Fellowship Hall Wi-Fi Network Access SSID: - - PowerPoint PPT Presentation

fellowship hall wi fi network access
SMART_READER_LITE
LIVE PREVIEW

Fellowship Hall Wi-Fi Network Access SSID: - - PowerPoint PPT Presentation

Fellowship Hall Wi-Fi Network Access SSID: Fellowship_Hall-guest_2GHz Password: guest TVCUC, Connecting Your World TVCUC, Connecting Your World Welcome and Opening Comments Bylaws Change Review & Vote New Member Welcome


slide-1
SLIDE 1

TVCUC, Connecting Your World

Fellowship Hall Wi-Fi Network Access

SSID: Fellowship_Hall-guest_2GHz Password: guest

slide-2
SLIDE 2

TVCUC, Connecting Your World

slide-3
SLIDE 3

TVCUC, Connecting Your World

  • Welcome and Opening Comments
  • Bylaws Change – Review & Vote
  • New Member Welcome
  • Logo Contest Winner
  • Committee Reports
  • Tonight’s Program:

⁻ Cyber Security – Part 1

  • Door Prizes
slide-4
SLIDE 4

TVCUC, Connecting Your World

slide-5
SLIDE 5

TVCUC, Connecting Your World

slide-6
SLIDE 6

TVCUC, Connecting Your World

Is Tellico Village Computer Users Club Going to Have to Shut Down?

Do I have your attention? Please read that again. This Club is run by Volunteers plain and simple. No Volunteers – No Club.

We have been asking for people to step up and volunteer for years, but, all we have heard is silence or something like: “I don’t know about computers”. Stepping up to do a Board position or a Committee position takes no more “computer” skills than an Office job. Just basic organization skills. We can teach the skills. It takes two other things: Caring about helping others and about 6-8 hours a month of your time. We have to fill the position of Vice President and the position of Secretary or we will not have a Board of Directors as required by law which will force this Club to shut down.

slide-7
SLIDE 7

TVCUC, Connecting Your World

 Section 2. Dues

Membership is effective upon submission of a membership application listing all proposed household members and payment of dues. Annual dues shall be payable in advance, between October 1 and December 31. Members whose dues are delinquent will have their Membership

  • canceled. Membership may be reinstated after December 31 by payment
  • f full annual dues which will be valid through the current calendar year.

This change eliminates the Jan 1 to Mar 31 “Grace Period”.

slide-8
SLIDE 8

TVCUC, Connecting Your World

Note:

David is working with our Web Master, Jim Watson, to create our new website.

slide-9
SLIDE 9

TVCUC, Connecting Your World

slide-10
SLIDE 10

TVCUC, Connecting Your World

TellicoLife user

slide-11
SLIDE 11

TVCUC, Connecting Your World

Month Program

February AT&T @Tellico Village March MasterCraft Boats April Backup Strategies May Wil Davenport - More Than Memories June Annual Picnic July No Meeting August FLS September Caitlin Darras - McGhee Tyson Airport October Cyber Security – A Joint Education Presentation

By TVCUC & Neighborhood Watch

November Annual Meeting – Meeting date changed to Tuesday, November 13th December TBD – Cutting The Cord?

slide-12
SLIDE 12

TVCUC, Connecting Your World

2018 Members – 1446 (New and Renewals) 2019 Membership Begins 10/1/2018

Use TellicoLife (www.tellicolife.org) to Join or Renew

Log on: With your ID and Password, then select TAB – “Clubs & Org” Pay Dues: 2 Methods:

1.

Credit Card (preferred) – $20.00 – 25% Discount = $15.00

2.

Check/Cash – $20.00 (Requires TellicoLife invoice submitted)

slide-13
SLIDE 13

TVCUC, Connecting Your World

1156 (New and Renewals)

Proton Labs – October 20, 9:00AM – 10:30PM

Reservations, contact Bob Kutschera at: bkkutch@yahoo.com

Volkswagen - In Chattanooga – VW has cancelled tours until further notice.

