Playing It Safe On The Internet

 These notes contain references to copyright information names and terms and the copyright rests with the owners. The material should not be copied and distributed to protect those copyrights.

The references are used for instructional purposes only.

The advice given is for your information and guidance only, I have no knowledge of your systems and the Appropriateness of the information relative to that system. If in any doubt do not make changes to your system.

 Table of Contents

Playing It Safe on the Internet 1

Introduction. 5

What is the Internet 5

General overview.. 5

What is the Cloud. 6

How does the internet work. 6

How do I access the Internet 8

What is my address?. 8

What are to components giving access. 10

Modem Router 10

Computer; Tablet; Phone; Watch. 11

What are the Threats. 11

What are the Risks. 13

How are the attacks done. 15

How do we protect ourselves. 17

Hardware and Software. 17

Fire Walls. 18

Ports. 19

Anti Virus. 21

Antivirus Rescue. 24

Malware. 25

Defending against ransomware threats. 25

Access to devices. 27

Passwords. 27

Password Managers. 27

My example is a product called Keepass. 27

What is a good password. 28

Encryption. 29

Tablets and Phones. 34

Apple. 34

iPad and iPhones. 34

Protect access to your iPad (from Apple site) 34

Keep your Apple ID secure. 35

Manage the information you share with people and apps. 35

Protect your email privacy. 35

Protect your web browsing. 36

Lock down your iPad if it’s facing a sophisticated cyberattack. 36

iPad Virus Scams. 36

Android Mobile Devices (From Google) 36

Outsmart spammers. 37

Avoid shady websites. 37

Privacy that works for you. 37

Secure to the core. 37

Powerful internal defence. 37

Protecting your privacy starts with the world’s most advanced security. 37

Keeping you safer online with continuously updated security. 37

Encryption keeps data private and secure while in transit 37

Proactive security alerts help protect your private information. 38

Blocking malicious and misleading ads before they get to you. 38

Our cloud infrastructure protects data 24/7. 38

Easy-to-use privacy settings, all in one place. 38

Quickly access your key privacy settings. 38

VPN (Virtual Private Network) 39

Why use a VPN?. 39

What does a VPN do. 39

Choosing your VPN Service. 39

Important things to consider. 40

Privacy considerations. 40

Most Important Features for a streaming VPN: 40

Think of these points. 40

Encryption. 40

Other Security Features. 40

What affects speed. 40

Using a VPN. 41

Social Media. 42

Facebook. 42

Twitter 45

Third Parties that are demanding and storing your sensitive data. 46

So what can we do?. 46

What should you do. 46

Other checks you can make. 46

Internet Safety Tips. 53

Privacy. 53

Remote Storage. 48

Advantages. 48

Local Storage Alternative. 48

Dropbox on a PC. 48

One Drive. 50

Introduction

The only way to be completely safe on the internet is NOT TO BE ON THE INTERNET.

For most of us that is not practical.

We are all forced to use the “web” for more and more of our connections to Government and businesses, let along the family.

This has exposed us to the many ways that we can be compromised or exploited by many people using these connection.

They can range from nuisance spam; abusive personal attacks; scams of many forms that seek to capture our information and money.

The “bad actors” range from malicious people using the anonymity of the web to cause hurt and intimidate, to those seeking to capture your personal data to sell, or to use for identity theft. You would be aware of the high level of Government inspired activity to undermine a country.

We have the recent events of large scale loss of personal data from those we do business with.

Keeping Safe is a combination of our own care in accessing sites reading messages and not responding to anything we don’t know. We also need to have firewalls, anti-virus and malware programmes. We also need to protect access to our devices so others can’t use them, and then we need to have strong passwords which are kept safe. Where you can limit the distribution of your personal details.

What is the Internet

Let’s start with what the internet is. We use the term and use the advantage of the internet more and more.

We first have the WWW, the World Wide Web, it is in simple an interconnection of nodes that allow you to reach any node with in the web.

Think of a spider’s web and at every point where lines cross there is a computer. Information can flow to and from any device on the web.

It is a network just as you have a “network” of friends and neighbours you talk to and share with.

Internet and www are used to describe the same thing but there is a difference, although not really of importance to us; the Internet is a global system of networks interconnected through the telecommunications system and, if you like, contains many www networks.

The internet covers the world.

Your first touch with the internet was most likely using email.

General overview

You know that we have communications systems that commonly were phone systems, spread throughout the country allowing voice contact to all on the system.

This is via cables in the ground or wireless forms of transmissions.

This is the back bone of the internet and we still rely on it to day to send and receive data of any type. Using copper cable, fire optics, wireless / radio transmission and satellites. Countries are linked via undersea cables.

Major cables connecting across the world (Part).

The internet is then a system that uses these connection to transmit data worldwide.

What is the Cloud

In short the cloud is simply a very large room with lots of computer equipment that you can save your data to. The room is a node on the internet.

Part of a Google Cloud storage centre.

A typical set up

Locations around the world.

So you are sending your data to store somewhere remotely.

The Cloud offers a management system that files the data, backs it up and gives you access anywhere you can get on the internet and use your access credentials to see the data.

If that is the only place you store your data then you must have internet connection and the “company” providing it needs to be trustworthy, and have the resources to send and receive numerous connections simultaneously.

How does the internet work

The internet works using a number of systems, rules and standard protocols.

  • TCP/IP this is a layer of protocols dealing with how transmission are done.
  • TCP/IP (Transmission Control Protocol/Internet Protocol) is a network standard, specifically a protocol, that defines how messages (data) are routed from one end of a network to the other. TCP/ IP describes rules for dividing messages into small pieces, called packets regulating the flow of messages along the network.
  • TCP/ IP is the network standard for Internet communications – without it there is no Internet.
  • There are many Protocols (e.g. DCHP) to do almost anything, some examples:
  • FTP: File Transfer Protocol
  • HTTP: Hypertext Transfer Protocol and also HTTPS: Hypertext Transfer Protocol Secure Web pages
  • SMTP: Simple Mail Transfer Protocol
  • DHCP: Dynamic Host Configuration Protocol. Automatically assign IP addresses on request
  • And many more, most of which you don’t need to know about, but be aware they are there.
  • HTML this is the base for web design Hyper Text Markup Language, it is the language of the internet. Hyper Text is how links in web pages that you can use to open another link or page by clicking the link. It shows like this https://www.lifewire.com/free-file-converter-software-and-online-services-2626121 (this is the form of a hyper link). Click it and it goes to the site.

First you need an address (an IP Address) that gives your location showing where the data come from and where it returned to.

As with computers all digital transfers are done using binary, 0s and 1s.

 Highly magnified to show the “data”, think of the white spaces as all 0s and the black spaces as all 1s.

This is on a magnetic hard drive.

The smallest recognizable piece of data is called a byte and is 8 bits, i.e. 0 and 1.

  • So here is Keith written as binary
  • The first 8 bits resolves a Capital K

Just like you have a home with an address or a telephone with a number. So you have an address for the internet.

There are a number of Association that perform that roll of managing those common components.

They ensure consistency and that the whole works together.

A domain name needs to be purchased from a registered seller that ensures it is unique.

The domain name forms the last part of an email address or a web site address. You will have one as part of an email address from your ISP and the cost is part of your monthly fee.

This email address is being protected from spambots. You need JavaScript enabled to view it. is an email address and the u3abrisbane.org.au is the domain name. Likewise, https://www.u3abrisbane.org.au/ is the web site address and again u3abrisbane.org.au is the domain name. This is because U3A has bought that domain name and pay a fee to maintain it.

If you have an email from Telstra it will be This email address is being protected from spambots. You need JavaScript enabled to view it. , bigpond.com is a domain name Telstra has purchased.

And so on, gmail.com, outlook.com, yahoo.com, are all domain names and part of the address / location for a service.

At every node there is a organisation with the infrastructure to provide access this is a service provider (Telstra); they are interconnected to other suppliers (Tier 1 2 3) and finally a connection to you. This is spread throughout the world.

Tier 1 bodies connect to each other; Tier 2 connect to other Tier 2, and so on down the order of size and connections and tier 3 consumers connect to one of these groups.

A transmission is automatically routed finding the neared available group to send on the transmission. They don’t just go from Brisbane to Sydney, a route may well be Melbourne –Darwin-Townsville then finally to Canberra where you want to be. You get the idea.

It is a construct using many interlocking protocols.

  • What is a Protocol?? – Just an agreed way of organizing data in the messages to do a specific job. It is a kind of standard.

How do I access the Internet

Access is through a service supplier i.e. Telstra; Optus; TPG to name a few, there are many more. You will take out some form of contract or agreement for that service and pay a monthly fee.

You need to have a connection available either NBN, Wireless Broadband; or Satellite.

