SlideShare a Scribd company logo
Phillip Schneider
Information Services Librarian
Gail Borden Public Library District
Cybersecurity: Keeping Your
Computers & Devices Safe
• What is a Virus
• Antivirus Software
• Web Browsers
• Passwords
• Safe Internet Use
• Upgrading/Updating
• Backup
Agenda
Searching through ads
What is a Virus
A malicious set of code meant to harm you and
your computer
Types of Viruses
• Basic Virus
• E-mail viruses
• Spyware
• Trojan Horses
• Worms
What is a Virus?
Viruses can…
• Record your keyboard strokes
• Break/Damage your computer
• Hold your files hostage
• Use your processing power
• Steal/copy your files
• Steal other important information such as
passwords, credit card numbers, etc.
What Can a Virus Do?
Searching through ads
Antivirus Software
Free Antivirus
• Defender (built into windows 8 and up)
• Avast
• AVG
• Panda Security
Paid Antivirus
• Kaspersky
• BitDefender Plus
• Norton
• McAfee
Antivirus Software (Windows)
Free Antivirus
• Defender (built
into windows 8
and up)
• Avast
• AVG
• Panda Security
Paid Antivirus
• Kaspersky
• BitDefender Plus
• Norton
• McAfee
Antivirus Software (Windows)
Add best for mac
Add comparision
from free to paid
Secondary Defense
• Malwarebytes
• Spybot
• Microsoft Malicious Software Removal Tool
Fire Wall
• Window Firewall
• Kaspersky/Norton firewall
• ZoneAlarm Free Firewall
• Comodo Firewall(free)
• Tiny Wall (in addition to Windows firewall free)
Antivirus Software (Windows)
Secondary Defense
• Malwarebytes
• Spybot
• Microsoft Malicious
Software Removal Tool
Fire Wall
• Window Firewall
• Kaspersky/Norton firewall
• ZoneAlarm Free Firewall
• Comodo Firewall(free)
• Tiny Wall (in addition to
Windows firewall free)
Antivirus Software (Windows)
Add best for mac
Add comparision
from free to paid
Show how to configure Windows Firewall
Show how to configure Mac OSX firewall
Antivirus Software (Windows)
Searching through ads
Web Browsers
Safest Browsers
1. Google Chrome
2. Fire Fox
3. Windows Edge/Safari (Mac only)
4. Opera
Browser Extensions for Privacy
• Ghostery
• Adblocker Plus
• ScriptSafe/NoScript
• Disconnect
Web Browsers
Complete Privacy
• Purchase a VPN (Virtual Private Network)
 Encrypts your internet Data
 Private web browsing, downloading, and uploading
 Can not be tracked
VPNs
• NordVPN
• Hotspot Shield Elite
• Spotflux Premium VPN
• Express VPN
 Typical cost $5-$15 per month
Web Browsers
Searching through ads
Passwords
Create a Strong Password
• Use a minimum of 8 characters
• Use a long string of words
• Add numbers, symbols (IE: !@#$), upper and
lowercase letters
Examples
• Thi$wou!dbeGood
• Dogs&cAtsrocK!
• 2Fast2cAtch!?
Passwords
Best Password Practices
• Never use the same password for multiple
accounts
• Write down passwords do not save them on
your computer
• For highest security never let your browser save
your password
Passwords
Searching through ads
Safe Internet Use
Safe Internet Use
Question before proceeding
• Is this a well know site?
• Have I used this site safely before?
• Does this site make me feel uncomfortable?
• Is this site asking for things I don’t want to share?
• Do I have a reason to trust this site?
Safe Internet Use
Use Safe Practices
• Only download from the companies website
• Do not click on popups
• Do not give private information unless you are
making a purchase from a trusted site.
 Use Paypal for the most secure transactions
 Use http://www.scamadviser.com/ to check online
retailers
Safe Internet Use
Safe Internet Use
Email
• Only open mail from known email addresses
• If your friend’s email sounds strange they were likely
hacked
• Only download or click on links from trusted emails
• Use a complicated Password to protect your email
• If an email asks for personal information delete it
• If an email seems sketchy google the text to see if it
is a scam.
Safe Internet Use
Email
Get emails alerts
and check on
latest
Scams
• https://www.consumer.ftc.gov/scam-alerts
Safe Internet Use
Searching through ads
Upgrading/Updating
Upgrading a current computer
• Avoid using unsupported Operating system
(example: Windows XP)
• When possible upgrade to the newest operating
system available for your device
• Always update your operating system, apps, and
programs. This will keep your computer as secure as
possible.
• Set your computer to automatically update to keep
up to date easily.
Upgrading/Updating
Searching through ads
Backup
Cloud Storage
Backup
One Drive
iCloud Google Drive
Drop Box Amazon Cloud Drive
Physical Back up
• Backup up important files to an external Hard drive
or large Flash drive often (manually)
• Windows backup and restore
• Android/iOS backup
• Periodically create restore points (Windows)
Paid backup
• Nova Backup
• Acronis Backup
• Genie Backup
Backup
Physical Back up
• Backup up important files
to an external Hard drive
or large Flash drive often
(manually)
• Windows backup and
restore
• Android/iOS backup
• Periodically create restore
points (Windows)
Paid backup
• Nova Backup
• Acronis Backup
• Genie Backup
Backup
add in physical back up
brands
Add in comparison
Add in size estimates
Cloud vs physical
Programs vs manually
Company vs do it
yourself
THANKS FOR COMING!
Questions?