Retooling factory for new model

No information on when tours will be resumed

We will try to get this rescheduled

Oak Ridge National Laboratory (ORNL) – Tours Cancelled

The type of tours we have done have been cancelled due to budget cuts and layoffs

  • f tour guides for this type of tour.

We are working to try and get this type of tour scheduled again

slide-14
SLIDE 14

TVCUC, Connecting Your World

  • ------- Forwarded Message --------

Subject:NSEFU.ORG PUBLIC SERVICE ANNOUNCEMENT

Date:Tue, 25 Sep 2018 19:58:52 +0000

From:Pandora Vreeland <buckrunne@hotmail.com>To:TAP <tap@tvcuc.org> To: Warren Sanders and the Incredible Members of the Tellico Village Computer Club

GREAT NEWS! Check out the very first Public Service Announcement for NSEFU Wildlife

  • Conservation. Please click on the Youtube (below) to see how NSEFU is

fighting poaching from several angles. The enthusiastic school children are learning about saving these endangered animals while studying in the new school that NSEFU built. NSEFU is teaching beekeeping as a way to teach villagers a valuable skill and a way to raise money for NSEFU and their anti-poaching efforts. The new sewing school, also built by NSEFU, is teaching skills to the villagers so their families can earn money from sewing instead of their men resorting to poaching. It is a 360 degree approach and they are making a BIG difference! The very brave NSEFU Rangers have destroyed over three thousand animal snares in only three years and many poachers have been caught-in-the-act and

  • JAILED. One of your Tellico Computer Club laptops is shown being presented by my sister

to the staff at the new school in the video. She said the school staff looked at her like she had just given them the Holy Grail. Thank you all for helping in this desperate

  • fight. [fyi-My sister, Coe Lewis, is a full-time Rock & Roll disc jockey in San Diego, CA on

station WKGB. She is one of the hard-driving co-founders of NSEFU and narrates this video.]

With respect and gratitude to each of you,

Pandora Vreeland

Pandora Vreeland

buckrunne@hotmail.com

https://www.youtube.com/watch?v=ZNw-qdglVmw

slide-15
SLIDE 15

TVCUC, Connecting Your World

slide-16
SLIDE 16

TVCUC, Connecting Your World

“Members FLS Support Hot Line:

(865) 408-8223 8223

Members can leave a message and a FLS volunteer will contact you as soon as possible

Meet with First Level Support

Once a month, volunteers from FLS will meet with TVCUC members to discuss computer related problems, issues, and solutions on a first come, first served basis.

The October FLS Support Day will be 10/30 at 3:00pm in Chota “D”

CALL US BEFORE YOU GET SO FRUSTRATED THAT YOU WANT TO DO THIS!

FLS available for Windows, Apple OS, Smart phones/Tablets -- iOS & Android

slide-17
SLIDE 17

TVCUC, Connecting Your World

September Hot Line calls: 51 Members 25th FLS Day: 9 Members

Top Issues:

Software Updates with Win 10

Slow Running Computers

Malware

Network Connections after Update

As always write down and safely store Passwords

slide-18
SLIDE 18

Protecting Your Personal Information:

  • Cyber Security

Joint Education Presentation by

HOA

slide-19
SLIDE 19

What we plan to cover today

  • What exactly is ‘Cyber Security’?
  • How big is this issue? Who is affected?
  • Tips to reduce computer threats

– Home Wi-Fi Network – Passwords – Virtual Private Network (VPN) – Requests for personal information

  • Financial

– Credit bureaus – Accessing Financial sites – Note: This presentation will be made available on-line on the Neighborhood Watch and TVCUC websites.

slide-20
SLIDE 20

Some Definitions

  • What is “Cyber” or “Digital”?
  • “Cyber” is a term used to define all electronic

communications and computer based activities both personally and business.