On your device you will need to have an App called a browser; Edge, Safari; Firefox etc. This will give you access to the internet.

You will need a browser, it is your interface to the web. To then search and find data you will need a search engine. The search engine allows you to enter a criteria to seek data or a web site you are looking for, it will provide you many results that may show what you want or suggested alternative sites that meet your criteria.

Operating Systems (OS), will have a browser and Mail App installed on your computer. You can install your preferred App if you like.

For your mail you could opt to use Web Mail which is located on a remote server i.e. Gmail Yahoo outlook. (more later), and only accessed with a browser.

What is my address?

It is called an IP address and consists of a group of numbers such as

Your IP Address is issued by your supplier of the internet service, you may know it as your (ISP).

Your supplier would have given you that information but you can find it by doing a look up on the internet using your browser. To then search and find data you will need a search engine. The search engine allow you to enter a criteria to seek data or a web site you are looking for, it will provide you many results that may show what you want or suggested alternative sites that meet your criteria.

Enter “what is my IP address in the search engine.

Most will probably be using IPv4 due the need for more addresses IP6 was created to meet the demand.

The search has resolved showing both the IP4 and IP6 address, many will just show the IP4.

The IP here is 144.132.227.90. It is your address and is sent out with all messages as your return address.

  • The IP address will also identify it as from Australia.

This address is from the ISP and it refers to their server.

The IP address is shown as numerical, a DNS server converts the number to a human name.

This is the Brisbug web address https://brisbug.asn.au/ and we can understand it. This is the IP address 54.39.106.33 . If you know the IP address you can enter that to find the site.

Demo looking up IP address

Command line                        ipconfig /all   to see IP and MAC addresses.

Software

Are packages of computer language that we use to “talk” to the computer.

Humans can’t talk to the hardware devices; they need a language referred to as: “Machine Language” that talks in the binary “0’s” and “1’s” that the hardware uses.

Software consists of two parts 1. The Operating System; 2. Applications (the human interface).

Operating system (OS)

Windows, Apple Mac, IOS, Android, are all operating systems some for computers some for mobile devices. It is the first layer above the hardware and it uses machine language to “run” the hardware and do the computing.

Applications

This is the second layer using programming languages to provide the human interface. Applications allow you to converse via keyboard and other inputs to have the computer carry out your needs.

Applications then translate your needs into Machine Language (via the Operating System) that can be understood by the hardware.

  • The flow then reverses with the hardware output traveling via the OS or first layer of the process, then through the Applications or second layer, to provide you the result in human language.

Hardware, are the physical components that are assembled into a case, making up the computer.

The simplified relationship of these parts.

What are to components giving access

The main infrastructure is in place by suppliers of the cable wireless carriers.

  • NBN or Mobile Broadband, essentially landline or wireless forms. NBN has the landline system supplemented for some direct wireless linked in difficult areas to cable. Large businesses i.e. Telstra, Optus TPG have wireless broadband networks supplying to mobile devices.
  • These large distributers also sell access to many other groups selling wireless broadband service using the backbone of the major networks.

Consumers then buy plans from the ISP of choice.

  • Connection devices, depending on the ISP you may have a connection device that is supplied by NBN if from that network of from the ISP. It is the end of the cable or signal to the premises.

Connection for NBN coaxcial service. NBN have other form of delivery and they connection box is different for each service.

Modem Router

A modem does more than just allow transfer over of data between your ISP and you.

Modem for a landline service

These device are doing three functions.

  • The communication between the computer and the ISP.
  • A router that allow you to connect your computer directly by a cable, up to 4 connections.
  • A wireless section that allows wireless connections to devices with wireless hardware.

Front and back views of a Telstra Modem for NBN system.

  • Showing the connections to NBN (yellow cables) hardwired to 4 devices.
  • Connection to the incoming line (the red cable) connected here to the NBN connection box.
  • Not visible but internally a wireless card receiving and sending wireless connections to connected devices.

Do demo of a live modem

Modem and Router for Mobile Broadband

This system uses the mobile broadband towers to send and receive transport via a radio signal.

  • Its functions are the same as the landline equipment it uses radio signals for the connection to a mobile tower.
  • This allow connection to the internet when a land line is not feasible or you don’t want to be tied to a signal location.
  • The wireless connection to connected devices is the same stand for all wireless transmissions.

Mobile Broadband Tower

Satellite system

Computer; Tablet; Phone; Watch

Further you will need a device to create send and receive data. There are the basic we know a computer, be it a desktop, laptop, a tablet and a mobile phone.

Computer                                      Tablet                         Mobile Phone                                                      Smart Watch

Smart TV                                                                    Internet of Things

There are many devices now connecting to the internet via the NBN or Broadband networks, and the list is and will continue to grow.

The starting position on protection is to consider if you need that connection, and what the proposed device has as built in protective services.

You then need to look for setting in the device that will allow you to set your personal and privacy options.

You may need to research the manufacturer and the internet as a whole to find it there are any changes to add in you can use to enhance the security of the device.

These devices will likely be the “uncontrolled” connection to your system, and may give a path to, say your computer.

What are the Threats

You are no doubt aware of the many reports of:-

  • Hi jacks.
  • Downloads that add a programme.
  • Viruses that infect your device.
  • Trojans, that infection that are “buried” within the computer and can regenerate themselves making it hard to remove.
  • Ransomware, attacks on your computer that “locks” access to the device and its data. The name is because the attacker wants money to get your access back.
  • Casual access by a local person accessing the device because it is open, not locked or password protected.
  • YOU. One of the weakest links is you, as the final access point is if you give “approval to enter” by not checking, not querying something strange, accepting an email or clicking on an unknown link.
  • As we are only too aware with recent issues it the loss of personal data held by external parties we do business with and even government through hacking of their systems.

What are the Risks

  • Loss of money.
  • Loss of your identity. Identity theft is a serious crime, and people who have been victims of identity theft often have to spend a lot of time and money to fix it.
  • Infection of your computer allowing your data to be captured and removed.
  • Malicious damage to your computer or devices by installed programming and deletion of system information.
  • Many bodies you contact will wand information about you and will build a profile of your like and dislikes, what you look at listen to, what your “thoughts are on many topics”.
  • Cyberbullying has the capacity to ruin people’s reputations which is why this kind of activity can never be tolerated.
  • If your email address has been hacked, then someone may have used it without your permission to send out malware or to send spam messages.
  • Spoofing happens when someone creates an imitation site to collect data from users without them knowing. This is very dangerous because a hacker could use this information to log into your account and steal all the data you entered. In addition to this, spoofing has the capacity to trick the user into entering personal information, such as credit card numbers.
  • Little popups telling you to share it with others to unlock something. If someone clicks on this link and shares it, they’ll end up getting redirected to other websites that will try to get them to download malware.
  • Social Media. Social media can be an means of exposing very personal details and views that are captured by anyone that connects and very importantly can be life long as even if you remove your account the details previously exposed are in many databased. People feel unhindered on what they say on the internet.
  • Unlike a letter, which can be burned or torn to pieces, what's written on the web lasts forever.
  • Computer left physical accessible for USB or other direct loading of infecting code.

As in any city which has some areas what are safe and others that are far from safe.

Unlike a city that has Governance and laws and a police force to maintain them; the web has no such laws. The only universally acknowledged cyber-crime is the intentional spreading of computer viruses—infectious software programs that could impair the experience of other cyber-tourists.

Beyond this, there are few moral guidelines with no structure to encourage them let alone enforce them.

Take a turn down the wrong cyber path can lead to exposure of information or images at least as corrosive as anything available in the dark streets of a city.

Look at Scamwatch          https://www.scamwatch.gov.au/ 

  • A common scam email

This may well be a safe email but first up it is from a different organisation. The email says it is working for the bank.

It contains a few links to other pages.

You should be initially concerned and do not click any links.

Separately contact the bank and confirm it is from them.

How are the attacks done

The attacks come from many sources and methods of compromising your data.

Do you do this?

