2. Worldwide
Internet
Users
2 BILLION+
62 BILLION
Internet users
worldwide
e-mails circulate
95%
DAILY
Some estimates
suggest upwards of
95% of all
e-mail is
“SPAM”
5%
The online world is
“the world” of today’s child; no
separation between “online” and
“offline”
4. How do we
use the
internet in
education?
•Keeping in touch even after
school hours.
•Using the internet to access
studying resources.
•Using the internet for researches.
•An interactive way for students
to communicate .
•No boundaries between the
parents and the teachers.
5. How this
helps you
as a
teacher?
•Simplifies the way of
communication.
•Helps all the participants
to know that technology
isn’t only for
entertainment.
•Sets you as a role-model
in using technology and
the internet.
6. The
Connection
In order to use the
technology in education
you must be aware of the
issues that might
encounter you.
•Online Reputation.
•Internet Safety.
7. Online Security Versus Online Safety
Safety: We must
act in ways that
help protect us
against the risks
that come with
Internet use.
Security: We must
secure our
computers with
technology in the
same way that we
secure the doors to
our homes.
9. 1- Beef up computer’s defenses and keep them up to date
2- Beef up computer’s defenses and keep them up to date
Top 10 Tips
For Online
Safety
3- Think first; Click later
4- Be protective of personal information
5- Make sure Web sites protect your personal information
6- Set clear, age-appropriate rules for Internet
use
7- Use family safety software and up-to-date technology
8- Guidance not control for tweens and
teens
9- Keep Communication Open With your
children
10- Use Family Contracts to help protect your kids on
line!
10. Key Points
• The Internet is both a classroom
and a virtual playground
where children can explore, learn,
and have fun
• Older children use the Internet to
form social networks
• Just as there are places in every
city and town that
are unsafe or inappropriate for
children and teenagers,
there are places online that are not
safe for kids
• Learning about the risks children
may encounter on the Internet,
and how you can reduce those
risks, will help you keep your
family safer online
11.
12. 1- Beef up computer’s defenses and keep them up to date
2- Beef up computer’s defenses and keep them up to date
Top 10 Tips
For Online
Safety
3- Think first; Click later
4- Be protective of personal information
5- Make sure Web sites protect your personal information
6- Set clear, age-appropriate rules for Internet
use
7- Use family safety software and up-to-date technology
8- Guidance not control for tweens and
teens
9- Keep Communication Open With your
children
10- Use Family Contracts to help protect your kids on
line!
13. Online
Reputatio
n
An online reputation is the
publicly held social
evaluation of a person
based on their behavior;
what they say, and what
others say about them.
14. Online
Reputatio
n
Online Reputation can affect
child education, career and
social life…
His online actions,
expressions, pictures is his
life-long reputation that he
can not ever remove and will
accompany him to collage,
work and later on when he
himself is a parent.
15. Online
Reputation
and
professional
life
•Your students watch you
online and consider you a
role model.
•First impression online
and Reputation AT work is
through your social
network pages.
•You represent the school
you work in, online AT ALL
times!
•Bad online reputation can
get you fired!
16. You see kindness and
cruelty on social networks
78%
88%
of teens surveyed
reported at least
witnessed crueltyone
positive experience
17. What you do online
doesn’t stay just online
8%
6%
22%
25%
physical
trouble fight
ended aat
face-to-face
school
friendship
argument
18. The effect
of Online
Reputation
o Can Online Reputation
affect your employment
potential?
o Can it affect your social
life?
Your Online Reputation
can either benefit or harm
you,
it is your choice!
19. Online
Reputation
impact future
decisions
• 70.5% believe that it is
considered in hiring decisions.
• 30% believe that it is
considered when being
accepted into a school or
college
• 86% believe that affects
friendship decisions
• 80% believes it affects marriage
decisions
20. Online
Reputation
and
professional
life
• HR managers research job
applicants online
• First impression and
Reputation AT work is
that AT your social
network pages.
