This action might not be possible to undo. Are you sure you want to continue?
By Joe Black, Courtesy of WindowsRepairTool.com Learn Windows Registry Repair Copyrig!t "##$ all rig!ts reser%ed.
Internet Security- The Truth About Identify Theft......................................................................... 3 Internet Security for Teens- What You Need to Do....................................................................... 4 Internet Security-Downloading E- ail Attach!ents ..................................................................... 4 Internet Security- " Ti#s for $sing %aceboo&................................................................................. " Internet Security- ' Ti#s to (rotect Yourself When Dating )nline ................................................ * Internet Security for Teens and Tweens- +, Ti#s to -ee# You (rotected..................................... . Internet Security- (arental /ontrol Software.................................................................................' Internet Security- )nline Safety for Your /hildren.........................................................................' /yber 0ullying- Another As#ect of 0rea&ing Internet Security......................................................1 " Ti#s to Ensure Internet Security.................................................................................................+, Internet Security- Downloading usic off the Internet............................................................... ++ Internet Security- (o#ular )nline Sca!s......................................................................................+2 Internet Security- (rotect Your Wireless /onnection...................................................................+3 Internet Security- 3ow to Deal with S#yware.............................................................................. +3 Internet Security- (rotecting Yourself When You Sho# )nline....................................................+4 Internet Securitya&e Sure Your (asswords (rotect You......................................................... +" a&e Sure Your E!ails Are Safe4 Ti#s for Internet Security.........................................................+* Internet Security- Why Should You $se a %irewall5..................................................................... +. Internet security-Signs That Your /hild6s Safety ight 0e /o!#ro!ised ....................................+' Internet Security- (rotect Your 0usiness...................................................................................... +' Internet Security- Safety When $sing (ublic /o!#uters.............................................................+1 4 E!ail Sca!s that Threaten Your Internet Security....................................................................2, Internet Security- Storing Your (assword on Your /o!#uter......................................................2+ Internet Security-What Does Your 7arge 0usiness 8e9uire5........................................................22 Internet Security-$sing Social $tility Sites....................................................................................22 Congratulations!!!!! You have full giveaway rights to this book.
T!is means as long as you don&t alter t!e content of t!is eBook you can use it as a part your newsletter, gi%e it away as a 'onus gift, or simply to add great content to your we'site. (ou may not offer t!is 'ook in any ot!er format t!en )*+.
Internet Security- The Truth About Identify Theft
(ou would !ate to t!ink t!at 'y ordering t!at new purse or 'uying t!at airline ticket for %acation mig!t end up costing you your identity. W!ile most we'sites are secure w!en it comes to transactions, your personal and financial information can 'e compromised. ,s a result, t!ey can open credit cards, c!ecking accounts, and e%en get an I* and purc!ase a new car wit! your personal information. ,s a result, you could end up owing t!ousands of dollars, as well as !a%e to seek legal !elp w!ic! can cost e%en more money. Identify t!eft can unfortunately !appen to anyone. -ere is some information t!at mig!t 'e !elpful in recogni.ing it and pre%enting it to maintain your internet security. Signs that Your Personal Infor ation !ight "e Co #ro ised /. (ou recei%e somet!ing t!at you did not order. ". 0ne1plained t!ings pop up on your credit report. (ou mig!t not e%en notice t!is until you try to purc!ase somet!ing and you are declined due to your poor credit rating. 2. 0ne1plained purc!ases s!ow up in your c!ecking account or on your credit cards. 3. (ou recei%e calls from 'ill collectors for accounts t!at you did not open. Preventing Identity Theft /. ,lways s!red any unwanted credit card offers or mail t!at mig!t contain personal information suc! as your account num'er, social security num'er, c!ecking account num'er, etc. ". Stay up to date on t!e latest scams. T!ere are se%eral we'sites de%oted to t!is. 2. use anti spam ware and ensure t!at your e4mail account !as a spam filter on it to deposit unwanted emails into. 3. C!eck t!e pri%acy policy on a we'site t!at asks for personal information. *on5t su'mit anyt!ing if it doesn5t !a%e one. 6. *on5t keep your personal or financial information on your computer. Likewise, don5t store your passwords on your computer eit!er. 7. *on5t open an attac!ment if you recei%e an e4mail from someone t!at you don5t know. 0se an anti4%irus program to scan t!e e4mail first to make sure t!at it doesn5t contain any p!is!ing or %irus programs on it. 8. 9eep your firewalls and anti4%irus software up4to4date on all of your computers. If you suspect t!at your security !as 'een compromised, c!ange all of your passwords, cancel your credit cards, close your 'ank account, and report it to t!e police. ,lso, report t!e acti%ity at once to your financial institution and Credit Card Company.
Sign u# for our +ree
:ewsletter ;mail t!is 'ook to a +riend
Internet Security for Teens- $hat You %eed to &o
;%eryday you !ear a'out teens 'eing attacked or compromised 'y people w!o take ad%antage of t!em 'y using t!e internet. +or a parent, t!is can 'e a frig!tening concept. -owe%er, t!ere are measures t!at you can take to protect your teens on t!e internet. T!e following is a list of tips to !elp ensure internet security for your teens.
1. Talk to your teen. +irst, make sure t!at you talk to your teens a'out internet security. -a%ing good communication is always t!e most effecti%e pre%enti%e measure. ,fter all, you can put security features on your computer at !ome, 'ut teens !a%e access to computers almost e%eryw!ere t!ey go. <ake sure t!at your teen understands t!e dangers associated con%ersing wit! people t!ey don5t know on t!e internet, meeting people off of t!e internet, and using t!eir financial information to purc!ase somet!ing online. 2. "e aware. T!ere are t!ousands of c!at rooms, message 'oards, and forums out t!ere for
teens. ,s a result, t!ere are t!ousands of people out t!ere w!o pretend to 'e teens in order to con%erse wit! t!em. T!is is a dangerous situation. W!en your teen is at !ome, monitor t!eir internet use wit!out 'eing too o%er'earing. 9now w!at c!at rooms t!ey use, w!at people t!ey con%erse wit! on a daily 'asis, and ask to 'e a'le to access t!eir face'ook and myspace pages. Let t!em know t!at if t!ey are going to !a%e a computer in t!eir room you !a%e t!e rig!t to look at t!eir internet usage from time to time.
3. 'e#ort any sus#icious behavior. If your teen tells you t!at someone on t!e internet wants to meet t!em, do some in%estigating yourself on t!is person. Likewise, if your teen tells you t!at t!ey are trou'led 'y someone w!o is contacting t!em on t!e internet t!en report t!is person to t!e police. It is 'etter to 'e safe t!an sorry. 4. &on(t let cyber bullying go unnoticed. Cy'er 'ullying is a %ery real t!reat to internet
security, as well as p!ysical and emotional well4'eing to teens. If your teen is 'eing cy'er 'ullied t!en report t!e offenders to t!at we'site t!at it is occurring on and t!en let t!e sc!ool know as well. <ore and more organi.ations and we'sites are taking t!is seriously t!is days. =n face'ook, if you 'lock someone now, it actually asks you if it was due to cy'er 'ullying.