  • You assume that your banking site is safe.
    The bad guys go where your money goes. That’s why hastily mistyping your bank’s URL or failing to notice that you’ve been redirected to an imposter website could lead to cyber theft .
  • You shop in shady places.
    It’s easy to get excited when you find a great deal online, but you need to use caution before clicking “Add to Cart.” If you’re hooked by a bargain on an unknown shopping site, or you click on a search result instead of entering the URL directly, you might pay for a cyber criminal’s shopping spree instead.
  • You only use one password.
    If you’re not putting enough thought into your passwords, hackers could steal your money—and your online identity. By using multiple and strong passwords, can prevent them from accessing your entire online world with a single word.
  • You don’t know all of your friends.
    It might feel good to friend your entire hometown on Facebook, but it’s safer to use discretion when expanding your social network. When you accept an invite request from someone you don’t know, you’re inviting malware or identity thieves into your inner circle.
  • You don’t question authority
    It’s important to be at least a little suspicious when you go online. If you never question the legitimacy of the pages you visit, you could lose money and data to cyber criminals
  • You’re too social.
    Revealing important information to your friends and extended network can be dangerous. When you post personal facts like your name, school or family history, you give away answers to password security questions. Adjust your privacy controls to limit the people who see your information.
  • You don’t read the fine print.
    Nobody likes to read the fine print. That’s why certain online businesses take advantage of the space to sneak carefully worded language past you. When you accept their terms and conditions without reading them, you could unknowingly give away your online privacy to the company and its affiliates.
  • You shop and bank on public Wi-Fi.
    Cybercriminals love to spy on public Wi-Fi and trick users onto bogus networks. Question all Wi-Fi links with suspicion and use a VPN (virtual private network) to encrypt important data. If on a mobile device, use your Mobile broadband connection not the local WI Fi.
  • You jailbreak your mobile devices.
    Jailbreaking does more than add features to your smartphone or tablet. It also takes away important protections, inviting a world of mobile malware onto your device. Stay safe on the go by avoiding jailbreaks and the third-party download sites, bad apps and other online dangers that go with them. “Jailbreaking” is where you change the devices OS by changing code to allow an app or such that has otherwise been stopped.
  • You don’t know where your kids go online.
    If you have kids, you should know their favorite websites and social networks. The Internet can be an extension of your child’s life, so it only makes sense that you stay involved to guide them through proper online etiquette, cyberbullying and the ever-changing challenges of online life.

These are the ways the attacks are targeted at us using our weaknesses.

The processes are.

Gaining access to your device, to by passing the security that is inbuilt or added to the device.

  • Penetrate Fire Walls
  • Bypass security software to install code to give access.
  • Send scam and phishing messages and emails to have you give access usually be clicking links in the email.
  • Using access done by “brute force” attacks to install infected software on the compute. Brute force is also use to crack passwords, weak password within hours, very strong password days and months, using very large computing power.
  • Scams either by email or phone calls that encourage you to give access or install Apps that allow them to “take control” of your computer.
  • Attacks are also run with “robot” programmes that search the internet traffic for anything of interest to them.
  • Such attacks look for specific data i.e. emails or bank logins and will use proceed to capture the data; one method is “keystroke or key logging” this allows people to see your typing.
  • Man in the Middle, this is a process where an attacker intercepts a transmission to capture the data and then send the transmission on to the recipient.
  • If you leave your computer open someone can put a USB or CD in and run up executable code to install / infect your computer.

How do we protect ourselves

One of the best ways to avoid the dangers of the Internet is to be smart when browsing. Keep your phone and computer up to date with the latest software updates, avoid shady websites, use virus protection on your devices, check for unsafe links in emails or texts before clicking them, and never give out personal information over the Internet without having secured it first.

By taking these precautions, you will be able to guarantee your safety and security. Sure, the Internet is a handy and powerful tool. However, it can also be harmful if you are not careful about using it

Hardware and Software

Firewalls. All modems will have a hardware firewall as part of the Modem. Make sure it is running. Although in today’s equipment that will be done by the ISP supplying the equipment,

You may have to check that if you purchase you own.

  • To check the settings you will need to log in to your modem, make sure you keep the details supplied with the modem safe.
  • Open your browser and enter the IP address given to you for your modem
  • Enter the ID name and password click on sign in, This is for a Telstra Modem

Once logged in you will have access to the settings of the modem.

  • You need to protect this as it is a prime target for hackers to access your computer and change the settings i.e. turn off the fire wall; or just lock you out of the modem so you can’t reconfigure.
  • If that was to happen you would need to do a reset and enter the access setup details.
  • It is often said that you should change the ID from that given to you by the supplier, as bad actors know all the default access IF you do that make sure you write down the access and save it to a safe place.
  • These are the Telstra headings
  • Your main interest will be those circled.
  • Home show an over view of the Ethernet (wired) and Wi Fi connections and the individual IP addresses.
  • Broadband (Ethernet) shows the connection set up for the wired connection to the ISP.
  • This is part of the Wi Fi settings. We are using the 2.5 GHz radio frequency.
  • This unit has another frequency available.
  • The standard show what you wireless cars supports.
  • Channels are the available part of the spectrum you are using.
  • Change from auto and you can choose another channel
  • This is a further part of the set up for Wi Fi and cover the name for the connection (SSID) and allows you to hide it or broadcast it so others in that near area can see it.
  • You then choose the security type and set a Key or (password).

You may never change these.

The user setting option allows you to change the strength.

  • This turns the firewall on.

Fire Walls

A hardware firewall is a system that works independently from the computer it is protecting as it filters data coming from the internet into the system.

To protect your system, a hardware firewall checks the data coming in from the various parts of the internet and verifies that it is safe.

It does that by comparing the data against a list of known “bad stuff” it uses programming that compares the “look” of the data to see if it is safe to enter. It is checking to see where it is coming from and its location. A hardware firewall can protect all the computers attached to it, making it an easily scalable solution.

Users can also add to the list with locations to block and locations that can be allowed in.

  • A hardware firewall can protect any computer on a network connected to the firewall i.e. devices connected to your modem.
  • The Fire wall is the first block to incoming transmissions.

A software firewall is a program used by a computer to inspect data that goes in and OUT of the device. It can be customized by the user to meet their needs. Like hardware firewalls, software firewalls filter data by checking to see if it or its behavior—fits the profile of malicious code.

Software firewalls are necessary as they can monitor traffic trying to leave your computer as well, preventing it from being used to attack other networks or devices.

A software firewall has to be installed on each computer in the network. Therefore, a software firewall can only protect one computer at a time.

It will check outgoing traffic, if an infection gets into the computer, its will want to send any data captured home. The software firewall looks for that data and blocks it leaving your computer.

This is particularly important as data getting into the computer may well be because you allowed it in.

Ports. Here we have a look at how data transmission happens.

You may be aware of ports as the physical connections on computers i.e. where equipment is attached such as a monitor via a HDMI port, or USB ports for USB connected devices.

The other ports are not visible but there are many of them and they are “doors into and out of your computer. It is these ports that hackers are testing all the time to see if they can get access to the computer.

There are some ports you may have come across as they are regularly referred to. An example is port 80 which is the common port for internet web traffic. Hackers know that data flows to and from web sites uses that port. You can think of them as doors to your house.

When you send out from your browser and search the internet the traffic goes via port 80, when an answer is sent back it come in through port 80. This is an example of how your choice of a site and what you bring “home” can let infected material in to your computer, you open the door.

Checking what you show to the outside world.

The objective of all the security and configuration of your computer is to make your computer invisible to the world of hackers. If the hacker can’t see you they can’t attack.

One test is called “shields Up” this is by Gibson Research who have been involved for many years with computer attack research.

Beware if you run this test you are effectively asking it to “attack” your computer to see if it can be accessed. Always worth a check to ensure it is still legit. So you need to really trust them.

You access from your browser either search for the company or you can use this link https:/www.grc.com/x/ne.dll?bh0bkyd2  

Shields up will run against your computer searching for any access ports that could be attacked.

We are looking for a report that has you as nonexistent on the internet.

Non existent means that they can’t see you so can’t attack.

  • Good Result the computer is hidden from probing.
  • A test of the common ports was good.
  • The highlighted ports are those that are regularly use and are known to be open.

The test provides useful information, and maybe a need to take some action to secure exposed ports.

If you find you have a report showing open ports you may need to do some research on the particular fail reported and see if it is a weakness that needs to be fixed.

Not all reports will mean that you are being “attacked”,, but you need to check out an open port.

This is a good guide. But is shows a possible area but needs further checks to see if it is in need of correction.

Fire walls are important first barriers to unauthorised access. But remember you need both a hardware and a software firewall

Included in Windows is a Software firewall. If you rely on it check it is turned on and the update is in place. Many update will come in via the Windows update process, make sure you keep up-to-date.

Anti Virus

Initially attacks on computers came from viruses attached to e-mails, they did not go away just developed in more sophisticate ways and became more damaging.

The protection is the installation of an antivirus programme that will look for and delete a virus in an email before it get on your computer.

Antivirus programmes are designed to do just that and a bit more.

  • These programme work by being able to recognise a virus and having the “programme to delete it”. That is done by companies taking a virus and reverse engineering it for them to build a “find and destroy” programme. Each virus needs to be found, a fix developed and then sent to your computer as a “definition update”.
  • Anti-virus programmes run in the background and examines all incoming emails live and will stop a virus before it gets on to the computer. (Provide it knows it).
  • The Anti-Virus programme must be kept up to date continually and it will install new “definitions” when a new virus is found and a fix developed.

