+ All Categories
Home > Documents > Module 2 - Apple Security - NEOnetTechSocial!!!!!4!!! APPLE! PASSCODES!AND!LOCKSCREENS!...

Module 2 - Apple Security - NEOnetTechSocial!!!!!4!!! APPLE! PASSCODES!AND!LOCKSCREENS!...

Date post: 16-Jul-2020
Category:
Upload: others
View: 3 times
Download: 0 times
Share this document with a friend
23
TechSocial 1 APPLE SECURITY
Transcript
Page 1: Module 2 - Apple Security - NEOnetTechSocial!!!!!4!!! APPLE! PASSCODES!AND!LOCKSCREENS! Under!Touch!ID!&!Passcode,!you!can!customize!the!security!forunlocking! your!iPhone.!Bydefault,!the!iPhone

TechSocial  

 

           1  

 

 

APPLE  SECURITY    

   

   

 

Page 2: Module 2 - Apple Security - NEOnetTechSocial!!!!!4!!! APPLE! PASSCODES!AND!LOCKSCREENS! Under!Touch!ID!&!Passcode,!you!can!customize!the!security!forunlocking! your!iPhone.!Bydefault,!the!iPhone

TechSocial  

 

           2  

 

WELCOME  TO  TECHSOCIAL  

The  following  manual  will  provide  an  introduction  to  software  and  hardware  specifications  of  Android  and  Apple  devices.  Our  goal  is  for  you  to  familiarize  yourself  with  the  interface  of  your  device  and  alter  your  settings  to  suit  your  needs.    

We  would  like  to  thank  the  Ontario  Trillium  Foundation  and  the  Venture  Centre  funding  this  project,  and  to  all  our  community  partners  who  are  helping  to  ensure  the  success  of  this  program.  

LEARNING  OBJECTIVES  

•   Understand  the  basic  security  functions  of  your  tablet  or  smartphone  •   How  to  make  changes  to  your  security  settings  •   To  feel  comfortable  using  the  basic  security  functions  of  your  device  •   To  recognize  the  types  of  security  threats  to  your  mobile  device  

 

 

 

 

 

 

 

 

 

 

 

 

 

Page 3: Module 2 - Apple Security - NEOnetTechSocial!!!!!4!!! APPLE! PASSCODES!AND!LOCKSCREENS! Under!Touch!ID!&!Passcode,!you!can!customize!the!security!forunlocking! your!iPhone.!Bydefault,!the!iPhone

TechSocial  

 

           3  

 

 

TABLE  OF  CONTENTS  Apple  Security  .......................................................................................................................  1  Welcome  to  TechSocial  ................................................................................................................  2  Learning  Objectives...............................................................................................................................................  2  

Apple  ........................................................................................................................................  4  Passcodes  and  Lockscreens  ........................................................................................................  4  To  Change  a  Passcode  Lock  ...............................................................................................................................  4  Setup  Touch  ID  &  Face  ID...................................................................................................................................  6  

Privacy  Settings..............................................................................................................................  9  Location  Services  ....................................................................................................................................................  9  Emergency  S.O.S  ......................................................................................................................................................  9  

Find  my  Device  ............................................................................................................................  10  Set  up  .........................................................................................................................................................................  11  How  To  Use  Find  My  Device  ..........................................................................................................................  12  

Protecting  yourself  online  ..............................................................................................  14  Hacking  &  Malware  ....................................................................................................................  14  Strong  passwords  .......................................................................................................................  15  Applications  .................................................................................................................................  16  Spam  ...............................................................................................................................................  17  Phishing  Scams............................................................................................................................  18  Pharming  ......................................................................................................................................  19  Reporting  Fraud..........................................................................................................................  19  Steps  to  Protect  Yourself  ..........................................................................................................  21  

 

 

 

 

 

 

 

Page 4: Module 2 - Apple Security - NEOnetTechSocial!!!!!4!!! APPLE! PASSCODES!AND!LOCKSCREENS! Under!Touch!ID!&!Passcode,!you!can!customize!the!security!forunlocking! your!iPhone.!Bydefault,!the!iPhone

TechSocial  

 

           4  

 

APPLE  

PASSCODES  AND  LOCKSCREENS  

Under  Touch  ID  &  Passcode,  you  can  customize  the  security  for  unlocking  your  iPhone.  By  default,  the  iPhone  requires  a  passcode  to  unlock  it.  If  you  have  an  iPhone  5S  or  a  newer  version,  you  can  also  unlock  your  iPhone  using  your  fingerprint  with  a  feature  called  Touch  ID.  