)arental Control Software Lets face it life keeps us to 'usy to 'e a'le to monitor our
c!ildren&s internet acti%ity completely. ,nd as muc! as we would like to 'elie%e our c!ildren our 'eing !onest wit! us it&s !ig!ly likely t!ey are not. T!e !ars! reality is our c!ildren know more a'out tec!nology t!en we do and can easily !ide t!eir acti%ity from us. If you want t!e piece of mind of knowing your c!ildren our safe in%est in )arental Control Software . T!ere are many great products a%aila'le. To sa%e you some time I !a%e pro%ided a link to t!e software I use personally. Click !ere
)andling * ail
It seems silly t!at people would waste t!eir time trying to come up wit! different ways to destroy ot!er people5s systems, 'ut it !appens on a daily 'asis. Sometimes, people do it >ust 'ecause t!ey can and t!ere isn5t reason a %alid reason 'e!ind t!eir actions. T!is can 'e %ery frustrating for t!e %ictims of suc! an attack. (ou must learn to 'e cautious. So !ow can you protect your internet security w!en it comes to downloading e4mail attac!ments? Ignore t!e mail. , lot of times people w!o send !armful t!ings to your e4mail account try to get away wit! it 'y pretending t!at t!ey know you or are sending you somet!ing t!at you already re@uested. Well, if you know t!em t!en you s!ould 'e a'le to identify t!e e4mail address. (ou s!ould also recogni.e t!e name. Sometimes, t!ey will use t!e name of a legitimate company to try to fool you. +or e1ample, it mig!t say A,ma.onB 'ut w!en you look more closely at t!e e4 mail address it mig!t read ama.onC!otmail.com. :ow, would it really make sense for ,ma.on to use a free e4mail account?
,nti4%irus software. (ou s!ould definitely in%est in some anti4%irus software. T!is will scan t!e
e4mails and attac!ments for you and let you know if t!ey are safe. T!is can 'e particularly important if you are using free email accounts.
)aretoLogic ,nti4Dirus )L0S is a !icrosoft Certified Anti-virus and Internet Security
Suite t!at is surprisingly afforda'le. T!ese days we are all on a strict 'udget. I recommend t!is software 'ecause it is e%ery 'it as good as :orton and <ac,fee 'ut at a fraction of t!e cost. T!is product is an all in one solution. It includes malware, spyware as well as ,nti4Dirus protection and elimination. Click !ere to learn more.
Internet Security- + Ti#s for ,sing -acebook
(ou pro'a'ly !a%e a face'ook account. If you don5t, t!en c!ances are t!at your c!ild does. +ace'ook can 'e an e1cellent way to interact wit! your friends and co4workers, as well as keep your family updated on w!at is going on in your life. (ou can post family %acation pictures, send emails, and Ac!atB wit! people t!at li%e far away. Better yet, you can do all of t!is for freeE -owe%er, t!ere are some risks associated wit! internet security w!en it comes to +ace'ook. Luckily, +ace'ook is aware of t!ese internet security risks. T!ere are actually some t!ings t!at you can do to !elp protect yourself. T!e following is a list of 6 tips t!at you can use to make sure t!at you are safe w!en using +ace'ok. /. <ake your profile pri%ate. (ou can do t!is in a num'er of ways. (ou can make it so t!at only your friends can see your information and p!otos, or you can make it so t!at people can see your name and information 'ut not your p!otos or wall unless you add t!em as a friend. C!eck t!is out under your Apri%acy settingsBtap on your account. ". Block people t!at you don5t want to see your information. T!ere is a c!oice under t!eir p!otograp! t!at will allow you to 'lock t!em. W!en you do t!is, you will not s!ow up on a searc! t!at t!ey do and t!ey will not see anyt!ing !a%ing to do wit! your account. It will 'e as t!oug! you do not e1ist to t!is person. T!is is a good feature is someone specifically is 'ot!ering you. "
2. Report cy'er stalking or !arassment. If you c!oose to 'lock someone, a window will pop up asking you t!e reason. =ne of t!e c!oices is cy'er stalking. C!oose t!is option if it is true. It won5t stop if people don5t report it. 3. =nly add people t!at you know. T!is will !elp your internet security tremendously. -a%ing 2## or more friends >ust so t!at you can say you !a%e a lot of t!em is not a good reason for continuing to add people. 6. *on5t purc!ase anyt!ing %ia +ace'ook. <any applications cost money. Ignore t!ese and use t!e multitude of free t!ings t!at t!e site offers. (ou don5t want your financial information to 'e compromised >ust 'ecause you send someone a picture of a 'irt!day cake.
Internet Security- . Ti#s to Protect Yourself $hen &ating /nline
, lot of people find great, !ealt!y relations!ips t!roug! online dating communities. <ost of t!e people w!o sign up for t!em are legitimately looking for lo%e and relations!ips. -owe%er, t!ere are always going to 'e people out t!ere w!o will take ad%antage of ot!ers. So w!at can you do to protect your internet security, and yourself, w!en using online dating we'sites? /. If you do decide to meet someone in person, do it in a pu'lic place. )refera'ly, meet t!em in daylig!t !ours and ask someone to go wit! you. If t!at doesn5t work, t!en at least lea%e information wit! a trusted person w!ic! includes w!ere you are going, !ow long you plan on staying,a s well as anyt!ing identifia'le a'out t!e person t!at you are meeting. ". *o not rely on a p!otograp!. It mig!t not e%en 'e t!e person t!at you are really talking to. =r, it could !a%e 'een t!em "# years 'efore. )eople use different pictures or are dis!onest a'out t!eir appearance all t!e time. 2. Sa%e all of your con%ersations in a file on your computer. Better yet, print t!em out. 9eep t!em somew!ere t!at is fairly easy to access. 3. Talking to someone online is not t!e same as talking to t!em in person. *on5t rus! t!e relations!ip and don5t feel as t!oug! you !a%e to meet t!em rig!t away. 6. use a different e4mail account for your online dating t!an you do for your regular emails. 7. *o not e%er gi%e out any personal information at t!e 'eginning. In addition, keep your last name and anyt!ing personal, suc! as your address and directions to your !ouse pri%ate, until you !a%e met t!e person and !a%e gotten to know t!em a little 'it 'etter. If you must gi%e t!em your num'er, gi%e t!em a cell p!one num'er instead of your !ouse p!one. 8. +ind a reputa'le online dating ser%ice. *on5t >ust go to Foogle and searc! for singles c!at rooms. ,n account t!at you !a%e to pay for is generally more reputa'le t!an one t!at is free of c!arge. *
G. *on5t post any racy or re%ealing p!otograp!s of yourself. T!is is sure to draw t!e wrong kind of person4and not one t!at is looking for a relations!ip wit! anyt!ing serious in mind. In addition, try to c!oose a screen name t!at isn5t too re%ealing eit!er.
Internet Security for Teens and Tweens- 01 Ti#s to 2ee# You Protected
T!ere are a lot of safety risks out t!ere for teens and tweens w!o use t!e Internet. -owe%er, t!is doesn5t mean t!at t!ey !a%e to stop using t!e 5:et. Instead, t!ey s!ould use good >udgment and try to make wise decisions. T!e following article lists some !elpful tips to keep your teen and tween5s internet security protected. /. *on5 let your username say too muc! a'out you. +or instance, don5t make it your name and age, like Susan/7. Instead, make it somet!ing t!at doesn5t say muc! a'out your name, age, or se1. 9eep it as neutral and %ague as possi'le. ". *on5t e%er post your social security num'er, dri%er5s license num'er, p!one num'er, !ome address or credit card information on t!e internet. If a friend asks you for your num'er on <yspace t!en eit!er email t!em a pri%ate message or wait until you see t!em in person. 2. *on5t add friends on t!e Internet t!at you don5t know. )eople often misrepresent t!emsel%es and pretend to 'e somet!ing t!ey are not. It !appens all t!e time and t!ey are %ery good a'out it. *on5t t!ink t!at you will know t!e difference. 3. :e%er agree to meet someone in person t!at you !a%e met off of t!e Internet. If you are part of a group and someone wants to get toget!er to discuss somet!ing t!at sounds legitimate, !a%e a parent go wit! you and meet in a pu'lic place. :e%er su'stitute a friend for a parent. 6. If you !a%e concerns a'out someone w!o is !arassing you on t!e Internet, tell an adult. Cy'er stalking is 'eing controlled t!ese days and awareness is growing. 7. <ake your profile pri%ate so t!at only t!e people you know can see your information and p!otos. 8. *o some researc! on sites 'efore you sign up for t!em. *on5t >ust >oin t!em 'ecause e%eryone else is. Learn !ow t!ey work 'efore you post anyt!ing. G. *on5t store your passwords on your computer. It can make !acking easier. $.If you purc!ase somet!ing wit! a credit card, ensure t!at you are using a secure ser%er. T!is s!ould 'e noticea'le 'y a little em'lem on t!e 'ottom rig!t !and side of your screen. /#. consider not using your full name w!en you >oin a site. :ot posting your last name is a great pre%enti%e measure w!en it comes to Internet security.
