Online and Safety Protect Your - and Yourself!

STATE CREDIT UNION www.scscu.com TABLE OF Fraud comes in many shapes and sizes, CONTENTS but the outcome is simple: the loss of both money and time. PROTECT PROTECT YOUR COMPUTER YOURSELF That’s why protecting 3 11 your computer and Antivirus Software Email Safety your privacy is so 5 13 important. Take action Anti- Software Online Identity Protection and get a peace of 7 15 mind. Protection Offline Identity Protection 9 17 Software Updates Take Away Tips PROTECT YOUR COMPUTER

Fraud operators are constantly developing new viruses, spyware, and online fraud Antivirus Software schemes; that’s not going to change. The good news is that most damage can be avoided Antivirus software detects and responds to various types of , including viruses, worms, and other with a combination of Antivirus and Anti-Spyware software, firewalls, and education. programs designed to damage or disrupt a computer. “2007 Identity Fraud Survey Report,” Javelin Strategy & Research, February 2007

About Malware Antivirus software typically works in two ways... Malware (malicious software). A Like a virus, a worm can make copies Removes Known Malware Prevents New Malware general term used to describe any of itself, but it does not require a Antivirus software examines your Antivirus software looks for ? program designed to cause harm. person to send it along to other computer looking for known viruses suspicious computer processing Some common types of malware . A worm spreads rapidly using a library of definitions and behavior to prevent threats that are include viruses, worms, and trojans. across a network without having to cures to remove threats. Antivirus either new variants of existing threats WHY attach itself to another program. software will automatically update or brand new threats altogether. HOW Virus. A malicious program that its library to stay current as new Antivirus software prevents attaches itself to and “infects” other Since worms are so quick and threats and protections emerge. suspicious code from executing and software applications and files, pervasive through a network, they blocks access to infected files. disrupting computer operations. quickly absorb resources and Viruses often carry a “,” can bring not just one computer How do I get Antivirus How long does Antivirus which is an executable script down, but thousands, potentially software protection? software last? designed to damage, delete, or steal shutting down an entire network. information from a computer. Antivirus software can be purchased at Most Antivirus vendors sell a Trojan. A malicious program disguised an electronics store, online or offline. perpetual license that requires annual CHECKLIST A virus is a self-replicating program, or hidden within another program renewal in order to continue receiving How to Protect Your Computer meaning it copies itself. Typically that appears to be safe (much Some Antivirus vendors include: updates that protect against the a virus only infects a computer like the myth of the ). • Security Essentials latest threats. The annual renewal Install Antivirus and begins replicating when When a trojan is executed, it allows software on www.microsoft.com fee is often less than the initial your computer. the user executes a program attackers to gain unauthorized access • Symantec www.symantec.com purchase of the Antivirus software. Keep your or opens an infected file. to the computer in order to steal Antivirus • McAfee www..com information and cause harm. Trojans How do I update my software license Viruses spread from computer current. commonly spread through email • www.trendmicro.com Antivirus software? to computer only when users Only open email attachments and downloads. and attachments unknowingly share infected files. How do I know if I already Antivirus software automatically from known senders. For example, viruses can spread have Antivirus software? updates itself with the latest and cure definitions and If you receive an when users send emails with Check the list of programs on your attachment from often repairs damaged content someone you do infected documents attached. computer to verify if an Antivirus automatically if it encounters not know or are software is already installed. Look not expecting, Worm. A worm is similar to a virus but malware (malicious software). do not open with an additional dangerous element. for program names that may match it; delete it. one of the Antivirus vendors above.

STATE CREDIT UNION PAGE | 4 PROTECT YOUR COMPUTER

The highest average dollar losses in a 2007 survey of identity theft victims were attributed to Anti-Spyware Software malware (viruses, worms, trojans), spyware, computer hacking and ().

Anti-Spyware software protects against another kind of malware, called spyware. “2007 Identity Fraud Survey Report ”, Javelin Strategy & Research, February 2007