• You represent the
company you work in
online AT ALL times!
21. What you post on the internet
affect you, your family and your
friends.
Online
Reputatio
n and
Social life
• Your pictures and actions on
the internet is a memory you
will keep forever.
• How you behave online is a
reflection on your values and
your family.
• You affect the lives of your
friends whenever you post
anything about them on the
internet
22. PROTECT your online reputation
Read the privacy policy of any
site before sharing personal
information online
Use privacy settings on social
networking sites that determine
who can access and respond to
your content
Use the alert feature provided by
some websites that automatically
notifies you of any new mention
of your name or other personal
information
Respect others privacy!
23. Think
before you
post
• Don’t post anything you’d ordinarily say
only to a close friend. This includes
details that could identify you or locate
you in person–your
address, workplace, phone
number, birth date, etc.
• Use caution when sharing feelings–
whether you’re happy, sad, angry, or
have money worries; predators prey on
emotions.
• Talk with family and friends about their
privacy. Remove from your pages any
info that doesn’t conform to their
wishes.
25. • Express yourself and defend your
position but don’t use any abusive
language.
Guard
Your
Reputatio
n
• Do not post anything in anger.
• Do not share personal Data, Personal
information can put you at RISK!
• Remember your boss, your parents,
and your future kids will see
everything you are posting.
27. Digital Citizen
Being online today is more than
simply surfing the web—it’s a way of
life.
Learning and connecting through
technology is now vital to our daily
routine, which means being a good
digital citizen takes on greater
importance. It means educating
ourselves about both the benefits
and risks of our online world, and
then developing the habits that can
help us stay safer there. Microsoft
offers six essential steps that each of
us can take to help protect our
devices, information, and families as
we learn, explore, and interact
online.
31. Primary Threats to Computer
Security
Viruses/Worms Trojans
Software programs
designed to invade
your computer, and
copy, damage, or
delete your data.
Viruses that pretend
to be helpful
programs while
destroying your
data, damaging your
computer, and
stealing your
personal
information.
Spyware
Software that tracks
your online
activities or
displays endless
ads.
32. Malware and potentially unwanted software categories in Egypt in 2013, by
percentage of computers reporting detections
Top Threats
33.
34.
35.
36. Primary Threats to our information
Phishing
E-mail sent by online criminals to trick you
into going to fake Web sites and revealing
personal information
Spam
Unwanted e-mail, instant messages,
and other online communication
Identity Theft
A crime where con artists get your
personal information and access your
cash and/or credit
Hoaxes
E-mail sent by online criminals to trick you
into giving them money
39. Blocked mail volumes in 1H13 were up slightly from 2H12, but remain well below levels seen prior to the end of 2010.
40.
41.
42.
43. Enjoy private browsing with IE 10 Privacy
Features
• InPrivate Browsing
• InPrivate Filtering
• Browse confidently
with built-in tools like
SmartScreen Filter
and Tracking
Protection that let you
be more aware of
threats to your PC and
your privacy.
• Do Not Track header.
45. “Amateurs hack
systems, professionals hack
people.” Bruce Schneier.
Social
Engineerin
g
Ian Mann, (2008) author of
“Hacking the Human,” defines
social engineering as the
following: “To manipulate people
by deception, into giving out
information, or performing an
action”
53. Distribution of Counterfeit and
Pirated Software
Counterfeit Ecommerce
Online Marketplaces
BitTorrent P2P Downloads
One-Click Downloads
PC Malls
54. What is a botnet?
Attacker
Command and
Control Server
Bots
Victim
Botnets are networks of infected
computers that can be remotely
controlled by an individual or
organization
61. Defend
your
Computer
Turn on Windows Internet firewall
Use Microsoft Update to keep Windows
up-to-date automatically
Install and maintain antivirus software
Install and maintain antispyware software
62. Turn on Windows Internet
Firewall
help protect your
PC from hackers
and malicious
software. It
creates a
protective barrier
between your
computer and
the Internet
63. Use Automatic Updates to Keep
Software Up-to-date
•Install
all updates
as soon as they
are available
•Automatic
updates provide the
best protection
•Windows
8 Action Center
The new Windows 7 Action
Center
in the Control Panel helps you
make sure that your firewall is on,
your antivirus software is up to
date, and your computer is set to
install updates automatically
64. Install and Maintain Antivirus
Software
•
Antivirus software
helps to detect and
remove computer
viruses before they
can cause damage.