As a general rule you should only run one anti-virus programme. Some won’t load if there is another already installed. They will see another anti-virus programme as a virus, giving false positive errors.

  • The programme must be “live” running it the background on the computer.
  • It must be constantly updating with new definition files.
  • It must allow you to ran a scan of all your computer files on demand and it must allow you to scan new connected devices i.e. USB sticks. This is to stop virus infected files being loaded from attached devices.
  • Allow you to look at any infection warning to see if it need deletion. This can sometimes be from a Quarantine folder when an antivirus programme will isolate a suspected file and you can then investigate.
  • Do search on the web for the suspected virus to see if it is a virus or something else. Most antivirus suppliers will have a location that you can search to find lists of known viruses. You can also check a different developer’s site to see if the information is consistent. (show a search for a virus)
  • Check the programmes set up so ensure a scan looks for a range of known types as well as data forms that are indicative of an infection.
  • There are many Antivirus programmes and they are available in both free versions (do not have full capability) and paid for version that come with a suite of antivirus, malware and other protection programmes. What is a good one which one is the best is a common question and open to many answers. Show a search for the best comparing products.

This is an example from Avast   https://support.avast.com/en-us/article/Antivirus-scan-settings#pc

  • Full Virus Scan: Performs an in-depth scan of your system, checking all hard drives, rootkits, and auto-start programs.
  • Targeted Scan: Scans folders or drives that you specify.
  • Explorer Scan: Scans files or folders like a Targeted Scan, but is only available from the Windows context menu when you right-click a selected file or folder in File Explorer or on your Desktop.
  • Boot-Time Scan: Scans for hard-to-reach malware as you boot up your PC.
  • Open the setting option
  • Full scan options.
  • Targeted Scan
  • Looking at files and groupings.
  • Looking at files involved in the Boot (start) pars of the system?

There is not as much comparison testing of Defender as other products. Demo scans in Defender.

  • This shows the option available for scanning folders and files.
  • This shows a scan running with a custom setting and an off line scan.

I often just use Defender but would likely change if I felt the threat level changed, and or it was on a computer that held confidential data.

Antivirus Rescue

Scans that run on your computer are running in a working environment i.e. windows if running. With some forms of viruses they load deep in the system and are designed to hide there. In such circumstances even when the virus is detected and isolated / deleted it is not fully removed from the computer because the system protects the hidden code and when the computer id restarted or at the next boo up the hidden code reloads the virus.

Most antivirus suites paid versions will offer a Rescue disk or USB.

These are made to start the computer on power up and will then load a antivirus scan package. Windows does not start so the scan can see all the data on the disk and therefore any hidden code can be found and deleted.

It is a good second check if you think you have a problem.

Windows Defender has this type of check.

Find it in settings security, in scan options,

Run a demo

I advise this as it is there but I don’t know how it works as it does not provide a report on the scan it did. This occurred on two scans I ran; it appears to be, if no issues them assume it is OK.

To me this makes it pointless. Possibly if it finds a problem then it will report.

Check your paid version to see if it either runs a scan offline or will make a USB to start your computer and run a scan.

Here is one offered by Kaspersky.

I generally use a different programme so that I get a second option.

Link; https:/free.kaspersky.com/  

The download is an ISO file that needs to be run to create either a CD or USB boot rescue media.

To record Kaspersky Rescue Disk to your USB device and boot a computer from it, please use the following instructions:

Connect a removable USB device to your computer

Download the ISO image of Kaspersky Rescue Disk. Make either a CD or USB from the ISO file to make the rescue image.

Using a DVD burning programme to make a restore disk using the ISO file you download.

Boot your computer from Kaspersky Rescue Disk.

  • Insert the USB and then press the power button to start the computer and at the same time hold the f12 key down till the “boot menu opens or after the splash screen come up.
  • Select the USB device in the Boot menu that opens and click to run.

The programme opens.

This will load the Kaspersky scan programme, (if you are connected to the internet), it will also do an update the latest definitions before running a scan.             Demo a test

Malware

Malware is malicious software, is a blanket term for any kind of computer software with malicious intent. Malware could be said as more directed to the computer systems; and seeks to invade, damage, or disable computers, computer systems, networks, tablets, and mobile devices, often by taking partial control over a device’s operations

Today Viruses and Malware are very much the same thing and most antivirus programmes will search for malware as well. That is true for all paid security suits that cover all the forms of attacks.

Malwarebytes is a programme identifying with protection of malware, but it also extends into a wider definition of viruses.

I have found that installing the free version gives me another option if I have received advice of an infection and virus scans come up clean then I will run this programme and see if it finds anything.

Our protection here is the same as for Viruses.                    Demo Malwarebytes

Some specific form of virus attack.

Trojans, that infection that are “buried” within the computer and can regenerate themselves making it hard to remove.

Trojans, in computing are defined as malware that use deception to trick unsuspecting users into running seemingly benign computer programs that hide malicious ulterior motives. While technically they are not computer viruses but rather a separate form of malware, "Trojan horse virus" has become a common way to refer to them. 

They can be a serious infection and are “buried” deep in the devices system and can, capture data, give future access to the “bad actor” and be hard to remove.

Trojans can look like just about anything, from free software and music, to browser advertisements to seemingly legitimate apps. Any number of unwise user behaviors can lead to a Trojan infection. Here are a few examples:

  • Downloading cracked applications. Promises of an illegal free copy of a piece of software can be enticing, but the cracked software or activation key generator may conceal a Trojan attack.
  • Downloading unknown free programs. What looks like a free game or screensaver could really be a Trojan, especially if you find it on an untrustworthy site.
  • Opening infected attachments. You get a strange email with what looks like an important attachment, like an invoice or a delivery receipt, but it launches a Trojan when you click on it.
  • Visiting shady websites. Some sites only need a moment to infect your computer.

Ransomware, is a type of malware, or malicious software that locks up a victim’s data or computing device and threatens to keep it locked, or worse, unless the victim pays the attacker a ransom.

Ransomware infections are the result of “bad Actors” seeking to make money. The infection can follow from all the methods as noted in the Trojan item above.

It is malware with a very specific concept of infecting the computer, taking control and encrypting the entire storage so the owner cannot access the date. Those doing this will lockup the computer to do that and remover data to sell.

They will send you a ransom calling for a payment to release the “key” to you so you can unencrypt the computer and or destroy any data copied.

This is a no win place to be, as you have no guarantees that making a payment will get your data back.

Defending against ransomware threats.

These are precautionary measures that have been suggested; they can also be applies for all forms of external attack.

  • Maintaining backups of sensitive data and system images, on hard drives or other devices that can be disconnected from the network. Demo Macrium Reflect
    • This is probably the most positive fix as you can completely replace the computer to a state before the attack.
    • You must keep the disk separated from the computers except for when a new image is created. Attackers now look for attached devices and will lock them as well.
  • Applying patches regularly to help thwart attacks that exploit software and operating system vulnerability.
  • Updating cybersecurity tools including anti-malware and antivirus software, firewalls and secure web gateways, as well as enterprise cybersecurity solutions—such as endpoint detection and response (EDR) and extended detection and response (XDR) tools—that help security teams detect and respond to ransomware in real-time.
  • Employee cybersecurity training to help users recognize and avoid to phishing, social engineering, and other tactics that can lead to ransomware infections.
  • Implementing access control policies including multi-factor authentication, zero-trust architecture, network segmentation, and similar measures that can prevent ransomware from reaching particularly sensitive data, and keep cryptoworms from spreading to other devices on the network.

Contact your ISP (Service Provider)

If you have a virus reported by your protection programme you could also contact your ISP if the email is from them i.e. me@iinet,com.

  • They may be able to track it.

Compromised Email Accounts

  • An email service is compromised when a third party obtains your iiNet password and uses these details to send email through the iiNet servers.
  • These aretypically spamor phishing/scam emails, which in turn generate complaints about the iiNet mail servers. In many cases, the emails are being sent from somewhere outside of Australia through a service called SMTP Authentication.
  • What happens if my email service is compromised?
  • We have monitoring in place on all the iiNet servers and we deal with spam complaints as a top priority, so when we identify a client as sending spam through our servers we need to take urgent action.

Telstra does similar and offers a, paid for service, to secure your devices.

  • All the ISP service need you to compare and see just what it does for you.
  • It is another way to add protection but comes at a price. $10 per month.


 

It looks like they can track and find where it come from but they can’t stop it, as such. Telstra looks more like they will sell you a form of security suite.

So I am not sure it will achieve much but anything is worth a try and as time goes on they may do more to help.

As with all our interfaces we need to balance total lock down to the convenience of using the devices.

Access to devices

Restrict users on your devices and don’t allow them to install or download to the device. This is a direct way of getting infected material on to the device.

Passwords

I have a personal policy of putting no passwords or auto fill forms and the like on my computer or devices.

In simple if it is on the device and it is hacked “someone” has the skills to find the passwords.

If you must save to the device make sure you use the “safe” offed by many OS programmes to store the data. These offer high encryption of the data that we can’t break; but those with the computer power and knowledge can possible do so.

If relying on encryption you need to ensure it is at a high level.

Password Managers

There are many products on the web and choosing can be difficult.

These products encrypt the stored data and the premise is you need to remember just one password to open the programme. The password needs to be a strong one

  • We want high encryption 256 bit.
  • We want it to be ease to use.
  • We don’t want the data to be in any third party hands.
  • I like it to be only on a secure USB not on the computer.
  • Be aware that to use it you need to have a computer or something that will open a USB. Standing on the footpath in the rain needing to bank key, the USB is useless.

You need to choose carefully and may need assistance with the installation and on using the programme. It can be daunting for new users.

My example is a product called Keepass.

I have used it for some time and have found no issues but that is at my level and is no recommendation on choice.

Keypass is written is a Linux programme but it runs on other platforms i.e. windows.

  • And independent platform written with the source code available for someone to check it does as it says (need the programming skills), and allows a programmer to customise the code.
  • I like that I can put it on a USB and store it safely.
  • Keypass is independent and does not use any cloud storage to operate it.
  • The principle here is very simple: KeePass saves all your individual passwords in an individual database. This database is in reality an encrypted file. It is only accessible by inputting your correct main password, meaning you only need to remember one such piece of information.
  • The basic layout of the system.

Demo my USB

What is a good password

It’s not using obvious data that someone can guess i.e. your address or someone’s name. It is regularly reported that the use of “password” is the most used, along with 123456.

A good password should be a long string of capital and lowercase letters, numbers, punctuation and other non-alphanumeric characters -- something that's difficult for others to guess.

There are any number of methods on how to set a strong password that you can remember. Just do a search.

Some entities will have specific rules for a password and may limit it by the number of characters and the types of characters numerals and non-alpha characters that you can use. Some want only 8 characters.

Here is an example using a favourite phrase.

Encryption

Encryption involves the application of a key or process to convert “plain” text into unreadable cyphered text

Early attempts like the “Caesar Cypher” used letter shifting to encode the message:

  • You might for example “shift” each letter a number of places right.

Then we have the advance in WW2 with the Enigma machines and the exploits of the code breakers.

The encryption of today is much more complex and for us cones down the 128 bit or 256 bit encryptions. The current best is the 256 bit.  And that is the one you want to see as the base for any encryption you chose.

To crack theses codes you need heavy computer power and lots of time and knowledge.

It is as safe as we can get.

What we expect of data protection as a minimum:

  • Data transferred on-line can be read only by the intended party
  • Exchange of data is not susceptible to “man in the middle” interception
  • Data stored anywhere cannot be accessed by bad actors
  • If data is breached, the data is encrypted and cannot be easily read

This show the time needed to break encryption standards

  • As you can see 256 bit takes a while

Using encryption can take time to encrypt and then time to unencrypt.

I would raise a point for consideration. We want to use encryption to protect transmissions across the internet and the use of current security certificates from sites (HTTPS) cover that as well as business, banks for example.

But you will come across options for you to encrypt folders and files. If you use them take care for if you encrypt make sure you store and describe the key to unencrypt the data, especially over time. Forget it or lose it and your data is completely lost and non-recoverable.

You will see people who claim to recover lost data but in most cases they can’t and the cost is very big dollars.

Configure your browser

Edge

This is a Web Browser by Microsoft which is built into Windows, which allows you to access the internet and browse the many Web sites and services.

This is the default home screen when Edge opens.

It is using the Bing search engine.

I do have the favourites bar turned on.

Searching the web has two components. The Browser and the Search engine. Today’s browsers have combined the two functions, so that you can search from the browser directly.

Google is a specialist Search engine, used in any browser, Edge has a default search engine called Bing.

Microsoft has packaged Edge and Bing, both Microsoft’s products, as the default web browsing duo to provide this function in Windows 10.

You of course do not have to use them; you can install different browsers and use different search engines of your choice.

But install Windows 10 and you have the components to access and search the web built in and fully compatible with Windows.

On opening Edge for the first time you should configure the settings with your choices. Especially you should address Privacy and Security options.

Configure Edge Settings

Open Edge and then click on the 3 dots (ellipsis) to access the settings.

  • You will see there are many options and we will look at a few as we go such as Favourites; History; downloads.
  • Click on the Settings option.
  • There are many so you should work through them and make your choices.

Profiles

  • Under this heading you can set or change your Windows Account setting as Edge uses that account for its control.

Passwords

  • By default, it will have the options turned on. Click on the slider to turn it off.
  • I suggest that you adopt a policy of never saving passwords on a computer or sign in automatically to any sites.
  • Always keep such control of personal access in your hands.

Payment Info

  • Don’t save any payment information or your credit cards on a computer.
  • Hackers just love that data.

Addresses and Cards

  • Don’t save personal address details.

Privacy, Search, and Services

Tracking

  • You want to control tracking by web sites and subsequent profiling. So, turn it on.
  • The default is Balanced.
  • Choice is basic with lower control or Strict with high control.
  • With high control you can find you have restriction on accessing a number of web sites.

Clear history

As you use the browser it accumulates a lot of temporary internet data.

  • This can build up and use significant amount of storage space.
  • You will also hold search history, cookies, which will use storage space.
  • You need to regularly clean out this data.

Privacy needs your attention as many “people” will seek to gain your information.

  • Don’t allow your information to be sent out.
    • You gain nothing from these requests, Turn them off.
    • click on the links to find some exciting reading.

Some further choices.

  • Turn off sending data to Microsoft.

Change the default search in the address bar.

  • Click drop down arrow and select from list Turn off suggestions.

Change the default search in the address bar.

  • Click drop down arrow and select from list.

 

Click on manage search engines.

To remove or add to the list,

  • Select an item and click on the 3 dots.
    • Click on remove to delete it
    • Click on edit to change.

Customise Browser

  • The Home button can be useful in “jumping back” to the start of a search.
  • You can change the default search engine here, by entering in the URL of the new one i.e. google.com.au
  • I find the favourites bar an essential.

New Tab Page

  • Click on Custom to set how each new tab is displayed.
  • There are a few preset options to choose from.
  • Click on Custom for other options.
  • Turn off the options here to make it a blank page.

Downloads

When you select some item to download from the Web it needs a location to save it to on the computer.

  • By default, it will save to the Windows Download folder.
  • This is a good option as you always know where the download went.
  • Click the Ask where… switch if you want to be asked where to save each download.
  • I suggest you leave it as the default it saves time for every download.
  • If you want the downloaded file in a different location it is easy to copy or cut the file and then paste it in the location you want.

As you can see there are many more options you can review and change as you see fit. Any change you make can always be reversed by turning the slider switch on or off.

Tablets and Phones

Apple

iPad and iPhones

This is an Apple product and it and the iPhone uses the iOS operating system and mobile apps.

These device are less open to attacks but are still vulnerable to user errors and email born intrusions.

For these device you need to take the same care and protection to limit attacks malware and loss of data.

  • Connect the device to an infected computer and you are open to infection of the device.
  • Infection from email and text messages, proves that even the most secure platforms aren't 100-percent safe. So don’t just hide behind the iOS reputation it can be bypassed.
  • Be careful of any downloads /installs that do not come from the Apple Apps Store.
  • They use a particular “loophole” associated with using your device on an enterprise system.
  • Think twice about jailbreaking your device: One way malware can be installed on your iPad is by side-stepping Apple's App Store. Knowledgeable users can jailbreak their device and research individual apps to reduce the threat of malware, but even then, they are in a less protected environment. If you are looking for the best protection, simply avoid jailbreaking the iPad.
  • Always install the latest updates. Hackers are good at what they do, and they are continuously checking all facets of the iPad for a way into the device. Apple combats this by patching holes and releasing those patches as operating system updates.
  • Never trust an unknown computer: When you plug your iPad into a PC using the Lightning adapter, you're prompted whether to trust the computer. Your iPad charges regardless of your answer, and the only reason to trust a PC is to transfer files.
  • Never give permission for an app to be installed on your device: This is where they get you.
  • When you sign in to your apple ID you are giving permission and trust to a joined computer, even if you don’t get asked.

How to Protect Your iPad From Viruses

  • As much as the word virus has put a scare into the PC world for a couple of decades, there's little need to worry about protecting your iPad. The way the iOS platform works is to put a barrier between apps, which prevents one app from modifying the files of another app. This keeps a virus from being able to spread.
  • A few apps that claim to protect your iPad from viruses, but they tend to scan for malware. And they don't even concentrate on apps. Instead, they scan Word documents, Excel spreadsheets and similar files for any potential viruses or malware that can't actually infect your iPad, but could potentially infect your PC if you transfer the file to your PC.
  • A better tactic than downloading one of these apps is to simply make sure your PC has some type of malware and virus protection. That's where you need it, after all.

