Tech committee presentation november
-
Upload
ken-tucker -
Category
Education
-
view
175 -
download
5
description
Transcript of Tech committee presentation november
![Page 1: Tech committee presentation november](https://reader033.fdocuments.us/reader033/viewer/2022052410/5552fbb4b4c90584028b5270/html5/thumbnails/1.jpg)
Tech Toys
November 21, 2013
![Page 2: Tech committee presentation november](https://reader033.fdocuments.us/reader033/viewer/2022052410/5552fbb4b4c90584028b5270/html5/thumbnails/2.jpg)
The purpose of this meeting is to inform and introduce
technology to Chamber members, not necessarily to give a complete education on the topics discussed.
Some of the technologies discussed are quite often available through Chamber member companies, including several of the volunteers in the subcommittee. Other topics are presented as classes by the Chambers.
If you would like to discuss any of these topics more in-depth, please contact one of the subcommittee members after the meeting and we’ll get you in touch with the best contact for your interest.
Mission
![Page 3: Tech committee presentation november](https://reader033.fdocuments.us/reader033/viewer/2022052410/5552fbb4b4c90584028b5270/html5/thumbnails/3.jpg)
Sub-Committee
Chamber Member Companies working together to bring you the information on the technological topics that interest you and can benefit your business!
Co-Chairman
Ken Tucker, Changescape Web
Mark Peimann, EPC Computers
Andy Kastrup, ProTronics Technologies, Inc.
Art & Candy Zemon, Hen’s Teeth Network
Beth Richter, ProTronics Technologies, Inc.
Don & David Weir, Managed Computer Services
Paul Barthel, Minuteman Press
Randy Downs, Independent Consultant
![Page 4: Tech committee presentation november](https://reader033.fdocuments.us/reader033/viewer/2022052410/5552fbb4b4c90584028b5270/html5/thumbnails/4.jpg)
Facebook Events Check-in facebook.com/STCCTechComm
![Page 5: Tech committee presentation november](https://reader033.fdocuments.us/reader033/viewer/2022052410/5552fbb4b4c90584028b5270/html5/thumbnails/5.jpg)
iPads
![Page 6: Tech committee presentation november](https://reader033.fdocuments.us/reader033/viewer/2022052410/5552fbb4b4c90584028b5270/html5/thumbnails/6.jpg)
iPad Air
It’s just 7.5 millimeters thin and weighs just one pound.
From $499
![Page 7: Tech committee presentation november](https://reader033.fdocuments.us/reader033/viewer/2022052410/5552fbb4b4c90584028b5270/html5/thumbnails/7.jpg)
iPad Air We want everyone to have the best possible experience with the products we
make. That’s why iPhoto, iMovie, GarageBand, Pages, Numbers, and Keynote
are now free with every Mac and iOS device.