•
For antivirus software
to be effective, you
must keep it up-todate.
65. Install and Maintain Antispyware
software
Use antispyware software, like Microsoft Windows Defender, so unknown
software cannot track your online activity and potentially steal your
information.
Windows Defender include:
Spyware detection and removal
Improved Internet browsing safety
Protection against the latest threats
68. Defend your computer against viruses, spyware, and other malware
Microsoft Security Essentials is a free download for Windows 7
that helps protect your computer from
viruses, spyware, worms, Trojans, and other malware.
http://www.microsoft.com/security_essentials/default.aspx
69. #2: Protect
sensitive
data.
• Think before you enter sensitive data
• Be suspicious of attachments and links
• Look out for scams and fraud
• Create strong passwords
70. Think before you type.
• Look for https (the “s” is for secure)
• A closed padlock means secure, too
• Are there signs the site is trustworthy?
72. Use the Red “X” to Close Pop-ups
•Always
use the red “X” in the corner of a
pop-up screen.
•Never
click “yes,” “accept,” or even
“cancel,” because it could be a trick that
installs software on your computer.
73. How to
avoid the
bait.
Confirm that the message is
real
Type the Web address
yourself
Use a browser with safety
features
74. Passwords
lock data
doors.
• Keep them secret (Don’t
write them Down on
anything)
• Change them often
(Recommended every two
weeks)
• Make a different password
for each password
• Make them strong
77. #3 Protect
devices on
the go.
• Do they have the latest
protection?
• Guard devices like you do
your wallet
• Don’t hand-carry sensitive
data
• Use caution if using a
thumb drive in
another computer
78. Windows 8
BitLocker
Drive
Encryption
Windows 8 BitLocker Drive
Encryption help you protect your
data from loss, theft, or hackers
BitLocker helps keep everything
from documents to passwords
safer by encrypting the entire
drive that Windows and your
data reside on.
BitLocker To Go—a new feature
of Windows 8—gives the
lockdown treatment to easilymisplaced portable storage
devices like USB flash drives and
external hard drives.
79. On the go:
wireless
hotspots.
• Connect securely
• Know who you’re
connecting to
• Save sensitive uses for
more trusted
connections
80. What to
do?
Contact an IT Professional
Contact the responsible authorities:
NTRA hotline : 155
Police Cyber Crime hotline : 108
82. Cybercrime costs
consumers $113 billion a
year*
1 in 5 small and medium
enterprises are targeted by
cyber criminals**
Every second, 12 people are
victims of cybercrime –
nearly 400 million every
year*
Cybercriminals have sophisticated
operations to create and distribute malware
50% of online adults have
been victims in the past year
Financial Fraud
53% of the world’s securities exchanges were
targeted in 2012
Online Child Exploitation
The NCMEC has reviewed more than 90 million
images and videos of child pornography.***
* 2013 Norton Report
** National Cyber Security Alliance
*** National Center for Missing and
Exploited Children
The Impact of
Cybercrime
Cybercrime is evolving at lightning speed
The risk to individuals and companies is
growing
Online criminals have global reach
Cybercrime has been embraced by
organized crime
Traditional responses won’t suffice –
proactive, aggressive action is required
Notas do Editor
Slide 10: You see kindness and cruelty on social networksTALKING POINTSThe good news is that most of you who use social media say that in your experience, people your age are generally kind to one another on social networks. The researchers found that 78 percent of teens surveyed reported at least one positive outcome from their interactions on social network sites. [click]However, the researchers also found that 88 percent of you had witnessed someone being mean or cruel to another person on a social network.Just out of curiosity, how many of you have observed someone being mean or cruel on a social network? [click]