TO  CHANGE  A  PASSCODE  LOCK  

When  you  first  start  up  your  iPhone,  you'll  be  prompted  to  create  a  passcode  lock.  If  you  ever  want  to  change  it,  it's  pretty  easy  to  do  so.    

Tap  the  Settings  icon  on  your  Home  screen,  then  tap  Touch  ID  &  Passcode.  General  settings  will  appear.  Scroll  down  and  tap  Change  

Passcode.  

 

 

Page 5: Module 2 - Apple Security - NEOnetTechSocial!!!!!4!!! APPLE! PASSCODES!AND!LOCKSCREENS! Under!Touch!ID!&!Passcode,!you!can!customize!the!security!forunlocking! your!iPhone.!Bydefault,!the!iPhone

TechSocial  

 

           5  

 

 

Personal  Identification  Number  or  PIN  is  a  4-­‐to-­‐17-­‐digit  numerical  code  The  disadvantage  is  that  it  might  be  easier  for  someone  to  crack  than  a  full-­‐blown  password.  

For  a  four-­‐digit  numeric  code:  Use  the  keypad  to  enter  your  current  passcode.  The  next  screen  will  automatically  appear,  prompting  you  to  enter  a  new  passcode.  Enter  the  new  passcode.  (You'll  need  to  enter  it  twice  to  confirm.)Your  new  passcode  will  be  set  

 

For  an  alphanumeric  password,  select  the  passcode  options.  Select  custom  alphanumeric  code.  Type  the  password  you’re  comfortable  with.  The  password  must  be  at  least  4  characters,  must  be  no  more  than  17  characters,  and  must  contain  at  least  1  letter.  Use  an  alphanumerical  password  with  symbols  that’s  at  least  8  characters  long  for  ultimate  security,  but  anything  will  do.  Hit  continue.  Re-­‐enter  the  password  to  confirm.  

 

 

Page 6: Module 2 - Apple Security - NEOnetTechSocial!!!!!4!!! APPLE! PASSCODES!AND!LOCKSCREENS! Under!Touch!ID!&!Passcode,!you!can!customize!the!security!forunlocking! your!iPhone.!Bydefault,!the!iPhone

TechSocial  

 

           6  

 

SETUP  TOUCH  ID  &  FACE  ID  

Some  phones  have  even  more  options  for  lock-­‐screen  security.  Newer  phones  with  front-­‐facing  cameras  should  have  an  option  for  Face  ID,  though  it  might  not  be  as  practical  for  typical  usage  (for  instance,  you  may  have  trouble  unlocking  your  phone  in  low  light,  and  someone  with  a  photo  of  you  could  simply  use  that  to  unlock  it).    

With  the  newer  iPhones,  you  can  set  up  your  iPhone  to  unlock  using  your  fingerprint.  This  feature  adds  an  extra  security  measure  since  fingerprints  are  unique  to  each  person.  Touch  ID  can  be  used  to  unlock  your  phone,  bypass  iTunes  password  and  Apple  Pay.    You  can  also  add  multiple  fingerprints  to  Touch  ID,  allowing  you  to  use  any  number  of  your  fingers  to  unlock  the  phone.  

Tap  the  Settings  icon  on  your  home  screen,  and  then  tap  Touch  ID  &  Passcode.  Input  your  passcode,  then  tap  Add  a  Fingerprint  

 

Page 7: Module 2 - Apple Security - NEOnetTechSocial!!!!!4!!! APPLE! PASSCODES!AND!LOCKSCREENS! Under!Touch!ID!&!Passcode,!you!can!customize!the!security!forunlocking! your!iPhone.!Bydefault,!the!iPhone

TechSocial  

 

           7  

 

 

Next,  you'll  see  a  screen  that  gives  you  the  details  on  fingerprint  security,  so  read  through  this  carefully,  then  press  "Continue."  From  here,  you'll  be  prompted  to  add  a  back-­‐up  code  that  will  be  used  in  the  event  that  the  scanner  fails  to  recognize  your  fingerprint.  