  • “Digital” is a term often used in place of “Cyber” because

computers and communications use a system of digits (numbers) instead of letters and words.

  • “Cyber” is used with other terms:
  • Cyber Space: Basically that is the Internet.
  • Cyber Crime: Attacks on computers - personal or business
  • Cyber Security: Protecting from attacks.
slide-21
SLIDE 21

So, Who is Affected?

  • EVERYONE!
  • WE ARE ALL JUST FLOATING IN THE CYBER

SEA – EVEN IF WE DO NOT USE A COMPUTER OR SMART PHONE, OUR BANKS, THE GOVERNMENT, PLACES WE SHOP, MEDICAL RECORDS, WHEN WE BUY A HOME – ALL THE TRANSACTIONS ARE DONE IN CYBERSPACE WHICH PUTS US IN CYBER SPACE.

slide-22
SLIDE 22

How Connected Are We?

slide-23
SLIDE 23

Just How Big A Problem?

  • Us Director of National Intelligence (Jan 2014) ranks

cybercrime as the top national security threat

  • Global cost of cybercrime estimated to be $445B-

$575B in 2013.

  • U.S. cybercrime

hit was ≈$100B That would be the world’s 27th largest economy if cybercrime were a country

slide-24
SLIDE 24

Who is Targeting You?

slide-25
SLIDE 25

Does this apply to anyone here?

  • #1 Use Passwords

– REAL ONES!! – Keep updated. EVERYWHERE!!

  • Make sure the Password

is a Strong Password.

  • Consider Password

keeper software.

So How do you Protect Yourself?

slide-26
SLIDE 26

No Joke…. People do Use these:

  • Recent password breaches at sites like Adobe have shown how insecure many of our

passwords are. Here is a list of the most common passwords that turned up in the Adobe

  • breach. It probably goes without saying: Avoid using these passwords.
  • 123456
  • 123456789
  • password
  • admin
  • 12345678
  • qwerty
  • 1234567
  • 111111
  • photoshop
  • 123123
  • 1234567890
  • 000000
  • abc123
  • 1234
  • adobe1
  • macromedia
  • azerty
  • iloveyou
  • aaaaaa
  • 654321
slide-27
SLIDE 27

So what is a strong password?

  • The only secure password is one that you can't

remember, but there are times when you can't use a password manager and need to rely on your memory.

  • The longer the password, the harder it is to
  • crack. Consider a 12-character password or

longer.

  • Avoid names, places, and dictionary words.
  • Mix it up. Use variations on capitalization,

spelling, numbers, and punctuation.

slide-28
SLIDE 28

Password Ideas

Take a sentence and turn it into a password. The sentence can be anything personal and memorable for you. Take the words from the sentence, then abbreviate and combine them in unique ways to form a password. Here are six sample sentences:

  • WOO!TEwontSB = Woohoo! The Eagles won the Super Bowl!
  • IltpPBedotw@TV =I like to play pickleball every day of the

week at Tellico Village.

  • PPupmoarT@O@tgs = Please pick up more Toasty O's at the

grocery store.

  • W?ow?imp::ohth3r = Where oh where is my pear? Oh, there.
  • L!veFour2d@y = Live for today.
  • 1L%veM0m$Pi! = I Love Moms Pie!
slide-29
SLIDE 29

Where do you keep your Passwords?

Consider a Password Keeper instead……

slide-30
SLIDE 30

Password Keepers

Password Keeper Software Can generate random passwords and fill them in with your username – you

  • nly need to remember the

Master Password

slide-31
SLIDE 31
slide-32
SLIDE 32

So Again the Question: How do you Protect Yourself?

  • #1 Use Strong Passwords – REAL ONES!! –

Keep updated.

