Social Medias and its Influence: Adventure with IT-Security Tweeps on Twitter

Hi,

chat iconFirst of all let me tell you that on the beginning when I joined Twitter I really wasn’t a friend of it as I didn’t see its advantages. I am an ICT Course Instructor and also an author who has written a lot of articles, blogs, tutorials and courses who were read +/- 4 million times in total:

I am also an TOP10 author on Google Knol with more than 1,3 million page views…
.
Top ranking Google Knol English
Link: http://knol.google.com/k/gust-mees-s-knols# (Screenshot is from October 2011) and link doesn’t work anymore as Google Knol discontinued its services on May 1, 2012!
.
So for making best SEO (Search Engine Optimization) I used the Social Medias and also curation to do this, so using also Twitter. It’s only when I started to make curation about Education related articles on Scoop.it, here my curations Gust MEES on Scoop.it, that I got a lot of Retweets (RTs) from teachers and educators and that I build me up a strong social network and a PLN (Personal Learning Network) which were accepting later on also my curations and FREE courses about IT-Security (EN + FR).
.
It started then to make fun using Twitter as I learned from others and others learned from me. As a Life Long Learner Twitter became my main resource to find best articles about Education related stuff and other interesting topics to me, such as mainly IT-Security. One needs only to know the right Hashtag to find relevant stuff for what one is looking…
.
Related links:
.
I tweeted then also a lot about IT-Security and Cyber-Security on Twitter and I encountered something very interesting, here is the story about it…
.
As I am writing in English, German and French so I decided one day to create a new tutorial about IT-Security in French, a FAQ-List http://gustmeesfr.wordpress.com/2012/02/05/securite-pc-et-internetfaqs/ about Frequently Asked Questions for IT-Security and when it was published, so I tweeted it on Twitter and I addressed it also to one of the responsible persons from one of our National Security Chapters (in Luxembourg) on Twitter!
.

A True Story

sharing iconHere ALL begins now:
.

My tweet: Feb 09, 2012: FAQ’s (FR) http://vsb.li/8BFqNe

I got a Reply on Twitter  @knolinfos well done, although some classics are missing like: what is the best antivirus software? 😉
As there is no one who can give that answer as its dependent also from customers choice, so I sent back an other tweet:
.
#joke What’s best car in the world? LOL 😉 This was a friendly message to open a new discussion… (BTW: I know that person…)
But then suddenly something happens what none of us expected (Looks like that both of us forgot that on Internet everybody can see and follow our conversations…); BTW: on Internet we are all “Sender” and “Receiver“, Internet is bi-directional!
.
We got a Tweet (an answer) back from an Antivirus Manufacturer, from Webroot.
.
 .
February 09, 2012: @knolinfos What IS the best antivirus software? Do we hear “Webroot?” 🙂
 .
February 09, 2012: I replied than that Webroot is already in my #curation list on #scoopit of  best IT-Security Tools here http://www.scoop.it/t/ict-security-tools?tag=Webroot and that would be worth a FREE licence of their product (provoking a bit…).
 .
February 10, 2012: Webroot Rescue ‏ @WebrootRescue @knolinfos We are so honored to be included in your list! Please let us see what we can do and we’ll be in touch. 🙂
.
February 18, 2012: Webroot Rescue ‏ @WebrootRescue @knolinfos Greetings! Would like to put a care package together for you & your students 🙂 Need some info do so –mind DM’ing us on here? 🙂
.
I contacted Webroot on Twitter over DM (Direct Message/Private Message) and provided them my email address.
.
Feb 24, 2012: Webroot Rescue ‏ @WebrootRescue @knolinfos We apologize for the delay! Expect a buzz in your inbox ASAP 🙂
.
Oh Wonder! I got an email proposing me FREE licences of an antivirus for my class! So I got a proposition for 40 licences (Key Codes) for a one year FREE use of  Webroot! ===> The key codes are for one year of Webroot SecureAnywhere Antivirus. <=== You will imagine how happy I was on that moment, 40 licences worth 1,600 EUROS = 2,112 $US (currency value at March 22, 2012)! WOW!
.
What followed later I will not publish it here as it was arranged over DM (Direct Messages), #privacy needs to get protected!
..

On March 22, 2012 I got contacted by email that they found already an institution who needs help and waiting now for an appointment…
.
===> I will try to make a completely report of any visited institution… with photos (if allowed…) and publish it also on our local press!<===
.
This could become a story, when well managed from the 3 actors could benefit to all of us and also for the readers of this blog, a win-win situation in the name of  a better Internet, a secure and safe Internet!
.
While visiting these chosen institutions I will give them practical advice on How-To stay secure and on How-To become a responsible eCitizen (Digital Citizen) while being assisted also from our National Security Chapter…
.
.
March 26, 2012: Webroot Rescue ‏ @WebrootRescueSocial Media & it’s Influence“-An in-depth look at our Twitter relationship w/ @knolinfos -A GREAT read! http://bit.ly/GRkX6l
.

