digital self defense 101 - rochester institute of …...• see how often that linkedin profile...
TRANSCRIPT
7/15/2016
1
DigitalSelfDefense101
DSD 101: Tips, Tools, and Best Practices to Stay Safe Online
Ben WoelkISO Program Manager
2
7/15/2016
2
You’re a Target. Why?
3
What are the Top Three Ways to Protect Yourself?
4
7/15/2016
3
Top online safety practices?
http://googleonlinesecurity.blogspot.com/2015/07/new‐research‐comparing‐how‐security.html
5
Protecting Your Computer• Anti‐virus
• Firewalls
• Patching and updates
• Passwords/passphrases
https://www.rit.edu/security/content/desktop‐and‐portable‐computer‐security‐standard(Additional standards/requirements https://www.rit.edu/security/content/requirements‐facultystaff)
6
7/15/2016
4
7
Update and Browser Tools
8
Note that Secunia is not for individual use on RIT computers.
7/15/2016
5
http://xkcd.com/936/
Passwords/Passphrases
https://www.rit.edu/security/content/password
9
How Strong is Your Password?
https://www.grc.com/haystack.htm
10
7/15/2016
6
PassphrasesIt was a dark and stormy night
becomes
ItwasaDark215&StormyNight
Length > complexity
11
Password Managers
12
7/15/2016
7
Two-Factor Authentication
13
Two Factor Authenticationwww.turnon2FA.com
14
7/15/2016
8
Mobile Devices, Smartphones, Tablets• Protection commensurate with risk of information accessed or stored
• Storage of private information is prohibited
https://www.rit.edu/security/content/desktop‐HTMLStandard
15
Mobile Security Apps• Lookout Security & Antivirus (Android, iOS)
• Avast Mobile Security (Android)
• Avast SecureMe (iOS)
• Google Authenticator (Android, iOS)
• Find My iPhone (iOS)
• iVault (iOS)
16
7/15/2016
9
What about Physical Security?
17
Protecting your identity
18
7/15/2016
10
19
How Many Compromised Accounts?
Fraud, Scams, and Malware• Employee Information
• Invoices
• Attachments
20
http://www.csoonline.com/article/3091795/security/phishing‐scam‐focuses‐on‐the‐basics‐to‐harvest‐business‐credentials.html
7/15/2016
11
21
ProtectingYourInformation
22https://www.rit.edu/security/content/information‐access‐protection‐standard
7/15/2016
12
Never assume privacy
Learn and set social network privacy settings
23
Privacy Settings
24
7/15/2016
13
Login Alerts
25
Who’s following
you?
Tagged photos on Instagram can be seen by?
7/15/2016
14
Protecting Your Reputation
27
Google My Account Dashboard
28
7/15/2016
15
Google Alerts
Monitor use of your name
29
Google Reverse Image Search• See how often that LinkedIn profile photo is being used.
• Go to LinkedIn profile.
• Right click on image. Copy image address.
• Click on camera icon in Google search window.
• Paste in image address.
30
7/15/2016
16
Questions (and maybe some answers)
Ben Woelk
http://rit.facebook.com/RITInfosec
http://twitter.com/RIT_InfoSec31
Resources• RIT Information Security Standardshttp://www.rit.edu/security
• Google Research on User vs Expert Practiceshttp://googleonlinesecurity.blogspot.com/2015/07/new‐research‐comparing‐how‐security.html
32