  • Have a safe strategy for keeping Passwords.
  • Consider Password Keeper Software.
slide-33
SLIDE 33

Some new vocabulary

  • Phishing
  • Cryptojacking
  • Ransomware
  • The Dark Web
slide-34
SLIDE 34

Phishing

  • Phishing is a cyber attack that uses disguised email as a weapon.

The goal is to trick the email recipient into believing that the message is something they want or need — a request from their bank, for instance, or a note from someone in their company — and to click a link or download an attachment.

  • What really distinguishes phishing is the form the message takes:

the attackers masquerade as a trusted entity of some kind, often a real or plausibly real person, or a company the victim might do business with. It's one of the oldest types of cyberattacks, dating back to the 1990s, and it's still one of the most widespread and pernicious, with phishing messages and techniques becoming increasingly sophisticated.

slide-35
SLIDE 35

Phishing Examples

slide-36
SLIDE 36

What to do about Phishing

  • NEVER follow an e-mail Link or a Phone Call, or Text.
  • If notified by e-mail of a problem or request for information, go to

the website (such as your bank) or call the customer service and ask if they sent you a message and what it is about. They have you information and will only ask for verification like the last 4 digits of your SS Number or birth date, this is done to make sure they are speaking to the proper person.

slide-37
SLIDE 37

COMPUTER THREAT – YES, EVEN APPLE PRODUCTS CAN BE ATTACKED

  • If you get a message that you computer has been attacked and you have only

some few seconds to respond to a phone number to fix it:

  • SHUT YOUR COMPUTER DOWN COMPLETELY AND WAIT FOR AT LEAST 30

SECONDS TO RE-BOOT.

  • DO NOT JUST DO A “RESTART” – THIS DOES NOT COMPLETELY CLEAR THE

MEMORY.

  • These messages frighten people into letting strangers take control of your

computer and charge you to fix them, allowing them to lock you out or steal information – and your money. Most likely your computer will be trashed.

  • Install, keep updated and use Anti-Virus programs. Yes, you can get some for free,

but consider the benefits of a subscription and if it offers more protection.

  • Install, keep updated and use Malware programs. Yes, you can get some for free,

but consider the benefits of a subscription and if it offers more protection.

  • Install, keep updated and use Anti-Ransom Ware programs. You can get some for

free, some are being included in Anti-Virus programs as part of a subscription.

slide-38
SLIDE 38

How many have heard of Cryptojacking??

  • Cryptojacking is defined as the secret use of your computing device to

mine cryptocurrency.

  • How does in-browser cryptojacking work?
  • In-browser cryptojacking uses JavaScript on a web page to mine for

cryptocurrencies.

  • JavaScript runs on just about every website you visit, so the JavaScript

code responsible for in-browser mining doesn’t need to be installed.

  • You load the page, and the in-browser mining code just runs. No need to

install, and no need to opt-in.

  • Cryptojacking blocker
  • The simplest way to protect yourself from cryptojacking is to install a

cryptojacking blocker.

https://hackerbits.com/programming/what-is-cryptojacking/

slide-39
SLIDE 39

Ransomware - Malware

https://us.norton.com/internetsecurity- malware-ransomware-5-dos-and- donts.htmlhttps://us.norton.com/internetsec urity-malware-ransomware-5-dos-and- donts.html

slide-40
SLIDE 40

Ransomware

  • For more long-term prevention of ransomware attacks, follow these ransomware

tips for businesses and consumers:

  • New ransomware variants appear on a regular basis. Always keep your security

software up to date to protect yourself against them.

  • Keep your operating system and other software updated. Software updates will

frequently include patches for newly discovered security vulnerabilities that could be exploited by ransomware attackers.

  • Email is one of the main infection methods. Be wary of unexpected emails,

especially if they contain links and/or attachments.

  • Be especially wary of any Microsoft Office email attachment that advises you to

enable macros to view its content. Unless you are absolutely sure that this is a genuine email from a trusted source, do not enable macros and instead immediately delete the email.