More Related Content

PPT
091005 Internet Security
PPT
Keep Your Computers Safe And Secure
PDF
fundamentals of Cybersecurity Lesion 1.pdf
PDF
Week3-CyberSecurity 8th Semester important.pdf
PPTX
Internet security
PPT
Cyber-Security.ppt
PPT
Cyber-Security-20211013105857.ppt
PPT
cybertestqas.ppt
091005 Internet Security
Keep Your Computers Safe And Secure
fundamentals of Cybersecurity Lesion 1.pdf
Week3-CyberSecurity 8th Semester important.pdf
Internet security
Cyber-Security.ppt
Cyber-Security-20211013105857.ppt
cybertestqas.ppt

Similar to Cybersecurity-Keeping-Your-Computers-Devices-Safe.pptx (20)

PPT
Cyber-Security-20211013105857.ppt
PPT
Cyber-Security-20211013105857.ppt
PPT
Cyber-Security-.ppt
PPT
cs0123.ppt
PPTX
Cyber-Security.ppt
PPT
Cyber-Security-20211013105857 (1).ppt
PPTX
Cyber security by vinod sencha for education
PPT
Cyber-Security-20211013105857.ppt HGJHHKJHJKHKH
PPT
Direct infection: virus can infect files every time a user opens that specif...
PPT
Cyber-Security-20211013105857.ppt
PPT
Cyber-Security-20211013105857.ppt
PPT
Cyber-Security]shhsjjsjsjdjdjjddjjdjh.ppt
PPT
Cyber-Security-20211013105857.ppt
PPT
Cyber-Security-20211013105857.ppt
PPT
Cyber-Security-20211013105857.ppt
PPT
Cyber-Security-20211013105857.ppt
PPT
Cyber-Security-20211013105857.ppt
PPT
Cyber-Security-20211013105857 (1).ppt
PPT
Cyber-Security-power point presentation.
PPT
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
Cyber-Security-.ppt
cs0123.ppt
Cyber-Security.ppt
Cyber-Security-20211013105857 (1).ppt
Cyber security by vinod sencha for education
Cyber-Security-20211013105857.ppt HGJHHKJHJKHKH
Direct infection: virus can infect files every time a user opens that specif...
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
Cyber-Security]shhsjjsjsjdjdjjddjjdjh.ppt
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857 (1).ppt
Cyber-Security-power point presentation.
Cyber-Security-20211013105857.ppt
Ad

Recently uploaded (20)