First intervention on Wednesday June 6, 2012

I had an appointment where I gave free (volunteer base) course about IT-Security and where I showed two responsible ladies from 10:00 am to 00:30 pm about how the practical course (workshop) on June 14, 2012 will get hold. There was also one of the free licences from Webroot installed. The ladies thought in beginning that the foreseen course of June 14, 2012 would perhaps become too theoretical; that’s why I made an appointment a week before to convince them about the practice, what they understood also and accepted later. Even that I got an email thanking me for my professionalism and my engagement. The main responsible lady even tried my advice out at home the same evening and didn’t have any problems to install the suggested programs alone… A success…
Here the link of the proposed FREE software to install (in French):  http://gustmeesfr.wordpress.com/2012/05/31/securite-internet-guide-pratique/. Next intervention with 7 more learners on the same place on Thursday June 14, 2012.
.
foyer-sichem-14.06.2012
Thursday June 14, 2012
I was getting introduced by BEESECURE where I am member of the “Advisory Board“. The practical course was given in a house for women and children in distress http://www.fmpo.lu/ and I got the authorization to take also some photos as shown on left side… All the ladies were about 20 years old…
The ladies had netbooks, laptops and also some one an iPhone and one an Android smartphone.
Concerning the iPhone: I helped to install a secure QR-Reader App from Symantec, the “Norton Snap QR-Code Reader“. The young lady didn’t know anything about the QR-Codes, so I explained a bit about it and I showed her how it is working with the QR-Code of the course page. She was impressed by seeing that without typing one letter one could access an Internet web site in less than 2 seconds… Now she can at least scan QR-Codes on a safe way.
 We installed together 6 free licences from Webroot and scanned also the computers where there were 3 computers infected! I didn’t wonder about the infections as all of them use filesharing P2P to download music, as most young people do. They don’t know the dangers of P2P (Peer to Peer) file-sharing, so I will prepare soon a course about How-To download music free and legal from Internet radios…
 .
Related links:
.
Stay tuned, will get updated and continued…
.
.

The actors on Twitter from this “adventure”

.community-jpeg
  • Webroot: Twitter Name @WebrootRescue  ===> Follow them on Twitter, very good Tweets (love that…) <===
    • As I had to make some research on old Tweets to find back the original Tweets by date, so I had time also to read their Tweets and I must say that I was impressed of the #quality!
  • Me: Twitter Name Knolinfos
  • Doesn’t want to get mentioned 😉

More info about Luxembourg (Europe):
.
BTW: I am actually unemployed due to health problems http://scalpelart.wordpress.com/ + http://lcgb.lu/fr/articles/show/id/1281 and looking for a new job in Luxembourg (Europe), my country, or as teleworker from an international company by working on Internet at home… With 57 years old not that easy to find a new job 😦 My mentioned courses here are made on a volunteer base as I want to spend my time on a constructive way in the “unemployed time”…
.
.

My Google+ Profile: https://plus.google.com/u/0/102227403703855230445/about

.

Gust MEESL’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES (Cyberworld Awareness and Security Enhancement Structure)....


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

.

Advertisements

Beginners IT-Security Guide

chat iconIn 21st Century we need not ONLY talking about Internet-Safety, Online-Safety and IT-Security, but we need to secure our computers and ANY other related device connecting to Internet, such as also our smartphones! I will present you now a tutorial on How-To create best protection (as on March 2012) for your computer and this with mostly FREE tools and FREE Online Services… Also will I provide you a worksheet which helps you planning your weekly tasks!

.

Weekly Tasks? YES, you need to work a bit, but don’t worry, most tasks are automated and don’t need a lot of intervention! But they are necessary! It’s ONLY the first time when you have to install some programs and to read this tutorial that you will need to invest time!

===> But investing once time for saving time later and avoiding trouble is definitely worth to do 😉 <===

.


What you should know: Computer Viruses and Threats

.

Check the video for better understanding, click image… This video explains the how computer viruses, worms and trojans work and what you can do to protect yourself.

.

Computer Viruses and Threats from CommonCraft

Click image above to access video

.

===> For readers who don’t want to read (trusting me and only want to install the programs which they didn’t know yet…), but ONLY want to install the proposed programs: go to the bottom of this tutorial and follow the download links! <===

So here we go…

First a reminder and the most important to know to have best protection on your computer:

 programmer manWhat you MUST KNOW!