Internet Security- Parental Control Software
9eeping your c!ild safe is one of t!e 'iggest c!allenges t!at parents face today. Food communication is an e1cellent tool and necessary w!en it comes to warning your c!ildren a'out dangers t!at t!ey may face. -owe%er, sometimes it takes more t!an >ust good communication w!en it comes to protecting your c!ild online. ,lt!oug! you can go t!roug! t!e process of putting your family5s computer in a common room, looking into t!e +ace'ook and <yspace accounts from time to time, and talking to your c!ild a'out t!e risks of posting personal information, risks still arise. T!e fact is t!at sometimes your c!ild will 'e su'>ected to adult material, or material t!at is ot!erwise inappropriate for c!ildren, 'y mistake. T!ere are some pornograp!y we'sites w!ose addresses are %ery close to popular we'sites wit! t!e same name. Sometimes, t!e only difference is w!et!er it is .net, .com. or e%en .go%. =ne of t!e t!ings t!at you can do to protect your c!ild5s internet security is to install parental control software . ,lt!oug! it mig!t seem e1treme, a parent will do w!ate%er it necessary to protect t!eir c!ildren. So what can #arental control software do3
l l l l
Create alerts. (ou can 'e notified at once t!roug! eit!er te1t messages, p!one calls, or e4mails w!en someone in your !ome %isits an inappropriate we'site. Ti e controls. T!ese are good 'ecause you can actually set a pre4determined amount of time t!at your c!ild can spend on t!e Internet. =f course, w!en t!eir time runs out, t!ey can still access ot!er features of t!e computer suc! as word programs w!ic! t!ey mig!t need for sc!ool purposes. , common complaint t!at parents !a%e is t!at t!eir c!ild spends too muc! time on t!e Internet. ,sage 4ogging. Wit! t!is feature, you can produce and re%iew logs of your c!ild5s internet acti%ity. (ou can see w!at we'sites were %isited, logs of Instant messaging c!ats, as well as t!e %arious programs t!at were used during t!e Internet session. Content controls. T!ese allow you to c!oose w!at types of content, suc! as adult content, t!at you want your c!ild to a%oid access to. Progra controls. )rogram controls control t!e access to certain programs suc! as downloading music files or ot!er files t!at could 'e dangerous. All in one solution. Look for an advance piece of software that has all its bases covered. Email recording, Content filtering, and Ke stroke logging are among the most important. T!ere are many great products a%aila'le. To sa%e you some time I !a%e pro%ided a link to t!e software I use personally. Click !ere
Internet Security- /nline Safety for Your Children
;%ery parent wants to keep t!eir c!ild safe. )rotecting your c!ildren w!en t!ey are on t!e Internet is no e1ception to t!is. W!ile you don5t want to t!ink a'out people !arassing your c!ild
or trying to 'ring !arm to t!em, t!ere are still t!ose out t!ere w!o mig!t try. T!e following is an article t!at contains tips on !ow you can pro%ide online safety for your c!ildren. l (ou can purc!ase online tools for added internet security. T!ese contain features t!at allow you to control your c!ild5s access to adult material. Some IS)s also contain parent4control options t!at 'lock some types of material. In addition, you can purc!ase programs t!at 'lock access to sites t!at is 'ased on a list t!at your IS) makes. (ou can also purc!ase filtering programs t!at restrict personal information from 'eing sent online. T!is is particularly !elpful in protecting your financial and personal information. Install a program t!at lets you set a time limit on !ow long your c!ild can stay online. T!is way, you can ensure t!at t!ey are not spending a large amount of time on t!e internet. -owe%er, t!ey will still 'e a'le to use office programs for sc!ool. If your c!ild !as a <yspace of +ace'ook account, get one as well and 'efriend t!em in order to monitor t!eir use. =nly inter%ene if t!ere is a safety concern in order to gi%e t!em more pri%acy. *on5t let your c!ild participate in c!at rooms. Some IS)s offer programs t!at 'lock c!at rooms. Sometimes people enter c!at rooms designed for c!ildren and teens and pretend to 'e one t!emsel%es. If you5re aware of any c!ild pornograp!y contact t!e :ational Center for <issing and ;1ploited C!ildren. If your c!ild recei%es pornograp!y, contact your local law enforcement office. Talk to your c!ild a'out t!eir screen name creation. , screen name s!ould 'e neutral and s!ould not re%eal any of t!e c!ild5s personal information suc! as t!eir name or age. Talk to your c!ild a'out posting personal information like t!eir address, age, and full name on social utility sites. W!en t!ey create an account, !a%e t!em make it pri%ate to ensure t!at only people t!ey know can access it. Continuously monitor your credit cards and 'anking account in order to 'e aware of any unusual acti%ity. Talk to your c!ild if you 'ecome aware of somet!ing different on t!e account. T!en, talk to your credit card company or 'ank.
l l l l l l l l
Cyber "ullying- Another As#ect of "reaking Internet Security
W!en you t!ink of Internet security, you are pro'a'ly t!inking of protecting your personal and financial information. -owe%er, t!ere are ot!er types of internet security 'reec!es. =ne type is cy'er 'ullying. , p!rase t!at is 'ecoming more and more pre%alent in t!e world wide we', cy'er 'ullying can 'e %ery in%asi%e and emotionally upsetting to c!ildren, teens, and e%en adults. It5s difficult to control 'ecause in many cases t!e perpetrator is known 'ut can not 'e pro%en. -ow? Because t!ey will gi%e >ust enoug! information to let t!eir %ictim know w!o t!ey are, 'ut not enoug! information to actually 'e con%icted of anyt!ing. T!ey can do t!is 'y using pretend user names, fake pictures, and re%ealing %ery little information a'out t!emsel%es. So w!at types of t!ings !appen wit! cy'er 'ullying? l T!reats4 a lot of times, a cy'er 'ully will make t!reats. T!ese can 'e t!inly %eiled or outrig!t %icious. 1
-arassment on %ictim5s out we'site4 anot!er type of cy'er 'ullying occurs w!en t!e 'ully posts negati%e material in a'undance on t!e %ictim5s own we'site. T!is can come in t!e form of negati%e comments, t!reats, and ot!er types of general !arassment. l Slander4 if t!e 'ully !as t!eir own site Hlike a 'log or a face'ook or myspace pageI t!ey mig!t make slanderous comments a'out t!e %ictim. T!ese can 'e falsities, suc! as claiming t!at t!e %ictim is c!eating on t!eir spouseJsignificant ot!er, or t!ey can 'e !armful trut!s t!at t!e general population doesn5t need to need. l ,ccusations4 a rare form of cy'er 'ullying, 'ut e@ually dangerous, is w!en t!e 'ully actually accuses t!e %ictim of doing t!e same t!ing t!at t!e 'ully is doing. ,n e1ample would 'e t!isK t!e 'ully sends negati%e e4mails to t!e %ictim. T!en, t!e 'ully gets on t!eir own 'log or we'site and writes a'out ow upset t!ey are due tot !e fact t!at t!e %ictim is sending T-;< negati%e emails. In suc! cases, t!e 'ully mig!t e%en recei%e sympat!y and t!e %ictim is t!en !arassed e%en more 'y people w!o feel sorry for t!e %ictim. l So w!y do t!ings like t!is !appen? It is %ery difficult to know w!y. ,nger, resentment, lack of self4esteem, or sometimes plain 'oredom can lead to cy'er 'ullying. In addition, t!e anonymity of t!e internet makes it easier t!an e%ery to 'ully someone. Still, cy'er 'ullying can 'e emotionally de%astating and can t!reaten your own emotional security. If it is !appening to you, don5t sit 'ack and let it continue.
