background preloader

OnGuard Online

OnGuard Online
Related:  General Safety Tips

Prevent Identity Theft Advertisement If you have ever experienced identity theft yourself or even know someone who has, you know the experience can be a harrowing one. Criminals can open accounts in your name and impersonate you for a multitude of reasons – none of which are good. That leaves the burden upon you to protect your personal information while using the internet. 1. A Phishing website is one that presents itself as a legitimate business website however in reality is a fake one looking for your information. Social Security numberCredit card numberBank account numberDriver’s license numberHome address and phone numberHealth insurance id or information The request for information could be legit (for example, if you are applying for a credit card); but if it was unsolicited that should be a big red flag. 2. Backdoors, keyloggers and other nefarious programs can allow entry to your system and they can be installed in any number of ways. 3. 4. 5. 6. 7. 8. 9. What Else Can I Do?

Online safety & civility be.macmillan - Work and cancer | technologies | Scoop.it Please note that the Essential Work and Cancer Toolkit for employers (available below) comes with relevant resources inside. Additional copies of these resources can be ordered separately below. If you are an employer ordering the pack for the first time please do this at macmillan.org.uk/worktoolkit and you can also receive Macmillan’s work and cancer e-newsletters for employers. To promote support for people affected by cancer in your organisation create your own bespoke Work and Cancer poster. For more information about work and cancer please visit Macmillan.org.uk/work An Introduction to Threat Modeling What do you want to protect?Who do you want to protect it from?How likely is it that you will need to protect it?How bad are the consequences if you fail? When we talk about the first question, we often refer to assets, or the things that you are trying to protect. Write down a list of data that you keep, where it’s kept, who has access to it, and what stops others from accessing it. In order to answer the second question, “Who do you want to protect it from,” it’s important to understand who might want to target you or your information, or who is your adversary. Make a list of who might want to get ahold of your data or communications. A threat is something bad that can happen to an asset. The motives of adversaries differ widely, as do their attacks. Write down what your adversary might want to do with your private data. The capability of your attacker is also an important thing to think about. A final thing to consider is risk. It is important to distinguish between threats and risks.

Kids Online Safety | SurveilStar Any Parental Control Online Safety Tips for Children, Young People, and Parents! As more and more children are involved in various online activities, responsible parents should ensure kids online safety by all possible means. Visit these sites to get resources and practical advice to help young kids, kids, teens and parents safely enjoy the online world. www.safekids.com From the SafeKids.com. Kids Rules for Online Safety (for pre-teens). www.netsafekids.com From the National Academies. www.fbi.gov/stats-services/publications/parent-guide/parent-guide From the FBI. www.getnetwise.org From the Internet Education Foundation. www.isafe.org From i-SAFE America Inc. www.ikeepsafe.org From the Internet Keep Safe Coalition. partners.nytimes.com A startling report from The New York Times Science section that highlights the dangers of sexually explicit Internet content. www.safeonlineoutreach.com www.famster.com www.high-speed-internet-access-guide.com Children of all ages use the Internet for so many reasons. buynowDownload

Do students understand their ‘digital footprint’ and how it can affect their employability? Last year I presented to a group of 1st year Business School students on the topic of their use of Social Media and Social Networking websites and how this could have implications on their employability. Presentation: Social Media & how (students) can survive online (2010) This year I’ve been privileged enough to be invited back into lecture slots for all the first year under graduate Business School students (Law, Accounting & Finance, and Business). While the topic(s) and reflective activity the students are presented with are the same (including the majority of the responses given) the examples have been updated and improved … there are far more examples to choose from for a start! Click to view This year I have been able to incorporate the TurningPoint handsets (clickers, zappers, etc) to get real-time responses (and capture/record them too) to the content. I ask the question at the beginning of the session “Do you consider your online activity ‘safe’?”

iKeepCurrent Texting and driving: Gruesome safety video goes viral Graphic UK ad: Texting 2die4 WARNING GRAPHIC CONTENT: A British police force releases a shocking advert on the dangers of texting while driving. P 27, 2009 A graphic British public service announcement about the dangers of sending text messages while driving has become an internet hit and sparked debate around the world. The Gwent police force in Wales said on Wednesday that an excerpt from a video it made for use in schools has been viewed more than 6 million times on YouTube and other websites since it was posted last month. If we can get one person to change their behaviour then it will have been worthwhile. The 30-minute film shows a bubbly teenager named Cassie - "a nice girl from a nice Gwent Valleys family" - who triggers a pile-up that kills four people when she tries to send a text message while driving. Global message ... Advertisement

Understanding Hidden Threats: Corrupted Software Files Malicious code is not always hidden in web page scripts or unusual file formats. Attackers may corrupt types of files that you would recognize and typically consider safe, so you should take precautions when opening files from other people. What types of files can attackers corrupt? An attacker may be able to insert malicious code into any file, including common file types that you would normally consider safe. When corrupting files, attackers often take advantage of vulnerabilities that they discover in the software that is used to create or open the file. What problems can malicious files cause? There are various types of malicious code, including viruses, worms, and Trojan horses (see Why is Cyber Security a Problem? How can you protect yourself? Related information This product is provided subject to this Notification and this Privacy & Use policy.

What Exactly Is Phishing & What Techniques Are Scammers Using? I’ve never been a fan of fishing, myself. This is mostly because of an early expedition to a pond where my cousin managed to catch two fish with a bamboo pole, while the fancy fiberglass-reinforced rod I had caught me zip, zero, nada. Similar to real-life fishing, phishing scams aren’t always best when they rely on advanced tactics, but there are many new techniques motivated by social networks. So what is phishing, and what should you be wary of? The Basics of Phishing According to Microsoft’s Safety & Security Center, phishing can be summed up as: “A type of online identity theft. In other words, phishers are the Loki of the Internet. There is one point on which I disagree with Microsoft, however, and that’s their description of phishing as “a type of online identity theft”. Traditional Phishing In many cases, Microsoft is correct. But it’s not. Traditional phishing can be combated by refusing to follow links in such emails. Phone Phishing Social Network Phishing That’s the bad news.

everyone needs to know about online safety tips by thomas3221 Apr 20

Related: