1 / 19

Safe Internet Use

Safe Internet Use. Mark Wheatley CSI Onsite 952-928-1788 mark@csionsite.com. About Us. In business for over 15 years Purpose & Values driven Member in good standing with:. Safe Internet Use. What can we do to stay ahead? What to watch out for What is a URL?

ivria
Télécharger la présentation

Safe Internet Use

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Safe Internet Use Mark Wheatley CSI Onsite 952-928-1788 mark@csionsite.com

  2. About Us • In business for over 15 years • Purpose & Values driven • Member in good standing with:

  3. Safe Internet Use • What can we do to stay ahead? • What to watch out for • What is a URL? • What is Phishing / Spoofing? • Threat Evolution - Malware • Good Practice - 5 rules (CSI Onsite Style)

  4. What to watch out for • URLs – Uniform Resource Locator • URL is the address to visit a web site • Domain name translates to an IP address • Can be masked to appear as something different than actual address • Web browser ignores the @ symbol in address • Besides the http://, look for the first “/” • Words to the left of that slash, is actual domain name

  5. What to watch out for • Hyperlinks, URLs and Redirects • Easy to spoof • Underlying address may be different than visible link • Domain names that are close to actual • www.micosoft.com • www.verify-microsoft.com • ww.mircosoft.com • Examples

  6. Examples • Fake Link • Look for the first “/” after http://

  7. What to watch out for • Phishing • Get you to click on link/s with malicious or fraudulent intent • Potential for identity theft • Fake emails from company with whom you do business • PayPal / EBay fraud • Fake charities • Urgent wording • Fake links with legitimate appearance http://office.microsoft.com/en-us/outlook/HA011400021033.aspx

  8. Examples • Link is the same as actual, but hoping you’ll only look at first or second line. • Look for the “/”. … viewvideopatch.com/

  9. What to watch out for • Email Spoofing • Email appearing to be from someone other than the actual sender • Spamming technique • Creates concern for recipient • Could be sent from infected computer • Open relays • Many ISPs requiring outbound e-mail authentication to keep infected computers from relaying email

  10. Examples • Spoofed Sender • Link that is close to actual • Clicked on link • Looked identical to PayPal site • All links were correct • Except one

  11. Examples Received: from blackbed by server1.0traffic.com with local (Exim 4.69) (envelope-from <blackbed@server1.0traffic.com>) id 1S55eO-0007wH-Bd for sales@csionsite.com; Tue, 06 Mar 2012 20:26:47 -0500 To: sales@csionsite.com Subject: Your package is available for pickup From: "FedEx Support" <information@fedex.com>

  12. Threat Evolution • What is Malware? • Short for Malicious Software • Disrupt computer operation, gather information or exploit system or data, without consent • Hostile, intrusive or annoying software • Delivered to system via: • Email attachment • Web site re-direct • Infected system, flash drive, software install

  13. Examples • Virus Attachment

  14. Threat Evolution • Can look like legitimate software • Hold your system ransom • Lock system down so even skilled technicians may choose to reload computer operating system, or restore from backup rather than try to find or un-do changes • Capture credit card information, leading to identity theft

  15. Examples • Looks legit and has feel of a Windows app • Could make changes to system with AV software installed • Entire window, one big “install me now” button • Shield in corner looks just like Windows Update • All BAD!

  16. Threat Evolution • Malicious intent – take down company web presence • Organized crime • Fraud • Financial gain • 1% of 1million emails = 10,000 • X $40 = a lot of money to be had….

  17. What can we do to stay ahead • Education, education, education • Software can’t always protect you • Be suspicious of Internet content • Operate computer with lesser privileges • Watch for drive-by downloads, or piggy-backing • Verify the software you do install, is legitimate and has good intentions • Email settings / spam filters • Create regular backups and system restore points

  18. 5 Basic Rules • Keep your antivirus software installed and definitions up to date • Careful where you browse… • Be careful when opening emails from people you do AND don’t know • Microsoft does not typically send updates or patches via email and neither do most software manufacturers • Check your hyperlinks and URLs before clicking

  19. Questions Email: mark@csionsite.com paul@csionsite.com john@csionsite.com dan@csionsite.com mail@csionsite.com Or Call: 952-928-1788

More Related