+ Ti#s to *nsure Internet Security
*o you want to keep your computer and personal information safe? =f course you do. -ere are 6 tips to !elp ensure your internet security. /. Be careful of em4mail attac!ments =ne of t!e most common ways to t!reaten your internet security is to open an e4mail attac!ment t!at contains a %irus. Sometimes, >ust clicking on t!e attac!ment itself will unleas! t!e %irus. If you recei%e an email from someone t!at you don5t know and it contains an attac!ment, don5t open it >ust to 'e on t!e safe side. (ou can always send a message to t!at person to %erify t!at t!e email is legitimate. It5s 'est to in%est in an anti %irus software program t!at can scan t!e attac!ment 'efore you open it. Some e4mail systems will scan emails for you. -owe%er, if you go t!roug! a free program Hlike !otmailI don5t count on t!e system 'eing as complete as an email account t!at you pay for. ". ,nti4%irus software (ou must in%est in anti4%irus software. It is one of t!e most important t!ings for your computer. In addition to keeping you safe from %iruses, it can also scan your !ard dri%e and clear out unnecessary information, t!us making your computer run more efficiently as well. ,nti4%irus software programs are e%eryw!ere 'ut it !elps to do some researc! 'efore in%esting in one. Wit! some of t!em, you !a%e to update t!em and pay again e%ery year. 2. 0pdate security patc!es for your 'rowser +,
=n Windows, you can go to AWindows 0pdateB under t!e AStartB menu it will update security patc!es for you. T!is is necessary 'ecause !oles are formed on t!e Internet fre@uently and w!ile you mig!t 'e protected t!is week, t!at doesn5t guarantee t!at you will 'e ne1t week.
3. )rotect your passwords W!ile it is easier to use your same password, or a %ariation of it, for all of your accounts, it is safer not to do so. W!en forming your password, it is 'etter to use a com'ination of letters and num'ers. ,lso, ne%er gi%e your password out to anyone and resist t!e urge to store t!em on your computer. +rom time to time, c!ange your password on your important accounts t!at contain personal information or financial information for added internet security. 6. Install a firewall. , firewall 'locks unwanted access to your computer. Some systems, like Windows Dista, !a%e firewalls 'uilt into t!em. (ou can also download ot!ers.
Internet Security- &ownloading !usic off the Internet
Today, most people !a%e downloaded music off of t!e Internet. :ot only is it con%enient, 'ut it is also fun and %ery ine1pensi%e. In t!e past, if you liked a song you eit!er !ad to wait until it came on t!e radio to record it or you !ad to go out and 'uy t!e entire al'um. :ot only was t!is e1pensi%e, 'ut it could 'e a !assle, too, if it was t!e only song off of t!e al'um t!at you wanted. *ownloading music, !owe%er, costs less t!an L/ per song in most cases. It also downloads @uickly and you can 'urn it on a C* for your !ome or %e!icle. -owe%er, downloading music off t!e internet comes wit! internet security risks as well. W!en a peer to peer H)")I site is used, eac! person5s computer acts as a !ost for a song or download. ,fter installing software, a person can decide if t!ey want to only download from ot!er people or let ot!er people also get into t!eir computer and download from t!em. ='%iously t!ings like t!is can cause pro'lems w!ere internet security is concerned. By letting ot!er people into your computer to download music, ot!er t!ings on your computer are also at risk from 'eing taken as well. T!is is especially true if a good !acker gets in control of your computer. +iles mig!t 'e stolen, or deleted, or a %irus can get into your computer and infect it, causing you to lose e%eryt!ing. :ot really wort! it for a couple of free songs. T!ere is anot!er pro'lem wit! downloading music in t!is way as well. <usic is copyrig!ted. W!en you download it wit!out t!e artist5s consent, you are 'asically stealing. It is punis!a'le 'y law. (ou !a%e pro'a'ly !eard of pirated music or pirated mo%ies 'efore.
, common argument is t!at artists are already ric! and downloading a couple of songs s!ouldn5t matter. -owe%er, it does matter. ,rtists, 'y t!e way, don5t really make t!at muc! money off of t!eir C*s. +or a L/2 C*, some of t!e profit goes to t!e songwriter, some to t!e record company, some to t!e musicians t!at played on t!e al'um, some to t!e distri'ution, and
some to t!e record store t!at sold it. 0nless t!e artist was also t!e songwriter, t!ey are getting a %ery low profit, usually only a dollar or so. If you are downloading music, !a%e a good anti4%irus software program a%aila'le, as well as a strong firewall. T!is will protect your computer, 'ut not your rig!ts if you get sued.
Internet Security- Po#ular /nline Sca s
:o'ody wants to get !ooked into a scam, 'ut some of t!em are so cle%er t!at you can get caug!t up in t!em wit!out e%en reali.ing t!at you are doing somet!ing t!at t!reatens your internet security. So w!at are some poplar internet scams? /. Cas!ier5s c!ecks. T!is is a new scam t!at is 'ecoming popular, especially on craigslist. Let5s say t!at you post somet!ing for sale. , person writes you, wit!out seeing t!e item, and says t!at t!ey want to purc!ase it. T!ey offer you a cas!ier5s c!eck t!at is sometimes e%en o%er t!e amount t!at t!e price is set for. T!ey e%en tell you to deposit it and to t!at t!ey will wait until t!e money s!ows up 'efore t!ey pick up t!e item. T!e money s!ows up in your account, t!ey get t!e item, and t!en suddenly, t!e 'ank calls. Turns out t!e c!eck wasn5t good to start wit!. To a%oid t!is, only deal wit! local people. :e%er accept a c!eck t!at is more t!an t!e amount. If possi'le, !a%e your 'ank c!eck out t!e cas!ier5s c!eck wit! t!e 'ank account t!at it was drawn upon. ". =nline auctions. ,lt!oug! t!e sites mig!t 'e legitimate, t!e products mig!t not 'e. To protect yourself, always purc!ase from a seller wit! positi%e feed'ack, make sure t!at it is a reputa'le auction site Hlike ;'ayI, understand t!e payment terms, use a safe payment met!od, and don5t accept cas!ier5s c!ecks for items. 2. )!is!ing. In t!is scam, someone writes you from a legitimate company, like a 'ank, and tells you t!at your information !as 'een compromised. T!ey t!en direct you to anot!er site w!ere you are asked to enter your personal information in order to protect e%eryt!ing. *on5t fall for it. If it was for real, you would !a%e recei%ed a p!one call or somet!ing from t!e mail. To 'e on t!e safe side, call t!e company 'y looking up t!e num'er in t!e p!one 'ook. 3. *isaster scams. , disaster strikes and t!e ne1t t!ing you know, someone is writing you asking for donations. Look t!em up on t!e internet 'efore you write a c!eck. 6. Work scams. T!ese can come in t!e form of work at !ome scams or scams in w!ic! t!e person tells you t!at t!ey found your resume online and want to offer you a >o'. :e%er do anyt!ing t!at re@uires you to pay money upfront or pro%ide your social security num'er of 'ank account num'er.
