Security Basics Webinar

of 28/28
talks! Security Basics: Keep your Computers Safe October 28, 2010 Audio is only available by calling this number: Conference Call: 866-740-1260; Access Code: 6339392 Sponsored by
  • date post

    02-Jul-2015
  • Category

    Education

  • view

    718
  • download

    0

Embed Size (px)

description

When you have computers connected to the internet or to any external device, you need to take precautions. There are threats present that can not only cause harm to your computers, but could damage files on your network or potentially put sensitive data at risk. This free webinar will help you understand what the threats are and how your computers can get infected.

Transcript of Security Basics Webinar

  • 1. Security Basics: Keep your Computers Safe October 28, 2010 Audio is only available by calling this number: Conference Call: 866-740-1260; Access Code: 6339392 Sponsored by

2. Using ReadyTalk

  • Chat & raise hand
  • All lines are muted
  • If you lose your internet connection, reconnect using the link emailed to you.
  • If you lose your phone connection, re-dial the phone number and re-join.
  • ReadyTalk support:800-843-9166

3. You are being recorded

  • Streaming into Second Life
  • This seminar will be available on the TechSoup website along with pastwebinar presentations:
    • www.techsoup.org/go/webinars
  • You will receive a link to this presentation, material and links.
  • After the webinar, you can ask follow-up questions in our Community Forum:
    • http://bit.ly/ts-sec
  • Twitter hashtags: #techsoup

4. Security Basics: Keep your Computers Safe Presenter: Marian Merritt Sponsored by 5. We are working toward a time when every nonprofit and social benefit organization on the planet has the technology resources and knowledge they need to operate at their full potential. 6. Home page screen grab 7. Todays Speakers Kami Griffiths TechSoup Global Marian Merritt SymantecAssisting with chat questions:Kevin Lo & Gary Lamontagne, TechSoup Global 8. Agenda

  • Threat landscape
  • How do computers get infected
  • What is driving growth in malware
  • Staying safe
  • What to do if infected
  • Resources

9. Poll #1:Does your organization have an Acceptable Use Policy?

  • Yes
  • No

10. Poll #2:Do you provide internet safety training for your employees and volunteers?

  • Yes
  • No

11. Threat Landscape

  • 2/3 of adults globally have been victim of cybercrime:
  • Viruses/malware51%
  • Online scams10%
  • Phishing9%
  • Social network hacking7%
  • Online credit card fraud7%
  • Sexual predation7%

12. Types of Malware

  • Virus program that can spread from computer to another
  • Worm virus that can spread on its own
  • Trojan hidden in an offer of something good
  • Bot robot network, remotely controlled by criminal
  • Keystroke logger silently records valuable info and sends to criminal over the web

13. How Does This Happen?

  • Dangerous links in email, IM, Twitter messages, Facebook and YouTube comments
  • Infected devices: USB sticks, disks, laptops, digital photo frames
  • Fake work at home schemes, online auctions, online dating
  • Phishing attacks, spearphishing
  • Fake antivirus pop-up alerts
  • Ex-employees using privileges to access systems
  • Skimming

14. Why The Rapid Growth in Malware?

  • Underground cybercrime economy
  • Bigger business than international drug trade
  • Hackers with computer skills and desire for money
  • Organized online buy/sell of breached and stolen data
  • Low risk, high reward

15. Zeus Trojan - $70 million stolen from small business, non-profits 16. Huge growth in malware and new physical threats 17. How Do We Protect Ourselves?

  • Internet Security (more than just AntiVirus)on all systems
  • Create culture of security in the organization(not us vs. them)
  • Explain the why to your employees so theycan practice safe computing at home andwith their families
  • Create security policy and enforce it
  • Separate systems where possible
  • Backup data in more than one form
  • Other suggestions:
    • Web filtering
    • Enforce Safe Search settings

18. Acceptable Use Policy Tips

  • Created by IT and HR, approved by Legal
  • Identify restricted activities: (examples)
    • Taking devices home
    • Accessing inappropriate websites like porn or online shopping
    • Installing software other than IT approved and provided
    • Conducting financial transactions
    • Email activities are for work-related only
    • Social networking activity
  • Remind employees that email, IM and other activities are company property and monitored
  • Identify what happens if policy isnt followed

19. When To Suspect Malware Infection

  • Strange pop-ups ads
  • Hijacked browser
  • Slow computer
  • Antivirus isnt working
  • Lots of activity when you arent doing anything
  • Strange icons in tool tray
  • Search isnt working
  • Lots of bounced back email or sent email

20. What To Do If Infected?

  • Report to IT
  • Determine scope of infection (device only, account only, network wide)
  • Determine availability of backup, restore points and other forms of restoring to a clean system
  • Proceed to identify and remove malware
    • Scan with security software, remove or quarantine malware
    • Use more powerful malware removal tools from Norton, Microsoft, etc
  • Determine how the infection occurred and communicate to team
  • Contact financial institutions or other impacted organizations for further assistance

21. Social Network Risks

  • Dangerous links and hacked accounts
  • Sharing information incorrectly
  • Inappropriate photos and videos
  • Violating acceptable use policy by displaying offensive imagery, language, sharing jokes, etc

22. Resources

  • Symantec Security ResponseBlog
  • Norton Family Resourcewebsite
    • Free booklets on online safety
  • Every Click Matterswebsite
  • Microsoft and Norton malware removal tools:
    • Norton Power Eraser
  • Federal Trade Commission
  • Natl Cyber Security Association

23. Wrap Up

  • Malware what is it, where does it come from, how to stay safe
  • Cybercriminals how do they work
  • What to do if you get infected
  • Acceptable Use Policies
  • Additional Resources

24. Questions? Submit your questions using the chat box. 25. Continue the Discussion

  • Additional questions can be answered by posting in in our Community Forum:
    • http://bit.ly/ts-sec

26. Upcoming Webinars

  • Is FileMaker Right for Your Organization?
    • Thursday, November 18, 11 a.m.
  • Manage your Data, Donations and More with CiviCRM
    • Tuesday, November 23, 11 a.m.

27. Thank you to our Webinar Sponsor! ReadyTalk offers dedicated product demos forTechSoup organizations 4 times per week. For more information: pages.readytalk.com/techsoup.html 28. Thank you! Please complete the post event survey! Kami Griffiths, [email protected], 415-633-9392