About Spyware Anti-Spyware works much like Antivirus software Spyware is a type of program other malware and spread by criminals Prevents Spyware Detects and Removes Spyware that monitors a user’s computer trying to obtain passwords, user IDs, Anti-Spyware software prevents Anti-Spyware software detects ? activity, collects information account numbers, and other sensitive spyware programs from collecting and removes spyware from your about a user without their in order to commit fraud. information on your computer and computer using a library of software knowledge, and then provides that providing it to unknown parties. file definitions and cures. Most spyware finds its way onto WHY information to a third party. HOW computers via the Internet. Web Spyware can be benign (like collecting downloads and JavaScript files are Where do I get Anti-Spyware Is spyware more dangerous information in order to show the user a popular ways to transmit spyware software protection? than malware (viruses, targeted advertisement) or malicious as they can be embedded in other Anti-Spyware software can be worms, trojans)? (such as attempts to commit fraud). programs and are self-executable, purchased at an electronics Spyware collects data and shares meaning they execute without store, either online or offline. it with outside parties without your The most dangerous spyware is any assistance from the user. knowledge. It’s made more dangerous usually combined with a trojan or Some Anti-Spyware when combined with malware and software vendors include: spread by cyber criminals. That’s why CHECKLIST How to Protect • it’s important to have both Antivirus Your Computer www.malwarebytes.org and Anti-Spyware protection. Install Anti- • Microsoft www.microsoft.com Spyware Can I combine Antivirus and software on • Symantec www.symantec.com Anti-Spyware software? your computer. • McAfee www.mcafee.com Keep your Most Antivirus software vendors Anti-Spyware offer protection from spyware software license How do I know if I already have current. within their products or as a Anti-Spyware software? Read software separate purchase. Be sure to verify agreements Check the list of programs on your that Anti-Spyware protection is to understand computer to verify if Anti-Spyware exactly what included, or purchase a separate applications software is already installed on are being Anti-Spyware software package. installed on your computer. Look for program your computer. names that may match one of Only download the vendors listed above. items from trusted sources.

STATE CREDIT UNION PAGE | 6 PROTECT YOUR COMPUTER

Fraud operators are constantly developing new viruses, spyware, and online fraud Firewall Protection schemes; that’s not going to change. The good news is that most damage can be avoided Firewalls are systems that help prevent unauthorized access to and from computers. with a combination of Antivirus and Anti-Spyware software, firewalls, and education. “2007 Identity Fraud Survey Report ”, Javelin Strategy & Research, February 2007

About Firewalls How do I ensure my Firewall is working?

Firewalls help protect against with built-in software firewalls. If Where do I get a firewall? Do I need to maintain or update attacks across any network - the not already “built-in” to a computer, , Mac OS, and my firewall once it’s installed? ? Internet, your home network, and software firewalls can be loaded even Antivirus software programs Check your system to ensure even wireless networks, like at onto any user’s computer. often include firewalls. Firewalls that the firewall is not only the airport, library, or work. WHY Hardware Firewalls provide a strong can also be purchased at most installed but also turned on. HOW electronics stores. You can obtain free There are two types of firewalls: degree of protection and are often used by businesses or users with firewalls online although they offer What will happen if I Software Firewalls are popular networked computers. These physical minimal or non-existent technical don’t have a firewall? for individual home use. In fact, devices require a power source and support and documentation. Without a firewall, your system operating systems like Microsoft connect directly to a network. may be vulnerable to unauthorized Windows and Mac OS often come How do I know if I already access and attack. have a firewall? Operating systems often come Do I need a software firewall with built-in software firewalls: or a hardware firewall? CHECKLIST How to Protect Most individual home users are suited Microsoft Windows users can verify if Your Computer to use a software firewall, typically the firewall is turned on by accessing the one that is included with their Check your the Control Panel > Windows Firewall. computer operating system. Hardware to verify that your firewall Mac users can verify if the firewall firewalls are typically suited for is turned on. is turned on by accessing System businesses and networked computers. If you don’t Preferences > Sharing > Firewall. have a firewall, install one. Use a firewall in conjunction with Antivirus and Anti-Spyware software.

STATE CREDIT UNION PAGE | 8 PROTECT YOUR COMPUTER

Software Updates Software that’s not regularly updated can leave Software Updates are necessary when companies identify application errors or weaknesses in their software or your computer system vulnerable to attacks. system that require stronger security protections.

About Software Updates How do I keep my computer up to date?

