Wednesday, June 20 | 8:30-9:45 AM
Level: Intermediate
Recommended Prerequisite: A basic understanding of computers, the internet and websites
Field of Study: Specialized Knowledge
This session will review how hackers and identity thieves gain access to your system and your information. It will also discuss how you inadvertently provide the information they need, and how malicious actors get a new and verifiable identity in less than 30 minutes. Everyone knows about firewalls and antivirus software, but this session addresses how hackers bypass these controls and how you can use this knowledge to prevent fraud.
You Will Learn How To:
- Identify personal habits that provide opportunities for hackers
- Recognize when some of these attacks are occurring or have occurred
- Examine methods used for computer security