SlideShare una empresa de Scribd logo
1 de 18
Should You Take Care of Your
Personal Digital Ecosystem ?
Mark Millery
Author of “Top Secret Methods for Getting Internet Security and Privacy”
“Top Secret Methods for Getting Internet Security and Privacy”
“Secrets Revealed to Study Online Successfully”
“Online Shopping: Secrets Revealed to Buy Successfully”
“The Quickest & Easiest Way to Shop Online”
“Secrets révélés pour étudier en ligne avec succès(French version)”
And blog: https://digiconcern.blogspot.com
Mark is the author of the following titles:
Obviously, we sometimes ignore or
underestimate digital risks!
Current context
• Rise of online
transactions
• Increased use of
the Internet
• Current situation
and life challenges
Transitional context
• Study at home
• Work at home
• Lockdowns
Digital assets vs Exposures and risks
The level of risk related to your devices relies on
the ways you expose them on Internet, including
how many devices you own.
A lot of devices and software will increase the level
of exposure:
• Your software exposure
• Your hardware exposure
• Your network exposure
• Your activity exposure
Digital activities vs risks
The level of risk related to your digital assets
increasingly relies on your online activities:
• Your work
• Your business
• Your studies
• Your social network reputation
• Your online transaction
• Your online notoriety
• Your affiliation
• Etc.
Your digital risks
• Access risks (user names, passwords, accounts, secrets
answers, etc.)
• Data risks (privacy, Identity, corruption, etc.)
• Cloud Risks (social media, streaming, cloud storage and
access, etc.)
• Network risks(device, links, Intrusion, etc.)
• Visibility risks (social networks, Software, exposure, etc.)
• Software risks(vulnerabilities, Malware, Corruption, etc. )
• Firmware risks (integrated software, functionalities, etc.)
• Etc.
Which elements requires protection in your
digital ecosystem?
Digital
Ecosystem
Digital
Network
Software
(local, web,
cloud)
Devices or
hardware
(mobile,
desktop, IoT,
network, etc.)
Information or
data
Which elements requires protection in your
digital ecosystem?
• Your digital and network devices (wearable devices, smart connected
objects, mobile devices, routers, etc.); also called hardware
• Your network links (WI-FI, NFC, Bluetooth, mobile, wired link, etc.)
• Your data (accesses, cloud, local, etc.)
• Your software which includes:
• Your regular tools (desktop or mobile tools, system tools, etc.)
• Your online transaction tools (such as payment gateway)
• Your digital communication and collaboration tools (social media, such as Facebook,
Twitter, Instagram, LinkedIn, cloud tools like Dropbox, OneDrive, etc.)
• Your devices’ firmware(printer, camera, etc.)
• The digital technologies you use (Internet of Things or IoT, cloud
computing, etc.)
Your Network Addresses (IP)
• Your Internet Provider assigns a public IP address to your
network modem (Ex: 234.25.26.30)
• Your IP address can be compared to your Phone
Number
• The IP address of your Internet modem is visible to the
world!
• Each connected device has a public or private IP Address
• Best practices
• Use a private VPN (Virtual Private Network)
• Update your router firmware regularly
• IP means Internet Protocol
Your Network Assets
• Your network includes your telecommunication
devices that connect physical or digital devices:
• Your router
• Your cable
• Your Wi-Fi extenders
• Your links (Wi-Fi, Wired, Phone links, etc.)
• Your connected devices(Mobile, PC, tablets,
smartphones, etc.)
Your Data
• Intrusions usually start within your network and
affect your applications, your data is the most
targeted part.
• Your data included your Metadata (critical
information) and other operational data(pictures,
social media posts, preferences, etc.)
• Your data can also be used by providers to get
statistics and create marketing models to improve
their sale strategies.
Your Credentials(accesses, passwords, user
IDs)
• Intruders usually need your IP addresses, your
credentials in order to access your software and
data.
• With possible software security breaches, your
credentials may be more exposed(such as passwords
stolen, etc.)
• 2nd factor authentication is a strong way to face
several issues you may have.
Your software (or Applications)
• Your OS (Operating System)
• Your software tools(Office, Communication,
Collaboration, etc.)
• Require regular monitoring and updates.
Your devices’ firmware
usually ignored or forgotten
• Firmware are integrated software installed on
devices. They also need to be updated.
• Which devices may contain firmware?
• Your printer, your router, your smartphone, your digital
camera, your smart TV, your TV receiver, your
connected devices, your smartwatch, your
computer(BIOS).
Keep in Mind!
• Intrusions usually start within your network and
affect your applications, your data is the most
targeted part.
• Your data included your Metadata (critical
information) and other operational data(pictures,
social media posts, preferences, etc.)
• Your data is also used by providers to get statistics
and create marketing models to improve their sale
strategies.
Keep in mind !
• Data needs to be protected and backed up on a
regular basis
• Your accesses also require monitoring and
protection
• Software and firmware need to be timely and
conveniently updated
• Digital devices need to be updated on a regular basis
• You are responsible of protecting your digital
ecosystem from legal, privacy and security
perspectives.
Take action !
Deepen your Internet
security knowledge
and be proactive!
• Author page: https://tiny.one/markauthor
• Blog: http://digiconcern.blogspot.com
• Twitter: http://twitter.com/digiconcern
• YouTube: https://tinyurl.com/digi2watch
Don't miss out!
Visit the website below to sign up and be notified whenever Mark publishes
a new book. There's no charge and no obligation.
SignUpHere
Stay connected for more updates