Internet Security- Protect Your $ireless Connection
0sing a wireless connection w!en it comes to your internet can 'e great. It5s fast, it5s easy, and you don5t !a%e to deal wit! cords. )lus, you can !ook up at a lot of different places4from airports to <c*onalds. W!ile wireless routers are great, t!ey are not as secure as !ooking up your computer to a wall in your !ome. =t!er people can use your routers and !ook up to t!e internet. T!ey can also access your own personal information and 'e pri%y to t!ings suc! as your financial information and ot!er t!ings t!at you don5t want ot!er people to !a%e access to. -ackers are notorious for 'reaking into unsecured connections. ,ctually, you don5t !a%e to 'e %ery tec!nologically ad%anced to do it, eit!er. ;%en someone wit! limited tec!nological skills can use your router for t!eir own computer. T!is is especially true if you do not set a password or make your connection secure. Sometimes, people >ust want to use your router to access t!e internet t!emsel%es. =t!er times, t!ey want to steal information or send you %iruses. :o'ody wants to deal wit! t!at. , %irus can cras! your computer, sometimes to t!e point t!at it is not sal%agea'le. But !ow do you make sure t!at your internet security is good w!en you use wireless internet? +irst, if you are not using your wireless router t!en you s!ould turn it off. T!is is one of t!e 'est ways to protect your internet security. (ou s!ould also disa'le t!e router5s *-C) ser%ice. W!at does t!is do? T!is 'asically gi%es t!e computer access to t!e wireless connection. -owe%er, w!en you disa'le it and figure it manually t!en you can gi%e your network a distinct I) address and make it more secure. It is also important to setting up a strong password in order to encrypt t!e ser%er. <ake sure t!at t!e password is somet!ing t!at is strong enoug! t!at it can5t 'e figured out. It is always suggested t!at you do not use t!e same password o%er and o%er for all of your accounts and t!at you try to make it a com'ination of letters and num'ers. *on5t e%er use your name, .ip code, social security num'er, or e%en telep!one num'er. Setting up and t!en acti%ating a firewall is an additional way to protect your internet security. T!is is important w!et!er you are using a wireless router or not. , firewall can protect you from %iruses.
Internet Security- )ow to &eal with S#yware
So w!at, e1actly, is Spyware? Spyware is software t!at can collect your personal information, c!ange your computer5s configuration, and install ad%ertising on your computer wit!out you e%en knowing it. Spyware generally does t!is wit!out your consent, w!ic! is w!at makes it t!reaten your internet security. +3
T!ere are a !ost of pro'lems associated wit! spyware, too, and some of t!ese pro'lems include trying to get rid of it. $hy do #eo#le use S#yware3 Spyware is typically used for marketing purposes. W!en a company makes spyware, t!ey get contracts from ot!er companies t!at pay t!em well. T!ey can direct traffic to ot!er we'sites t!at are similar. +or t!is reason, t!ey can 'e 'e good. -owe%er, like most t!ings, spyware can 'e a'used, too. Sometimes, t!ings pop up on your screen t!at are unwelcome, suc! as adult content. =r, sometimes !undreds of t!ings pop up at once. T!is is annoying and can make you not want to return to t!at particular we'site. $hat kinds of s#yware is out there3 <ost spyware is adware. ,dware captures data for ad%ertising t!at is targeted. <alware, on t!e ot!er !and, causes pro'lems wit! your computer. <alware can 'e a %irus t!at !arms your computer, for e1ample, or !i>ack your computer5s information. T!is can t!en 'e used for identity t!eft purposes. (our personal information can 'e sold to ot!er people w!o can t!en use it to open accounts and purc!ase t!ings in your name. $hat else can s#yware do3 It can cause you to lose control of your computer. It can also cause error messages and make your computer run slower, w!ic! is a 'ig annoyance in and of itself. (our computer can e%en 'e used to send out emails t!at contain %iruses or for illegal purposes if t!e rig!t !acker gets into it. )ow can you get rid of it3 =f course, now you want to know !ow you can get rid of it. Well, resist t!e urge to use t!e AuninstallationB part of t!e program. W!ile it mig!t appear to take t!e spyware off of your computer, it generally doesn5t. In fact, it mig!t e%en set off a trigger t!at installs more. Instead, spend t!e money and in%est in a reputa'le cleaner or spyware detection program. T!ese sometimes !a%e to 'e updated e%ery year w!ic! mig!t re@uire a new su'scription 'ut it5s wort! it to get your computer cleaned. It5s 'etter to spend money on t!at t!an trying to reco%er your identity later. If you don&t !a%e protection download MoftSpyS;
Internet Security- Protecting Yourself $hen You Sho# /nline
T!e internet can 'e a great place to go s!oppingE (ou can do it rig!t from your !ome wit! little to effort. -owe%er, t!ere are !orror stories from people w!o !a%e !ad t!eir credit card and e%en entire identities stolen. So w!at can you do to protect yourself from t!is !appening to you? 9eep in mind t!at a lot of credit card companies !a%e pro%isions for c!allenging fraudulent c!arges. If you see somet!ing t!at doesn5t look rig!t on your 'ill, gi%e t!em a call. ,lso, print out a copy of e%ery receipt of w!at you 'uy. l =nly s!op at sites t!at contain a p!ysical address and a telep!one num'er. If you feel l +4
leery a'out t!em, eit!er trust your gut or gi%e t!em a call or email. See !ow @uickly t!ey return your message. If you call t!em, don5t >ust talk to a mac!ine, talk to a person. Remem'er w!o you spoke to. =rdering from a trusted site mig!t 'e 'etter t!an one you !a%e ne%er !eard of. +or e1ample,. =rdering straig!t from =ld :a%y is pro'a'ly more secure t!an ordering from a random woman online w!o sells =ld :a%y. *on5t e%er pro%ide personal or unnecessary information like your social security num'er or c!ecking account information in order to process credit card transactions. ,ll t!ey need to know is your 'illing address, telep!one num'er, credit card num'er and type of credit car, and t!e security num'er on t!e 'ack. :e%er gi%e out your social security num'er. It is not necessary. Look for sellers w!o !a%e secure ser%ers. Some companies t!at are considered safe are ;@uifa1, SecureSite eBusiness, T!wate, and Derisign. T!e encryption tec!nology is always c!anging and w!ile it already makes s!opping pretty safe, it keeps adding additional features for t!e security and protection of s!oppers like yourself. T!ere s!ould 'e a little em'lem in t!e 'ottom rig!t !and corner of protected sites to watc! for. W!en you are on a secure page, rig!t click wit! your mouse on any 'lank space and you s!ould get t!e options 'o1. Scroll to t!e 'ottom of t!e 'o1 and click on A)roperties.B , ta'le t!at is t!e security certificate s!ould appear. (ou can c!eck t!is out to !elp put yourself at east. If it gi%e you an option to store any information, >ust say no. If you return, you can enter it all again.