  • Backing up important data is the single most effective way of combating

ransomware infection. Attackers have leverage over their victims by encrypting valuable files and leaving them inaccessible. If the victim has backup copies, they can restore their files once the infection has been cleaned up. However,

  • rganizations should ensure that backups are appropriately protected or stored
  • ffline so that attackers can’t delete them.
  • Using cloud services could help mitigate ransomware infection, since many retain

previous versions of files, allowing you to “roll back” to the unencrypted form. https://us.norton.com/internetsecurity-malware-ransomware-5-dos-and- donts.html

slide-41
SLIDE 41

SMART PHONE THREATS

  • A Smart Phone is a computer. Messages or links like those

sent to a computer will pop up and cannot be dismissed.

  • SHUT YOUR PHONE DOWN COMPLETELY AND WAIT FOR

AT LEAST 30 SECONDS TO RE-BOOT.

  • DO NOT JUST DO A “RESTART” – THIS DOES NOT

COMPLETELY CLEAR THE MEMORY.

  • Use many of the same types of protective programs and

cautions as a computer to shield you.

  • Process Updates as soon as available!!!!!!!
slide-42
SLIDE 42

Financial Matters This is where “The Dark Web” thrives

  • Targets of The

Dark Web:

  • Banking
  • Credit & Debit

Cards

  • Credit

Monitoring

  • Social Security
  • ID Theft
slide-43
SLIDE 43

The Dark Web

  • The Web or Internet most everyone uses is an open, easily

searched network of people, places and information. We just “Google” it, and there, whatever we want is on our screen.

  • The “Deep Web” is special part of the internet that

businesses like Banks, PayPal, Social Security, and government use to transact business and only by knowing some exact address can someone access those who use it. A “Google” search won’t find anything.

  • The “Dark Web” is like the “Deep Web” in that special

software is needed to gain access, but unlike the “Deep Web” it is filled with hackers and thieves. They set up shop like an

  • pen air Bazaar selling your full ID (SSN, mother’s maiden

name, full history) for as low as: $2.95 Your whole life is worth $2.95. (bitcoin – no traceable dollars) Guns, drugs, children, you name it - all for sale in the Dark Web.

https://www.aarp.org/money/scams-fraud/info-2018/what-is-the-dark-web.html

slide-44
SLIDE 44

Banking

  • Check your accounts regularly – at least weekly.
  • If your Bank offers alert monitoring – enable it

so you know when there is a posting and can react promptly.

slide-45
SLIDE 45

Credit Cards and Debit Cards

  • Set up Alert monitoring. Setting the alert

amount to $0.00 will alert you to every charge

  • Inform Credit Card companies before you

travel – especially International.

slide-46
SLIDE 46

Credit Bureaus

  • Credit bureaus, also called credit

reporting agencies, are companies that collect and maintain consumer credit information then resell it to

  • ther businesses in the form of a

credit report.

  • In the United States, there are three major credit bureaus:

Equifax, Experian, and TransUnion. When creditors and lenders check your credit, they'll very likely to check your credit with one or all three of these credit bureaus.

  • All three of the major credit bureaus are publicly-traded, for-

profit companies—they're not owned by the government. The government does, however, have legislation—the Fair Credit Reporting Act (FCRA)—that regulates how these and other credit bureaus can and must operate.

slide-47
SLIDE 47

What do they get from Credit Bureaus

  • Your most personal

information — home address, Social Security number, etc. — has likely been hacked as one of the 143 million American consumers whose Equifax credit files were breached.

slide-48
SLIDE 48

What the Credit Reporting Agencies Do...and What They Don't Do

  • The major credit bureaus receive credit-related information from

companies that you do business with. They also pull relevant public records, like tax liens or bankruptcy information, from state and local courts and include this in your credit report.

  • Credit bureaus collect and hold consumer credit information then

sell it to businesses who have a legally valid reason for reviewing it. For example, a company with whom you've applied for credit with would have a valid need to look at your credit history. Your information can also be sold to companies that want to prescreen you for their products and services.