PDF
Copia de Minimal 3D Technology Consulting Presentation.pdf
PDF
Q2 2025 :Lundin Gold Conference Call Presentation_Final.pdf
PDF
caregiving tools.pdf...........................
PDF
ECONOMICS AND ENTREPRENEURS LESSONSS AND
PDF
way to join Real illuminati agent 0782561496,0756664682
PDF
Blockchain Pesa Research by Samuel Mefane
PPTX
Introduction to Essence of Indian traditional knowledge.pptx
DOCX
marketing plan Elkhabiry............docx
PDF
Why Ignoring Passive Income for Retirees Could Cost You Big.pdf
PDF
Topic Globalisation and Lifelines of National Economy.pdf
PDF
ECONOMICS AND ENTREPRENEURS LESSONSS AND
PPTX
EABDM Slides for Indifference curve.pptx
PDF
Understanding University Research Expenditures (1)_compressed.pdf
PPTX
The discussion on the Economic in transportation .pptx
PPTX
Globalization-of-Religion. Contemporary World
PPT
E commerce busin and some important issues
PDF
Dialnet-DynamicHedgingOfPricesOfNaturalGasInMexico-8788871.pdf
PDF
how_to_earn_50k_monthly_investment_guide.pdf
PDF
Bitcoin Layer August 2025: Power Laws of Bitcoin: The Core and Bubbles
PDF
NAPF_RESPONSE_TO_THE_PENSIONS_COMMISSION_8 _2_.pdf
Copia de Minimal 3D Technology Consulting Presentation.pdf
Q2 2025 :Lundin Gold Conference Call Presentation_Final.pdf
caregiving tools.pdf...........................
ECONOMICS AND ENTREPRENEURS LESSONSS AND
way to join Real illuminati agent 0782561496,0756664682
Blockchain Pesa Research by Samuel Mefane
Introduction to Essence of Indian traditional knowledge.pptx
marketing plan Elkhabiry............docx
Why Ignoring Passive Income for Retirees Could Cost You Big.pdf
Topic Globalisation and Lifelines of National Economy.pdf
ECONOMICS AND ENTREPRENEURS LESSONSS AND
EABDM Slides for Indifference curve.pptx
Understanding University Research Expenditures (1)_compressed.pdf
The discussion on the Economic in transportation .pptx
Globalization-of-Religion. Contemporary World
E commerce busin and some important issues
Dialnet-DynamicHedgingOfPricesOfNaturalGasInMexico-8788871.pdf
how_to_earn_50k_monthly_investment_guide.pdf
Bitcoin Layer August 2025: Power Laws of Bitcoin: The Core and Bubbles
NAPF_RESPONSE_TO_THE_PENSIONS_COMMISSION_8 _2_.pdf
Ad

