SlideShare una empresa de Scribd logo
1 de 47
Online
       Self-Defense
Don’t Let Bad Stuff Happen To You
                    Barry Caplin
         Chief Information Security Officer
      Minnesota Department of Human Services
             barry.caplin@state.mn.us

               Slides on InfoLink
Happy
  CyberSecurity
    Month!
(and belated Happy National Coffee day!)
2 Main Issues

• Passwords
• Clicking on Links
Passwords

Why Are They A Problem?
•Hard to remember
•Hard to enter
•Need too many
•Inconsistent Rules
•Changes
How Passwords Work
• Site saves encrypted pw
• At login – enter pw – it’s encrypted
  and compared to stored value
• Some sites:
  – Don’t encrypt well
  – Don’t encrypt at all!
Password Hacks in the News

It was a busy year
How Passwords Get Hacked
• Site attacked – many methods
• Encrypted pw file downloaded
  (should be more difficult!)
• Over time, hackers crack the file

• What does that get them?
Passwords
• Avg. web user has:
  – 25 separate accounts but
  – 6.5 unique passwords
     password reuse – not good

• So…
Password Self-Defense

1.   Don’t reuse passwords
2.   Only enter on secure sites
3.   Login notifications
4.   Choose good (long) passwords
Password Self-Defense

5.   Vault it
6.   Care with “secret” questions
7.   Care with linking accounts
8.   2-step authentication
9.   Use separate email addresses
Password Self-Defense

Handouts
• Password Self-Defense tips
  and resources
Safe Computer Use
      and Web Surfing
Don’t Click!
How Your Computer Gets Sick
• Attachments
• Downloads
  – Intentional
    • Clicks
    • URL shortening
  – Unintentional - Website Visits/Drive-
    By
Attachments
•   File sent via email
•   Can execute when clicked
•   doc, xls, pdf, jpg (and other images), etc.
•   Even zip files can cause problems

• Only open expected attachments
• Don’t open chain emails
• Watch holiday emails
Downloads
• Intentional – Clicking on link downloads
  page or file
Click here to download




                     http://www.download.com/filename
Downloads
• Only some executables ask permission
  – Dialog boxes often ignored
URL shortening
• http://ht.cdn.turner.com/si/danpatrick/aud
  io/2009/11/03/DP-Hr3_11-03-
  2009_stream.mp3 or…
• http://bit.ly/2d5LUP

• bit.ly, tinyurl.com, others

• Some browsers support URL lengthening
  – Long URL Please
URL lengthening
Safe Surfing Tips
•   Look before you click
•   Use Link Rating
•   Consider the source (subjective)
•   Beware – file sharing, gaming, gambling,
    questionable legality
Safe Surfing Tips
• Use Care – Social Networking (limit
  apps), ads, pop-ups, banners
• https and lock for shopping, banking, etc.
• Limit – open/public networks, scripts
• Protect web pw’s
Safe Surfing Tips


Handouts
• PC Protection Tips/Tools
• Safe Surfing Tips
Phishing
Phishing

Looks real, but rarely is
From a familiar business (not)
May threaten to close account, warn of fraud or
  virus
Legitimate businesses will not ask for private
  info via email

http://192.160.201.5/trusted.bank/index.htm
Phishing on Social Networks
Scams seem real when they come from a
  “friend”
Malicious links/apps
Spread quickly when posted or “liked”
“Just say no” to apps
• Installs app
• Grabs info
• Posts on your wall
• Click-fraud
Phone Phishing
At work: gain access/info,
 supplement intel
  Impersonate user/exec/vendor
  Ask probing questions or for
    access
At home: get personal/financial
 info
  Verify cc, ssn, etc.
  Use fear of theft or fraud to
   commit theft or fraud!
Tips to Avoid Phishing
Look before you Click - Don’t click links
 asking for personal info
Never enter personal info in a pop-up
Use spam filters, anti-virus/spyware, and keep
 updated
Only open email attachments you’re expecting
Don’t give out personal info over the phone
 unless you initiated the call
Tips to Avoid Phishing
Know what you’ve posted about yourself on
  social networks
Know who your “friends” are
Use care with apps
Recheck your social network privacy settings
Verify callers asking for “too much” info
Initiate calls to known numbers for banks, etc.
Act immediately if you’ve been hooked
Tips for Avoiding Phishing

Handouts
• Top Tips to Help Avoid
  Phishing Scams
• 10 Tips for Social
  Networking Safety
Mobile Devices
Computer is always with you
•Device theft
•Data theft
•Wireless networks
•Malicious software
•Geolocation
Device Theft
• How to protect
  your devices
  when you’re
  mobile?

