Hi,
As a savvy internet user, it is worth reading the following.
The Internet offers many possibilities and opportunities in your life; however, there are many risks that you cannot ignore. Digital technologies are involved in many aspects of your life; you shop online, transact, study, work, socialize and more. Identifying the risks is the first step in helping you to behave more carefully to avoid some unexpected problems. With this in mind, it becomes important to reduce risk by identifying what is behind each category of Internet risk.
Do you want to know more? Please read the following slides now.
Happy reading!
Author page: www.tiny.one/markauthor
Blog: www.digiconcern.blogspot.com
Identify and mitigate hidden risks you may be exposed to on own Internet
1. Should You Take Care of Your
Personal Digital Ecosystem ?
Mark Millery
Author of “Top Secret Methods for Getting Internet Security and Privacy”
2. “Top Secret Methods for Getting Internet Security and Privacy”
“Secrets Revealed to Study Online Successfully”
“Online Shopping: Secrets Revealed to Buy Successfully”
“The Quickest & Easiest Way to Shop Online”
“Secrets révélés pour étudier en ligne avec succès(French version)”
And blog: https://digiconcern.blogspot.com
Mark is the author of the following titles:
3. Obviously, we sometimes ignore or
underestimate digital risks!
Current context
• Rise of online
transactions
• Increased use of
the Internet
• Current situation
and life challenges
Transitional context
• Study at home
• Work at home
• Lockdowns
4. Digital assets vs Exposures and risks
The level of risk related to your devices relies on
the ways you expose them on Internet, including
how many devices you own.
A lot of devices and software will increase the level
of exposure:
• Your software exposure
• Your hardware exposure
• Your network exposure
• Your activity exposure
5. Digital activities vs risks
The level of risk related to your digital assets
increasingly relies on your online activities:
• Your work
• Your business
• Your studies
• Your social network reputation
• Your online transaction
• Your online notoriety
• Your affiliation
• Etc.
7. Which elements requires protection in your
digital ecosystem?
Digital
Ecosystem
Digital
Network
Software
(local, web,
cloud)
Devices or
hardware
(mobile,
desktop, IoT,
network, etc.)
Information or
data
8. Which elements requires protection in your
digital ecosystem?
• Your digital and network devices (wearable devices, smart connected
objects, mobile devices, routers, etc.); also called hardware
• Your network links (WI-FI, NFC, Bluetooth, mobile, wired link, etc.)
• Your data (accesses, cloud, local, etc.)
• Your software which includes:
• Your regular tools (desktop or mobile tools, system tools, etc.)
• Your online transaction tools (such as payment gateway)
• Your digital communication and collaboration tools (social media, such as Facebook,
Twitter, Instagram, LinkedIn, cloud tools like Dropbox, OneDrive, etc.)
• Your devices’ firmware(printer, camera, etc.)
• The digital technologies you use (Internet of Things or IoT, cloud
computing, etc.)
9. Your Network Addresses (IP)
• Your Internet Provider assigns a public IP address to your
network modem (Ex: 234.25.26.30)
• Your IP address can be compared to your Phone
Number
• The IP address of your Internet modem is visible to the
world!
• Each connected device has a public or private IP Address
• Best practices
• Use a private VPN (Virtual Private Network)
• Update your router firmware regularly
• IP means Internet Protocol
10. Your Network Assets
• Your network includes your telecommunication
devices that connect physical or digital devices:
• Your router
• Your cable
• Your Wi-Fi extenders
• Your links (Wi-Fi, Wired, Phone links, etc.)
• Your connected devices(Mobile, PC, tablets,
smartphones, etc.)
11. Your Data
• Intrusions usually start within your network and
affect your applications, your data is the most
targeted part.
• Your data included your Metadata (critical
information) and other operational data(pictures,
social media posts, preferences, etc.)
• Your data can also be used by providers to get
statistics and create marketing models to improve
their sale strategies.
12. Your Credentials(accesses, passwords, user
IDs)
• Intruders usually need your IP addresses, your
credentials in order to access your software and
data.
• With possible software security breaches, your
credentials may be more exposed(such as passwords
stolen, etc.)
• 2nd factor authentication is a strong way to face
several issues you may have.
13. Your software (or Applications)
• Your OS (Operating System)
• Your software tools(Office, Communication,
Collaboration, etc.)
• Require regular monitoring and updates.
14. Your devices’ firmware
usually ignored or forgotten
• Firmware are integrated software installed on
devices. They also need to be updated.
• Which devices may contain firmware?
• Your printer, your router, your smartphone, your digital
camera, your smart TV, your TV receiver, your
connected devices, your smartwatch, your
computer(BIOS).
15. Keep in Mind!
• Intrusions usually start within your network and
affect your applications, your data is the most
targeted part.
• Your data included your Metadata (critical
information) and other operational data(pictures,
social media posts, preferences, etc.)
• Your data is also used by providers to get statistics
and create marketing models to improve their sale
strategies.
16. Keep in mind !
• Data needs to be protected and backed up on a
regular basis
• Your accesses also require monitoring and
protection
• Software and firmware need to be timely and
conveniently updated
• Digital devices need to be updated on a regular basis
• You are responsible of protecting your digital
ecosystem from legal, privacy and security
perspectives.
18. • Author page: https://tiny.one/markauthor
• Blog: http://digiconcern.blogspot.com
• Twitter: http://twitter.com/digiconcern
• YouTube: https://tinyurl.com/digi2watch
Don't miss out!
Visit the website below to sign up and be notified whenever Mark publishes
a new book. There's no charge and no obligation.
SignUpHere
Stay connected for more updates
Notas del editor
Current context
Study at home
Work at home
Rise of online transactions
Increased use of the Internet
Current situation and challenges
Stay at home orders
Lockdown
Your company has a its own strategy to reduce digital risks over Internet, however you should consider your plan to reduce your risks
Network risks(Device, links, Intrusion, etc.)
Visibility risks (Social networks, Software, exposure, etc.)
Access risks (User names, passwords, accounts, secrets answers, etc.)
Software risks(Vulnerabilities, Malware, Corruption, etc. )
Firmware risks (integrated software, functionalities, etc.)
Data risks (Privacy, Identity, corruption, etc.)
Etc.
Your digital and network devices (wearable devices, smart connected objects, etc.)
Your network links (WI-FI, NFC, Bluetooth, mobile, wired link, etc.)
Your data (Accesses, cloud, local, etc)
Your software
Your regular tools (Desktop or mobile tools, system tools, etc.)
Your online transaction tools (such as payment gateway)
Your digital communication and collaboration tools (social media, such as Facebook, Twitter, Instagram, LinkedIn, etc.)
Your devices’ firmware(Printer, camera, etc.)
The digital technologies you use (Internet of Things or IoT, cloud computing, etc.)
Your digital and network devices (wearable devices, smart connected objects, etc.)
Your network links (WI-FI, NFC, Bluetooth, mobile, wired link, etc.)
Your data (Accesses, cloud, local, etc)
Your software
Your regular tools (Desktop or mobile tools, system tools, etc.)
Your online transaction tools (such as payment gateway)
Your digital communication and collaboration tools (social media, such as Facebook, Twitter, Instagram, LinkedIn, etc.)
Your devices’ firmware(Printer, camera, etc.)
The digital technologies you use (Internet of Things or IoT, cloud computing, etc.)
Your Internet Provider assigns a public IP address to your network modem (Ex: 234.25.26.30)
Your IP address can be compared to your Phone Number
The IP address of your Internet modem is visible to the world!
Each connected device has a public or private IP Address
Prevention
Use a private VPN
Update your router
IP : Internet Protocol
Your network includes your telecommunication devices that connect physical or digital devices:
Your router
Your cable
Your Wi-fi extenders
Your links (Wi-Fi, Wired, Phone links, etc.)
Your connected devices(PC, Tablets, Smartphones, etc)
Data needs to be protected and backed up on a regular basis. Your data may become corrupted, lost, etc. Take action now.
Your accesses also require monitoring and protection. Your access may be compromised by intruders.
Software and firmware need to be timely and conveniently updated. Security breaches are sometimes unattended, be careful.
Digital devices need to be updated on a regular basis Deepen your knowledge and be proactive!
You are responsible of protecting your digital ecosystem from privacy, legal, and security perspectives. Protecting your devices, software is a must to avoid some issues.