![Page 8: Tech committee presentation november](https://reader033.fdocuments.us/reader033/viewer/2022052410/5552fbb4b4c90584028b5270/html5/thumbnails/8.jpg)
Google Nexus 7
Nexus 7 Powerful, portable and made for what matters to you. Now thinner, lighter, and faster — Nexus 7 brings you the perfect mix of power
and portability and features a sharp 7” screen. MEMORY
Nexus 7
$349
![Page 9: Tech committee presentation november](https://reader033.fdocuments.us/reader033/viewer/2022052410/5552fbb4b4c90584028b5270/html5/thumbnails/9.jpg)
Dell XPS 10 XPS 10 (XPS10-3636BLK) at a glance... Processor: Dell XPS 10 Tablet with Qualcomm® Snapdragon™ S3 1.5GHz DC processor and 64GB Flash Storage Display: 10.1" High Definition (1366x768) IPS with Gorilla Glass Operating system: Windows RT [Win 8 edition for ARM] Memory (RAM): 2GB LP-DDR2 Storage (hard drive): 64GB eMMc Optical drive: No Optical Drive Audio: Stereo Speakers Preinstalled software: Microsoft® Defender (included with Win 8 OS), Microsoft® Office Home & Student 2013 RT
![Page 10: Tech committee presentation november](https://reader033.fdocuments.us/reader033/viewer/2022052410/5552fbb4b4c90584028b5270/html5/thumbnails/10.jpg)
Microsoft Surface
![Page 11: Tech committee presentation november](https://reader033.fdocuments.us/reader033/viewer/2022052410/5552fbb4b4c90584028b5270/html5/thumbnails/11.jpg)
Microsoft Surface Pro 2 “One Device for Everything in Life”
Obviously trying to appeal more to the business user
Now really highlighting the fact that this can be your only
device
From desktop to laptop to tablet
Accessories highlight this:
Docking Station (for the Pro models) – adds 4 USB ports,
Ethernet, audio, mini display port
Type Cover 2 – backlit keys
Power Cover – extends battery life
![Page 12: Tech committee presentation november](https://reader033.fdocuments.us/reader033/viewer/2022052410/5552fbb4b4c90584028b5270/html5/thumbnails/12.jpg)
Google Chromecast The cheap & easy way to bring online video & music to your TV
HBO Go – added this morning
Hulu Plus
Pandora
Netflix
YouTube
Google Play TV, Music & Movies
Chrome tabs (with the Chromecast Extension on your Chrome browser)
$35
![Page 13: Tech committee presentation november](https://reader033.fdocuments.us/reader033/viewer/2022052410/5552fbb4b4c90584028b5270/html5/thumbnails/13.jpg)
Neat Scanners Neat Connect $499.95
Cloud Based (No computer needed)
Neat Desk $ 399.95 Desktop ADF scanner with unique paper input tray
Faster scanning
Proprietary industrial design
Neat Receipts $ 179.95 All new proprietary industrial design and software
Automatically extracts key information from scanned
receipts; can export to Excel, Quickbooks, TurboTax,
and more
Scans are IRS-accepted digital copies, making tax
preparation a snap
USB interface also provides power so no AC adapter
needed
Highly portable
Software is the draw here
![Page 14: Tech committee presentation november](https://reader033.fdocuments.us/reader033/viewer/2022052410/5552fbb4b4c90584028b5270/html5/thumbnails/14.jpg)
Fujitsu ScanSnap
Price: $295
![Page 15: Tech committee presentation november](https://reader033.fdocuments.us/reader033/viewer/2022052410/5552fbb4b4c90584028b5270/html5/thumbnails/15.jpg)
Fujitsu ScanSnap
![Page 16: Tech committee presentation november](https://reader033.fdocuments.us/reader033/viewer/2022052410/5552fbb4b4c90584028b5270/html5/thumbnails/16.jpg)
- Ransomware/encryption Trojan virus.
Unlike other ransomware such as the FBI
virus, this virus does actual damage.
Infection occurs (typically through an
email attachment or link in an email),
encryption starts in the background while
you continue to work, then after the
damage is done, you get a pop-up similar
to the picture on the right
This is a game-changer virus and it is
ever-evolving
Your BEST defense is to be smart!!!
Quick Tips:
Don’t click on attachments unless you
know what it is & who it came from
Don’t click on links in emails – unless you
know it is valid!! Do a mouseover!!
TechTip NASTY NEW VIRUS ---
CryptoLocker
REVIEW OUR SAFE COMPUTING TIPS FROM OUR MAY TECH COMM!!