Slide 11: What you do online doesn’t stay onlineTALKING POINTSWhen the researchers looked deeper into online cruelty, they found that 69 percent of the teens in the study thought that their peers were mostly kind to each other, but more than a third (41 percent) said they had experienced at least one of the negative experiences the researchers asked about. [click]25 percent of teens who use social media had an experience that resulted in a face-to-face argument or confrontation with someone. [click]22 percent had an experience that ended their friendship with someone. [click]8 percent had a physical fight with someone because of something that happened on a social network site. [click]6 percent got in trouble at school because of an experience on a social site.Clearly, what teens experienced online had a direct impact on their “real” lives. With these statistics in mind: How many of you have had an experience online that affected your real life?What can you do if you see mean behavior on a social network?[The last three questions below are just different ways to elicit the response you’re looking for. You probably won’t need to ask all of them.]What do you think you can do to be a better friend on social sites?What advice would you give to someone about how to reduce online drama?What can you do if you see someone being bullied online?[DISCUSSION TAKES PLACE.]Let’s see the tips Microsoft’s safety experts came up with and how they compare with what you said. [click]NOTES FOR SPEAKERHere are some of the answers to your questions that may come up—you’ll be looking for these to transition to the safety tips on the next slide.Tell the person causing the drama to stop it.Don’t participate in drama—don’t post mean comments or pictures.Don’t ignore bullying or drama.Stand up for your friends. Don’t be a bystander.Don’t make private stuff about others public.What do we mean by “drama?“ This term has already popped up a couple of times in this presentation but is more central to the point here. It is based on studies by Danah Boyd at Microsoft Research, that showed that teenagers “describe many interpersonal conflicts playing out in their lives as drama,” including bullying.To get a glimpse into her ideas, read this opinion piece (that she co-authored with Alice Marwick) in the New York Times (September 2011): “Bullying as True Drama:” www.nytimes.com/2011/09/23/opinion/why-cyberbullying-rhetoric-misses-the-mark.html
Slide 19: Connect honestly and carefullyTALKING POINTSRemember the story of the players who pirated a game and were locked out of playing on Xbox? Download files legally and use web content honestly for school work. [click]
WW average CCM in 3Q12 = 5.3WW average CCM in 4Q12 = 6.0
WW average CCM in 3Q12 = 5.3WW average CCM in 4Q12 = 6.0
The Do Not Track header sends a signal to websites that you prefer not to have information collected about your visit used to track you as you browse the web.
According to SearchSecurity.com DefinitionsSocial engineering is a term that describes a non-technical kind of intrusion thatrelies heavily on human interaction and often involves tricking other people to breaknormal security procedures. A social engineer runs what used to be called a "con game".“I explained that I could often get passwords and other pieces of sensitive information from companies bypretending to be someone else and just asking for it.” (Mitnick, 2002)“Two things are infinite: the universe and human stupidity; and I'm not sure about the universe.” Albert Einstein quotesMurphy’s Law says human error will creep into the most secure security systems.
Now you can use mobile apps to manipulate any one to give you personal information
Copy from an e-mail of young female that was stolen and exploited by a criminal – Egyptian police local case.Identity theft worse more than a car theft
Slide 13: Pirated programs are not a gameTALKING POINTSThe night the Xbox® game “Call of Duty: Modern Warfare 2” went on sale, thousands of gamers lined up hours in advance to snap up the first copies when the game was released at the stroke of midnight.But up to a million other gamers chose the piracy route, modifying their Xbox consoles to bypass the digital rights management features so they could download illegal copies of the game. Now they’re paying for it. Most of those players were banned from Xbox LIVE®—up to a million players!—for playing pirated versions of Microsoft games. These gamers learned the hard way that theft has consequences and that you’re never truly anonymous with digital files and devices. There are other ways you can connect honestly and carefully on the web. [click]NOTES FOR SPEAKERDepending how talkative your group has been, it’s quite possible that you won’t have time to include this point. In that case, skip this slide and the next. When you get to the “recap” slide (slide 15), summarize the points below, to give a slightly more substantive summary than you will on the other slides.