  • Credit reporting agencies can only provide information and

analytical tools to help businesses make decisions about whether to

  • ffer you credit and what sort of interest rate they should charge
  • you. The bureaus themselves don't make those decisions.
slide-49
SLIDE 49

Suggestions

  • Check your Credit Bureaus

Frequently for activity these are “Soft Pulls” and don’t usually affect credit scores.

  • Consider placing a “Lock” or

a “Freeze” in all 3 Bureaus.

  • LOCK: Allows for placing or

removing a lock on your Credit Bureaus – each is separate – so that new credit cannot be made without your consent. This can be done using mobile devices to aid obtaining credit, for example a new car, as needed then shut off.

  • FREEZE: Freezing shuts of the ability to add a new account until the Freeze is lifted
  • n all Credit Bureaus. A Freeze can be placed free of charge. It is fast to place a

freeze, but can take time to Un-Freeze. “On the fly” like a Lock is not possible.

  • Which One? Both shut off credit to protect, but the FREEZE has additional state

mandated rules while the Lock is regulated by the Bureaus.

  • Request annually your free credit report and review carefully.
slide-50
SLIDE 50

When You Need to Contact the Credit Bureaus

  • You have a right to view your credit reports

and you're entitled to order a free report from each of the major credit reporting agencies

  • nce each year.
  • Just visit AnnualCreditReport.com to make the
  • request. You can also get a copy of your report

at no charge if you've been turned down for credit, but you have to make the request within 60 days.

slide-51
SLIDE 51

Medicare

  • This year Medicare will be mailing new Medicare cards to everyone

with Medicare. The new card will have a new Medicare Number that’s unique to each person instead of their Social Security Number.

  • Watch out for scams
  • Medicare will never call you uninvited and ask you to give personal or

private information to get your new Medicare Number and card.

  • Scam artists may try to get personal information (like your current

Medicare Number) by contacting you about your new card.

  • If someone asks you for your information,

for money, or threatens to cancel your health benefits if you don't share your personal information, hang up and call 1-800-MEDICARE (1-800-633-4227).

  • For more information about new cards

and other Medicare information - check out Medicare.gov or log into your MyMedicare.gov account.

slide-52
SLIDE 52

The Dark Web & Basic Safeguards

  • Freeze you Credit Bureaus so no new credit

can be opened without you knowing. This also limits credit checks. This puts YOU in control.

  • Monitor ALL your accounts so you know when

and what transactions are taking place. This puts YOU in control.

  • Use a Password Manager this is the easiest

way to create a unique, random password for each site. If someone does get a password, it will only be to a single site. This puts YOU in control.

slide-53
SLIDE 53

Are Any Devices “Safer” than Others? No, not really, it is most often us who let the hacker in

slide-54
SLIDE 54

Tips for Securing Your Wireless Home Network

  • Refrain from giving out the network password. As paranoid as it may make you seem, refusing to give out your network's

password lowers the chances of people who you don't trust finding out your network's password. Instead of giving out the password, offer to sign in friends and family when they visit rather than allowing them to sign into the Wi-Fi themselves.

  • Place your router in the middle of your home. In addition to making your router coverage more balanced, doing this will

limit the router's reach beyond your home's walls. This means that would-be network intruders won't be able to sit outside

  • f your home and still connect to the network.[1]Your home's size and layout may make this impossible; if so, just try to keep

your router well-away from windows and external doorways.

  • Disconnect the router when it's not in use. If you plan on leaving your home for a weekend or more, unplug your router

and/or modem. This is more of a safety precaution than an active security measure, but it will prevent any potential attackers from connecting to your Internet while you're powerless to stop it.Even if you're going to be gone for a standard 8-

  • r 9-hour work day, disconnecting your router will prevent any chances of your network being compromised while you're

gone.