Follow  the  instructions  shown  on  the  screen,  and  then  place  your  finger  or  thumb  on  the  home  button.  You  may  need  to  touch  the  Home  Button  repeatedly  until  the  iPhone  gets  a  good  read  of  your  fingerprint  

Your  fingerprint  will  be  added,  and  you  can  now  unlock  the  iPhone  with  your  fingerprint  with  Touch  ID  

 

   

Page 8: Module 2 - Apple Security - NEOnetTechSocial!!!!!4!!! APPLE! PASSCODES!AND!LOCKSCREENS! Under!Touch!ID!&!Passcode,!you!can!customize!the!security!forunlocking! your!iPhone.!Bydefault,!the!iPhone

TechSocial  

 

           8  

 

Face  ID  is  another  great  feature  on  Apple  based  operating  systems.  Before  you  set  up  Face  ID,  make  sure  that  there  isn't  anything  covering  the  TrueDepth  camera  or  your  face.  Face  ID  is  designed  to  work  with  glasses  and  contacts.  Face  ID  works  best  when  your  iPhone  X  is  approximately  an  arm’s  length  or  closer  (10-­‐20  inches)  from  your  face.  

Firstm  go  to  Settings  and  then  click  Face  ID  &  Passcode.  Tap  the  Set  Up  Face  ID,  then  tap  to  Get  Started.    

Look  Straight  into  your  device  with  your  face  inside  the  frame.  Gently  move  your  head  around  the  scricle  to  complete  it.  If  you  are  unable  to  move  your  head,  tap  the  Accessiblity  Options.  Tap  continue  to  do  this  process  one  more  time.    

Your  Face  ID  set-­‐up  is  complete!    

 

 

 

 

 

 

 

 

 

 

 

Page 9: Module 2 - Apple Security - NEOnetTechSocial!!!!!4!!! APPLE! PASSCODES!AND!LOCKSCREENS! Under!Touch!ID!&!Passcode,!you!can!customize!the!security!forunlocking! your!iPhone.!Bydefault,!the!iPhone

TechSocial  

 

           9  

 

PRIVACY  SETTINGS  

Using  a  mobile  device  will  allow  you  to  interact  in  new  ways  with  new  people.  Though  these  new  interactions  can  be  exciting  at  times,  but  there  is  also  a  need  for  a  certain  amount  of  privacy  while  online.  By  reviewing  the  following  list  of  privacy  settings,  you  will  help  ensure  that  you  are  not  over  sharing  on  the  internet  and  connecting  with  others  in  a  safe  manner.    

LOCATION  SERVICES  

To  see  what  applications  are  monitoring  your  location  navigate  to  your  settings  menu.  From  the  settings  menu,  select  the  submenu  titled  Privacy  and  then  Location  services.  From  this  submenu,  you’ll  be  able  to  see  any  applications  that  have  requested  to  track  your  location  or  are  currently  monitoring  your  location.  Selecting  one  of  these  apps  will  allow  you  to  set  your  preference  for  which  apps  have  permission  to  track  your  location.    

 

EMERGENCY  S.O.S  

If  your  phone  has  an  SOS  feature,  it  can  be  turned  on  in  the  Privacy  and  Safety  submenu  of  your  settings  menu.  This  feature  will  activate  when  you  press  your  power  button  three  times.  The  SOS  feature  will  send  a  front/rear  camera  photo,  audio  recording,  exact  location,  and  help  needed  message  to  three  of  your  pre-­‐selected  emergency  contacts.  This  can  be  a  useful  feature  in  case  of  an  emergency.    

Page 10: Module 2 - Apple Security - NEOnetTechSocial!!!!!4!!! APPLE! PASSCODES!AND!LOCKSCREENS! Under!Touch!ID!&!Passcode,!you!can!customize!the!security!forunlocking! your!iPhone.!Bydefault,!the!iPhone

TechSocial  

 

           10  

 

FIND  MY  DEVICE  

Find  My  Device  is  one  application  that  we  recommend  you  allow  location  tracking.  This  application  allows  you  to  track  your  phone  if  it  is  lost,  as  well  as  completely  wipe  the  memory  from  your  phone  in  the  event  that  it’s  stolen.  That’s  an  extremely  helpful  tool  because  then  you  don’t  have  to  worry  about  if  the  phone  thief  will  have  access  to  all  of  the  information  on  your  phone.  These  apps  and  features  are  available  on  both  iPhone  and  Android  phones.  

Smartphones  are  a  large  part  of  our  everyday  lives  and  so  we  load  them  up  with  vast  amounts  of  personal  information.  If  our  devices  are  stolen,  we’re  putting  our  identity  in  jeopardy  because  of  all  the  unlimited  information  we  allow  these  devices  to  store.  Following  these  steps  can  help  save  your  identity  in  the  event  that  your  smartphone  is  stolen.    

If  you  lose  your  Apple  device,  you  can  locate,  lock,  or  erase  your  device  with  Find  My  Device.  Find  My  Device  is  a  default  application  for  Apple  devices  associated  and  can  be  turned  on  through  your  icloud  settings  menu.    

 

 

 

 

 

 

 

Page 11: Module 2 - Apple Security - NEOnetTechSocial!!!!!4!!! APPLE! PASSCODES!AND!LOCKSCREENS! Under!Touch!ID!&!Passcode,!you!can!customize!the!security!forunlocking! your!iPhone.!Bydefault,!the!iPhone

TechSocial  

 

           11  

 

SET  UP    

Tap  on  the  Settings  app  and  select  your  iCloud  account.  If  you’re  on  iOS  10.2  or  earlier  go  to  Settings  and  select  iCloud.  

 

 

Scroll  to  the  bottom  and  select  Find  My  iPhone.  

Turn  on  Find  My  iPhone  and  Send  Last  Location.  

 

Page 12: Module 2 - Apple Security - NEOnetTechSocial!!!!!4!!! APPLE! PASSCODES!AND!LOCKSCREENS! Under!Touch!ID!&!Passcode,!you!can!customize!the!security!forunlocking! your!iPhone.!Bydefault,!the!iPhone

TechSocial  

 

           12  

 

HOW  TO  USE  FIND  MY  DEVICE  

Find  the  approximate  location  of  your  iOS  device  using  Find  My  iPhone  on  iCloud.com.  You  can  locate  your  device  if  Find  My  iPhone  is  set  up,  or  the  device  is  awake  and  in  range  of  a  WiFi  network.  If  you  have  Family  Sharing  set  up,  you  can  also  find  a  family  members  device.  

Click  on  All  Devices.  In  the  list,  the  dot  next  to  the  device  indicates  its  status.  Select  the  device  you  would  

like  to  locate.  

A  green  dot    means  that  the  device  is  online.  You  can  also  see  the  

time  it  was  last  located.  

A  grey  dot    means  that  its  turned  off  or  not  connected  to  a  

network.  If  the  device  was  recently  online,  you  can  see  the  time  it  was  last  located.  If  the  device  has  been  offline  for  over  24  hours,  it  will  be  offline.  

 

 

If  your  device  is  online,  you  can  track  its  whereabouts  to  it’s  last  known  location.  The  tracking  can  be  approximate  by  about  a  couple  

of  metres.  

If  you  find  that  the  circle  is  too  large,  wait  a  few  minutes  for  the  location  tracker  to  update.  If  the  circle  remains  large,  your  device  might  not  have  access  to  WiFi  or  

Page 13: Module 2 - Apple Security - NEOnetTechSocial!!!!!4!!! APPLE! PASSCODES!AND!LOCKSCREENS! Under!Touch!ID!&!Passcode,!you!can!customize!the!security!forunlocking! your!iPhone.!Bydefault,!the!iPhone

TechSocial  

 

           13  

 

GPS.  

You  can  update  the  location  by  clicking  the  Refresh  button    

You  can  also  move  around  the  map  by  dragging  it,  zooming  in  and  out  with  the  plus  and  minus  buttons      

 

You  can  also  change  the  map  view.  Click  the  current  view,  such  as  

Standard  View,  in  the  bottom  right  corner  and  change  to  the  map  

preference  you  prefer.  

   

 

You  can  also  lock  your  device  from  the  Find  My  iPhone  screen  to  add  an  extra  security  measure.  If  you  are  close  to  your  device,  you  can  command  it  to  make  a  noise.  Or  as  a  last  resort,  erase  the  data  

on  your  device.  This  can  be  accessed  from  the  Actions  button.  

 

 

 

 

Page 14: Module 2 - Apple Security - NEOnetTechSocial!!!!!4!!! APPLE! PASSCODES!AND!LOCKSCREENS! Under!Touch!ID!&!Passcode,!you!can!customize!the!security!forunlocking! your!iPhone.!Bydefault,!the!iPhone

TechSocial  

 

           14  

 

PROTECTING  YOURSELF  ONLINE  Using  your  smartphone  and  tablets  to  go  online  makes  every  day  activities  such  as  shopping,  banking,  paying  bills  and  keeping  in  touch  that  much  easier.  There  are,  however,  a  number  of  risks  when  it  comes  to  going  online.  Some  risks  include  identity  theft,  phishing  scams,  viruses  and  hacking.    