By:VyacheslavZakorzhevsky Kaspersky Lab ExpertWhile the freebie lover is waiting for the result, two pieces of malware that were stealthily installed and launched by the dropper make themselves at home on the PC. One of these is detected by Kaspersky Lab as Trojan.MSIL.Agent.aor. It steals registration data for other programs, as well as passwords, mostly for online games.
Pirated software as a threat vector
Used to conduct a variety of attacksSpamDenial of serviceClick fraudMore malware distribution
Drive-by download means two things, each concerning the unintended download of computersoftware from the Internet:Downloads which a person authorized but without understanding the consequences (e.g. downloads which install an unknown or counterfeit executable program, ActiveX component, or Java applet).Any download that happens without a person's knowledge, often a computer virus, spyware, malware, or crimeware.[1]Wikipedia
Example on how social media apps and quizzes can collect and identify personal information.Information from Allowing Access to ProfileName: Mellissa OurtheE-mail: mali437@Juno.comInformation from QuizzesBasic PersonalHeight: 5’1”Hair: Blonde and WavyEyes: BrownPierced NoseFavoritesFavorite Color: PurpleFavorite Candy: Reese’s Peanut Butter CupsFavorite food: MexicanFavorite drink: SodaFavorite Movie: Wall-E & Finding NemoFavorite Animal: CatsPersonality-Drives a minivan-Most important thing is family-Always carries cell phone with her-Self-proclaimed procrastinatorThere are three ways that the harvested information could be used: SpearPhishing, Impersonation or Identity Theft, and In-Person Attack or Scam.
Each click on any link is will install and activate malicious content.
Microsoft Security Essentials provides real-time protection for your home PC that guards against viruses, spyware, and other malicious software.Microsoft Security Essentials is a free* download from Microsoft that is simple to install, easy to use, and always kept up to date so you can be assured your PC is protected by the latest technology. It’s easy to tell if your PC is secure — when you’re green, you’re good. It’s that simple.Microsoft Security Essentials runs quietly and efficiently in the background so that you are free to use your Windows-based PC the way you want—without interruptions or long computer wait times.It’s easy to tell if your PC is secure — when you’re green, you’re good. It’s that simple.When y are red … y have a problem!Windows Defender detects and removes spywareWindows Defender is software that helps protect your computer against pop-ups, slow performance, and security threats caused by spyware and other unwanted software by detecting and removing known spyware from your computer. Windows Defender features Real-Time Protection, a monitoring system that recommends actions against spyware when it's detected, minimizes interruptions, and helps you stay productive.The benefits of installing Windows Defender include:Spyware detection and removalWindows Defender quickly and easily finds spyware and other unwanted programs that can slow down your computer, display annoying pop-up ads, change Internet settings, or use your private information without your consent.Windows Defender eliminates detected spyware easily at your direction, and if you inadvertently remove programs that you actually want, it's easy to get them back.Windows Defender allows you to schedule your scanning and removal times when it's convenient for you, whether it's on-demand or on a schedule that you set.Improved Internet browsing safetyWindows Defender helps stop spyware before it infiltrates your computer. Windows Defender also offers a continuous safeguard designed to target all the ways that spyware can infiltrate your computer.Windows Defender works without distracting you. It runs in the background and automatically handles spyware based on preferences that you set. You can use your computer with minimal interruption.Protection against the latest threatsA dedicated team of Microsoft researchers continuously searches the Internet to discover new spyware and develop methods to counteract it.A voluntary, worldwide network of Windows Defender users helps Microsoft determine which suspicious programs to classify as spyware. Participants help discover new threats quickly and notify Microsoft analysts, so that everyone is better protected. Anyone who uses Windows Defender can join this network and help report potential spyware to Microsoft.To help protect your computer from the latest threats, you can choose to have updates that counteract new spyware automatically downloaded to your computer.
