the secure communicator: best practices for surviving heartbleed and other threats
DESCRIPTION
Do you understand how you’ve been affected by the Heartbleed bug? Are you worried about maintaining your privacy online? (You should be.) Do you know how to best protect client or company information? Is it safe to use social media? Have you heard of ransomware? Are you worried about identity theft? Most technical communicators know that it’s important to secure their work and online presence, but many don’t know how to do it effectively. Good security can enable—not hinder—your work. Join the presenter as he discusses the steps you can take to adopt a security lifestyle that protects you and enables you to work effectively: Protecting your computer Protecting your reputation Protecting your information Protecting your identity Creating strong and memorable passwords Leveraging cool toolsTRANSCRIPT
![Page 1: The Secure Communicator: Best Practices for Surviving Heartbleed and Other Threats](https://reader036.vdocument.in/reader036/viewer/2022081404/557565dcd8b42a2e248b47f7/html5/thumbnails/1.jpg)
The Secure CommunicatorBest Practices for Surviving Heartbleed and Other Threats
Ben Woelk
Program Manager, Information Security Office
Rochester Institute of Technology
Director and Community Affairs Committee Chair
Society for Technical Communication
Benwoelk.com
@benwoelk
Author of Shockproofing Your Use of Social Media, available on Amazon.
![Page 2: The Secure Communicator: Best Practices for Surviving Heartbleed and Other Threats](https://reader036.vdocument.in/reader036/viewer/2022081404/557565dcd8b42a2e248b47f7/html5/thumbnails/2.jpg)
Why Worry?
![Page 3: The Secure Communicator: Best Practices for Surviving Heartbleed and Other Threats](https://reader036.vdocument.in/reader036/viewer/2022081404/557565dcd8b42a2e248b47f7/html5/thumbnails/3.jpg)
Threat Landscape
http://www.symantec.com/content/en/us/enterprise/images/security_response/SYM-ISTR-SMB-Infograph.jpg
![Page 4: The Secure Communicator: Best Practices for Surviving Heartbleed and Other Threats](https://reader036.vdocument.in/reader036/viewer/2022081404/557565dcd8b42a2e248b47f7/html5/thumbnails/4.jpg)
Threat Landscape
![Page 5: The Secure Communicator: Best Practices for Surviving Heartbleed and Other Threats](https://reader036.vdocument.in/reader036/viewer/2022081404/557565dcd8b42a2e248b47f7/html5/thumbnails/5.jpg)
Threat Landscape
![Page 6: The Secure Communicator: Best Practices for Surviving Heartbleed and Other Threats](https://reader036.vdocument.in/reader036/viewer/2022081404/557565dcd8b42a2e248b47f7/html5/thumbnails/6.jpg)
Threat Landscape
![Page 7: The Secure Communicator: Best Practices for Surviving Heartbleed and Other Threats](https://reader036.vdocument.in/reader036/viewer/2022081404/557565dcd8b42a2e248b47f7/html5/thumbnails/7.jpg)
Threat Landscape
![Page 8: The Secure Communicator: Best Practices for Surviving Heartbleed and Other Threats](https://reader036.vdocument.in/reader036/viewer/2022081404/557565dcd8b42a2e248b47f7/html5/thumbnails/8.jpg)
![Page 9: The Secure Communicator: Best Practices for Surviving Heartbleed and Other Threats](https://reader036.vdocument.in/reader036/viewer/2022081404/557565dcd8b42a2e248b47f7/html5/thumbnails/9.jpg)
Adopting a Security Mindset
Inside the Twisted Mind of the Security Professionalhttp://www.schneier.com/essay-210.html
![Page 10: The Secure Communicator: Best Practices for Surviving Heartbleed and Other Threats](https://reader036.vdocument.in/reader036/viewer/2022081404/557565dcd8b42a2e248b47f7/html5/thumbnails/10.jpg)
About that mindset…
![Page 11: The Secure Communicator: Best Practices for Surviving Heartbleed and Other Threats](https://reader036.vdocument.in/reader036/viewer/2022081404/557565dcd8b42a2e248b47f7/html5/thumbnails/11.jpg)
The Basics• Anti-virus• Anti-spyware• Firewalls• Patching
![Page 12: The Secure Communicator: Best Practices for Surviving Heartbleed and Other Threats](https://reader036.vdocument.in/reader036/viewer/2022081404/557565dcd8b42a2e248b47f7/html5/thumbnails/12.jpg)
Protecting Your
Information
![Page 13: The Secure Communicator: Best Practices for Surviving Heartbleed and Other Threats](https://reader036.vdocument.in/reader036/viewer/2022081404/557565dcd8b42a2e248b47f7/html5/thumbnails/13.jpg)
Protecting Your Identity
![Page 14: The Secure Communicator: Best Practices for Surviving Heartbleed and Other Threats](https://reader036.vdocument.in/reader036/viewer/2022081404/557565dcd8b42a2e248b47f7/html5/thumbnails/14.jpg)
Protecting Your
Reputation
![Page 15: The Secure Communicator: Best Practices for Surviving Heartbleed and Other Threats](https://reader036.vdocument.in/reader036/viewer/2022081404/557565dcd8b42a2e248b47f7/html5/thumbnails/15.jpg)
Passwords
![Page 16: The Secure Communicator: Best Practices for Surviving Heartbleed and Other Threats](https://reader036.vdocument.in/reader036/viewer/2022081404/557565dcd8b42a2e248b47f7/html5/thumbnails/16.jpg)
Passphrase
It was a dark and stormy night
becomes
ItwasaDark215&StormyNight
Length > complexity
![Page 17: The Secure Communicator: Best Practices for Surviving Heartbleed and Other Threats](https://reader036.vdocument.in/reader036/viewer/2022081404/557565dcd8b42a2e248b47f7/html5/thumbnails/17.jpg)
Cool Tools
• Google Dashboard• Browser Plugins
– Netcraft– McAfee Site Advisor– Web of Trust (WoT)
• Secunia PSI• Password Safes
![Page 18: The Secure Communicator: Best Practices for Surviving Heartbleed and Other Threats](https://reader036.vdocument.in/reader036/viewer/2022081404/557565dcd8b42a2e248b47f7/html5/thumbnails/18.jpg)
Resources
• Goodreads Cyber Security Library• https://www.goodreads.com/search?q=cyber+security+library
• Infosec Communicator Blogbenwoelk.com
• Shockproofing Your Use of Social Media eBook
![Page 19: The Secure Communicator: Best Practices for Surviving Heartbleed and Other Threats](https://reader036.vdocument.in/reader036/viewer/2022081404/557565dcd8b42a2e248b47f7/html5/thumbnails/19.jpg)
Questions (and Maybe Some Answers)
Ben Woelk
Benwoelk.com
@benwoelk
www.linkedin.com/in/benwoelk/