HACKING  &  MALWARE  

Hacking  is  a  term  used  to  describe  someone  who  has  gained  access  to  your  device  without  your  authorization.  Hackers  find  weaknesses  in  your  security  settings  and  exploit  them  in  order  to  gain  access  to  your  personal  information.  They  most  often  access  your  information  through  a  Trojan  Horse,  which  provides  a  back  door  for  hackers  to  enter  and  search  your  information.  

Malware  –  a  malicious  piece  of  code  -­‐  could  get  on  your  machine  when  you  open  an  attachment  or  link.  Malware  is  one  of  the  more  common  ways  to  infiltrate  or  damage  your  device.  It  infects  your  device  with  malicious  software,  such  as  viruses,  worms,  Trojan  Horses,  spyware  and  adware.  Malware  can  alter  or  delete  your  files,  steal  information,  send  emails  on  your  behalf  or  reformat  your  device.  

 

 

 

Page 15: Module 2 - Apple Security - NEOnetTechSocial!!!!!4!!! APPLE! PASSCODES!AND!LOCKSCREENS! Under!Touch!ID!&!Passcode,!you!can!customize!the!security!forunlocking! your!iPhone.!Bydefault,!the!iPhone

TechSocial  

 

           15  

 

STRONG  PASSWORDS  

Choosing  a  strong  password  is  very  important  when  it  comes  to  protecting  yourself  online.  A  study  in  2012  by  the  Javelin  Strategy  and  Research  found  that  62%  of  users  did  not  have  a  password  on  their  device.  Not  using  a  password  means  that  if  you  lose  your  phone,  a  stranger  can  pick  up  your  phone  and  easily  access  your  personal  information.    

When  choosing  a  password,  it  is  essential  to  select  a  long  and  difficult  password.  If  you  decide  on  a  numerical  password,  don’t  select  an  easy  one  such  as  1-­‐2-­‐3-­‐4.  Instead,  choose  your  favourite  date  –  not  your  birthday  or  your  SIN  number  –  or  sequence  of  numbers.    

When  it  comes  to  creating  profiles  for  social  media  accounts,  e-­‐commerce  or  email,  choosing  the  right  password  can  save  you  a  lot  of  headaches  in  the  future.  Always  use  a  minimum  of  6  characters  and  a  combination  of  numbers  and  symbols  (such  as  !,  @,  #,  $,  etc.,).  You  will  also  want  to  make  sure  to  change  your  password  every  so  often,  typically  every  3-­‐5  months.  An  ideal  password  should  be  hard  to  guess  but  easy  for  you  to  remember.    

 

 

   

Page 16: Module 2 - Apple Security - NEOnetTechSocial!!!!!4!!! APPLE! PASSCODES!AND!LOCKSCREENS! Under!Touch!ID!&!Passcode,!you!can!customize!the!security!forunlocking! your!iPhone.!Bydefault,!the!iPhone

TechSocial  

 

           16  

 

APPLICATIONS  

When  you  download  an  app  from  the  Apple  App  Store  or  the  Google  Play  Store  a  list  pops  up  and  you  have  to  select  “I  accept”  or  “OK”  to  complete  the  download  of  the  app.  This  list  is  filled  with  the  information  the  app  has  access  to  on  your  phone.  Some  of  the  information  that  a  majority  of  popular  apps  have  access  to  includes  your  device’s  location,  photos,  contacts  and  calendar,  among  other  information.  It’s  exciting  

when  you  purchase  or  download  a  new  app,  but  you  need  to  take  a  minute  to  double  check  what  this  app  requires  access  to  because  it  could  very  well  be  that  the  app  will  have  access  to  more  information  that  you’re  comfortable  with.    

Besides  double-­‐checking  what  the  app  has  access  to,  you  should  also  go  into  the  app’s  settings  and  disable  the  tracking  ability.  Tracking  your  location  on  Facebook  can  be  fun,  however  it  also  might  be  putting  your  identity  and  safety  in  jeopardy.  The  problem  with  apps  that  track  your  device’s  location  is  that  you’re  making  a  roadmap  

of  your  life  —  places  you  regularly  go  to  and  even  the  location  of  your  home.  By  turning  the  location  tracking  off  on  the  apps,  you’re  protecting  your  privacy  from  future  phone  hackers.  If  you  opt  to  allow  your  apps  to  track  your  location  then  you  are  possibly  making  yourself  more  vulnerable  to  identity  hacking.  