![Page 17: Tech committee presentation november](https://reader033.fdocuments.us/reader033/viewer/2022052410/5552fbb4b4c90584028b5270/html5/thumbnails/17.jpg)
November 21, 2013
Presented by:
Tech Toys
Please fill out your survey & drop it in the box before you leave
Art & Candy
Zemon
Mark Peimann Ken Tucker Andy Kastrup
Beth Richter
Paul Barthel Randy Downs Independent
Consultant
Don & David Weir
![Page 18: Tech committee presentation november](https://reader033.fdocuments.us/reader033/viewer/2022052410/5552fbb4b4c90584028b5270/html5/thumbnails/18.jpg)
Safer Computing
May 16, 2013
![Page 19: Tech committee presentation november](https://reader033.fdocuments.us/reader033/viewer/2022052410/5552fbb4b4c90584028b5270/html5/thumbnails/19.jpg)
What is malware? Malware: Is malicious software that’s specifically
designed to gain access or damage a computer
without the knowledge of the owner
Includes:
viruses
worms
trojan horses
spyware
dishonest adware
crimeware
scareware
ransomware
most rootkits
other malicious and
unwanted software
![Page 20: Tech committee presentation november](https://reader033.fdocuments.us/reader033/viewer/2022052410/5552fbb4b4c90584028b5270/html5/thumbnails/20.jpg)
What is malware? #1 goal: REPRODUCTION / PROLIFERATION
Causing damage to computer systems, destroying
data, or stealing sensitive information are ALL
Secondary objectives, HOWEVER,
much of malware today is created for profit
through forced advertising (adware), stealing sensitive
information (spyware), spreading email spam or lewd
photography (zombie computers), or to extort money
(ransomware)
originally created as experiments and pranks, but
eventually led to vandalism and destruction of targeted
machines
![Page 21: Tech committee presentation november](https://reader033.fdocuments.us/reader033/viewer/2022052410/5552fbb4b4c90584028b5270/html5/thumbnails/21.jpg)
Anti-malware any program that combats malware, whether it’s
real-time protection or detection and removal of
existing malware.
Anti-virus, anti-spyware applications and malware
scanners are examples of anti-malware.
Like a “flu-shot” for your computer – it doesn’t
guarantee you won’t get infected
![Page 22: Tech committee presentation november](https://reader033.fdocuments.us/reader033/viewer/2022052410/5552fbb4b4c90584028b5270/html5/thumbnails/22.jpg)
Common Methods of Infection Email
Attachments: executables, .zip files, videos
Misdirecting Links: phishing, spam
Password hacks (brute-force attacks)
Web
Hi-jacking
Social networking websites
Banner ads
Unreputable web sites
Pop-ups
USB drives – pre-infected
![Page 23: Tech committee presentation november](https://reader033.fdocuments.us/reader033/viewer/2022052410/5552fbb4b4c90584028b5270/html5/thumbnails/23.jpg)
Examples – Spoofing Several things about this one, but notice the address is citybank, not citibank
![Page 24: Tech committee presentation november](https://reader033.fdocuments.us/reader033/viewer/2022052410/5552fbb4b4c90584028b5270/html5/thumbnails/24.jpg)
Examples - FAKE I don’t know of a single law enforcement agency that will send you an email
about legitimate business. Not to mention, it wouldn’t come from a gmail or
yahoo account.
![Page 25: Tech committee presentation november](https://reader033.fdocuments.us/reader033/viewer/2022052410/5552fbb4b4c90584028b5270/html5/thumbnails/25.jpg)
Examples “Mouseover” To do a “mouseover”, hover your mouse cursor over the link
it will show where the link is actually taking you! Notice they don’t match!!
![Page 26: Tech committee presentation november](https://reader033.fdocuments.us/reader033/viewer/2022052410/5552fbb4b4c90584028b5270/html5/thumbnails/26.jpg)
Common Viruses Trojans: conceals itself inside software that seems
legitimate – “trojan horse” from Greek Mythology
Cyber-crooks often use viruses, trojans and worms
together. They design a trojan that ‘drops’ a virus or
worm onto the victim’s computer thus initiating a brand
new infection. This virus or worm is usually called the
‘payload’ of the trojan. Trojans can also drop spyware.