Software Updates come in the software programs. These features How do I keep my software Mac OS users can check the form of software “patches” that periodically and automatically programs updated? “Software Update” settings ? replace defective sections of update the user’s computer. by accessing the System Some programs, including Microsoft software code with corrected code. Preferences > Software Update. Microsoft Windows calls this Windows and Mac OS operating All software manufacturers issue WHY feature “Auto Update.” systems, provide automatic software HOW patches either on a regular schedule updates. Keep these automatic How do I manually patch one or as defects are discovered. Mac OS calls this feature updates turned on so that your of my software programs? “Software Update.” Most software programs have Malware such as viruses, worms, computer is protected routinely. automatic update and patching and trojans can infiltrate a computer Other software programs may How do I check my computer features. The program’s “Help” menu through a software application display pop-up notices within a operating system’s automatic may also include a feature allowing that has not been . program notifying you to install update settings? you to manually “Check for Updates.” the latest software patches. Automatic Updates are included Microsoft Windows users can in most operating systems and check the “Auto Update” settings CHECKLIST by accessing the Control Panel How to Protect Your Computer > Automatic Updates. Check your automatic update settings to ensure you’re receiving updates. Check software updates that may be available in the “Help” menu or on the vendor’s website. Pay attention to pop-up messages within a program: these may be notices of available updates.

STATE CREDIT UNION PAGE | 10 PROTECT YOURSELF

Email Safety It’s never too late to evaluate your approach to email and develop good Email safety means following best practices when you send and receive email. habits to protect your privacy, identity, data, and computer.

About Email Safety Practice safe email habits.

Email commonly transports malware, Following some simple Never include sensitive information highly likely that this is a dangerous file like viruses, that can result in identity guidelines can help in email. Forged email purporting and should not be opened. In addition, ? fraud or computer damage. In addition to be from your financial institution do not open email attachments that you safeguard your to the transmission of malware, email environment. or favorite online store is a popular have file endings of “.exe,” “.pif,” or phishing also threatens email users. trick used by criminals to extract “.vbs.” These are filename extensions WHY personal information from fraud. for executable files and could cause HOW Phishing is a type of email fraud damage to your computer if opened. in which the perpetrator poses as Never open or respond to SPAM a legitimate, trustworthy business (unsolicited bulk email messages). Never give our your email address to in order to acquire personal Delete all SPAM without opening unknown websites. If you don’t know and sensitive information, like it. Responding to SPAM only the reputation of a website, don’t passwords or financial data. confirms your email address assume trust. Many websites sell to the spammer, which can email addresses or may be careless actually intensify the problem. with your personal information. CHECKLIST Never click on links within an Don’t believe the hype. Many How to Protect email. It is safer to retype the web fraudulent emails contain urgent Yourself address than to click on it from messages claiming your account will Don’t include within the body of an email. be closed if sensitive information sensitive information is not provided immediately or that in email. Don’t open attachments from important security information Never click on strangers. If you do not know needs to be updated online. links within the sender or are not expecting an email. the attachment, delete it. Be aware of bad grammar, Don’t open SPAM or attachments spelling, and design. Fraudulent from strangers. Don’t open attachments with odd emails and websites often Be suspicious filename extensions. Most computer include typos and grammar of emails asking files use filename extensions such for personal emails as well as unprofessional information. as “.doc” for Word documents or design layout and quality. Be selective “.jpg” for images. If a file has a double when providing your email extension like “heythere.doc.pif” it is address.

STATE CREDIT UNION PAGE | 12 PROTECT YOURSELF

Online Identity Protection Online identity theft is on the rise, Online Identity Protection means following best practices to help you browse the Internet safely and securely. nearly doubling from 8.3% in 2006 to 16% in early 2007.

About Online Identity Protection Practice safe habits to protect your identity online.

Online security includes following best Following simple guidelines can Be selective about where you surf. Don’t choose “Remember My practices while you’re banking online, help protect your identity and Not all websites are benign. Sites that Password.” You should never ? shopping, or just surfing the Internet. are engaged in illegal or questionable use the “remember password” allow you to conduct business online with confidence. activities often host damaging feature for or software and make users susceptible transactional websites. WHY to aggressive computer attacks. HOW Work on a computer you trust. Use a secure browser. Always use Firewalls, Antivirus, and Anti- secure web pages when you’re Spyware software will help conducting transactions online. protect your computer and Look for “https://” at the beginning your personal information. of the URL and/or a green par or Don’t use public computers padlock in the address area to for sensitive transactions. verify the security of the site. Since you cannot validate the CHECKLIST Select a strong password. The computer’s integrity, there’s a How to Protect best password is an undetectable higher risk of fraud when you log Yourself one. Never use birth dates, first in from a public computer. Update and names, pet names, addresses, strengthen the Log off, disconnect, and shut down. security of your phone numbers, or Social Security passwords. Always sign off from online banking or numbers as your password. Instead, Use a secure any other website that you’ve logged use a combination of letters, browser and into with a user ID and password. trusted computer numbers, and symbols. Be sure to for sensitive Utilize automatic timeout features transactions. change your passwords regularly. that prevent others from continuing Log off when you’re done Don’t share passwords. Don’t share your online banking session in case using websites your passwords with other people, you leave your computer unattended that require a user ID and of course, but also don’t share without logging out. When a computer password. passwords between sites. Set a is not in use, disconnect it from Disconnect and unique password for each site. the Internet or shut it down. shut down when you’re not using your computer.

