+ All Categories
Home > Documents > Data Security Essentialsrabbittech.net/wp-content/uploads/2019/04/Security-Talk-2018.pdf · How to...

Data Security Essentialsrabbittech.net/wp-content/uploads/2019/04/Security-Talk-2018.pdf · How to...

Date post: 12-Jun-2020
Category:
Upload: others
View: 1 times
Download: 0 times
Share this document with a friend
16
Data Security Essentials How to protect your data from hackers.
Transcript
Page 1: Data Security Essentialsrabbittech.net/wp-content/uploads/2019/04/Security-Talk-2018.pdf · How to secure online accounts • Do not use “personal” accounts. • Must have support

Data Security EssentialsHow to protect your data from hackers.

Page 2: Data Security Essentialsrabbittech.net/wp-content/uploads/2019/04/Security-Talk-2018.pdf · How to secure online accounts • Do not use “personal” accounts. • Must have support

Topics we will cover• How to secure your computer

• How to secure your online accounts

• Phishing & Spoofing - what to know & how to avoid

• Questions

Page 3: Data Security Essentialsrabbittech.net/wp-content/uploads/2019/04/Security-Talk-2018.pdf · How to secure online accounts • Do not use “personal” accounts. • Must have support

How to secure your computerFirewall

• How to check built in firewall

• Windows - Type “firewall” in start menu

• Mac - type “firewall” in spotlight

• What about the network? My home office?

• How to check modem or router firewall at home

Page 4: Data Security Essentialsrabbittech.net/wp-content/uploads/2019/04/Security-Talk-2018.pdf · How to secure online accounts • Do not use “personal” accounts. • Must have support

How to secure your computerAnti-Virus

• Anti-Virus - what does it protect you from?

• Virus vs malware

• Other features - anti-phishing, malware scans

• Microsoft Security Essentials includes Windows Defender

• Select the Start  button, then select Settings  > Update & Security.

• Select Windows Defender, then turn Real-time protection on or off.

• examples of “active” antivirus

• Webroot

• ESET

• Bitdefender

Page 5: Data Security Essentialsrabbittech.net/wp-content/uploads/2019/04/Security-Talk-2018.pdf · How to secure online accounts • Do not use “personal” accounts. • Must have support

How to secure your computerAnti-Virus and Malware scanner

• What anti-virus to avoid:

• Kaspersky

• Norton

• What if anti-virus fails?

• Manual scan

• malwarebytes.org free version works great!

• SuperAntiSpyware.com

Page 6: Data Security Essentialsrabbittech.net/wp-content/uploads/2019/04/Security-Talk-2018.pdf · How to secure online accounts • Do not use “personal” accounts. • Must have support

Have a Mac?

• Keep it updated

• Built in tools

• App control

• FileVault (128-bit AES full disc encripiton)

• Find My Mac

Page 7: Data Security Essentialsrabbittech.net/wp-content/uploads/2019/04/Security-Talk-2018.pdf · How to secure online accounts • Do not use “personal” accounts. • Must have support

How to secureonline accounts

• Do not use “personal” accounts.

• Must have support available.

• Types of accounts to avoid:

• Yahoo, AOL, Hotmail, MSN, other free email services

• 2016 - Every single Yahoo account was hacked - 1 billion accounts hacked. After completion of sale to Verizon that was revised to 3 billion, in other words ALL the accounts.

• 2004 500 million Yahoo accounts hacked

• Use a company provided account (kw.com)

• Set up your own business account (G-Suite)

• 2-step (or two factor) authentication

• How to set up in google accounts

Page 8: Data Security Essentialsrabbittech.net/wp-content/uploads/2019/04/Security-Talk-2018.pdf · How to secure online accounts • Do not use “personal” accounts. • Must have support

How to secureonline accounts

• Passwords, Passwords, Passwords

• How complex?

• 16 characters or more

• Why do I need to do upper case, lower case, numbers & symbols?

• Password Calculator

• Do not repeat passwords across services.

• Password manager

• Lastpass

• Onepass

• Always use 2-step (or two factor) authentication

Page 9: Data Security Essentialsrabbittech.net/wp-content/uploads/2019/04/Security-Talk-2018.pdf · How to secure online accounts • Do not use “personal” accounts. • Must have support

Phishing & Spoofing• Phishing to harvest account info for sale

• Infecting computers to use as a resource for spam and processor farms

• Money scams with address book (Help me I’m trapped somewhere please send money)

• Sending out ransomware

• Spoofed emails regarding wire transfers

• Email account compromised

• Hacker waits for the right time to send wire transfer request

Page 10: Data Security Essentialsrabbittech.net/wp-content/uploads/2019/04/Security-Talk-2018.pdf · How to secure online accounts • Do not use “personal” accounts. • Must have support

Phishing & Spoofing

• Different styles of phishing scams

• Variations on email addresses (misspelling, substitute characters)

[email protected]

• chrí[email protected]

• Spoofed email header can look perfect

• Stolen email accounts from past phishing

Page 11: Data Security Essentialsrabbittech.net/wp-content/uploads/2019/04/Security-Talk-2018.pdf · How to secure online accounts • Do not use “personal” accounts. • Must have support

How to avoid phishing

• How to verify a link in an email

• Mouse over to see actual URL

• Verify with company representative

• Do not call the number in the email

• Look up company contact info independently

• What if I clicked? Is it too late?

• Do not respond to text messages - call and verify!

Page 12: Data Security Essentialsrabbittech.net/wp-content/uploads/2019/04/Security-Talk-2018.pdf · How to secure online accounts • Do not use “personal” accounts. • Must have support

Example Phishing through Text messages

Page 13: Data Security Essentialsrabbittech.net/wp-content/uploads/2019/04/Security-Talk-2018.pdf · How to secure online accounts • Do not use “personal” accounts. • Must have support

Good Practices• Immediately prior to

wiring any money, the person sending the money must call the intended recipient to verify the wiring instructions.  Only use a verified telephone number to make this call. 

• If you have to send sensitive info in email use a password protected PDF and transmit the password in a different communication method -

• How to add a password to a PDF on Mac and Windows

Page 14: Data Security Essentialsrabbittech.net/wp-content/uploads/2019/04/Security-Talk-2018.pdf · How to secure online accounts • Do not use “personal” accounts. • Must have support

If you think you have been hacked

• If money has been wired via false wiring instructions, immediately call all banks and financial institutions that could possibly put a stop to the wire.

• Contact your local police. 

• Contact any clients or other parties who may have been exposed during the attack so that they take appropriate action. Remind them not to comply with any requests from an unverified source.

• Change all usernames and passwords associated with any account that you believe may have been compromised or otherwise made vulnerable by the attack.

• Report any fraudulent activity to the Federal Bureau of Investigations via their Internet Crime Complaint Center.

• Brokers should report any fraudulent activity to their state or local REALTOR® association

Page 15: Data Security Essentialsrabbittech.net/wp-content/uploads/2019/04/Security-Talk-2018.pdf · How to secure online accounts • Do not use “personal” accounts. • Must have support

Questions?

Page 16: Data Security Essentialsrabbittech.net/wp-content/uploads/2019/04/Security-Talk-2018.pdf · How to secure online accounts • Do not use “personal” accounts. • Must have support

Thank You!


Recommended