• Keep it with
  you, or
• Lock it up –
  out of sight
Data Theft
• Most people have a device: smartphone,
  tablet, netbook, laptop
• Do you know your surroundings?
• What network are you using?
Data Theft
Shoulder surfing…
Data Theft
• USB devices
• “evil maid”




• Be aware of
  your
  surroundings
Wireless Networks
• Open Wi-Fi
• “evil twin”
• firesheep
Wireless Networks
• Use Wi-fi with WPA2
• Verify your connection (ask the provider)
• 3G/4G relatively safer… for now
Malicious Software
• There’s an app
  for that!

• Use official
  app markets
• Use anti-
  malware
Geolocation


The world knows
• Where you are
• Where you are not
Tips for Mobile Devices
• Use official app markets
• Use anti-malware
• Keep your device close or locked-up out of
  sight
• Watch your surroundings
• Be stingy with your personal data
Tips for Mobile Devices
• No government data on personal devices
• Use only DHS-managed connections
  
Tips for Mobile Devices

Handouts
• 10 Tips for Securing Your
  Mobile Device
Let’s Be Careful Out There
Discussion?

Más contenido relacionado

La actualidad más candente

Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
stephensc
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
stephensc
 
Online reputation
Online reputationOnline reputation
Online reputation
esl2m
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
stephensc
 

La actualidad más candente (17)

An Introduction To IT Security And Privacy In Libraries
 An Introduction To IT Security And Privacy In Libraries An Introduction To IT Security And Privacy In Libraries
An Introduction To IT Security And Privacy In Libraries
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and Libraries
 
An Introduction To IT Security And Privacy - Servers And More
An Introduction To IT Security And Privacy - Servers And MoreAn Introduction To IT Security And Privacy - Servers And More
An Introduction To IT Security And Privacy - Servers And More
 
It security in healthcare
It security in healthcareIt security in healthcare
It security in healthcare
 
Securing your cyberspace_Watson
Securing your cyberspace_WatsonSecuring your cyberspace_Watson
Securing your cyberspace_Watson
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
001 ho basic computer
001 ho basic computer001 ho basic computer
001 ho basic computer
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security Practice
 
Online reputation
Online reputationOnline reputation
Online reputation
 
Internet safety presentation sv
Internet safety presentation svInternet safety presentation sv
Internet safety presentation sv
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Ethics and safety measures in Computing
Ethics and safety measures in ComputingEthics and safety measures in Computing
Ethics and safety measures in Computing
 

Destacado

Self defence workshops for women - part i
Self defence workshops for women - part iSelf defence workshops for women - part i
Self defence workshops for women - part i
Kravmaga Sreeram
 
Self Defence, Defence of Another and Prevention of a Crime Lecture
Self Defence, Defence of Another and Prevention of a Crime LectureSelf Defence, Defence of Another and Prevention of a Crime Lecture
Self Defence, Defence of Another and Prevention of a Crime Lecture
shummi
 
Self defence
Self defenceSelf defence
Self defence
Miss Hart
 
Self defense 2
Self defense 2Self defense 2
Self defense 2
107750
 

Destacado (16)

Strategic Self Defense
Strategic Self DefenseStrategic Self Defense
Strategic Self Defense
 
Six Principle Of Self Defense
Six Principle Of Self DefenseSix Principle Of Self Defense
Six Principle Of Self Defense
 
Self Defense Tactics Don't Always Have to Involve Violence
Self Defense Tactics Don't Always Have to Involve ViolenceSelf Defense Tactics Don't Always Have to Involve Violence
Self Defense Tactics Don't Always Have to Involve Violence
 
Karate self defense
Karate self defenseKarate self defense
Karate self defense
 
4 self defence techniques
4 self defence techniques4 self defence techniques
4 self defence techniques
 
The Gentle Art of Verbal Self Defense Working with Difficult People And Impro...
The Gentle Art of Verbal Self Defense Working with Difficult People And Impro...The Gentle Art of Verbal Self Defense Working with Difficult People And Impro...
The Gentle Art of Verbal Self Defense Working with Difficult People And Impro...
 