STATE CREDIT UNION PAGE | 14 PROTECT YOURSELF

The majority of identity theft and privacy infringement is the result of “real world” fraud, Offline Identity Protection including lost or stolen wallets, checkbooks, credit cards, and stolen confidential information.

Offline Identity Protection means following best practices to help you secure your personal information in the “real “2007 Identity Fraud Survey Report ”, Javelin Strategy & Research, February 2007 world.”

About Offline Identity Protection Protect your identity in the “real world” too.

Offline security is critical to helping Following simple guidelines Lock your mailbox. Preferably, your Security card in a safe place at home. you protect your identity. While online for offline activities can personal mailbox should lock. Don’t Copies aren’t necessary. Know your ? security is an important and current leave mail in your mailbox longer help you protect your rights regarding copies of your driver’s issue, the majority of identity fraud privacy and your identity. than necessary - especially if your license. Business transactions, like continues to take place offline. mailbox doesn’t have a lock. WHY checking into a hotel, do not require HOW Hold your mail. If you’re traveling, a copy of your driver’s license. don’t let mail pile up. Have the post Take advantage of free annual office hold your mail at times when credit reports. Credit reports contain you won’t be able to collect it. information about your accounts Monitor mail closely. Take and your bill paying history. Major immediate action if bills do not nationwide consumer reporting arrive as expected or if you receive companies are legally required unexpected credit cards or a to provide free copies of your CHECKLIST mysterious account statement. credit reports. Review your credit How to Protect report each year for accuracy. Yourself Don’t give out your phone number. Monitor your Ask solicitors or other businesses Shred, shred, shred. Shred bills, bank postal mail. for their phone number so you have statements, pre-approved financial Don’t give our control over these communications. solicitations and other confidential your personal information information before discarding them. freely. Don’t give our personal information Check your credit in surveys. Surveys, both online and report annually. offline, can be dangerous if they ask Shred you to provide confidential information. documents containing personal Safeguard your Social Security information Number. Do not publish your Social before discarding them. Security Number on checks or other public documents. Do not carry your card with you; keep your Social

STATE CREDIT UNION PAGE | 16 TAKE AWAY TIPS

Protect Your Computer Protect Yourself

CHECKLIST CHECKLIST CHECKLIST CHECKLIST

Antivirus Software Anti-Spyware Software Email Safety Online Identity Protection II Install Antivirus software II Install Anti-Spyware software II Don’t include sensitive II Update and strengthen the on your computer. on your computer. information in email. security of your passwords. Keep your Antivirus software Keep your Anti-Spyware II Never click on links within an email. Use a secure browser and trusted license current. software license current. II Don’t open SPAM or attachments computer for sensitive transactions. II Only open email and attachments II Read software agreements to from strangers. II Log off when you’re done using websites from known senders. understand exactly what applications Be suspicious of emails asking that require a user ID and password. are being installed on your computer. II If you receive an attachment from for personal information. II Disconnect and shut down when someone you do not know or are not Only download items from Be selective when providing you’re not using your computer. expecting, do not open it; delete it. trusted sources. your email address.

CHECKLIST CHECKLIST CHECKLIST CONTACT

Firewall Protection Software Updates Offline Identity Protection Contact State Credit Union Check your operating system to verify Check your automatic update settings II Monitor your postal mail. PO Box 726, Columbia, SC 29202 that your firewall is turned on. to ensure you’re receiving updates. II Don’t give our your personal (803) 343-0300 (Local) II If you don’t have a firewall, install one. Check software updates that may information freely. (800) 868-8740 (Toll-Free) be available in the “Help” menu II Use a firewall in conjunction with II Check your credit report annually. www.scscu.com Antivirus and Anti-Spyware software. or on the vendor’s website. [iii ----­ II Shred documents containing personal Pay attention to pop-up messages [email protected] information before discarding them. • ----- within a program: these may be rJ www.facebook.com/statecreditunion______notices of available updates. w www.twitter.com/scuconnect______

STATE CREDIT UNION PAGE | 18