Más contenido relacionado

Último

AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
ellan12
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
Diya Sharma
 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
@Chandigarh #call #Girls 9053900678 @Call #Girls in @Punjab 9053900678
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 

Último (20)

AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 

Destacado

Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Saba Software
 
Introduction to C Programming Language
Introduction to C Programming LanguageIntroduction to C Programming Language
Introduction to C Programming Language
Simplilearn
 

Destacado (20)

How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
 
Introduction to C Programming Language
Introduction to C Programming LanguageIntroduction to C Programming Language
Introduction to C Programming Language
 

Identify and mitigate hidden risks you may be exposed to on own Internet

  • 1. Should You Take Care of Your Personal Digital Ecosystem ? Mark Millery Author of “Top Secret Methods for Getting Internet Security and Privacy”
  • 2. “Top Secret Methods for Getting Internet Security and Privacy” “Secrets Revealed to Study Online Successfully” “Online Shopping: Secrets Revealed to Buy Successfully” “The Quickest & Easiest Way to Shop Online” “Secrets révélés pour étudier en ligne avec succès(French version)” And blog: https://digiconcern.blogspot.com Mark is the author of the following titles:
  • 3. Obviously, we sometimes ignore or underestimate digital risks! Current context • Rise of online transactions • Increased use of the Internet • Current situation and life challenges Transitional context • Study at home • Work at home • Lockdowns
  • 4. Digital assets vs Exposures and risks The level of risk related to your devices relies on the ways you expose them on Internet, including how many devices you own. A lot of devices and software will increase the level of exposure: • Your software exposure • Your hardware exposure • Your network exposure • Your activity exposure
  • 5. Digital activities vs risks The level of risk related to your digital assets increasingly relies on your online activities: • Your work • Your business • Your studies • Your social network reputation • Your online transaction • Your online notoriety • Your affiliation • Etc.
  • 6. Your digital risks • Access risks (user names, passwords, accounts, secrets answers, etc.) • Data risks (privacy, Identity, corruption, etc.) • Cloud Risks (social media, streaming, cloud storage and access, etc.) • Network risks(device, links, Intrusion, etc.) • Visibility risks (social networks, Software, exposure, etc.) • Software risks(vulnerabilities, Malware, Corruption, etc. ) • Firmware risks (integrated software, functionalities, etc.) • Etc.
  • 7. Which elements requires protection in your digital ecosystem? Digital Ecosystem Digital Network Software (local, web, cloud) Devices or hardware (mobile, desktop, IoT, network, etc.) Information or data
  • 8. Which elements requires protection in your digital ecosystem? • Your digital and network devices (wearable devices, smart connected objects, mobile devices, routers, etc.); also called hardware • Your network links (WI-FI, NFC, Bluetooth, mobile, wired link, etc.) • Your data (accesses, cloud, local, etc.) • Your software which includes: • Your regular tools (desktop or mobile tools, system tools, etc.) • Your online transaction tools (such as payment gateway) • Your digital communication and collaboration tools (social media, such as Facebook, Twitter, Instagram, LinkedIn, cloud tools like Dropbox, OneDrive, etc.) • Your devices’ firmware(printer, camera, etc.) • The digital technologies you use (Internet of Things or IoT, cloud computing, etc.)
  • 9. Your Network Addresses (IP) • Your Internet Provider assigns a public IP address to your network modem (Ex: 234.25.26.30) • Your IP address can be compared to your Phone Number • The IP address of your Internet modem is visible to the world! • Each connected device has a public or private IP Address • Best practices • Use a private VPN (Virtual Private Network) • Update your router firmware regularly • IP means Internet Protocol
  • 10. Your Network Assets • Your network includes your telecommunication devices that connect physical or digital devices: • Your router • Your cable • Your Wi-Fi extenders • Your links (Wi-Fi, Wired, Phone links, etc.) • Your connected devices(Mobile, PC, tablets, smartphones, etc.)
  • 11. Your Data • Intrusions usually start within your network and affect your applications, your data is the most targeted part. • Your data included your Metadata (critical information) and other operational data(pictures, social media posts, preferences, etc.) • Your data can also be used by providers to get statistics and create marketing models to improve their sale strategies.
  • 12. Your Credentials(accesses, passwords, user IDs) • Intruders usually need your IP addresses, your credentials in order to access your software and data. • With possible software security breaches, your credentials may be more exposed(such as passwords stolen, etc.) • 2nd factor authentication is a strong way to face several issues you may have.
  • 13. Your software (or Applications) • Your OS (Operating System) • Your software tools(Office, Communication, Collaboration, etc.) • Require regular monitoring and updates.
  • 14. Your devices’ firmware usually ignored or forgotten • Firmware are integrated software installed on devices. They also need to be updated. • Which devices may contain firmware? • Your printer, your router, your smartphone, your digital camera, your smart TV, your TV receiver, your connected devices, your smartwatch, your computer(BIOS).
  • 15. Keep in Mind! • Intrusions usually start within your network and affect your applications, your data is the most targeted part. • Your data included your Metadata (critical information) and other operational data(pictures, social media posts, preferences, etc.) • Your data is also used by providers to get statistics and create marketing models to improve their sale strategies.
  • 16. Keep in mind ! • Data needs to be protected and backed up on a regular basis • Your accesses also require monitoring and protection • Software and firmware need to be timely and conveniently updated • Digital devices need to be updated on a regular basis • You are responsible of protecting your digital ecosystem from legal, privacy and security perspectives.
  • 17. Take action ! Deepen your Internet security knowledge and be proactive!
  • 18. • Author page: https://tiny.one/markauthor • Blog: http://digiconcern.blogspot.com • Twitter: http://twitter.com/digiconcern • YouTube: https://tinyurl.com/digi2watch Don't miss out! Visit the website below to sign up and be notified whenever Mark publishes a new book. There's no charge and no obligation. SignUpHere Stay connected for more updates

Notas del editor

  1. Current context Study at home Work at home Rise of online transactions Increased use of the Internet Current situation and challenges Stay at home orders Lockdown
  2. Your company has a its own strategy to reduce digital risks over Internet, however you should consider your plan to reduce your risks Network risks(Device, links, Intrusion, etc.) Visibility risks (Social networks, Software, exposure, etc.) Access risks (User names, passwords, accounts, secrets answers, etc.) Software risks(Vulnerabilities, Malware, Corruption, etc. ) Firmware risks (integrated software, functionalities, etc.) Data risks (Privacy, Identity, corruption, etc.) Etc.
  3. Your digital and network devices (wearable devices, smart connected objects, etc.) Your network links (WI-FI, NFC, Bluetooth, mobile, wired link, etc.) Your data (Accesses, cloud, local, etc) Your software Your regular tools (Desktop or mobile tools, system tools, etc.) Your online transaction tools (such as payment gateway) Your digital communication and collaboration tools (social media, such as Facebook, Twitter, Instagram, LinkedIn, etc.) Your devices’ firmware(Printer, camera, etc.) The digital technologies you use (Internet of Things or IoT, cloud computing, etc.)
  4. Your digital and network devices (wearable devices, smart connected objects, etc.) Your network links (WI-FI, NFC, Bluetooth, mobile, wired link, etc.) Your data (Accesses, cloud, local, etc) Your software Your regular tools (Desktop or mobile tools, system tools, etc.) Your online transaction tools (such as payment gateway) Your digital communication and collaboration tools (social media, such as Facebook, Twitter, Instagram, LinkedIn, etc.) Your devices’ firmware(Printer, camera, etc.) The digital technologies you use (Internet of Things or IoT, cloud computing, etc.)
  5. Your Internet Provider assigns a public IP address to your network modem (Ex: 234.25.26.30) Your IP address can be compared to your Phone Number The IP address of your Internet modem is visible to the world! Each connected device has a public or private IP Address Prevention Use a private VPN Update your router IP : Internet Protocol
  6. Your network includes your telecommunication devices that connect physical or digital devices: Your router Your cable Your Wi-fi extenders Your links (Wi-Fi, Wired, Phone links, etc.) Your connected devices(PC, Tablets, Smartphones, etc)
  7. Data needs to be protected and backed up on a regular basis. Your data may become corrupted, lost, etc. Take action now. Your accesses also require monitoring and protection. Your access may be compromised by intruders. Software and firmware need to be timely and conveniently updated. Security breaches are sometimes unattended, be careful. Digital devices need to be updated on a regular basis Deepen your knowledge and be proactive! You are responsible of protecting your digital ecosystem from privacy, legal, and security perspectives. Protecting your devices, software is a must to avoid some issues.