Stay protected and secured

Stay protected and secured Please do not feel offended if you find this too obvious How many have a computer at home? • • • Everyone running s...
6 downloads 2 Views 2MB Size
Stay protected and secured

Please do not feel offended if you find this too obvious

How many have a computer at home?







Everyone running some kind of security suite? •





Internet connection all secured?

Anti-virus? Anti-spyware? Firewall?

Everyone know what anti-virus they are using? How about wireless? Anyone use wireless at home?

Fully Protected? Are you sure? Agenda: How to protect your home computer and for free

•It

used to be all you needed was an anti-virus software. •Anyone

ever get a virus? Or some kind of infection? •Viruses

are no longer the main threat.

Computer security

What is malware? • Malware is a generic name for all types of malicious programs: adware, backdoors, rogues, trojans, viruses, worms, foistware, bots etc...

Malware! ever heard of malware?

Adware (or spyware) is a small program that is designed to show advertisements (in various form and degrees of intrusiveness) on your computer. It often reports personal information back to its owners. As a result your sense of privacy can be violated. Backdoor A backdoor is a small malicious program that is used to gain access to a computer by bypassing the computer access security mechanisms. It gives the attacker almost unlimited rights. While it can be used to spy on a user, it is mainly used to install other malware on the system. Heuristic A technique designed to detect malware by empirical means but without having the specific data. Malware A generic name for all types of malicious programs: adware, backdoors, rogues, trojans, viruses and worms. Rogue A rogue program is a malicious program that is disguised, for instance, as trustworthy anti-spyware programs or registry cleaners. But these programs are only put on the market to scare you into buying these programs because they make exaggerated claims about the safety of your computer or, worse still, give erroneous scan results or put their own malware in your system. Trojan A trojan (or Trojan horse) is a small malicious program that pretends to have a particular function, but that only shows its real purpose after execution and that purpose is often destructive. Trojans cannot multiply themselves, which differentiates them from viruses and worms. Virus A virus is a small malicious program that multiplies and is capable to attach itself to other programs after being executed. It then causes an infection and causes various degrees of damage to your computer Worm A worm is often characterized as a malicious application that will use a host machine to infect other machines. Therefore worms can create enormous damage on networks with multiple computers.



Description of Malware

How to protect your computer at home

•1

Keep your Microsoft critical updates up-to-date



Start->Control Panel->Security Center or System and Security “make sure automatic updates is turned on”

How to protect your computer at home

1 • •



Keep your web browser up-to-date Best way to keep Internet Explorer up-to-date is by keeping your Windows up to date. Manual method: open up Internet Explore and go to Tools pull-down then select “Windows Update”

How to protect your computer at home

•2 • •

Keep your anti-virus up-to-date and understand your anti-virus also known as security suite Where to get your anti-virus software: Comcast gives you free Norton Security Suite http://www.comcast.net upper right corner select “Security” you have to be signed-in “if you don’t remember your sign-in info go to” http://security.comcast.net/email



AT&T DSL, Verizon DSL and Clearwire do not offer any free anti-virus software right now.



FREE Microsoft Security Essentials http://microsoft.com/security_essentials (Windows 7 with Security Essentials works really well)



AVG Free or AVG Internet Security http://free.avg.com/us-en/download-free-antivirus

How to protect your computer at home

•2

Anti-virus, as long as you use one of the top ten

http://anti-virus-software-review.toptenreviews.com

How to protect your computer at home

•3 •

Use a firewall I cannot stress how important this is



Without a firewall your computer is susceptible to being hacked and taken over.



By using a firewall the majority of security holes will not be accessible as the firewall will block the attempt.

How to protect your computer at home

•3

Firewall/Router examples:

How to protect your computer at home

4 • •



Malware scanner, even if you are using a security suite at home http://malwarebytes.org Run it every time you suspect any infection

How to protect your computer at home

5

Be smart about where you visit and what you click on

-

Understanding how you can get infected and what to avoid when using the internet will be the most important step in keeping your computer clean and secure.