These are often referred to as a “Virus Cocktail”
Rogue Antivirus Software viruses
(scareware/ransomware)
FBI virus (ransomware/scareware)
![Page 27: Tech committee presentation november](https://reader033.fdocuments.us/reader033/viewer/2022052410/5552fbb4b4c90584028b5270/html5/thumbnails/27.jpg)
Examples
![Page 28: Tech committee presentation november](https://reader033.fdocuments.us/reader033/viewer/2022052410/5552fbb4b4c90584028b5270/html5/thumbnails/28.jpg)
Examples
![Page 29: Tech committee presentation november](https://reader033.fdocuments.us/reader033/viewer/2022052410/5552fbb4b4c90584028b5270/html5/thumbnails/29.jpg)
Examples
![Page 30: Tech committee presentation november](https://reader033.fdocuments.us/reader033/viewer/2022052410/5552fbb4b4c90584028b5270/html5/thumbnails/30.jpg)
Examples
![Page 31: Tech committee presentation november](https://reader033.fdocuments.us/reader033/viewer/2022052410/5552fbb4b4c90584028b5270/html5/thumbnails/31.jpg)
Examples
![Page 32: Tech committee presentation november](https://reader033.fdocuments.us/reader033/viewer/2022052410/5552fbb4b4c90584028b5270/html5/thumbnails/32.jpg)
![Page 33: Tech committee presentation november](https://reader033.fdocuments.us/reader033/viewer/2022052410/5552fbb4b4c90584028b5270/html5/thumbnails/33.jpg)
Examples
![Page 34: Tech committee presentation november](https://reader033.fdocuments.us/reader033/viewer/2022052410/5552fbb4b4c90584028b5270/html5/thumbnails/34.jpg)
Examples
![Page 35: Tech committee presentation november](https://reader033.fdocuments.us/reader033/viewer/2022052410/5552fbb4b4c90584028b5270/html5/thumbnails/35.jpg)
Examples
![Page 36: Tech committee presentation november](https://reader033.fdocuments.us/reader033/viewer/2022052410/5552fbb4b4c90584028b5270/html5/thumbnails/36.jpg)
Examples
![Page 37: Tech committee presentation november](https://reader033.fdocuments.us/reader033/viewer/2022052410/5552fbb4b4c90584028b5270/html5/thumbnails/37.jpg)
Tips & Tricks / Best Practice You’ve already taken the 1st step: EDUCATION
Know what your anti-malware program looks like &
Keep it updated
Install program updates as needed & often
“Patch Tuesday” or “zero hour” viruses
“mouse-over” links before clicking
Don’t use the same login & password for all
accounts
Disable plug-ins
![Page 38: Tech committee presentation november](https://reader033.fdocuments.us/reader033/viewer/2022052410/5552fbb4b4c90584028b5270/html5/thumbnails/38.jpg)
More Info Why is it “always” Windows?
It is not – Macs are not impervious to viruses
It’s a matter of numbers
Smartphones can get them too
Infection is 5.5 times more likely with no anti-malware
¼ of all PCs have no anti-malware
Ransomware explained: http://www.youtube.com/watch?v=-qR3D-Jx6FQ
![Page 39: Tech committee presentation november](https://reader033.fdocuments.us/reader033/viewer/2022052410/5552fbb4b4c90584028b5270/html5/thumbnails/39.jpg)
What to do after infection If possible, run a scan with your anti-malware
software
Some malware disables this ability
If the computer is “locked down” or won’t let you run
a scan…shut the computer down & call your IT
Professional for help!
The longer you ignore it, or leave the machine on, the
worse the infection can get (depends on infection)
“Virus cocktails”
![Page 40: Tech committee presentation november](https://reader033.fdocuments.us/reader033/viewer/2022052410/5552fbb4b4c90584028b5270/html5/thumbnails/40.jpg)
Tech Tip: Backup!!!
Seriously though, we will talk about Backups more in depth in January!!