Cybersecurity-Keeping-Your-Computers-Devices-Safe.pptx

  • 1. Phillip Schneider Information Services Librarian Gail Borden Public Library District Cybersecurity: Keeping Your Computers & Devices Safe
  • 2. • What is a Virus • Antivirus Software • Web Browsers • Passwords • Safe Internet Use • Upgrading/Updating • Backup Agenda
  • 4. A malicious set of code meant to harm you and your computer Types of Viruses • Basic Virus • E-mail viruses • Spyware • Trojan Horses • Worms What is a Virus?
  • 5. Viruses can… • Record your keyboard strokes • Break/Damage your computer • Hold your files hostage • Use your processing power • Steal/copy your files • Steal other important information such as passwords, credit card numbers, etc. What Can a Virus Do?
  • 7. Free Antivirus • Defender (built into windows 8 and up) • Avast • AVG • Panda Security Paid Antivirus • Kaspersky • BitDefender Plus • Norton • McAfee Antivirus Software (Windows)
  • 8. Free Antivirus • Defender (built into windows 8 and up) • Avast • AVG • Panda Security Paid Antivirus • Kaspersky • BitDefender Plus • Norton • McAfee Antivirus Software (Windows) Add best for mac Add comparision from free to paid
  • 9. Secondary Defense • Malwarebytes • Spybot • Microsoft Malicious Software Removal Tool Fire Wall • Window Firewall • Kaspersky/Norton firewall • ZoneAlarm Free Firewall • Comodo Firewall(free) • Tiny Wall (in addition to Windows firewall free) Antivirus Software (Windows)
  • 10. Secondary Defense • Malwarebytes • Spybot • Microsoft Malicious Software Removal Tool Fire Wall • Window Firewall • Kaspersky/Norton firewall • ZoneAlarm Free Firewall • Comodo Firewall(free) • Tiny Wall (in addition to Windows firewall free) Antivirus Software (Windows) Add best for mac Add comparision from free to paid
  • 11. Show how to configure Windows Firewall Show how to configure Mac OSX firewall Antivirus Software (Windows)
  • 13. Safest Browsers 1. Google Chrome 2. Fire Fox 3. Windows Edge/Safari (Mac only) 4. Opera Browser Extensions for Privacy • Ghostery • Adblocker Plus • ScriptSafe/NoScript • Disconnect Web Browsers
  • 14. Complete Privacy • Purchase a VPN (Virtual Private Network)  Encrypts your internet Data  Private web browsing, downloading, and uploading  Can not be tracked VPNs • NordVPN • Hotspot Shield Elite • Spotflux Premium VPN • Express VPN  Typical cost $5-$15 per month Web Browsers
  • 16. Create a Strong Password • Use a minimum of 8 characters • Use a long string of words • Add numbers, symbols (IE: !@#$), upper and lowercase letters Examples • Thi$wou!dbeGood • Dogs&cAtsrocK! • 2Fast2cAtch!? Passwords
  • 17. Best Password Practices • Never use the same password for multiple accounts • Write down passwords do not save them on your computer • For highest security never let your browser save your password Passwords
  • 19. Safe Internet Use Question before proceeding • Is this a well know site? • Have I used this site safely before? • Does this site make me feel uncomfortable? • Is this site asking for things I don’t want to share? • Do I have a reason to trust this site?
  • 20. Safe Internet Use Use Safe Practices • Only download from the companies website • Do not click on popups • Do not give private information unless you are making a purchase from a trusted site.  Use Paypal for the most secure transactions  Use http://www.scamadviser.com/ to check online retailers
  • 22. Safe Internet Use Email • Only open mail from known email addresses • If your friend’s email sounds strange they were likely hacked • Only download or click on links from trusted emails • Use a complicated Password to protect your email • If an email asks for personal information delete it • If an email seems sketchy google the text to see if it is a scam.
  • 23. Safe Internet Use Email Get emails alerts and check on latest Scams • https://www.consumer.ftc.gov/scam-alerts
  • 26. Upgrading a current computer • Avoid using unsupported Operating system (example: Windows XP) • When possible upgrade to the newest operating system available for your device • Always update your operating system, apps, and programs. This will keep your computer as secure as possible. • Set your computer to automatically update to keep up to date easily. Upgrading/Updating
  • 28. Cloud Storage Backup One Drive iCloud Google Drive Drop Box Amazon Cloud Drive
  • 29. Physical Back up • Backup up important files to an external Hard drive or large Flash drive often (manually) • Windows backup and restore • Android/iOS backup • Periodically create restore points (Windows) Paid backup • Nova Backup • Acronis Backup • Genie Backup Backup
  • 30. Physical Back up • Backup up important files to an external Hard drive or large Flash drive often (manually) • Windows backup and restore • Android/iOS backup • Periodically create restore points (Windows) Paid backup • Nova Backup • Acronis Backup • Genie Backup Backup add in physical back up brands Add in comparison Add in size estimates Cloud vs physical Programs vs manually Company vs do it yourself

Editor's Notes

  • #5: source: for list of virus types http://computer.howstuffworks.com/virus.htm
  • #14: Based off of security tests and reviews http://www.browserscope.org/ http://tiptopsecurity.com/safest-web-browser-chrome-firefox-ie-opera-safari-comparison-chart/
  • #30: Example There are several options for those who want a physical backup of their files. Option one is to purchase a devices—such as an external hard drive or flash drive—and save the files to the device. Pros are that users include only a one-time cost; cons are that if your home computer gets fried, there’s a good likelihood your device may get fried as well. Option two is to pay for a backup service—such as Nova, Acronis, or Genie—to save your files for you. Pros are that you don’t have to worry about equipment; cons are that it may involve a monthly subscription cost.
  • #31: Example There are several options for those who want a physical backup of their files. Option one is to purchase a devices—such as an external hard drive or flash drive—and save the files to the device. Pros are that users include only a one-time cost; cons are that if your home computer gets fried, there’s a good likelihood your device may get fried as well. Option two is to pay for a backup service—such as Nova, Acronis, or Genie—to save your files for you. Pros are that you don’t have to worry about equipment; cons are that it may involve a monthly subscription cost.