For starters, before you enter sensitive data on a Web form or page, look for two things:1. Signs that the site uses data encryption: https (“s” is for secure).A closed padlock. It must be here, beside the Web address, or in the lower right corner of the window. 2. Signs of a trusted site, such as the green address bar in Windows® Internet Explorer®. The graphic in the slide shows what each of those things looks like in your browser.That’s the first strategy for protecting sensitive information. Another precaution you can take is to think before you click.
BE SUSPICIOUS OF ATTACHMENTS AND LINKS. There are several reasons to use caution: Senders can be phony. A virus (the colds and flu of computing, designed to spread to other computers) may have sent the mail you just received.Spyware can hide in e-mail attachments. Open one and you may download spyware which can track what you do on your computer. It may enable criminals to collect company or personal information, record account numbers and passwords as you type, or bombard you with pop-up ads.Click links or download videos and photos and you could be downloading a virus along with them. Links can go to phony Web sites.Toll-free numbers can go to fraudulent call centers.Keep in mind: If you click, you catch. MESSAGES ON SOCIAL SITES:Just because the e-mail message says it’s a LinkedIn update, doesn’t mean it is.Messages you get when you’re using a social site such as Facebook, LinkedIn, and Twitter can have viruses or be trying to entice you to divulge sensitive information, too. TO REPEAT: “THINK BEFORE YOU CLICK” IS A BEST PRACTICE FOR PROTECTING SENSITIVE DATA, but you also need to be on the lookout for scams and fraud in e-mail and instant messages.
Use the Red “X” to Close Pop-upsWhile you are surfing the Internet, if you see a pop-up window, never click any buttons in the window to close the window. Always use the red “X” in the corner of the pop-up window. Even though the pop-up window shows buttons saying “No,” or “Cancel,” criminals can program these buttons to trigger an action you don’t expect. Clicking any button, or even clicking anywhere in the pop-up window, could cause your computer to download unwanted software. The red “X,” usually found in the upper right corner of the pop-up window, is controlled by the browser program and is a safe way to close pop-up windows. With Internet Explorer 7, you can also press ALT+F4 to manually close a pop-up window.
CONFIRM WITH THE SENDER THAT THE E-MAIL OR INSTANT MESSAGE IS REALCall the company using a number you already have for it.Or check it against what you find on Bing, Google, or an online phone directory.To visit the site, TYPE THE WEB ADDRESS YOURSELF instead of clicking the link in the message.Or, use your own bookmark or favorite.USE A BROWSER WITH SAFETY FEATURESSuch as the anti-phishing feature (SmartScreen® Filter) and the pop-up blocker that’s on by default in Internet Explorer 8.If you’re ever in doubt about a site, consult a Web site that identifies known scams:Such as www.snopes.com.Another way to protect sensitive data is to use strong passwords.
You lock your house, your car, your bike. You also need to lock up corporate assets, client info, accounts, computers, mobile phones, etc. To do this on your computer:KEEP PASSWORDS SECRETIf stolen, everything they protect is at risk. Don’t share them with friends, colleagues, or businesses.Don’t use the same password (or simple variations) for different accounts or services.Don’t store passwords on your phone or in a file on your computer or on a post-it on your computer. It’s okay to store them on a well-hidden sheet of paper.Don’t let someone trick you into revealing them.CHANGE THEM OFTEN: Change the important ones regularly—like the one for your computer or mobile phone.MAKE THEM STRONGAt least eight characters. Upper and lower case letters, numbers, and symbols.Easy for you to remember and hard for others to guess.Avoid number sequences, your pet’s name, birth date, Social Security numbers, and the like. Don’t use words that you can find in the dictionary.Avoid using only look-alike substitutions of numbers or symbols.Choose a sentence that’s easy to remember and difficult for others to guess and use it as the basis of a password. (See below for an idea about how to present this.)CUSTOMIZING THE PRESENTATION: Ask the group to create a phrase that’s eight words or longer—like the first line of a favorite song. Take the first letter of each word to make the password. Substitute numbers or symbols for some of the letters—like “3” for “E” or “!” for “L.”
