290 likes | 395 Views
Protecting yourself from scams, malware, and phishing. Don’t Get Taken. Judicial Information Technology Office. How much would you pay?. 4 steps in an Exploit Attack. User is lured to poisoned webpage Profiling malware downloaded
E N D
Protecting yourself from scams, malware, and phishing Don’t Get Taken Judicial Information Technology Office
4 steps in an Exploit Attack • User is lured to poisoned webpage • Profiling malware downloaded • A profile of the user’s computer (including weaknesses) is created and sent back to the Exploit server. • A unique package of malware is created and downloaded to the user’s computer. Note: The attack may not trigger any alerts.
CBC.ca • Before • After
You Must Protect Yourself Back it up Lock it down Don’t get tricked
Pop-ups • Never enter passwords or other data into a pop-up.
Pop-Ups • Never click on a pop-up to update a browser plug in (e.g. Adobe Flash). • Download new software directly from the company or the browser website.
Pop-Ups • Always close unexpected pop-ups by clicking the upper right-hand corner:
Malware Exploits Need Your Help They are counting on you • To be lax about security • To fall for their tricks • To pay up when your data is threatened
Don’t Be The Weak Link Back it up Lock it down Don’t get tricked