Internet Security- !ake Sure Your Passwords Protect You
In t!is day and age, protecting our internet security is %ery important. We store important information on t!e internet suc! as our personal information as well as out financial information. Identities are stolen e%eryday and getting yours 'ack and clearing up t!e damage t!at it can cause is e1pensi%e and time4consuming. =ne of t!e most important t!ings you can do is to protect t!e passwords t!at you use for your %arious accounts. W!y is t!is important? Because if someone gets a !old of your password, t!ey can !a%e all sorts of information a'out you. <ost people use t!eir same password, or a %ariation of it, for all of t!eir accounts. :eedless to say, t!is is not a good idea. ,fter all, if someone gets t!at password t!ey can tap into almost any internet account you !a%e and t!us 'reec! your internet security. So w!at can you do? +irst, don5t use your same password for e%eryt!ingE ,nd adding A/B after t!e password in instances w!en you need a num'er does not make t!e password different. Secondly, don5t store your password on your computer. (es, it can 'e a pain to type it in e%ery time, 'ut if someone 'roke into your !ouse t!ey would 'e pri%y to all of your accounts. ,lso, don5t store your passwords on a notepad rig!t t!ere 'y your computer, or in a document on your computer called Ainternet passwords.B T!ey s!ould 'e a little !arder to locate t!an t!at. +"
(ou can also use <icrosoft5s )assword Strengt! Tester. T!is program lets you enter in a password to see w!at its strengt! is. If you gi%e it somet!ing t!at doesn5t test %ery strongly t!en you need to c!ange it in order to make it more secure. =ne t!ing t!at you can do is to make your password a com'ination of letters and num'ers. T!is is more difficult to figure out. ,lso, don5t e%er use your social security num'er, dri%er license num'er, or .ip code. (ou s!ouldn5t 'e storing your social security num'er on t!e internet to 'egin wit! like t!at and your .ip code is too easy to figure out. In addition, don5t use your c!ild5s name, your partner5s name, or your own name as a password. ,gain, t!ese are @uite simple to figure out. By following t!ese tips w!en it comes to your password, you s!ould 'e a'le to strengt!en your internet security. W!ile it is a !assle to come up wit! se%eral different passwords and to remem'er t!em, it is more of a !assle to straig!ten out t!e mess t!at can result from not doing it.
!ake Sure Your * ails Are Safe5 Ti#s for Internet Security
T!e last t!ing you want to do is to !a%e an unwanted e4mail wreck !a%oc on your computer. -owe%er, t!is !appens e%eryday. ,t t!e 'est, it can make your computer run slower. ,t t!e worst, your personal and financial information can 'e stolen, or your entire computer can cras! and e%eryt!ing could get lost due to a %irus. T!e following article includes some tips for internet security w!en it comes to your e4mail.
*on5t open attac!ments from people you don5t know. T!is s!ould go wit!out saying. -owe%er, people do it all t!e time. 0sually, t!e su'>ect lines of t!ese unwanted e4mails eit!er make it look as t!oug! t!ey are sending you somet!ing t!at you re@uested HA!ere5s t!e information you asked forBI or t!ey make it appear as if t!ey know you HA-ey, it5s me, Jo!nBI. -owe%er, if you weren5t e1pecting any email wit! an attac!ment and you don5t recogni.e t!e sender5s address don5t open it. It could contain a %irus. l *on5t gi%e out any information. =n t!e ot!er !and, sometimes your internet security can 'e t!reatened from senders w!o pretend to know you and try to get you to gi%e t!em information. +or instance, if you are applying for >o's on %arious searc! sites, someone mig!t contact you and say t!at t!ey found your resume. T!ey could t!en send you to anot!er site and ask for your personal information, like your social security num'er, 'y pretending to !a%e you fill out an application. 0nless you are applying for a state or go%ernment >o', or !a%e already 'een t!roug! t!e inter%iew process and t!ey need to run a 'ackground c!eck on you, you s!ould ne%er gi%e out your social security num'er. l *on5t use t!e same passwords. :e%er use t!e same passwords for your email account as you do for your e1pedia account, online 'anking account , or any ot!er we'site t!at stores financial information. It is fairly easy to figure out email passwords and once a !acker !as it, t!ey can get into your ot!er accounts as well and your information can 'e used. l C!ange your passwords. ,lso, remem'er to c!ange your passwords from time to time. Try including num'ers, as well as letters, in your passwords. It makes it !arder to figure l
t!em out. l *on5t let ot!er people access your email account. :e%er gi%e someone else your password w!en it comes to your email accounts. It5s difficult enoug! for you to keep ta's on your internet security, muc! less trusting ot!er people to keep it safe.
Internet Security- $hy Should You ,se a -irewall3
W!at is a firewall and !ow it will protect your internet security? , firewall is usually part of t!e internet router and 'asically works 'y passing traffic 'etween secure and insecure areas. T!ere are to kinds of firewallsK pro1y ser%ers and packet filters. )ro1ies are generally more e1pensi%e t!an packet filters. Computers are identified 'y I) num'ers a firewall can tell if a source is legitimate 'y comparing it to a set of rules t!at it employs. Wit! a packet filter, t!e firewall won5t let in sources t!at do not pass t!e rules. It more or less stands guard o%er your computer and won5t let t!ings pass t!roug! t!at do not ad!ere to its standards. W!ile firewalls are meant to keep t!ings coming in, in some rare cases it can actually pre%ent users from getting out as well. T!is can 'e frustrating w!en you are trying to %isit a site t!at you know is secure 'ut for some reason your firewall !as a pro'lem wit! it and won5t let you access it. If t!is 'ecomes a ma>or !indrance, you can reconfigure your firewall settings. =f course, if you are part of an Intranet, suc! as at a place of 'usiness, t!ere is little t!at you can do unless you, yourself, !a%e access to t!e main computer and passwords. If you do !a%e access, !owe%er, you can always add t!e site t!at you are trying to access as a 5safe siteB so t!at t!e firewall will let you in in t!e future. (ou can purc!ase internet security programs t!at contain firewalls. It is 'est to do some researc! on t!em first to get a good feel of w!at you are purc!asing. Some are created superior to ot!ers. If you get a good program, it s!ould also come wit! some adware and spyware 'lockers as well, and per!aps an anti4%irus program. =f course, most good anti4%irus programs also come wit! firewalls. ,lt!oug! people often 'emoan firewalls and t!e fact t!at t!ey try to keep people out of sites t!at are sometimes legitimate, t!ey can 'e a great way to protect your computer from !armful attacks. If you own and operate a 'usiness and !a%e employees accessing t!e internet t!ey can 'e especially !elpful, too. It can 'e difficult to protect your internet security w!en you are dealing wit! multiple internet users. It5s !ard enoug! 'eing safe yourselfE
Internet security-Signs That Your Child(s Safety !ight "e Co #ro ised
,lt!oug! you do e%eryt!ing you can to protect your c!ild, sometimes t!ings get past parents and your c!ild5s internet security protection is compromised nonet!eless. So !ow will you know if t!ere is somet!ing going on wit! your c!ild? T!e following is a list of signs to watc! for t!at mig!t indicate your c!ild is suffering from internet related concerns. /. (our c!ild turns off t!e computer t!e minute you walk into t!e room. T!ey mig!t !a%e 'een catting wit! t!eir crus! or significant ot!er, or 'een 'een c!atting wit! t!eir 'est friend a'out somet!ing t!at t!ey t!oug!t s!ould 'e pri%ate. =r, t!ey could !a%e 'een looking at an inappropriate we'site. +or t!is reason, you mig!t want to in%est in a tracking tool t!at creates logs of your c!ild5s internet acti%ity t!at you can re%iew. ". (our c!ild recei%es standard mail or packages from people you don5t know. It is possi'le t!at t!ey ordered somet!ing online. ,sk t!em and t!en c!eck your 'ank account or credit cards. -owe%er, sometimes predators do get online and pretend to 'e somet!ing t!at t!ey are not. In some cases, t!ey send t!eir %ictims gifts in order to get t!em to 'ecome 'e!olden to t!em. =pen any packages t!at you weren5t e1pecting. In some cases, it is 'etter to ask for forgi%eness t!an permission.
2. (ou find pornograp!y on your c!ild5s computer. W!ile it was true t!at growing up you mig!t !a%e sneaked a look at )lay'oy or somet!ing similar, Internet pornograp!y can 'e difficult to get a grasp on. It is rampant and muc! of it is fairly different t!an t!e almost c!aste images seen in )lay'oy. Some of it is also Ade%iantB pornograp!y t!at includes 'estiality and e%en c!ild pornograp!y. T!erefore, t!e content s!ould 'e monitored and communication s!ould e1ist.
3. (our c!ild 'ecomes wit!drawn. Se1 offenders and ot!er people w!o prey on c!ildren do t!eir 'est to upset family interactions. If your c!ild tells t!em a pro'lem t!at t!ey are !a%ing at !ome, t!e person will often try to make t!at pro'lem appear larger in order to make t!e c!ild more upset at t!e parent or si'ling in an attempt to dri%e a wedge t!roug! t!e family itself. T!is is to gain more control of t!e c!ild. 6. (our c!ild spends a lot of time on t!e computer, especially at nig!t. In%est in a time control de%ice t!at limits t!e amount of time t!ey can spend on t!e internet at once.
Internet Security- Protect Your "usiness
,lt!oug! you often want to protect your c!ildren from !armful t!ings on t!e we' t!at can t!reaten t!eir internet security, you mig!t also 'e concerned a'out your 'usiness. T!ere are se%eral types of software t!at 'e purc!ased in order to !elp protect your 'usiness. So w!at can t!ese %arious types of software programs offer in terms of protection?
l (ou can use a filtering program t!at in some cases can 'lock do.ens of categories at once. (ou can also customi.e your filtering in order to c!oose w!at types of content you
l l l l
want to 'e inaccessi'le to your employees. (ou can create an entire list of specific we'sites to 'lock as well. T!at way, if you don5t want your employees on +ace'ook w!ile t!ey are in t!e office, t!ey will 'e 'locked from entering t!e site. T!is is generally in addition to t!e filtering program t!at t!e software, or !ardware, will offer. (ou can create a list of keywords t!at can5t 'e used in searc! engines. T!is will also limit access to content and sites t!at are inappropriate for t!e workplace. 0se t!e software to 'lock Instant <essaging. T!is can 'e a pro'lem in many offices w!ere t!e employees want to c!at wit! t!eir friends, and sometimes e%en co4workers, w!en t!ey are on t!e >o'. Create logs. Create and re%iew logs of internet acti%ity to see t!at e%eryone !as 'een up to. T!ese can s!ow you w!at we'sites were accessed and t!e amount of time spent on t!e we'sites. It can also keep track of w!at people were searc!ing for in t!e searc! engines. )re%ent files from 'eing downloaded, t!us making it more difficult to get a %irus, or download applications suc! as music downloading programs. T!is can protect your internet security from !armful 'ugs, spyware, adware, and %iruses. So does some of t!is sound like an in%asion of pri%acy? )er!aps. Just remem'er t!at your employees are on t!e >o' and t!at you s!ould 'e a'le to protect work computers from %iruses and ot!er !armful programs t!at can access your computers. (ou mig!t want to make your employees aware t!at t!ese t!ings programs e1ist, especially t!e logs, so t!at t!ey will not 'e 'lindsided. It is also recommended t!at you !a%e a good computer policy in your employee !and'ook for t!e employee to read w!en t!ey are !ired. <ake sure t!at you update it w!en necessary.
Internet Security- Safety $hen ,sing Public Co #uters
<any times, you mig!t find yourself !a%ing to use a pu'lic computer. )er!aps t!e internet is down at your !ome or you !a%e mo%ed and it !asn5t 'een set up yet. =r, you mig!t 'e tra%eling and need to use an internet cafe or a internet site in t!e airport. T!ese are generally okay to use, 'ut you must use caution w!en you are accessing sites t!at ask you to use your password. T!e following article will gi%e you some information safety measures w!en using pu'lic computers. +irst of all, w!en you are at !ome and you are accessing ;1pedia or ,ma.on or e%en your 'ank account, you mig!t !a%e your password already stored on your computer so t!at you can enter t!e site wit! a click of t!e mouse. ,nd w!y not? It5s a lot easier to do it t!at way. (ou don5t !a%e to remem'er your password and you5re at !ome so you feel safe. -owe%er, w!ile t!is is a not a good idea e%en in t!e first place, it5s an e%en worse idea to do it w!ile you5re using a pu'lic computer. <ore often t!an not, w!en you enter a site on a pu'lic computer and it asks you for your password it will ask you if you want t!e site to remem'er it or not. ,lways answer no. +1
Some pu'lic computers will actually reset e%eryt!ing once you !a%e logged off. (our 'rowsing !istory and any information you entered w!ile you were using it will 'e erased. -owe%er, t!is isn5t t!e case wit! e%ery pu'lic computer. So, to protect your internet security you are 'etter off ensuring t!at not!ing personal is left 'e!ind. -a%e you e%er entered your pin num'er at t!e store or at an ,T< mac!ine and !ad someone standing rig!t 'e!ind you? Were you afraid t!at t!ey mig!t read your num'er and use it t!emsel%es? (ou s!ould use t!e same caution w!en using pu'lic computers. T!e person sitting down after you, or standing 'e!ind you, mig!t easily find out your passwords and use t!em to t!eir ad%antage. T!is is not to say t!at you s!ould 'e paranoid. W!en you are finis!ed, it !elps to erase all of your 'rowsing !istory, as well as any cookies t!at you mig!t !a%e used. C!eck under Ainternet toolsB at t!e top to see if any passwords were remem'ered. It is 'etter to 'e safe t!an sorry at any rate.
6 * ail Sca s that Threaten Your Internet Security
*o you trust your e4mails? It5s !ard to 'elie%e, 'ut t!ere are people out t!ere w!o !a%e not!ing 'etter to do t!en to t!ink of ways of conning ot!er people out of 'usiness. It actually is t!eir 'usiness to scam. *on5t let your internet security 'e t!reatened 'y t!ese scammers. T!e difficult t!ing is t!at w!ile some of t!e scams sound outlandis!, many of t!em also appear legitimate, too. Intelligent people !a%e 'een scammed and !ad t!eir internet security t!reatened w!en t!e emails appeared real. To !elp keep you and your information safe, t!e following is a list of 3 email scams t!at can t!reaten your internet security. /. T!e 'ank scam. T!is is one of t!e more realistic sounding scams. , supposed 'ank will contact you and tell you t!at t!ey !a%e !ad a security 'reec! and t!at you5re information !as 'een %iolated. T!ey will t!en direct you to an outside we'site w!ere you are t!en supposed to enter your personal and 'anking information to Aprotect it.B +irst of all, you wouldn5t recei%e an email from your 'ank if t!is !appened. Secondly, ne%er enter your 'anking information like t!is. If you feel like it could 'e true, call your own local 'ank 'ranc! and ask t!em. ". T!e fake >o' scam. In t!is scam, a person e4mails you and tells you t!at t!ey found your resume and are interested in !iring you. T!ey t!en direct you to a we'site w!ere you are asked to enter a 'unc! of information suc! as your social security num'er and dri%er5s license num'er. , legitimate 'usiness would ask you to call t!em to set up an inter%iew. 2. T!e lottery scam. -ere, a person will write you and tell you t!at you !a%e won t!e lottery. ,gain, you will 'e directed to a site w!ere you will 'e asked your 'anking information so t!at t!e money can 'e deposited. *on5t fall for it. T!is is not t!e way t!e lottery works.