  • Use a boring network name. It may sound stupid, but changing your clever Wi-Fi network name to a boring one will

decrease the odds of it being picked out as a potential target.[2]For example, using the router's manufacturer and its number (e.g., "Belkin-3030") as the name will make the network stand out less than if its name is "Bill Wi the Science Fi" or something similar.

  • Disable your computer's network sharing. Network sharing allows your computer to share files and information with other

computers on the network, but it also makes your computer a weak point in the network's security.

  • Use a VPN. Virtual Private Networks, or VPNs, direct your network traffic through one or more abnormal servers, hiding your

network's activity in the process. VPNs don't necessarily secure your network so much as they hide it, but that's usually enough to prevent attacks as well as reduce the likelihood of future attacks.

  • Replace your router when it becomes obsolete. As with any technology, routers lose their value after a few years, especially

in the security department. Since online threats are constantly updating and evolving, a brand-new router will be much better equipped for security than will a three- or four-year-old one.

slide-55
SLIDE 55

Virtual Private Network

  • Consider using a VPN (Virtual Private

Network) which masks your computer’s address and creates an encrypted “Tunnel” in the internet between your computer and where you are connecting to. This to shield you from hackers, even a Government. There is a subscription fee to cover the cost of all the servers used and there is a bit of slowing.

slide-56
SLIDE 56

VPNs and cost (CNET)

  • NordVPN – 5 / 5 - best plan is 1-year subscription plan: $6.99 ($83.88). While their

monthly price of $11.95, their yearly price of $83.88

  • STRONGVPN – 5 / 5 - monthly price of $10 is in the middle of the pack, but their

yearly price of $69.99

  • IPVanish VPN – 4.5 / 5 - $7.50/month and $58.49 for a year,
  • PureVPN – 4.5 / 5 - Pricing is middle-of-the-road,at $10.95 per month and $69.00

for three year's service.

  • ExpressVPN – 4 / 5 - Their best plan is priced at just $6.67per month for an annual

package which includes 3 extra months free.

  • Hide My Ass – 4 / 5 - monthly pricing of $11.52 is at the high end of the spectrum,

their yearly pricing is competitive at $78.66 for a full year.

  • Buffered VPN – 4/5 At $12.99 per month and $99.00 for a year of service
  • Goose VPN – 4.5 / 5. monthly fee for unlimited bandwidth is a middle-of-the-road

$12.99/month, but if you spend $59.88 for a year's service,

  • https://www.cnet.com/best-vpn-services-directory/
slide-57
SLIDE 57

What is “https” and Why Do I care?

Hyper Text Transfer Protocol Secure (HTTPS) is the secure version of HTTP, the protocol over which data is sent between your browser and the website that you are connected to. The 'S' at the end of HTTPS stands for 'Secure'. It means all communications between your browser and the website are encrypted. helps to prevent hacker attacks that are based on eavesdropping

slide-58
SLIDE 58

Anti-Virus, Anti-Malware, Anti-Ransomware

Each is a different type of attack – some just to cause trouble, some to steal information, some to steal “YOU”. It is important to constantly update the anti-virus, anti-malware and anti-ransomware software on a computer because computers are regularly threatened by new types of attacks. These updates contain the latest files needed to combat new attacks and protect your computer.

slide-59
SLIDE 59

Conclusion YOU need to Help Keep YOU Safe

  • Guard your Personal Information
  • Strong Passwords - Consider Password Keeper
  • Be careful on-line – Be cautious of posting Information on Social

Media

  • Be careful when info requested – others are trying to get you to

give them information

  • Follow safe “computer” use methods – up to date software
  • Note: This presentation will be made available on-line on the

Neighborhood Watch and Computer Club websites.

slide-60
SLIDE 60

TVCUC, Connecting Your World

Thanks For Coming!

Welcome to our new members tonight, thanks for joining us. And now:

The Door Prize Drawing – Tickets in Hand?