                      • Automatic Windows Update must be enabled
                      • Third Party Programs are responsible for 78% of vulnerabilities!!! What are Third Party Applications (Programs)? Knowing that third party programs are vulnerable also, we must update them alsoUse SECUNIA PSI to update automatically third party programs https://secunia.com/
                      • Browsers (ALL) need to get updated!
  • The weakest link in the Security Chain is the human! If you don’t respect certain advice you will get tricked by the Cyber-Criminals!

===> NOBODY is perfect! A security by 100% doesn’t exist! <===

.

.

 

So, after knowing now what’s most important for protecting your computer and helping also your Government for a better National Cyber-Security we will start with our workshop on How-To protect our computer at its best (for private users…)

Related links:

First of all, I suggest to you to check online your computer’s security to get convinced yourselves about the need to secure your computer, here we go…

Most of this advice is for Windows PC’s, but some are also necessary for Mac and Linux computers!


1. Is your Browser up-to-date?

This is very easy to check online, without installation of any program! Use Qualys BrowserCheck who will perform a security analysis of your browser and its plugins to identify any security issues.

QUALYS Browser Check Results

.

===> Here is the link: Qualys Browser Check <===

`


2. Is your Operating System switched to automatic updates?

Programmer man

This is the most important for any OS (Operating system), the updates!!! They MUST get installed!!!

===> Visually: it’s like of the manufacturer of a car has detected technical problems who are necessary to get fixed for your security! The car will then go the the garage and problems will get fixed for FREE! <===

Read instructions on How-To:

 

 3. Is your antivirus program up-to-date?

Surprised? I am convinced that most of you are wondering and surprise about the results! So now you know that it is about time to get better protected, follow these steps now please:

Run F-Secure HealthCheck http://www.f-secure.com/en/web/home_global/protection/free-online-tools/free-online-tools

.

F-Secure HealthCheck


4. Install an “Internet Security Suite”!

Instead of working with a FREE antivirus, use aInternet Security Suite“! Why?

Why IT-Security? Gust MEES's cartoon courses about IT-Security

.

Links to learn more:


5. Update your Third Party Applications!

Third Party Programs are responsible for 78% of vulnerabilities!!! What are Third Party Applications (Programs)? Knowing that third party programs are vulnerable also, we must update them alsoUse SECUNIA PSI to update automatically third party programs, install it ===> https://secunia.com/ <===

.

.


6. Organize a Family Weekly-Security-Day

My suggestion: to make sure that anybody’s computer is secure at home I suggest that you introduce a “Family Weekly-Security-Day“, where any week one member of your family will get chosen as the  “responsible” for the week and that “responsible” will remind you to respect the weekly task and controls also that the task was achieved! I will provide you with a sheet from Google Docs which you can use for it…

===> Play as a team in the family to make sure that everybody respects the weekly Security-Day! Any week someone else is responsible to remember the whole team (family) for the Weekly-Security-Day-Task! <===

Worksheets on Google Docs: 

You can even imagine some penalties such as e.g. making the dish-wash for 2 days, or similar, LOL 😉

.

===> Motivation: don’t let us forget the positive side and motivate members of family to do that unusual task by giving them some special bonus points when well done that task! Those bonus points could result in: <===

.

  • Penalties could get reset for a certain time (up to you to make the rules…)
  • Bonus points will get collected and by reaching a certain score will result by paying out some money (up to you to say how much…)
  • Your own ideas for motivating the team to do the tasks…
.
 

7. Secure Surfing Behavior

McAfee SiteAdvisor™ software

McAfee SiteAdvisor™ software

McAfee SiteAdvisor™, software is an award-winning, free browser plug-in that gives safety advice about Websites before you click on a risky site. These site ratings are based on tests conducted by McAfee using an army of computers that look for all kinds of threats (detailed below). The result is a guide to Web safety. The SiteAdvisor software is free, easy to install and even easier to use. And it doesn’t collect any personally identifiable information.

Other similar products:


8. Forewarned is Forearmed

In a world where ICT is getting more and more important it is very important to follow the Information (“I” in ICT) and also to share this Information over the Social Medias (“C” in ICT), communicating with your friends in real life and in virtual life (Internet)!


Internet Monitor (Luxembourg/Europe)

↑ Grab this Headline Animator

Recommended programs:


9. Change your Router’s Pass Word!

help-books-aj.svgajash01-1

Cybercriminals may also use your Router (without that you know it…) when you haven’t changed the original settings! Text from Internet / Network Security

.

