SlideShare a Scribd company logo
Security Basics: Keep your Computers Safe   October 28, 2010 Audio is only available by calling this number: Conference Call: 866-740-1260; Access Code: 6339392 Sponsored by
Using ReadyTalk Chat & raise hand  All lines are muted If you lose your internet connection, reconnect using the link emailed to you. If you lose your phone connection, re-dial the phone number and re-join. ReadyTalk support:  800-843-9166
You are being recorded… Streaming into Second Life This seminar will be available on the TechSoup website along with past  webinar presentations: www.techsoup.org/go/webinars You will receive a link to this presentation, material and links.  After the webinar, you can ask follow-up questions in our Community Forum: http://bit.ly/ts-sec Twitter hashtags: #techsoup
Security Basics: Keep your Computers Safe Presenter: Marian Merritt Sponsored by
We are working toward a time when every nonprofit and social benefit organization on the planet has the technology resources and knowledge they need to operate at their full potential.
Home page screen grab
Today’s Speakers Kami Griffiths   TechSoup Global Marian Merritt Symantec  Assisting with chat questions:  Kevin Lo & Gary Lamontagne, TechSoup Global
Agenda Threat landscape How do computers get infected What is driving growth in malware Staying safe What to do if infected Resources
Poll #1:  Does your organization have an Acceptable Use Policy? Yes No
Poll #2:  Do you provide internet safety training for your employees and volunteers?  Yes No
Threat Landscape 2/3 of adults globally have been victim of cybercrime: Viruses/malware  51% Online scams  10% Phishing  9% Social network hacking  7% Online credit card fraud  7% Sexual predation  7%
Types of Malware Virus – program that can spread from computer to another Worm – virus that can spread on its own Trojan – hidden in an offer of something good Bot – robot network, remotely controlled by criminal Keystroke logger – silently records valuable info and sends to criminal over the web
How Does This Happen? Dangerous links in email, IM, Twitter messages, Facebook and YouTube comments Infected devices: USB sticks, disks, laptops, digital photo frames Fake work at home schemes, online auctions, online dating Phishing attacks, “spearphishing” Fake antivirus pop-up alerts Ex-employees using privileges to access systems Skimming
Why The Rapid Growth in Malware? Underground cybercrime economy Bigger business than international drug trade Hackers with computer skills and desire for money Organized online buy/sell of breached and stolen data Low risk, high reward
Zeus Trojan - $70 million stolen from small business, non-profits
Huge growth in malware and new physical threats
How Do We Protect Ourselves? Internet Security (more than just AntiVirus)  on all systems Create culture of security in the organization  (not us vs. them) Explain the “why” to your employees so they  can practice safe computing at home and  with their families Create security policy and enforce it Separate systems where possible Backup data in more than one form Other suggestions:  Web filtering Enforce Safe Search settings
Acceptable Use Policy Tips Created by IT and HR, approved by Legal Identify restricted activities: (examples) Taking devices home Accessing inappropriate websites like porn or online shopping Installing software other than IT approved and provided Conducting financial transactions Email activities are for work-related only Social networking activity Remind employees that email, IM and other activities are company property and monitored Identify what happens if policy isn’t followed
When To Suspect Malware Infection Strange pop-ups ads Hijacked browser Slow computer Antivirus isn’t working Lots of activity when you aren’t doing anything Strange icons in tool tray Search isn’t working Lots of bounced back email or sent email
What To Do If Infected? Report to IT Determine scope of infection (device only, account only, network wide) Determine availability of backup, restore points and other forms of restoring to a clean system Proceed to identify and remove malware Scan with security software, remove or quarantine malware  Use more powerful malware removal tools from Norton, Microsoft, etc Determine how the infection occurred and communicate to team Contact financial institutions or other impacted organizations for further assistance
Social Network Risks Dangerous links and hacked accounts Sharing information incorrectly Inappropriate photos and videos Violating acceptable use policy by displaying offensive imagery, language, sharing jokes, etc
Resources Symantec Security Response  Blog Norton Family Resource  website Free booklets on online safety Every Click Matters  website Microsoft and Norton malware removal tools: Norton Power Eraser  Federal Trade Commission   Nat’l Cyber Security Association
Wrap Up Malware – what is it, where does it come from, how to stay safe Cybercriminals – how do they work What to do if you get infected Acceptable Use Policies Additional Resources Questions? Send me an email: marian@norton.com
Questions? Submit your questions using the chat box.
Continue the Discussion… Additional questions can be answered by posting in in our Community Forum: http://bit.ly/ts-sec
Upcoming Webinars Is FileMaker Right for Your Organization?  Thursday, November 18, 11 a.m. Manage your Data, Donations and More with CiviCRM Tuesday, November 23, 11 a.m.
Thank you to our Webinar Sponsor! ReadyTalk offers dedicated product demos for  TechSoup organizations 4 times per week. For more information:   pages.readytalk.com/techsoup.html
Thank you!   Please complete the post event survey! Kami Griffiths, kami@techsoup.org, 415-633-9392

More Related Content

PPSX
Technology Training - Security, Passwords & More
PPSX
Ransomware 101
DOC
Data security
PPT
At Your Expense
PPTX
Back to school - CYBER SAFETY
PPTX
Impact on IT system breaches
PDF
Information security
PPTX
SECURITY THREATS AND SAFETY MEASURES
Technology Training - Security, Passwords & More
Ransomware 101
Data security
At Your Expense
Back to school - CYBER SAFETY
Impact on IT system breaches
Information security
SECURITY THREATS AND SAFETY MEASURES

What's hot (20)

PDF
Cyber security-awareness-for-social-media-users - Devsena Mishra
PPTX
Cyber Crime and Social Media Security
PPTX
Data breach
PDF
SOCIAL NETWORK SECURITY
PPT
Promote Education Internet Security
PPTX
Online safety and security
PPTX
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
PPTX
Social Networking Security Issues
PPTX
Presentation on cyber security
PPT
Securing Your Small Business Network
PDF
Computer Security and Safety, Ethics & Privacy
PPTX
Empowerment Technology Lesson 2
PPTX
The need for effective information security awareness practices.
 
PPT
Social media and Security risks
DOCX
Giarritano concept paper 4
PPT
Virus
PPT
Threats and Security Tips of Computer System
PPTX
Security threats and safety measures
PPTX
Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...
Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber Crime and Social Media Security
Data breach
SOCIAL NETWORK SECURITY
Promote Education Internet Security
Online safety and security
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Social Networking Security Issues
Presentation on cyber security
Securing Your Small Business Network
Computer Security and Safety, Ethics & Privacy
Empowerment Technology Lesson 2
The need for effective information security awareness practices.
 
Social media and Security risks
Giarritano concept paper 4
Virus
Threats and Security Tips of Computer System
Security threats and safety measures
Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...
Ad

Viewers also liked (17)

PPT
Open Source Library Webinar
PPT
How To Tell Your Digital Story: TechSoup Digital Storytelling event
PDF
Putting the Web to Work
PPT
Donor Management Solutions Webinar
PPT
Microsoft Licensing and Benefits
PPT
Cloud Computing Webinar
PPT
OCTribe Meetup presentation by Charles Baker of Meetup.com
PPT
Civi CRM Webinar
PPT
Presentation winning grants
PDF
11NTC Virtual Teams
KEY
TSDigs 2011 Metrics & Learning Report
PPT
Expanding Internationally Through Partnerships: Practical Lessons For 21st Ce...
PPT
File Maker Webinar
PPT
Social Media Decision Making
PPT
Quick Books Webinar
PPT
Tools for Digital Storytelling
PPTX
Encouraging Community Collaboration
Open Source Library Webinar
How To Tell Your Digital Story: TechSoup Digital Storytelling event
Putting the Web to Work
Donor Management Solutions Webinar
Microsoft Licensing and Benefits
Cloud Computing Webinar
OCTribe Meetup presentation by Charles Baker of Meetup.com
Civi CRM Webinar
Presentation winning grants
11NTC Virtual Teams
TSDigs 2011 Metrics & Learning Report
Expanding Internationally Through Partnerships: Practical Lessons For 21st Ce...
File Maker Webinar
Social Media Decision Making
Quick Books Webinar
Tools for Digital Storytelling
Encouraging Community Collaboration
Ad

Similar to Security Basics Webinar (20)

PPT
091005 Internet Security
PPT
Cyber Security-Foundation.ppt
PDF
fundamentals of Cybersecurity Lesion 1.pdf
PPSX
Security Awareness Training
PPTX
Cybersecurity Training
PPTX
BAIT1003 Chapter 11
PDF
How to Protect Your Devices from Internet-Based Malware.pdf
PPTX
Real Business Threats!
PDF
Week3-CyberSecurity 8th Semester important.pdf
PPT
Cyber-Security-.ppt
PPT
Cyber-Security.ppt
PPT
100812 internet security2.0
PPT
computer_security.ppt
PPT
Protect Yourself From Internet Pests
PPTX
Computer Security 101
PPSX
csa2014 IBC
PPT
Cyber-Security.ppt
PPT
Cyber-Security-20211013105857.ppt
PPT
cybertestqas.ppt
PPT
Cyber-Security-20211013105857.ppt
091005 Internet Security
Cyber Security-Foundation.ppt
fundamentals of Cybersecurity Lesion 1.pdf
Security Awareness Training
Cybersecurity Training
BAIT1003 Chapter 11
How to Protect Your Devices from Internet-Based Malware.pdf
Real Business Threats!
Week3-CyberSecurity 8th Semester important.pdf
Cyber-Security-.ppt
Cyber-Security.ppt
100812 internet security2.0
computer_security.ppt
Protect Yourself From Internet Pests
Computer Security 101
csa2014 IBC
Cyber-Security.ppt
Cyber-Security-20211013105857.ppt
cybertestqas.ppt
Cyber-Security-20211013105857.ppt

More from TechSoup (20)

PDF
Welcome to TechSoup New Member Orientation 8.13.25.pdf
PDF
Streamlining Nonprofit Website Navigation for Better Engagement.pdf
PDF
Introducing Nanoheal — the Invisible IT Team Member.pdf
PDF
Welcome to TechSoup New Member Orientation 7.16.25.pdf
PDF
07.15.2025 - Managing Your Members Using a Membership Portal.pdf
PDF
Understanding Pastors Payroll for nonprofits.pdf
PDF
TechSoup Presentation - Cyber Risk Management July 9.pdf
PDF
AI-Powered-Visual-Storytelling-for-Nonprofits.pdf
PDF
WIX website Training Material - Material.pdf
PDF
TechSoup Microsoft Copilot Nonprofit Use Cases and Live Demo - 2025.06.25.pdf
PDF
Welcome to TechSoup New Member Orientation 6.18.25.pdf
PDF
Educational_ Leveraging Data to Strengthen Nonprofit Impact (1).pdf
PDF
Introduction to Generative AI and Copilot.pdf
PDF
ABCs of Bookkeeping for Nonprofits TechSoup.pdf
PPTX
4 Time-Saving HR Tips—How to Speed Up HR Processes.pptx
PDF
Growth-Driven Design with TechSoup Website Services.pdf
PDF
TechSoup Microsoft Copilot Nonprofit Use Cases and Live Demo - 2025.05.28.pdf
PDF
TechSoup - Microsoft Discontinuation of Selected Cloud Donated Offers 2025.05...
PDF
he Grant Preparation Playbook: Building a System for Grant Success
PDF
TechSoup Introduction to Generative AI and Copilot - 2025.05.22.pdf
Welcome to TechSoup New Member Orientation 8.13.25.pdf
Streamlining Nonprofit Website Navigation for Better Engagement.pdf
Introducing Nanoheal — the Invisible IT Team Member.pdf
Welcome to TechSoup New Member Orientation 7.16.25.pdf
07.15.2025 - Managing Your Members Using a Membership Portal.pdf
Understanding Pastors Payroll for nonprofits.pdf
TechSoup Presentation - Cyber Risk Management July 9.pdf
AI-Powered-Visual-Storytelling-for-Nonprofits.pdf
WIX website Training Material - Material.pdf
TechSoup Microsoft Copilot Nonprofit Use Cases and Live Demo - 2025.06.25.pdf
Welcome to TechSoup New Member Orientation 6.18.25.pdf
Educational_ Leveraging Data to Strengthen Nonprofit Impact (1).pdf
Introduction to Generative AI and Copilot.pdf
ABCs of Bookkeeping for Nonprofits TechSoup.pdf
4 Time-Saving HR Tips—How to Speed Up HR Processes.pptx
Growth-Driven Design with TechSoup Website Services.pdf
TechSoup Microsoft Copilot Nonprofit Use Cases and Live Demo - 2025.05.28.pdf
TechSoup - Microsoft Discontinuation of Selected Cloud Donated Offers 2025.05...
he Grant Preparation Playbook: Building a System for Grant Success
TechSoup Introduction to Generative AI and Copilot - 2025.05.22.pdf

Recently uploaded (20)

PPTX
Cell Structure & Organelles in detailed.
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
RMMM.pdf make it easy to upload and study
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPTX
Institutional Correction lecture only . . .
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PPTX
master seminar digital applications in india
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Cell Structure & Organelles in detailed.
O7-L3 Supply Chain Operations - ICLT Program
102 student loan defaulters named and shamed – Is someone you know on the list?
RMMM.pdf make it easy to upload and study
PPH.pptx obstetrics and gynecology in nursing
O5-L3 Freight Transport Ops (International) V1.pdf
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Institutional Correction lecture only . . .
Microbial diseases, their pathogenesis and prophylaxis
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Module 4: Burden of Disease Tutorial Slides S2 2025
Abdominal Access Techniques with Prof. Dr. R K Mishra
Renaissance Architecture: A Journey from Faith to Humanism
master seminar digital applications in india
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
VCE English Exam - Section C Student Revision Booklet
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf

Security Basics Webinar

  • 1. Security Basics: Keep your Computers Safe October 28, 2010 Audio is only available by calling this number: Conference Call: 866-740-1260; Access Code: 6339392 Sponsored by
  • 2. Using ReadyTalk Chat & raise hand All lines are muted If you lose your internet connection, reconnect using the link emailed to you. If you lose your phone connection, re-dial the phone number and re-join. ReadyTalk support: 800-843-9166
  • 3. You are being recorded… Streaming into Second Life This seminar will be available on the TechSoup website along with past webinar presentations: www.techsoup.org/go/webinars You will receive a link to this presentation, material and links. After the webinar, you can ask follow-up questions in our Community Forum: http://bit.ly/ts-sec Twitter hashtags: #techsoup
  • 4. Security Basics: Keep your Computers Safe Presenter: Marian Merritt Sponsored by
  • 5. We are working toward a time when every nonprofit and social benefit organization on the planet has the technology resources and knowledge they need to operate at their full potential.
  • 7. Today’s Speakers Kami Griffiths TechSoup Global Marian Merritt Symantec Assisting with chat questions: Kevin Lo & Gary Lamontagne, TechSoup Global
  • 8. Agenda Threat landscape How do computers get infected What is driving growth in malware Staying safe What to do if infected Resources
  • 9. Poll #1: Does your organization have an Acceptable Use Policy? Yes No
  • 10. Poll #2: Do you provide internet safety training for your employees and volunteers? Yes No
  • 11. Threat Landscape 2/3 of adults globally have been victim of cybercrime: Viruses/malware 51% Online scams 10% Phishing 9% Social network hacking 7% Online credit card fraud 7% Sexual predation 7%
  • 12. Types of Malware Virus – program that can spread from computer to another Worm – virus that can spread on its own Trojan – hidden in an offer of something good Bot – robot network, remotely controlled by criminal Keystroke logger – silently records valuable info and sends to criminal over the web
  • 13. How Does This Happen? Dangerous links in email, IM, Twitter messages, Facebook and YouTube comments Infected devices: USB sticks, disks, laptops, digital photo frames Fake work at home schemes, online auctions, online dating Phishing attacks, “spearphishing” Fake antivirus pop-up alerts Ex-employees using privileges to access systems Skimming
  • 14. Why The Rapid Growth in Malware? Underground cybercrime economy Bigger business than international drug trade Hackers with computer skills and desire for money Organized online buy/sell of breached and stolen data Low risk, high reward
  • 15. Zeus Trojan - $70 million stolen from small business, non-profits
  • 16. Huge growth in malware and new physical threats
  • 17. How Do We Protect Ourselves? Internet Security (more than just AntiVirus) on all systems Create culture of security in the organization (not us vs. them) Explain the “why” to your employees so they can practice safe computing at home and with their families Create security policy and enforce it Separate systems where possible Backup data in more than one form Other suggestions: Web filtering Enforce Safe Search settings
  • 18. Acceptable Use Policy Tips Created by IT and HR, approved by Legal Identify restricted activities: (examples) Taking devices home Accessing inappropriate websites like porn or online shopping Installing software other than IT approved and provided Conducting financial transactions Email activities are for work-related only Social networking activity Remind employees that email, IM and other activities are company property and monitored Identify what happens if policy isn’t followed
  • 19. When To Suspect Malware Infection Strange pop-ups ads Hijacked browser Slow computer Antivirus isn’t working Lots of activity when you aren’t doing anything Strange icons in tool tray Search isn’t working Lots of bounced back email or sent email
  • 20. What To Do If Infected? Report to IT Determine scope of infection (device only, account only, network wide) Determine availability of backup, restore points and other forms of restoring to a clean system Proceed to identify and remove malware Scan with security software, remove or quarantine malware Use more powerful malware removal tools from Norton, Microsoft, etc Determine how the infection occurred and communicate to team Contact financial institutions or other impacted organizations for further assistance
  • 21. Social Network Risks Dangerous links and hacked accounts Sharing information incorrectly Inappropriate photos and videos Violating acceptable use policy by displaying offensive imagery, language, sharing jokes, etc
  • 22. Resources Symantec Security Response Blog Norton Family Resource website Free booklets on online safety Every Click Matters website Microsoft and Norton malware removal tools: Norton Power Eraser Federal Trade Commission Nat’l Cyber Security Association
  • 23. Wrap Up Malware – what is it, where does it come from, how to stay safe Cybercriminals – how do they work What to do if you get infected Acceptable Use Policies Additional Resources Questions? Send me an email: marian@norton.com
  • 24. Questions? Submit your questions using the chat box.
  • 25. Continue the Discussion… Additional questions can be answered by posting in in our Community Forum: http://bit.ly/ts-sec
  • 26. Upcoming Webinars Is FileMaker Right for Your Organization? Thursday, November 18, 11 a.m. Manage your Data, Donations and More with CiviCRM Tuesday, November 23, 11 a.m.
  • 27. Thank you to our Webinar Sponsor! ReadyTalk offers dedicated product demos for TechSoup organizations 4 times per week. For more information: pages.readytalk.com/techsoup.html
  • 28. Thank you! Please complete the post event survey! Kami Griffiths, kami@techsoup.org, 415-633-9392

Editor's Notes

  • #6: TechSoup.org offers nonprofits a one-stop resource for technology needs by providing free information, resources, and support. In addition to online information and resources, we offer a product philanthropy service through which nonprofits can access donated and discounted technology products, generously provided by corporate and nonprofit technology partners.
  • #7: TechSoup Global currently operates its product donation programs with partners in 32 countries. With the number of supporting corporations currently at 37 (offering 392 different donated or discounted products) TechSoup Global has provided approximately 4.9 million donated technology products since program inception to NGOs around the world. The retail price of these donations is roughly equivalent to US$1.4 billion.
  • #16: Emailed Trojan virus to targetted individuals in small business, non profits, small towns. Once clicked on, installed silently and stole account information and passwords. Logged into online banking and transferred thousands of dollars. Money mules owned the accounts and wired the money overseas to others. The documents used to create the US bank accounts were fake passwords nad other ids held by the people above, many of whom were in US on student visas from E. Europe.