-

The majority of people who have infections on their machines were infected due to lack of knowledge and clicking on things that they should not. Here is a list of actions that you should not do:

How to protect your computer at home

5



Do not open attachments from users that you do not know. This is one of the most effective ways for viruses to infect you..



Never open an attachment that is a .exe, .pif, .com, or .bat unless you specifically know the file is clean. The majority of these are always bad!



If you visit a site and a popup appears saying that your computer is unsafe, ignore it! These are gimmicks that are used to make you click on the ad which then can potentially install unwanted malware.



If you go to a site and a popup occurs, many times they will make them look like a normal Windows message box in order to trick you into clicking on them. Instead just close them by doing a ALT-F4 or CTRL-ALT-DEL and ending the task.

How to protect your computer at home

Example: 5

How to protect your computer at home

5 •

Do not visit porn sites! reality is that the majority of spyware and browser hijackers are put on your computer through porn sites.



Do not visit key crack sites! Many of the cracks include malware in them!



If you use P2P software, make sure you are careful about what you open. Malware is all over the P2P networks. LimeWire, BearShare, Kazaa, Napster, free MP4 downloads.



Watch out for phishing sites and emails



Watch out for web sites with fake antivirus pop-ups



Read the license agreement for any software that you install. Many free downloads are offered with spyware and other programs that you DO NOT want on your computer. Reading the agreement may help you to spot them.

How to protect your computer at home

5

How to protect your computer at home

6 • • • •



Wireless security By default your wireless security is not setup. Stay off wireless connections that you don’t know Public wireless, security keys that are shared can be dangerous Setup wireless security

How to protect your computer at home

Wireless security: • •

Defaults: Routers are usually 192.168.1.1 or 192.168.0.1



Default login username Admin or Administrator, password is password or admin



First thing you should do is change the default password and maybe even the username, combo of letters and numbers is best



Turn on the wireless security encryption



Encryption types are: WEP or WPA and makes it virtually impossible for anyone to use. WEP: Wired Equivalent Privacy WPA: Wi-Fi Protected Access

How to protect your computer at home

Wireless security: •

SSID this is broadcasting the name of your wireless network usually name of make like Linksys SSID: service set identifier



Change it to something else, someone that is looking around for hacking will probably try getting in if the default name is being used since they may think you have not taken the time to go through and add security yet. Another thing you can do is turn on your MAC address filtering

• •

Every device that can be network has its own MAC address also known as physical address. It’s a unique number like a street address.



When MAC filtering is on only the device MAC address that are in the MAC filter list can connect to your wireless router/access point

How to protect your computer at home



Wireless security example:

log into router or wireless access point, usually 192.168.1.1

How to protect your computer at home



Wireless security example: Select the “wireless” tab

How to protect your computer at home



Wireless security example:

Select the “Wireless Security” tab, select a security mode Type in a security share key (Label router/A.P. with share key)

How to protect your computer at home



Wireless security example:

For a second layer of security you can enable access list

• •

Every computer has it’s own MAC number Also know as a physical address number

How to protect your computer at home



Wireless security example:

To find the MAC number you want to add to your wireless network access list: Start->Run: type in cmd Ok

How to protect your computer at home



Wireless security example: Command: ipconfig /all

How to protect your computer at home

Wireless security information: In summery -Change password and login name Admin -Turn on wireless encryption, WEP or WPA -Change SSID, name of your network -Turn on MAC address filtering, so you can specify who/what has access HOT SPOTS, are they safe: http://videos.howstuffworks.com/science-channel/5018-its-all-geek-to-me-wireless-internetsecurity-video.htm Make sure you are running a firewall that stops all incoming traffic when you are out and about

How to protect your computer at home

Summary: 1. 2. 3.

4. 5. 6.

Keep your Microsoft critical updates up-to-date Understand your anti-virus software Use a router/firewall (hardware) or Personal firewall (software) Educate yourself and be smart about where you visit and what you click on Run a Malware scanner Secure your wireless connection

THANKS:



Joe Sarinana



You can download a .pdf version of this slideshow from: http://www.sohonets.com/services.html