SlideShare a Scribd company logo
1 of 29
Protecting your online identity Managing your passwords

18th of December 2013
Securing your online identity
Managing your passwords
Agenda

Bunmi Sowande
Technical Specialist – F-Secure (UK)
bunmi_Sowande@f-secure.com
07818 515 687

1.
2.
3.
4.
5.
6.

Security in the news
Recent password breaches
What‟s the most popular password?
How websites store your passwords
Password Best Practice - (Mission Impossible?)
Using a Password Manager – F-Secure Key
Awarded Best Protection
“Out of all corporate
endpoint protection
products reviewed, FSecure Client Security
offered by far the best
protection.”

Andreas Marx,
CEO of AV-TEST

Certified and Awarded
by numerous 3rd parties!
Praised by Analysts
The Forrester Wave™: Endpoint Security, Q1 2013

Forrester Research Inc. gave us the
highest score among all vendors for
our product roadmap and strategy.

We received top ranking scores on
our performance and satisfaction, in
addition to our advanced antimalware technologies.
Comprehensive Protection
Providing 360 protection from all threats
Protection Service for Business

Business Suite
In-House IT

Policy Manager

Management as a Service

Internet Gatekeeper Messaging Security
Gateway

PSB Portal

Out-sourced IT

Server Security

Client Security

Email and Server
Security

Mobile Security

Linux Security

AV for
Workstations

PSB Server
Security

PSB Email and
Server Security

PSB Workstation
Security

Protection
Service for Email

PSB Mobile Security
Karmina
Senior Analyst

Security in the news
Security in the News
Security in the News
Security in the News
Security in the News
Security in the News - Passwords
Security in the News - Passwords
Data Breaches in 2013
Adobe – 38 million accounts – October
Evernote – 50 million passwords reset - March
Twitter – 250,000 accounts – February
Facebook – Email addresses and phone
numbers for 6 million users – June
Other ’famous’ breaches
LinkedIn – June 2012 – 6.5 million passwords
Sony PlayStation Network – April 2011 – 77
million accounts
Adobe Hack – Analysis of data
• 123456 – 1.9 million passwords
• 123456789 – Around 450,000
passwords
• “password” – 346,000 passwords
• Poor encryption meant
passwords were easy to
determine
• Password hints were stored in
plain text
How do we pick our passwords?

Poor passwords go right to the top !!
How do sites store your passwords
• Plain Text
Cupid Media – November 2013 – 30 Million passwords

•
•
•
•

Basic Password Encryption
Hashed Passwords – e.g. SHA-1
Salted Hashed Passwords
Slow Hashes
How do sites store your passwords
SHA1 Hash of a password 5baa61e4c9b93f3f0682250b6cf8331b7ee68fd8
Length is more important that complexity
Password – Best Practices
Don‟t write down or share your passwords
Don‟t use websites with poor security
Use a strong password – length is better than complexity
Always change your password after a breach
Use a different password for every site
If you are unsure of a website‟s security, use Oauth where
available
Use 2 factor Authentication where available
2 Factor Authentication
Something you know + Something you have
2 Factor Authentication
•
•
•
•
•
•
•
•
•
•
•
•

Google/Gmail - Text Message or Google Authenticator
LinkedIn – Text Message
Apple – Text Message or Find My iPhone Notification
Facebook – Login Approvals – Text Message
Twitter – Text Message
Dropbox – Text Message or Google Authenticator
Evernote – Google Authenticator
Paypal - Text Message
Steam - Email
Microsoft Accounts – Text Message or Email
Yahoo! – Text Message
Wordpress – Google Authenticator
What is a strong password ??
•
•
•
•

12 Characters
Not a Dictionary Word
No Personal Information
Use Upper and lower case letters, numbers and symbols
F-Secure Key – Password Manager

Built with Security in Mind
Completely anonymous- even F-Secure cannot identify who
you are/what is your data
Multiple layers of protection – Data is „encrypted‟ securely.
Works on PC‟s, Macs and Tablets
F-Secure Mobile Apps
Best Protection for your Android Device
Anti Theft
Anti Malware
Browsing Protection
Parental Control
Safe Contacts

F-Secure Lokki

Personal
Location
tracking for
family and
friends

F-Secure App
Permissions
One app to reveal
them all

Displays the permissions
for all the apps on your
phone.
For example, see apps
that can cost you money
or drain your battery
F-Secure Mobile Apps – Coming Soon
Security in the Cloud
Tracking Protection
Virus Protection
Browsing Protection
Connection Protection
Virtual Location
Sign up for early access at
http://freedome.f-secure.com

Cloud Storage - It's your stuff. Not theirs.
We believe in people‟s right to privacy.
No spying. No backdoors. Access Everything, everywhere.
Access your content from Facebook, Picasa
Younited for Business – Collaborate and share

Sign up for early access at www.younited.com
Questions ??

Next Webinar – January 15th 2014 (11am)

Securing Virtual and Cloud Environments
Register now at http://bit.ly/fswebinar3
Save the Date
Securing Virtual and Cloud environments
Wednesday 15 January @ 11:00-11:45
Why SMBs are outsourcing Security to Managed Service Providers
Wednesday 12 February @ 11:00-11:45
It’s time for business to secure their mobile phones and tablets
Wednesday 12 March @ 11:00-11:45

More Related Content

What's hot

Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
amiinaaa
 
TakeDownCon Rocket City: Cyber Security via Technology Fails by Jeremy Conway
TakeDownCon Rocket City: Cyber Security via Technology Fails by Jeremy ConwayTakeDownCon Rocket City: Cyber Security via Technology Fails by Jeremy Conway
TakeDownCon Rocket City: Cyber Security via Technology Fails by Jeremy Conway
EC-Council
 

What's hot (20)

ZeroNights2013 testing of password policy
ZeroNights2013 testing of password policyZeroNights2013 testing of password policy
ZeroNights2013 testing of password policy
 
Hijacking Softwares for fun and profit
Hijacking Softwares for fun and profitHijacking Softwares for fun and profit
Hijacking Softwares for fun and profit
 
Ground Zero Training- Metasploit For Web
Ground Zero Training- Metasploit For WebGround Zero Training- Metasploit For Web
Ground Zero Training- Metasploit For Web
 
Spy Software
Spy SoftwareSpy Software
Spy Software
 
Basics of Meterpreter Evasion
Basics of Meterpreter EvasionBasics of Meterpreter Evasion
Basics of Meterpreter Evasion
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
Mobile phone Data Hacking
Mobile phone Data HackingMobile phone Data Hacking
Mobile phone Data Hacking
 
Web security
Web security Web security
Web security
 
Ethical Hacking and Network Security
Ethical Hacking and Network SecurityEthical Hacking and Network Security
Ethical Hacking and Network Security
 
03 secure the computer
03 secure the computer03 secure the computer
03 secure the computer
 
Assume breach, layered security in Azure tested and explained
Assume breach, layered security in Azure tested and explainedAssume breach, layered security in Azure tested and explained
Assume breach, layered security in Azure tested and explained
 
Improving Password Based Security
Improving Password Based SecurityImproving Password Based Security
Improving Password Based Security
 
An Introduction To IT Security And Privacy - Servers And More
An Introduction To IT Security And Privacy - Servers And MoreAn Introduction To IT Security And Privacy - Servers And More
An Introduction To IT Security And Privacy - Servers And More
 
How To [relatively] Secure your Web Applications
How To [relatively] Secure your Web ApplicationsHow To [relatively] Secure your Web Applications
How To [relatively] Secure your Web Applications
 
An Introduction To IT Security And Privacy In Libraries
 An Introduction To IT Security And Privacy In Libraries An Introduction To IT Security And Privacy In Libraries
An Introduction To IT Security And Privacy In Libraries
 
An Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & AnywhereAn Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & Anywhere
 
TakeDownCon Rocket City: Cyber Security via Technology Fails by Jeremy Conway
TakeDownCon Rocket City: Cyber Security via Technology Fails by Jeremy ConwayTakeDownCon Rocket City: Cyber Security via Technology Fails by Jeremy Conway
TakeDownCon Rocket City: Cyber Security via Technology Fails by Jeremy Conway
 
Hack me now, hack me then @ btp
Hack me now, hack me then @ btpHack me now, hack me then @ btp
Hack me now, hack me then @ btp
 
04 secure the human
04 secure the human04 secure the human
04 secure the human
 
Cybereason - behind the HackingTeam infection server
Cybereason - behind the HackingTeam infection serverCybereason - behind the HackingTeam infection server
Cybereason - behind the HackingTeam infection server
 

Viewers also liked

Receitas AlimentaçãO Escolar Lanche Gostoso 09
Receitas AlimentaçãO Escolar Lanche Gostoso 09Receitas AlimentaçãO Escolar Lanche Gostoso 09
Receitas AlimentaçãO Escolar Lanche Gostoso 09
tsunamidaiquiri
 

Viewers also liked (6)

Ache flavonoides
Ache flavonoidesAche flavonoides
Ache flavonoides
 
Securing Virtual and Cloud Environments
Securing Virtual and Cloud Environments Securing Virtual and Cloud Environments
Securing Virtual and Cloud Environments
 
How Malware Works - Understanding Software Vulnerabilities
How Malware Works - Understanding Software VulnerabilitiesHow Malware Works - Understanding Software Vulnerabilities
How Malware Works - Understanding Software Vulnerabilities
 
Receitas AlimentaçãO Escolar Lanche Gostoso 09
Receitas AlimentaçãO Escolar Lanche Gostoso 09Receitas AlimentaçãO Escolar Lanche Gostoso 09
Receitas AlimentaçãO Escolar Lanche Gostoso 09
 
Hype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerHype vs. Reality: The AI Explainer
Hype vs. Reality: The AI Explainer
 
Study: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsStudy: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving Cars
 

Similar to Protecting your online identity - Managing your passwords

Mobile security services 2012
Mobile security services 2012Mobile security services 2012
Mobile security services 2012
Tjylen Veselyj
 

Similar to Protecting your online identity - Managing your passwords (20)

Mobile security services 2012
Mobile security services 2012Mobile security services 2012
Mobile security services 2012
 
IT Security for Small Business
IT Security for Small BusinessIT Security for Small Business
IT Security for Small Business
 
Protecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyProtecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World Safety
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security Tips
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security Seminar
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
 
Technology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreTechnology Training - Security, Passwords & More
Technology Training - Security, Passwords & More
 
Correcthorsebatterystaple dwsg 07 09-13
Correcthorsebatterystaple dwsg 07 09-13Correcthorsebatterystaple dwsg 07 09-13
Correcthorsebatterystaple dwsg 07 09-13
 
Secure Your Mobile Apps
Secure Your Mobile AppsSecure Your Mobile Apps
Secure Your Mobile Apps
 
information security and backup system
information security and backup systeminformation security and backup system
information security and backup system
 
The top 5 basics fundamentals of network security cyberhunter solutions
The top 5 basics fundamentals of network security    cyberhunter solutionsThe top 5 basics fundamentals of network security    cyberhunter solutions
The top 5 basics fundamentals of network security cyberhunter solutions
 
Password Strength Policy Query
Password Strength Policy QueryPassword Strength Policy Query
Password Strength Policy Query
 
Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019
 
The Safest Way To Interact Online
The Safest Way To Interact OnlineThe Safest Way To Interact Online
The Safest Way To Interact Online
 
85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?
85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?
85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?
 
Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.
 