CUSTOMIZING THIS PRESENTATIONThis is an opportunity for the audience to test their password knowledge. There are several ways you can handle this:If you have a white board or flip chart, you can do this as a group activity: One password at a time, ask the group to decide whether it’s strong or not and discuss why.If people have paper and pen, ask everyone to do this as a task either by themselves or in pairs.Or simply give everyone a minute or two to think about which of these are strong, and which weak. When you’re ready to see the results, go to the next slide.
EXPLAINING THE ANSWERS:WEAK. Only numbers, possibly a Social Security number, which criminals can easily find online.WEAK. A date—birth or anniversary date, for example—can be known and easily found by a criminal.WEAK. Don’t use words you can find in any dictionary in any language (expeditious). Criminals will not be fooled by common look-alike replacements such as “3” for “e”.STRONG. Letters, symbols, numbers, not a word found in the dictionary.WEAK. Only numbers. Avoid sequences (or repeated numbers, like 22222222).STRONG. A sentence that’s easy to remember, but difficult for others to guess. Eight characters or longer.Take the first letters of this sentence: My son Aiden was 3 years Old in December. Add complexity by mixing upper and lower case letters, symbols, and numbers.Having reviewed many ways you can protect sensitive information, let’s look at the third way to avoid a bad day…
…protecting devices when you’re away from workThese include laptops, thumb drives (USB or flash drives), mobile phones.DO YOUR DEVICES HAVE THE LATEST PROTECTION?Make it part of your travel routine. Update before you leave.GUARD YOUR DEVICES LIKE YOU DO YOUR WALLET.For example, lock your mobile phone when you’re not using it. DON’T HAND-CARRY SENSITIVE DATA.On your laptop or thumb drive.It’s not worth the risk. If you lose it, anyone can access it.If you must take sensitive data, encrypt it. However, encryption only slows access to data; it doesn’t prevent access from a determined hacker after really valuable data.IF YOU USE YOUR THUMB DRIVE IN ANOTHER COMPUTER:That computer may be infected and could corrupt the thumb drive and ultimately your computer.When you re-insert the drive into your computer, click the Close button in any message that pops up so you don’t give any malware a chance to run.But you need to do more than protect the physical devices when you’re on the road…
BitLocker helps keep everything from documents to passwords safer by encrypting the entire drive that Windows and your data reside on. Once BitLocker is turned on, any file you save on that drive is encrypted automatically.BitLocker To Go—a new feature of Windows 7—gives the lockdown treatment to easily-misplaced portable storage devices like USB flash drives and external hard drives.
…Wireless hotspots can be risky, so here are ways to connect to the Web more safely: CONNECT SECURELY. Choose:The most secure connection, even if it means paying for it. Ask about it before you connect.WEP (at least) that encrypts (or scrambles) data as it travels between your laptop and the wireless access point. (WEP stands for Wired Equivalent Privacy. It is a system of data encryption that prevents access to a wireless network.) A password-protected connection, ideally one that is unique for your use.KNOW WHO YOU’RE CONNECTING TOConfirm the exact spelling of the network you’re connecting to. Beware of clever (slightly misspelled) fakes. For example: HLTONHOTELSNET vs. HILTONHOTELSNET. (There’s no “I” in the first Hilton.)Check the privacy statement on the network's Web site. No privacy statement? Wait until you return to the office to conduct sensitive business.SAVE SENSITIVE USES FOR MORE TRUSTED CONNECTIONSDon’t bank or make other financial transactions at a wireless hotspot.Don’t download, install, or update software.Use e-mail with the understanding that it can open the door to illegal access to corporate networks and data.Turn off the wireless connection when you’re not using it.