Apple stuff

iPad is designed to protect your data and your privacy. Built-in security features help prevent anyone but you from accessing the data on your iPad and in iCloud.

Built-in privacy features minimize how much of your information is available to anyone but you, and you can adjust what information is shared and where you share it.

To take maximum advantage of the security and privacy features built into iPad, follow these practices.

Protect access to your iPad (from Apple site)

  • Set a strong passcode: Setting a passcode to unlock iPad is the most important thing you can do to safeguard your device.
  • Use Face ID or Touch ID: Face ID (supported models) or Touch ID (supported models) provides a secure and convenient way to unlock your iPad, authorize purchases and payments, and sign in to many third-party apps. See Set up Face ID on iPad or Set up Touch ID on iPad.
  • Turn on Find My iPad: Find My helps you find your iPad if it’s lost or stolen and prevents anyone else from activating or using your iPad if it’s missing.
  • Control what features are available without unlocking your iPad: Disallow or allow access to some commonly used features, such as Control Centre and USB connections, when your device is locked.

Keep your Apple ID secure

  • Don’t let others use your Apple ID, even family members.

To share purchases, subscriptions, a family calendar, and more without sharing Apple IDs, set up Family Sharing.

  • Use two-factor authentication. If you created your Apple ID on a device with iOS 13.4, iPadOS 13.4, macOS 10.15.4, or later, your account automatically uses two-factor authentication. If you previously created an Apple ID account without two-factor authentication, turn on two-factor authentication.
  • Never provide your password, security questions, verification codes, recovery key, or any other account security details to anyone else. Apple will never ask you for this information.
  • When accessing your Apple ID account page in Safari or another web browser, look for the lock icon in the address field to verify that your session is encrypted and secure.
  • When using a public computer, always sign out when your session is complete to prevent other people from accessing your account.
  • Avoid phishing scams. Don’t click links in suspicious email or text messages and never provide personal information on any website you aren’t certain is legitimate. See the Apple Support article Recognize and avoid phishing messages, phony support calls, and other scams.
  • Don’t use your password with other online accounts.

Manage the information you share with people and apps

  • Control app tracking: All apps are required to ask your permission before tracking you or your iPad across websites and apps owned by other companies for advertising or to share your information with a data broker. You can change permission later, and you can stop all apps from requesting permission.
  • Go to Settings > Privacy & Security > Tracking.

The list shows the apps that requested permission to track you. You can turn permission on or off for any app on the list.

The list shows the apps that requested access. You can turn access on or off for any app on the list.

Protect your email privacy

  • Protect your Mail activity: Turn on Mail Privacy Protection to make it harder for senders to learn about your Mail activity. Mail Privacy Protection hides your IP address so senders can’t link it to your other online activity or use it to determine your exact location.
  • Go to Settings  > Mail > Privacy Protection.
  • Turn on Protect Mail Activity.

Protect your web browsing

  • Manage your privacy, and help protect yourself against malicious websites: Safari helps prevent trackers from following you across websites. You can also review and adjust Safari settings to keep your browsing activities private from others who use the same device, and help protect yourself from malicious websites. See Browse privately in Safari on iPad.

Lock down your iPad if it’s facing a sophisticated cyberattack

  • If you find your iPad and personal accounts are targeted by sophisticated remote attacks, you can also help protect yourself with Lockdown Mode.
  • Lockdown Mode offers an extreme level of security for the very few users who, because of who they are or what they do, may be personally targeted by some of the most sophisticated digital threats.
  • Lockdown Mode automatically protects Safari, Messages, Home, and many other Apple services and apps. Webpages and internet communications continue working, but with reduction in performance and usability. See Harden your iPad from a cyberattack with Lockdown Mode.

·       Learn about Lockdown Mode

  • Go to Settings > Privacy & Security > Lockdown Mode, then tap Learn More.

·       Turn on Lockdown Mode

  • Go to Settings > Privacy & Security > Lockdown Mode, then turn on Lockdown Mode.

iPad Virus Scams

One of the most common scams for the iPad is the iOS Crash Report and variations of it. In this phishing scam, a website displays a pop-up page informing you that iOS has crashed or the iPad has a virus, then instructs you to call a number. However, the people on the other end aren't Apple employees and their main goal is to trick you out of either money or information that can be used to hack into your accounts.

Android Mobile Devices (From Google)

With Android, protection is built into everything that you do.

  • Like downloading apps, browsing the web and choosing to share data.
    • If something seems off, like a bad app or a harmful link, we'll alert you and give you tips on what to do next.
    • Our powerful internal security guards your device and data. So that you stay protected, even when you’re not using your phone.
  • Google Play Protect helps you download apps without worrying if they’ll hurt your phone or steal data.
    • We carefully scan apps every day, and if we detect a bad one, we’ll let you know and tell you what to do next.

Outsmart spammers.

  • Pick up the calls that matter and skip the ones that don't. We screen your calls, so you don't waste time answering bots.
  • Spam protection can tell you if a call is bad, to help stop outsiders getting your personal information.
  • To protect your privacy, the transcription of your call happens entirely on your device.

Avoid shady websites.

  • Google Safe Browsing lets you explore the web with confidence and helps protect you from dangerous websites and malicious files.
  • We warn you if you try to navigate to a website or file that seems bad, getting you to safety and helping you avoid malware or a phishing scam.

Privacy that works for you.

  • Android security enables privacy. We protect your data from prying eyes by wrapping it in encryption and setting boundaries around what apps can and can’t do in the background.
  • And when you want to browse? Go incognito in Chrome or on Maps. We also give you tools that help you control who can see what data and when.

Secure to the core.

Powerful internal defence.

  • Keeping you safe is what we do, with security in every detail of Android. Even the parts that you can’t see.
  • Device encryption keeps your data safe when your phone is locked so that it looks scrambled to anyone trying to steal your info. And when you back your phone up to the cloud, everything is encrypted end-to-end using your phone’s PIN.
    • So only you can access that data.
  • We guard each app at the operating system level, so other apps won’t snoop on what you do.
    • We’ll even notify you if we think that someone tampered with your operating system. These features are always on, working in the background. To make sure that you’re protected automatically.

Protecting your privacy starts with the world’s most advanced security.

  • All Google products are continuously protected by one of the world’s most advanced security infrastructures.
  • This built-in security automatically detects and prevents online threats, so you can be confident that your private information is safe.

Keeping you safer online with continuously updated security.

Encryption keeps data private and secure while in transit

  • Encryption brings a higher level of security and privacy to our services. When you send an email, share a video, visit a website or store your photos, the data that you create moves between your device, Google services and our data centres.
  • We protect this data with multiple layers of security, including leading encryption technology such as HTTPS and Transport Layer Security.

Proactive security alerts help protect your private information

  • We’ll proactively notify you if we detect something that we think you should know about, like a suspicious login or a malicious website, file or app, and we’ll provide guidance to help you strengthen your security. For example, on Gmail, we’ll warn you before you download an attachment that could put your security at risk or if someone logs in to your account from a device not associated with you.
  • When we detect something suspicious in your account, we’ll send a notification to your inbox or phone so that you can protect your account with one click.

Blocking malicious and misleading ads before they get to you

  • Your online experience can be affected and your security compromised by ads that carry malware, cover the content that you are trying to see, promote fake products or otherwise violate our advertising policies.
  • We take this problem very seriously. Every year we block billions of bad ads – on average, 100 per second – through a combination of live reviewers and sophisticated software.

Our cloud infrastructure protects data 24/7

  • From custom-designed data centres to private undersea cables that transfer data between continents, we operate one of the worlds most secure and reliable cloud infrastructures.
  • It’s continuously monitored to protect your data and keep it available. And in the event of a disruption, platform services can be automatically and instantly shifted from one facility to another so that they can continue without interruption.

Easy-to-use privacy settings, all in one place

  • You can find key information, privacy and security settings all in your Google Account.
  • We have created easy-to-use tools like Dashboard and My Activity, which give you transparency data collected from your activity across Google services.
  • There are also powerful privacy controls such as Activity Controls and Ad Settings, which allow you to switch the collection and use of data on or off.

Quickly access your key privacy settings

  • Your Google Account is always easy to find in our most popular services like Search, Maps, YouTube, Gmail and Assistant. Just tap on your profile picture and follow the link to your account.

https://safety.google/

https://safety.google/security/built-in-protection/

https://safety.google/authentication/

https://safety.google/privacy/privacy-controls/

https://safety.google/privacy/privacy-controls/

VPN (Virtual Private Network)

A virtual private network extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.