Page 17: Module 2 - Apple Security - NEOnetTechSocial!!!!!4!!! APPLE! PASSCODES!AND!LOCKSCREENS! Under!Touch!ID!&!Passcode,!you!can!customize!the!security!forunlocking! your!iPhone.!Bydefault,!the!iPhone

TechSocial  

 

           17  

 

SPAM  

Spam  is  one  of  the  more  common  methods  of  both  sending  information  out  and  collecting  it  from  unsuspecting  people.  Canada  has  a  new  anti-­‐spam  legislation  that  you  can  learn  more  about  at  www.fightspam.gc.ca.  Spam  is  the  mass  distribution  of  unsolicited  messages,  advertising  or  pornography  to  addresses,  which  can  be  easily  found  on  the  Internet  through  things  like  social  networking  sites,  company  websites  and  personal  blogs.  Canada's  anti-­‐spam  legislation  applies  to  all  commercial  electronic  messages.  A  commercial  electronic  message  is  any  electronic  message  that  encourages  participation  in  a  commercial  activity,  regardless  of  whether  there  is  an  expectation  of  profit.  

Cell  phone  spam  is  a  common  problem.  As  we  increasingly  rely  on  smartphones  for  communications,  the  potential  for  spam  increases.  Most  spam  received  on  smartphones  is  from  Short  Messaging  Service  (SMS),  otherwise  known  as  text  message.  Smartphone  spam  can  be  costly.  If  you  don’t  have  a  messaging  plan,  you  could  end  up  paying  for  unwanted  texts,  or  your  personal  information  (such  as  credit  card)  can  be  comprised.      

 

 

 

 

Page 18: Module 2 - Apple Security - NEOnetTechSocial!!!!!4!!! APPLE! PASSCODES!AND!LOCKSCREENS! Under!Touch!ID!&!Passcode,!you!can!customize!the!security!forunlocking! your!iPhone.!Bydefault,!the!iPhone

TechSocial  

 

           18  

 

PHISHING  SCAMS  

Clicking  on  unknown  links  may  lead  to  “phishing”  sites  that  harvest  usernames  and  passwords.  Pay  attention  to  suspect  emails  as  more  and  more  hackers  are  getting  sophisticated  in  the  way  they  write  them.    

In  this  example,  we  can  clearly  see  that  something  looks  suspicious.  For  one,  when  a  company  like  PayPal  sends  you  an  email,  they  will  always  include  their  logo.    

Phishing  is  used  most  often  by  cyber  criminals  because  it's  easy  to  execute  and  can  produce  the  results  they're  looking  for  with  very  little  effort.  Fake  emails,  text  messages  and  websites  are  created  to  look  like  they're  from  authentic  companies.  They're  sent  by  criminals  to  steal  personal  and  financial  information  from  you.  This  is  also  known  as  “spoofing”.  "Smishing"  is  the  cell  phone  equivalent,  with  con  artists  texting  your  phone  with  messages  that  link  to  web  sites  where  you  might  be  asked  to  reveal  confidential  information.  

 

Page 19: Module 2 - Apple Security - NEOnetTechSocial!!!!!4!!! APPLE! PASSCODES!AND!LOCKSCREENS! Under!Touch!ID!&!Passcode,!you!can!customize!the!security!forunlocking! your!iPhone.!Bydefault,!the!iPhone

TechSocial  

 

           19  

 

PHARMING    

Pharming  is  a  type  of  online  fraud.  It  convinces  the  user  that  the  site  is  real  and  legitimate  by  spoofing  or  looking  almost  identical  to  the  actual  site  down  to  the  smallest  details.  You  may  enter  your  personal  information  and  unknowingly  give  it  to  someone  with  malicious  intent.  This  is  often  applied  to  the  websites  of  banks  or  e-­‐commerce  sites.    

It  is  possible  to  increase  your  protection  with  some  simple  steps  and  precautions.  The  URL  is  also  a  great  place  to  check.  Always  ensure  that,  once  the  page  has  loaded,  that  the  URL  is  spelt  correctly  and  hasn’t  redirected  to  a  slightly  different  spelling,  perhaps  with  

additional  letters  or  with  the  letters  swapped  around.  One  of  the  biggest  fears  is  that  pharmers  will  attack  major  banking  services  or  e-­‐commerce  sites.  When  you  reach  the  payment  point  or  the  point  wherein  you  are  asked  to  type  in  banking  passwords  and  usernames,  ensure  that  the  http  has  changed  to  https,  as  the  ‘s’  stands  for  secure.  