3. T!e foreign money scam. T!is is a great one as well. , person will write you and tell you t!at t!ey li%e in a foreign country and came into a lot of money. T!ey will ask you to deposit it for t!em in your account and as a result t!ey will gi%e you a c!unk of it. Just say no. T!ey want your account information to take your money.
Internet Security- Storing Your Password on Your Co #uter
=ne of t!e most common t!ings t!at you do mig!t 'e t!reatening your internet security. It5s a mistake t!at nearly e%eryone is guilty of making. W!at is it? Storing your password on your computer. W!en you create a new account, or sign into your account, your computer generally asks you if you would like to !a%e t!e password sa%ed. It makes more sense to answer AyesB due to t!e fact t!at it makes life a little simpler to not !a%e to re4type your password time and time again. -owe%er, doing t!is can compromise your security and your personal information. ,side from t!e fact t!at if someone comes into your !ome and gets on your computer, t!ey can easily !a%e access to your accounts, sa%ing your password also allows !ackers easier access to your accounts as well. T!ink a'out t!e accounts t!at you mig!t !a%e sa%ed your password on. ;1pedia, for e1ample. ;%en wit!in ;1pedia you sa%e your credit card num'er, 'illing information, and ot!er pertinent financial information. In fact, you mig!t !a%e more t!an one credit card num'er entered in it. ,not!er account t!at you pro'a'ly !a%e personal information stored in is ,ma.on. ,gain, wit! t!is type of account you store your credit card information. ,lt!oug! ,ma.on itself is a secure site, someone wit! access to your information can use it against you to make purc!ases, open new credit cards in your name, and generally ruin your credit. (our 'ank account is one of t!e most important t!ings t!at you need to protect. Wit! online 'anking 'eing %ery popular t!ese days more and more people are using it instead of traditional 'anking. -owe%er, is your information gets into t!e wrong !ands t!en someone can transfer money from your 'ank account or e%en use your information to open an account in your name. Jo' searc! sites can also 'e a pro'lem. In some cases, you !a%e to enter your social security num'er or dri%er5s license num'er in order for t!em to run a security c!eck on you. T!ese are two t!ings t!at you do not want people to !a%e access to. If you !a%e trou'le remem'ering your passwords, write t!em down on a piece of paper and store t!em close to your computer, 'ut not in an o'%ious place. <any people actually create a file on t!eir computer 'ut t!en t!ey name it somet!ing like Acomputer passwordsB w!ic! isn5t %ery secure at all.
Internet Security-$hat &oes Your 4arge "usiness 'e7uire3
W!y is internet security important for a large 'usiness? T!ere are se%eral reasons. =ne of t!e most important reasons is due to t!e fact t!at a 'reec! of internet security can t!reaten t!e %ery li%eli!ood of t!e company itself, including %ital information suc! as financial formation. +or t!at reason, one system s!ould 'e a'le to keep track of recording and monitoring all internet acti%ity across t!e 'oard w!en it comes to t!e 'usiness itself. T!ere are a couple of different ways t!at you can go a'out doing t!is. To 'egin wit!, you can monitor your employees using restricted access and 'y not allowing access to certain we'sites. H, lot of companies 'lock face'ook and myspace, for e1ample, muc! to t!e c!agrin of t!e employeesI. It is important to do t!is 'ecause many large 'usinesses are t!reatened 'y !ackers w!o get onto t!e internet and !ack into t!e 'usiness5s system and t!reaten secure information. T!ey do t!is 'y eit!er gat!ering t!e information to use for %arious reasons, or 'y sending out %iruses t!at can !arm t!e integrity of t!e system itself. By restricting access and monitoring your employees, you can !elp sta%e off some of t!ese attacks. , good security protection system wit!in eac! computer is also recommended. T!is can 'e in t!e form of a firewall or anti4%irus program4prefera'ly 'ot!. By installing t!ese, you can try to ward off some of t!e most common attacks. )rograms t!at 'lock adware and spyware is also suggested and s!ould 'e included as part of a good anti4%irus program, too. In addition, it s!ould 'e noted t!at updating your we' 'rowser from time to time can 'e ad%antageous as well. HWindows Dista does it for you automatically.I Some companies !a%e started !a%ing internet training sessions for t!eir employees as well. In t!ese sessions, employees are taug!t t!e dangers of opening attac!ments from people t!ey don5t know, c!anging t!eir passwords fre@uently, and staying away from sites t!at are not secure.
;nsure t!at t!e email system t!at your employees use !as a %irus system included as well. , good system will read and scan t!e attac!ments @uickly to ensure t!at t!ere are no %iruses included. Some of t!em e%en do t!is rig!t as t!e emails come in, making it go a little 'it faster. Lastly, make sure t!at you always 'ack up your important fields and documents and make certain t!at your employees know to do t!is as well. In%est in flas! dri%es for e%eryone.
Internet Security-,sing Social ,tility Sites
If you don5t !a%e a +ace'ook, <yspace, or Twitter account t!en you are among t!e few. Social utility sites are some of t!e most common we'sites on t!e Internet today. C!ildren as young as ten years old can 'uild t!eir own we'sites and upload music, p!otograp!s, and %ideos on t!em. T!ey can 'e a great way to keep in touc! wit! family and friends, promote your 'usiness, or e%en meet new people. -owe%er, do t!ey t!reaten your internet security? 22
In some cases, t!ey can. T!ey can also t!reaten your personal security if you don5t make wise decisions a'out !ow you use t!em. Like in Areal lifeB you s!ould use caution in your A%irtual life.B (ou wouldn5t gi%e someone on t!e street a p!otograp! of your c!ild, your p!one num'er, or your address, rig!t? Well, 'elie%e it or not millions of people do t!at on t!e internet e%eryday. =n +ace'ook, it gi%es you a place to enter your employment information, your address, your telep!one num'er, and your work !istory. If you c!oose to make your profile pu'lic, t!at means t!at anyone w!o looks at your profile can read all of t!at. +ace'ook also !as applications t!at re@uire you to pay for certain t!ings. H0sually t!ings like AgiftsB t!at you can send to people on your friend5s list.I -owe%er, if someone !acks into your account t!ey can steal your credit card information. T!is is particularly easy if you store your password on your computer. In addition, sometime people !ack into social utility sites, use a person5s profile, and send out %iruses to t!e people on t!eir friend5s list. W!en t!is !appens, t!e %ictim5s friends open t!e e4 mail t!inking t!at it is from someone t!at t!ey know, only to 'e !it wit! a %irus t!at could cras! t!eir entire system. To a%oid t!is, make sure t!at you c!ange your password on a regular 'asis and t!at you keep diligent watc! of your acti%ity. If you decide not to use your account anymore, !a%e it deleted. ,lways ask permission 'efore you include a p!otograp! of someone on your site. <any people do not want t!eir picture posted for %arious reasons. *on5t add someone if you do not know t!em. It I %ery easy to pretend to 'e somet!ing t!at you5re not w!en it comes to t!e internet. Lastly, make your profile pri%ate so t!at only t!e people on your friend5s list can see it. T!is will stop unwanted people from lurking on your site.
This action might not be possible to undo. Are you sure you want to continue?
We've moved you to where you read on your other device.
Get the full title to continue listening from where you left off, or restart the preview.