A network is a reference to a number of computers connected to each other, either as a wired or wireless network.

You most likely will have a computer, tablet and phone connected to your internet connection. This is a network and you may have it set up so that you can access the data on the connected devices from one of the others.

Here we refer to the connection of computers in a way that limits the data flow so no one else can access it.

The internet is in fact a connection of many computers as a public network and this makes them open to hacking and data theft. A VPN is use to create a “private” network through this public space and secures the traffic with high encryption.

An example has been businesses that have facilities at different location, VPN connections have been used to secure those connection to only company access even though it is using the internet to transport the data.

These were difficult to set up and manage so VPN was not readily available to individual users.

What has developed is a number of service providers that have set up the hardware in locations around the world and the software that makes it readily available for you to use VPN.

Why use a VPN?

  • It’s software that encrypts your online data and creates a secure connection between your computer and the internet.
  • When you are online you are exposed and protecting your personal data is a primary reason to use a VPN.
  • This ensures your traffic is safe, your identity is anonymous, and your online activities are protected.
  • It’s virtually impossible for your data to be intercepted by cyber criminals or anyone.

That said it is no guarantee that the benefits will hold good it will depend on what service you connect with and its trustworthiness. The service has all your data of your web travels or can capture it.

VPN are good but not foolproof.

What does a VPN do

It establishes a connection between your computer and the site you want to go to directly via a “Tunnel” with the effect that all data transfers are protected by the “tunnel” preventing it from being hijacked.

It does that using high level encryption.

  • Protect yourself from snooping on untrustworthy Wi-Fi hotspots.
  • Bypass geographic restrictions on websites or streaming audio and video.
    • Watch streaming media like Netflix and Hulu.
  • Gain at least some anonymity online by hiding your true location.

Choosing your VPN Service

                                                                                    Demo of Proton VPN

Using a VPN is easy. But choosing the perfect VPN for your intended usage is where many people get stuck

https:/www.vpnuniversity.com/learn/how-to-choose-a-vpn

Picking a VPN is about it providing a specific function you want to cover.

So your search should look for what the providers offer and its match with the function you want covered.

As already identified the basic service you will be offered are.

  • Security and Encryption; travel; free public Wi Fi.
  • Protection of your Privacy when you are searching; your ISP; search engine supplier.
  • Location hiding to stop tracking you and to let you access blocked site i.e. Netflix.

Important things to consider.

  • Security; does the VPN use DNS IPv6 Webtrc protection?
  • How strong is the encryption?
  • Privacy, What are the policies of the VPN service; does it track usage; does it inject ads; does it keep logs.
    • What is its reputation on standing by its policies?
  • Is it available for all the devices you will be using?
  • You can use a VPN to limit your ISP or mobile carrier's ability to track you across the internet.

Privacy considerations.

  • No VPN Logs.
  • No tracking or ad injection.
  • Ad blocking capability.

A VPN can be the perfect tool to unlock global streaming services, even in areas that aren't currently served by that service.

Most Important Features for a streaming VPN:

  • Works with the services you use most (obviously)
  • Fast Speeds (so you can stream in full HD or even 4K)
  • Smart DNS is a bonus feature to look for.

Encryption and security are the core of what a VPN is supposed to do. It is absolutely essential that you chose a provider that gets the basics right

Think of these points.

Encryption.

  • Always look for 256 bit encryption. While slower it is stronger and harder to crack.
  • Is it only AES (Advanced Encryption Standard) or are there alternatives.
  • Handshake Encryption: should use 2048-bit RSA encryption for the handshake at minimum and ideally 4096-bit should be available
  • Authentication: automatically check each received packet to make sure its authentic and nothing has been tampered with or injected by a middleman. Your VPN should use SHA-256 (Cryptographic Hash Algorithm) or higher by default.

Other Security Features

Not all VPNs are created equal, and speed is one of the features that really separates the weak from the strong.

You're paying your internet provider for a fast broadband connection, choose a VPN that will lose the least amount of what you have.

What affects speed.

  • Server Load: How crowded is the VPN server, and how much bandwidth does it have in total.
    • Too many users for the bandwidth will reduce the speed of the service.
  • Server Distance: The further you are from the VPN server, the slower your speeds will be due to latency and packet loss. Don't expect to get fast speeds using a server on the other side of the world.
  • High Encryption will take longer to transport the data. Strength.
  • Of course the distant between you and the server you choose will increase transport times.

Using a VPN.

https:/www.expressvpn.com/top10vpn  This is an example of one fairly well accepted.

Features on offer.

  • Watch out for specials and check what cost is when the deal stops.
  • Try out offers still require you to sign up.
  • Give out the least information needed the less descriptive of you the better.
  • Consider using a non-descriptive email, not one with your name in it.
  • Details needed to sign up.
  • Use PayPal, if you have an account to hide your card details.
  • Once signed in you will be able to download the programme.
  • Run the installation for the programme.
  • When finished you will have an icon on the desktop or the app on the start menu.
  • To run VPN click the icon.
  • Select the server you wish to use in the login screen.

Connect to the chosen server and you are good to go.

You will need to look at the settings and decide if you want the programme to start with the computer boot up and connect to a default server, or to manually start it only when you want to use the VPN.

Social Media

Social Media is a very exposed place to be and one predators are habituating.

  • The platforms are when all is said and done money making enterprises. That is very evident when you see the value of the companies and the salaries of the top staff.
  • the users are sharing their every thought and personal detail exposing them to having such detail distributed beyond the place they mean it to be.
  • If you must use it take great care on what you share and how you share with.
  • Ensure you go through all the settings and deselect any that are sharing or distributing your details.
  • Beware that even when you delete an account you cannot ensure that that data has been destroyed.
  • There are more stories than you can count of loss of personal data; misuse of personal data; by the various organisations offering the services. Can they be trusted?
  • I offer the opinion that they should not be treated lightly, as the cost of ID theft, reputational and legal actions from inappropriate use can be lifelong outcomes.

Facebook

                                                                                                                                                                                                                                                                                                                                                                                                                                        

  • While it give you some ability to limit spread via removal of tags.
  • For me this is “after the horse has bolted” so just how much is gained.
  • But better than doing nothing.

Twitter

  • This is just a couple of platforms used in social networking and while providing for this linking and sharing; it also opens up you communications to miss use.
  • You should approach them with caution and fully check out what they do with your data and personal information.
  • Can you really tie up the security and personal protection issues?
  • They all suffer from the “friend of a friend” weakness. If you share with a friend who has no protection on the site, that friend can expose you information to the wider distribution.
  • Even the simple snapping of part of your site moves the information to anywhere.

In the end analysis it is for you to protect yourself and do not place anything you hold personal on any site.

Third Parties that are demanding and storing your sensitive data.

We are continually being forced to work online with numerous government and business you have to deal with.

  • This leaves all that data subject to their equipment, programmes and IT companies that supply services to them; along with the staff you are dealing with.

We have little or no control here, and have little or no ability to monitor the situation.

We have heard many stories of lost data; recently/currently we have the Optus and Medibank intrusions that many of you many have been impacted.

  • They both demonstrate the reality of our exposure. And sense of hopelessness.

I live in hope the Government will, through its review, change the rules to stop the unnecessary demands for information not required to give the service; and to set strong criminal penalties, for the collection and failure to keep it safe and indeed rules enforceable and demonstrable that the data is destroyed after a time, when a service has ceased and when the client parts company.

  • If it is medical and live threating data; then it can be placed in the Health data store, or a doctor provides a full set of the history data to the client.

So what can we do?

  • We can query why the data is requested.
  • We can ask why it is being stored or licenses and such are being copied and kept.
  • We can ask how long will it be kept and how it will be destroyed and we are advised it is done.
  • We can demand of our pollies that they change the requirement and make it a criminal offence to loss our data.

We have all had unreasonable demands for personal data for simple purchases. I even found that, even having Telstra account, when seeking to take up another email address I was required to front up my license; why I asked you already have me identified: no answer was given or could be given. Just a nonsense and unnecessary data gathering. How many of you have had your license or other important documents taken away and copied, 1 ,2, 3 copies.. who knows credit cards ,have they been scanned?

What should you do

With Optus and Medicare they have tried to give advice on what has been taken but they can’t be sure and from my data they are really seeing what has been put on the “dark web” and then telling me what was exposed.

  • This means that good intent and after the event sorrow, is not able to advise what we need to do.

With some of the information exposed it is clear that theft of ID is a high probability.

  • This then means we have to go through the process of renewing all the parts of an identity, license, cards bank and other ie. Medibank, Medicare, and so on(can we even remember some of them
  • Changing passwords to accounts and even emails.

All of this is time consuming and adds to the fear created.