Securing password
Securing passwordSecuring password
Securing password
 
Cyber security for journalists
Cyber security for journalistsCyber security for journalists
Cyber security for journalists
 
Introduction to Personal Privacy and Security
Introduction to Personal Privacy and SecurityIntroduction to Personal Privacy and Security
Introduction to Personal Privacy and Security
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application Security
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 

Protecting your online identity - Managing your passwords

  • 1. Protecting your online identity Managing your passwords 18th of December 2013
  • 2. Securing your online identity Managing your passwords Agenda Bunmi Sowande Technical Specialist – F-Secure (UK) bunmi_Sowande@f-secure.com 07818 515 687 1. 2. 3. 4. 5. 6. Security in the news Recent password breaches What‟s the most popular password? How websites store your passwords Password Best Practice - (Mission Impossible?) Using a Password Manager – F-Secure Key
  • 3.
  • 4. Awarded Best Protection “Out of all corporate endpoint protection products reviewed, FSecure Client Security offered by far the best protection.” Andreas Marx, CEO of AV-TEST Certified and Awarded by numerous 3rd parties!
  • 5. Praised by Analysts The Forrester Wave™: Endpoint Security, Q1 2013 Forrester Research Inc. gave us the highest score among all vendors for our product roadmap and strategy. We received top ranking scores on our performance and satisfaction, in addition to our advanced antimalware technologies.
  • 6. Comprehensive Protection Providing 360 protection from all threats Protection Service for Business Business Suite In-House IT Policy Manager Management as a Service Internet Gatekeeper Messaging Security Gateway PSB Portal Out-sourced IT Server Security Client Security Email and Server Security Mobile Security Linux Security AV for Workstations PSB Server Security PSB Email and Server Security PSB Workstation Security Protection Service for Email PSB Mobile Security
  • 12. Security in the News - Passwords
  • 13. Security in the News - Passwords
  • 14. Data Breaches in 2013 Adobe – 38 million accounts – October Evernote – 50 million passwords reset - March Twitter – 250,000 accounts – February Facebook – Email addresses and phone numbers for 6 million users – June
  • 15. Other ’famous’ breaches LinkedIn – June 2012 – 6.5 million passwords Sony PlayStation Network – April 2011 – 77 million accounts
  • 16. Adobe Hack – Analysis of data • 123456 – 1.9 million passwords • 123456789 – Around 450,000 passwords • “password” – 346,000 passwords • Poor encryption meant passwords were easy to determine • Password hints were stored in plain text
  • 17. How do we pick our passwords? Poor passwords go right to the top !!
  • 18. How do sites store your passwords • Plain Text Cupid Media – November 2013 – 30 Million passwords • • • • Basic Password Encryption Hashed Passwords – e.g. SHA-1 Salted Hashed Passwords Slow Hashes
  • 19. How do sites store your passwords SHA1 Hash of a password 5baa61e4c9b93f3f0682250b6cf8331b7ee68fd8
  • 20. Length is more important that complexity
  • 21. Password – Best Practices Don‟t write down or share your passwords Don‟t use websites with poor security Use a strong password – length is better than complexity Always change your password after a breach Use a different password for every site If you are unsure of a website‟s security, use Oauth where available Use 2 factor Authentication where available
  • 22. 2 Factor Authentication Something you know + Something you have
  • 23. 2 Factor Authentication • • • • • • • • • • • • Google/Gmail - Text Message or Google Authenticator LinkedIn – Text Message Apple – Text Message or Find My iPhone Notification Facebook – Login Approvals – Text Message Twitter – Text Message Dropbox – Text Message or Google Authenticator Evernote – Google Authenticator Paypal - Text Message Steam - Email Microsoft Accounts – Text Message or Email Yahoo! – Text Message Wordpress – Google Authenticator
  • 24. What is a strong password ?? • • • • 12 Characters Not a Dictionary Word No Personal Information Use Upper and lower case letters, numbers and symbols
  • 25. F-Secure Key – Password Manager Built with Security in Mind Completely anonymous- even F-Secure cannot identify who you are/what is your data Multiple layers of protection – Data is „encrypted‟ securely. Works on PC‟s, Macs and Tablets
  • 26. F-Secure Mobile Apps Best Protection for your Android Device Anti Theft Anti Malware Browsing Protection Parental Control Safe Contacts F-Secure Lokki Personal Location tracking for family and friends F-Secure App Permissions One app to reveal them all Displays the permissions for all the apps on your phone. For example, see apps that can cost you money or drain your battery
  • 27. F-Secure Mobile Apps – Coming Soon Security in the Cloud Tracking Protection Virus Protection Browsing Protection Connection Protection Virtual Location Sign up for early access at http://freedome.f-secure.com Cloud Storage - It's your stuff. Not theirs. We believe in people‟s right to privacy. No spying. No backdoors. Access Everything, everywhere. Access your content from Facebook, Picasa Younited for Business – Collaborate and share Sign up for early access at www.younited.com
  • 28. Questions ?? Next Webinar – January 15th 2014 (11am) Securing Virtual and Cloud Environments Register now at http://bit.ly/fswebinar3
  • 29. Save the Date Securing Virtual and Cloud environments Wednesday 15 January @ 11:00-11:45 Why SMBs are outsourcing Security to Managed Service Providers Wednesday 12 February @ 11:00-11:45 It’s time for business to secure their mobile phones and tablets Wednesday 12 March @ 11:00-11:45