REPORTING  FRAUD  

It  is  also  very  important  to  note  that  you  should  never  share  your  password  with  anyone  who  you  don’t  know  or  who  you  don’t  trust.  If  you  receive  a  message,  email,  or  phone  call  from  an  unknown  source  that  is  asking  for  your  personal  information,  make  sure  to  report  the  incident.  Facebook,  Twitter,  Instagram,  and  email  service  providers  all  have  reporting  functions.    

If  you  believe  you  or  someone  you  know  may  have  provided  personal  or  financial  information  to  an  unknown  source  it  is  imperative  that  you  notify  your  banking  institution,  credit  card  companies,  and  credit  bureau.  You  can  also  notify  your  local  police  and  Canada  Anti-­‐Fraud  Centre:  

Page 20: Module 2 - Apple Security - NEOnetTechSocial!!!!!4!!! APPLE! PASSCODES!AND!LOCKSCREENS! Under!Touch!ID!&!Passcode,!you!can!customize!the!security!forunlocking! your!iPhone.!Bydefault,!the!iPhone

TechSocial  

 

           20  

 

Canada  Anti  Fraud  Centre  1-­‐888-­‐495-­‐8501  

Or  visit  their  website  at    http://www.antifraudcentre-­‐centreantifraude.ca/  

 

Here  are  few  things  to  be  cautious  of  when  online  and  help  you  identify  fraudulent  activities:    

It  sounds  too  good  to  be  true  You've  won  a  big  prize  in  a  contest  that  you  don't  recall  entering.  You're  told  that  you  

can  buy  into  a  lottery  ticket  pool  that  cannot  lose.  

You  must  give  them  your  private  financial  information  "You're  a  winner!"  but  you  must  agree  to  send  money  to  the  caller  in  order  to  pay  for  

delivery,  processing,  taxes,  duties  or  some  other  fee  in  order  to  receive  your  prize.  Sometimes  the  caller  will  even  send  a  courier  to  pick  up  your  money.  

The  manager  is  calling  Often   criminal   telemarketers   ask   you   to   send   cash   or   a  money   order,   rather   than   a  

cheque  or  credit  card.  Cash  is  untraceable  and  can't  be  cancelled.  And,  crooks  also  have  difficulty  in  establishing  themselves  as  merchants  with  legitimate  credit  card  companies.  

The  stranger  calling  wants  to  become  your  best  friend  Criminals   love   finding   out   if   you're   lonely   and  willing   to   talk.   Once   they   know   that,  

they'll  try  to  convince  you  that  they  are  your  friend  –  after  all,  we  don't  normally  suspect  our  friends  of  being  crooks.  

It's  a  limited  opportunity  and  you're  going  to  miss  out  If  you  are  pressured  to  make  a  big  purchase  decision  immediately,   it's  probably  not  a  

legitimate  deal.  Real  businesses  or  charities  will  give  you  a  chance  to  check  them  out  or  think  about  it.  

 

Page 21: Module 2 - Apple Security - NEOnetTechSocial!!!!!4!!! APPLE! PASSCODES!AND!LOCKSCREENS! Under!Touch!ID!&!Passcode,!you!can!customize!the!security!forunlocking! your!iPhone.!Bydefault,!the!iPhone

TechSocial  

 

           21  

 

STEPS  TO  PROTECT  YOURSELF  

Now  that  we  know  the  different  types  of  spam,  here’s  some  steps  to  protect  yourself:  

Use  different  passwords  for  every  account.  While   it  may   be   easier   to   have   the   same  password   for   every   account,  

having  multiple  passwords  keeps  your   information  much  more  safe.   If  the  password  or   email   address   that   you   use   gets   into   the  wrong   hands,   they  can  start  trying  that  password  on  other  websites  or  services.  

Make  sure  your  passwords  are  strong.  You   also   have   to  make   sure   those   passwords   are   good,   hard-­‐to-­‐guess  

passwords.  You  should  also  change  your  most  important  passwords  at  least  once  every  six  months.  