===> The first step in securing your wireless network is the same as the first step for just about everything else in computers and computer networking — always change the defaults. Any attacker can find out what the default username and password is for a given program or device in just a few minutes. <===


10. Chose strong PassWords

.
No need to explain more, just watch the video below, it says ALL ;-)
.
 
.
.

.
 
Check out also this sketch below who explains in a humorous way about PassWords 🙂
.
.
.
.
.

.

11. Be Aware of Public Wi-Fi!!!

programmer man
 
 
Protect yourself on public Wi-Fi: ALL your data could get seen when not taken the right precautions on a public Wi-Fi Access…
 
.
 
 
First of all, check out to know more about how easy it is to get information about your online communications (passwords and private information…) as also on how easy it is to hijack your accounts while using a public Wi-Fi!!! Follow this BBC investigation and be surprised Why personal data is at risk on unsecured public Wi-Fi!!!
.
.
 
 
.
.
 
 
 
 
.
.
 
 
 
Lessons to learn: coming soon, stay tuned…
 
As learned already now from the shown videos above, you will certainly know how to protect you against it? OK, what should we know???
 
– A public, non secured Wi-Fi Access can intercept all of our internet traffic…
 
– With special programs (even Freeware programs like FireSheep) it is possible that a third person could break in our PC and MAC and steal our PWs (passwords) and log-ins and also so sending messages with our identity!!! Not really funny isn’t???
.
firesheep sample
 
 
.
Read here the full article who explains very well:
.
So how can we protect us again those threats (MAC and Windows and Linux)???
 
By using a public Wi-Fi Access, called also HotSpot it is recommended to use a private network (VPN) between your laptop or iPhone and our Internet gateway. 
 
Such a good and FREE and also for MAC users FREE program is “Hotspot Shield”:
 

Get behind the SHIELD! 100% FREE!

  • Secure your web session, data, online shopping, and personal information online with HTTPS encryption.
  • Protect yourself from identity theft online.
  • Hide your IP address for your privacy online.
  • Access all content privately without censorship; bypass firewalls.
  • Protect yourself from snoopers at Wi-Fi hotspots, hotels, airports, corporate offices.

Works on wireless and wired connections alike. Provides Unlimited Bandwidth.
Works on the PC and the Mac, including new operating systems (Windows 7 and Snow Leopard)

Hotspot Shield protects your entire web surfing session; securing your connection at both your home Internet network & Public Internet networks (both wired and wireless). Hotspot Shield protects your identity by ensuring that all web transactions (shopping, filling out forms, downloads) are secured through HTTPS. Hotspot Shield also makes you private online making your identity invisible to third party websites and ISP’s. Unless you choose to sign into a certain site, you will be anonymous for your entire web session with Hotspot Shield. We love the web because of the freedom that it creates to explore, organize, and communicate. Hotspot Shield enables access to all information online, providing freedom to access all web content freely and securely. Secure your entire web session and ensure your privacy online; your passwords, credit card numbers, and all of your data is secured with Hotspot Shield. Standard antivirus software protects your computer, but not your web activities.

Here is the address to download it http://hotspotshield.com/.

.
.
.
.
.
Check out ALSO the FREEWARE “BlakSheep” who shows you when someone is using “FireSheep“! Knowing your enemy is every time good 😉
.
.
 
And here is the download link:
.
 
 

12. Be aware of what YOU publish online

.

This video reveals the magic behind the magic, making people aware of the fact that their entire life can be found online.

.

.


Don’t want to read all the above text and start the practice?

.

gears icon Download Links:

      • SECUNIA PSI ===> Automatic check and download of Third Party Applications
      • WOT ===> Web Of Trust helps you identify suspect web sites
      • McAfee Site Advisor ===> helps you identify suspect web sites

Free Online Checks:

===> Reminder: NOBODY is perfect! A security by 100% doesn’t exist! <===

 

..

This below is the situation actually, now you know where it is necessary to apply above mentioned advice

.

IKARUS Comic_MalwareEvolution

Click image to access IKARUS Security Software

.


.

.
 

blueman20401Recommendations from the BIG Players on IT-Security, Cybersecurity, Internet-Safety, privacy, Online-Safety:

.

as on Friday May 18, 2012: SaferOnlineTeam@MS @Safer_Online
.
 
Follow Friday – Follow @knolinfos to help stay up to day on Internet security and safety tips. ===> That’s my Twitter account

.

PS: SaferOnlineTeam@MS @Safer_Online is Microsoft’s official Twitter account for privacy and online safety guidance and information.

Redmond, WA, USA http://www.microsoft.com/security

 

.

Gust MEES

L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

%d bloggers like this: