1 / 16

Locking down your information

Locking down your information. By Boone Evans. The Virtual World. Main Ideas Why? Passwords Protection software Updating operating systems Firewall Keeping your information. Why Protect Yourself?. Safe computers make safe networks Your information can be used against you

Télécharger la présentation

Locking down your information

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Locking down your information By Boone Evans

  2. The Virtual World • Main Ideas • Why? • Passwords • Protection software • Updating operating systems • Firewall • Keeping your information

  3. Why Protect Yourself? • Safe computers make safe networks • Your information can be used against you • Losing your information costs you lots of money and time

  4. Passwords • Use passwords often • Change your passwords when you reset clocks • Do not let your computer remember passwords • Do not write passwords down

  5. Protection Software • Antispyware software is just as important as passwords • Keeps you identity safe • Computer can be infiltrated by many viruses and worms • Without this you may not even know of the problem

  6. Update Operating System • Without a capable operating system your computer is worthless • Updates are made very often • Must run updates for them to take effect • Vulnerable to theft without proper tools

  7. Firewalls Very effective and worthwhile • Expert’s definition • “It’s can be a nasty world out there in cyberspace, and a firewall is a hardware or software “barrier” that helps separate you from those who would do you harm”

  8. How to keep your info. • Secure Sites • Truly secure sites have “s” by “http” • https:/www.site.com or shttp:/www.site.com • Avoid • File sharing • Dangerous opens you up to intrusion • Phishing • Beware of suspicious emails • May look legitimate

  9. The Real World • Main Ideas • Ways you loose info. • Safe habits • Credit cards and mail • Trash • The sensitive information

  10. Ways you can loose info. • Steal wallet or purse • Take mail • Leave information in glove compartment • Dumpster Diving • Directly ask you

  11. Mail • Many of the everyday items you receive in mail have information the thief can use. • Credit card offers • Bank statements • Credit card bills • Lock your mailbox to be safe

  12. Safe habits • Never write PIN numbers down • Do not carry your Social Security Card • Carry only credit cards you will use • Shred papers with personal information before discarding • Cut up old credit cards

  13. Credit cards and Mail • Mail • Shred papers • Dumpster diving can get all information the thief needs • Credit cards • Easily stolen • Offers can be sent in and obtained if not properly discarded

  14. Trash • Thieves can use • Old bank statements • Credit card offers with application • Any piece of paper with your personal information • Digging through trash or “dumpster diving” is some thieves favorite hobby

  15. The Sensitive Information • Social security number • PIN numbers • Account numbers • Credit card numbers • With these things crooks can steal you identity and cost you a lot of money and time

  16. In conclusion • Protect yourself by • Keeping personal info. to yourself • Shredding trash and other papers • Remembering passwords and PINs • Changing passwords • Not carrying social security card • Updating operating system • Equping computer with correct software

More Related