 

Set  up  two-­‐factor  authentication.  Two-­‐factor   authentication   or   two-­‐step   verification   is   something  

everyone   should   set   up   on   his   or   her   Google   account.   Other   services  provide   similar   security   safeguards.   (Twitter  is   said   to  be   setting   some  up  soon   too.)   The   service  provides  an  extra   layer  of   security.  When  you   sign  into  your  account  it  requires  you  to  enter  another  code,  which  you  can  only  get  via  text  or  a  voice  call.  This  way  no  one  can  get  into  your  account  unless  they  have  that  piece  too.  

Don't  reveal  too  much  on  social  networks.  We  are  often  providing  enough  information  via  social  media  for  hackers  

to   figure   out   our   passwords   or   answer   those   questions   in   the   password  reset  tools.  We  recommend  being  very  careful  about  what  information  you  share  on  your  public  profile.  

     

Page 22: Module 2 - Apple Security - NEOnetTechSocial!!!!!4!!! APPLE! PASSCODES!AND!LOCKSCREENS! Under!Touch!ID!&!Passcode,!you!can!customize!the!security!forunlocking! your!iPhone.!Bydefault,!the!iPhone

TechSocial  

 

           22  

 

Protect  your  devices  This  one  used   to  be   the  most  obvious  and  probably   still   is.  Make   sure  

your   devices   have   a   password,   and   keeping   your   software   up   to   date.  Updates   are   important   as   they   patch   any   loopholes   that   can   allow   your  device  to  be  hacked.  

Also,  make   sure   to   do   some   research   on   the   app   you   are  wanting   to  install   on   your   device.   Read   the   reviews   and  make   sure   it’s   from   a   legit  source.  

Secure  your  wireless  connection  Just  as  important  is  protecting  the  way  you  get  onto  the  Internet.  Make  

sure  you  have  protected  your  home  wireless  network  with  a  password  and  you   have   changed   the   default   SSID   (your   network's   name)   -­‐-­‐   that  means  changing  it  from  "Linksys"  to  something  else.  

 

Shop  only  at  safe  sites.  Make  sure  the  site  has  a  little  padlock  icon  next  to  the  address  and  it  has  

an  HTTPS  address  before  putting   in  your  credit  card  number.  Keep  a  close  eye  on  your  credit  card  bills  for  suspicious  charges.  In  addition,  make  sure  to   look   at   the   site   and   make   an   educated   decision   about   its   legitimacy.  Googling  it  also  make  sense  to  see  if  any  others  have  had  issues  with  it.  

Think  before  clicking  links  Clicking   links   is   second   nature   on   the   Internet,   we   should   be   careful  

before  we  click  those  lines  of  text.  Be  vigilant  about  what  links  you  click  in  an  email,  especially  when  they  come  from  companies.  Also,  don't  click  on  odd  direct  messages  or  Facebook  messages  with  links.  If  you're  friends  are  sending  exciting  photos  they  aren't  going  to  do  it  via  a  link.  

Pay  attention.  It  might  be  obvious,  but  just  remember  that  if  you're  using  any  Internet  

service  or  Web  browser  you  have  to  be  smart.  

Page 23: Module 2 - Apple Security - NEOnetTechSocial!!!!!4!!! APPLE! PASSCODES!AND!LOCKSCREENS! Under!Touch!ID!&!Passcode,!you!can!customize!the!security!forunlocking! your!iPhone.!Bydefault,!the!iPhone

TechSocial  

 

           23  

 

OTHER  PROGRAMS  THROUGH  TECHSOCIAL-­‐   BASIC  APPLICATIONS  -­‐   CYBERSECURITY  -­‐   DEFAULT  APPS  -­‐   ENTERTAINMENT  APPS  

-­‐   SOCIAL  MEDIA  -­‐   MOBILE  COMMERCE  -­‐   HEALTH  APPS  -­‐   CLOUD  COMPUTING  

 

 

WHERE  CAN  I  GET  MORE  HELP?  

In  addition  to  this  manual,  you  can  also  find  help  here:  

   Libraries   The  libraries  in  your  community  are  an  excellent  

resource  of  information  on  how  to  use  your  device.  Many  libraries  have  staff  that  is  able  to  assist  with  

questions  or  problems  with  your  device.  TechSocial  Team   You  can  contact  the  TechSocial  coordinators  any  

time.  They  are  available  to  answer  all  of  your  questions.  

 Email  –  [email protected]  

Phone  –  705-­‐360-­‐1353  Website  –  http://bit.ly/NEOnetTechSocial  

   


Recommended