How do you go about proving who you are when someone has accepted the ID from another person? Some fiction coverage of this scenario is very frightening as you become nobody.

Other checks you can make.

  • Using your antivirus and malware tools; Run complete scans of the device.
  • Run scans of all USB connected drives and memory sticks to ensure they are clean.
  • Open you installed apps list and check if there are any you don’t know or did not install and remove them.
  • Check out any infection that may be found and delete them, if you have trouble removing one search the internet or you security supplier’s tech help for the specific virus and how to remove it.
  • Run an offline scan to ensure you don’t have a worm or root kit that re infects on a restart.
  • You may have to do a refresh of the OS to clean it up, or use a restore image to load back an image of the computer before the infection. You may lose data created since the image was made.

Remote Storage

There are a number of services offering remote storage. These are physical locations reached by the internet where you can store your data in all its forms and your backups.

Apple has iCloud; Microsoft have One Drive; Google has Google Drive and Dropbox. They offer various amounts of free storage 2Gb, 5Gb; after that you will need to pay for larger storage capacities and that is usually a monthly charge.

Be aware of the conditions of use of these storage sites. They have many pages of privacy statements and they also “sub contract” to other sites that have another set of statements.

Advantages

  • Don’t need large drives of your own.
    • Don’t have to manage the hardware/software.
  • Availability of apps, such as Word, so you can read and create documents directly.
  • Sync files with multiple users.
    • To work together. (Usually only with paid for version).
    • To share between devices and with family etc.
  • Access your files remotely from any ware around the world (where you can gain internet access).
  • Share private photos and messages with a family group, as an alternative to Social Media.
    • This would offer a reduced exposure of wider distribution of the images and messages.
  • The online storage could be seen as safer, in times of a disk failures or theft of the computer.

Local Storage Alternative

Today with the increase in storage capacities and cost per Gb low there are a number of “Home Cloud” devices available.

  • There are a number of drives from Seagate and Western Digital that offer these devices and they come with management software.
  • They can be connected to a single computer to Network Connected (NAS) devices that allow all computer on a local network to save and retrieve data from the device.
  • The can be configured to allow remote access and sharing over the internet. That means the can be access from anywhere in the world.
  • This could offer you a self-controlled cloud for sharing with family members.
    • This keeps your data private and limited to selected users for access.
  • Your data transport can be logged by your ISP.
  • You need to set up secure configuration on the device to lock out unauthorized access and protection against viruses and malware.
    • Protection of the network, so sharing with you are not infected over the connection.

Note: the security and privacy is only as strong as the connected computers and their protection of the shared connection. It is very reliant on accredited users maintaining the sharing within the group.

If one of the users share to others then that data could be disclosed to the public at large.

Dropbox on a PC.

Download Dropbox from this link               https:/www.dropbox.com/basic

Web page opening screen.

Files is the screen you will use to see your folders and files.

You and create new and set shares

  • Folders represent a connection between shared members.
  • Each folder can be a share to a different person. Shares can only be seen by those given sharing rights.
    • In the personal version you can have only one Dropbox account so folders are the way for you to have a number of different contacts on the one account.
  • Once install it can be accessed and worked from the task bar and Windows File Explorer.
  • Click the Dropbox logo in the System Tray.
  • There you will get list of last activities and in the header bar you can click to open the web access and the file explorer folder.

In File Explorer there is a folder in the sidebar.

Click and the folders in Dropbox are shown in the right hand side.

  • In File Explorer you can directly access the Dropbox contents and add and remove content.
  • That is done by right clicking a folder to see its contents and also to paste new data.
  • When data is being added or deleted that folder will have blue circle and spinning showing it is updating, syncing.
    • When completed it will show a green circle with a tick in it indicating it is up to date.
  • You can also share a folder or a single file.
  • Right click and click on share.
  • Enter the email address of the person you want to share with.
    • Set the level of the share edit or view.
    • Click the share button at the bottom.
    • Notification that folder shared.
  • Click the share again and you will see that the new share show in the members list.
  • When you offer a share to a new person they will get an email inviting them to share.
    • If they do not have a Dropbox account they will be given a link to set up an account.
  • You can also send a file using a link that will allow someone without an account to view the file.

You can manage you Dropbox from this location opening folders and files; copy and delete them; add new documents to Dropbox and set up sharing of it.

One Drive

One drive is Microsoft’s cloud solution and works similar to Apples’ iCloud in that it syncs across all devices to allow sharing from one to the other.

It also allows for storage direct to the remote location and have the Office apps available for reading and creating documents.

You will find One Drive pre-installed in Windows and it is tied to the Microsoft ID.

This is it in the side bar in File Explorer.

Click on it and the default folders are seen in the right side pane.

You may find you will need to set it up.

Enter you email address (the one used in the Microsoft ID).

Follow the steps to set the files to be included in One Drive.

Internet Safety Tips

  • Know what your kids are doing online. Supervise your children's computer activities, just as you do their television time.
  • Never give out personal information online, such as a home phone number, address, last name, name of school, passwords, or credit card info.
  • Be cautious of online chat rooms. I allow them only with my supervision. Chat rooms are the cyber equivalent of CB radio. Users can "type" to each other in real-time, and messages are viewed by everyone in the chat room. Private chat rooms are also available. The problem is, as a famous New Yorker cartoon put it, "on the Internet no one knows you're a dog" or a child or an adult masquerading as a child.
  • Teach your children to come to you if anything ever makes them feel uncomfortable, such as inappropriate questions or an invitation to a private chat room. Do not respond to offensive email.
  • Use parental control software as appropriate. Parents routinely lock up household chemicals to protect their toddlers and the Internet can also be selectively locked. Today there are several software products to keep kids out of adult Internet sites.
  • Phishing?" the most common scenario is as follows: You open your email and suddenly an alert from your bank appears in your inbox. When you click the link in the email, you are taken to a webpage that looks, more or less, like your banks — but is actually designed to steal your information. The alert will say there is a problem with your account, and ask you to confirm your login and password. After entering your credentials on the page that appears, you are usually sent to the actual institution to enter your information a second time. By steering you to the legitimate institution, you don't immediately realize your information was stolen.
  • Phishing persuades you to take an action which gives a scammer access to your device, accounts, or personal information. By pretending to be a person or organization you trust, they can more easily infect you with malware or steal your credit card information.

Privacy

Ensure that you have worked through all settings in the OS and Apps to close down any setting that is capturing data i.e. send information about the computer and Apps so “we can build better programmes”.

  • You will find many and you need to decide to accept or deny; and do you want to give your location (potential tracking) or access to your camera or microphone.
    • You can turn of access and then turn it on while using a particular App i.e. Zoom, then turn it off when finished.

Know the Signs

  • Major businesses i.e. Banks IPS insurance etc.
  • Will never ask you to disclose your logins and ID
  • Will not “robo call” you to offer assistance (they may send you advertising).
  • Will not ask for remote assistance access to your computer.
  • Check any technicians who call at your house have company ID and if in doubt ask them to wait while you call the company to verify the person.
  • Use multi factor verification methods to secure your accounts and devices.
    • May be SMS message with code.
    • Dongle devices that provide one time use codes.
    • A company App that will provide the second verification.
    • Use of bio metric verification i.e. finger print, eye or facial recognition.
    • While someone may get your email or even your password they will be stopped with the second authentication.
  • Trust your Instincts (trust your Gut). If it look wrong then it is.
    • Too good to be true.
    • Doesn’t sound like my friend or family.
    • Don’t open suspicious emails, Pop ups, click on links or attachments including unsubscribe links.
    • Remember all the time scams exist and this may be one.
  • Be alert that scams exist. And the first way a hacker will attack is a scam seeking you details. Hacking is hard work but give them your details and they will be in your computer fast as.
    • Use a different password for your accounts. If they get you password ant it is the same for all your accounts then they have access to all you accounts.
  • Never leave your devices open always lock them to stop casual access.
  • Use strong passwords and don’t pin passwords to your monitor or a note on screen.
  • Check if you email have been compromised. https://haveibeenpwned.com/
  • Don’t forget scammers also use the phone.
    • Don’t give any personal information to a caller you don’t know.
    • I only say hello.
    • Never confirm you name or address to some stranger asking is this you or similar.
    • Ask them why they are and why are they calling.
    • Don’t engage in a conversation it only give them time to convince you they are OK.
    • You don’t have to be polite just hang up.
    • Don’t rely on the “do not call” service it is only for Australian numbers and charities are exempt.
  • What if you think you have given details to a scammer?
    • Contact you bank(s) or other organisation you have accounts with.
    • Contact IDCARE 1300 432 273 in Australia. Especially if you think you have given access to your computer.
  • Report it to Scam Watch. scamwatch.gov.au www.scamwatch.gov.au/report-a-scam
  • Online Safety for Seniors safety.gov.au/seniors