Editor's Notes

  1. We have been awarded Best Protection..
  2. But why should you use F-Secure to protect your customers?We have been endorsed by Forrester….
  3. Let’s look at the detail of our security offering…
  4. Lee Miles, deputy head of the National Cyber Crime Unit, says: "The NCA are actively pursuing organized crime groups committing this type of crime. We are working in co-operation with industry and international partners to identify and bring to justice those responsible and reduce the risk to the public."
  5. 2012 – LinkedIn – 6.5 million passwordsThe stolen passwords, which were in an encrypted format, were decrypted and posted on a Russian password decryption forum later on that day. By the morning of June 6, passwords for thousands of accounts were available online in plain text.The attack occurred between April 17 and April 19, 2011,forcing Sony to turn off the PlayStation Network on April 20. On May 4 Sony confirmed that personally identifiable information from each of the 77 million accounts appeared to have been stolen. Credit card data was encrypted, but Sony admitted that other user information was not encrypted at the time of the intrusion (including passwords)
  6. 123456 - 5% of the passwords
  7. Basic Encryption - The problem is, the key is often stored on the very same server that the passwords are, so if the servers get hacked, a hacker doesn't have to do much work to decrypt all the passwords, which means this method is still wildly insecure.unlike encryption, hashing is a one way street: If you have the hash, you can't run the algorithm backwards to get the original password. However, you can try different paswords until the hashes match. Rainbow tables are made up of passwords that have already been tested against hashes, which means the really weak ones will be cracked very quickly. Their biggest weakness, however, isn't complexity, but length. You're better off using a very long password rather than a short, complex one (like kj$fsDl#). Salt - It uses a different salt for each password, and even if the salts are stored on the same servers, it will make it very hard to find those salted hashes in the rainbow tables, since each one is long, complex, and unique. LinkedIn is famous for not using salted hashes, which brought them under a lot of scrutiny after their recent hack—had they used salts, their users would have been safer. Adding a salt in itself does not make hacking harder. Instead, it makes the procedure longer.Slow hash. Bcrypt - By using a slower hash—like the bcrypt algorithm—brute force attacks take much, much longer, since each password takes more time to compute.
  8. Google Authenticator, text message or email.Apple – Find my iPhone NotificationMicrosoft covers the Xbox
  9. Freedome – Android first,ioS 7 coming, PC and MacWindows Phone doesn’t support VPN