MARTIAL ARTS : The Art of Self-Defence
MARTIAL ARTS : The Art of Self-DefenceMARTIAL ARTS : The Art of Self-Defence
MARTIAL ARTS : The Art of Self-Defence
 
Self defence workshops for women - part i
Self defence workshops for women - part iSelf defence workshops for women - part i
Self defence workshops for women - part i
 
Female Self Defense
Female Self DefenseFemale Self Defense
Female Self Defense
 
Self Defence, Defence of Another and Prevention of a Crime Lecture
Self Defence, Defence of Another and Prevention of a Crime LectureSelf Defence, Defence of Another and Prevention of a Crime Lecture
Self Defence, Defence of Another and Prevention of a Crime Lecture
 
Self defence
Self defenceSelf defence
Self defence
 
Self Defence For Women
Self Defence For WomenSelf Defence For Women
Self Defence For Women
 
Self defense 2
Self defense 2Self defense 2
Self defense 2
 
Verbal self defense
Verbal self defenseVerbal self defense
Verbal self defense
 
Self defense power point by giri bdr. sunar
Self defense power point by giri bdr. sunarSelf defense power point by giri bdr. sunar
Self defense power point by giri bdr. sunar
 
15 common defense mechanisms
15 common defense mechanisms15 common defense mechanisms
15 common defense mechanisms
 

Similar a Online Self Defense

Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
Sadaf Walliyani
 

Similar a Online Self Defense (20)

Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Lesson 5 protecting yourself on the internet
Lesson 5 protecting yourself on the internetLesson 5 protecting yourself on the internet
Lesson 5 protecting yourself on the internet
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
 
Personal Threat Models
Personal Threat ModelsPersonal Threat Models
Personal Threat Models
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 
Security Best Practices for Regular Users
Security Best Practices for Regular UsersSecurity Best Practices for Regular Users
Security Best Practices for Regular Users
 
Security best practices for regular users
Security best practices for regular usersSecurity best practices for regular users
Security best practices for regular users
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
Online reputation
Online reputationOnline reputation
Online reputation
 
security.ppt
security.pptsecurity.ppt
security.ppt
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library Setup
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
 
Cybersecurity-Awareness-Presentation-17-May-22.pptx
Cybersecurity-Awareness-Presentation-17-May-22.pptxCybersecurity-Awareness-Presentation-17-May-22.pptx
Cybersecurity-Awareness-Presentation-17-May-22.pptx
 
Cybersecurity-Awareness-Presentation-17-May-22 (1).pptx
Cybersecurity-Awareness-Presentation-17-May-22 (1).pptxCybersecurity-Awareness-Presentation-17-May-22 (1).pptx
Cybersecurity-Awareness-Presentation-17-May-22 (1).pptx
 

Más de Barry Caplin

Embracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveEmbracing the IT Consumerization Imperitive
Embracing the IT Consumerization Imperitive
Barry Caplin
 
Embracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveEmbracing the IT Consumerization Imperitive
Embracing the IT Consumerization Imperitive
Barry Caplin
 

Más de Barry Caplin (20)

Healing healthcare security
Healing healthcare securityHealing healthcare security
Healing healthcare security
 
It’s not If but When 20160503
It’s not If but When 20160503It’s not If but When 20160503
It’s not If but When 20160503
 
Dreaded Embedded sec360 5-17-16
Dreaded Embedded   sec360 5-17-16Dreaded Embedded   sec360 5-17-16
Dreaded Embedded sec360 5-17-16
 
It’s not if but when 20160503
It’s not if but when 20160503It’s not if but when 20160503
It’s not if but when 20160503
 
Wearing Your Heart On Your Sleeve - Literally!
Wearing Your Heart On Your Sleeve - Literally!Wearing Your Heart On Your Sleeve - Literally!
Wearing Your Heart On Your Sleeve - Literally!
 
CISOs are from Mars, CIOs are from Venus
CISOs are from Mars, CIOs are from VenusCISOs are from Mars, CIOs are from Venus
CISOs are from Mars, CIOs are from Venus
 
Online Self Defense - Passwords
Online Self Defense - PasswordsOnline Self Defense - Passwords
Online Self Defense - Passwords
 
The CISO Guide – How Do You Spell CISO?
The CISO Guide – How Do You Spell CISO?The CISO Guide – How Do You Spell CISO?
The CISO Guide – How Do You Spell CISO?
 
Bullying and Cyberbullying
Bullying and CyberbullyingBullying and Cyberbullying
Bullying and Cyberbullying
 
3 factors of fail sec360 5-15-13
3 factors of fail   sec360 5-15-133 factors of fail   sec360 5-15-13
3 factors of fail sec360 5-15-13
 
Tech smart preschool parent 2 13
Tech smart preschool parent 2 13Tech smart preschool parent 2 13
Tech smart preschool parent 2 13
 
Embracing the IT Consumerization Imperative NG Security
Embracing the IT Consumerization Imperative NG SecurityEmbracing the IT Consumerization Imperative NG Security
Embracing the IT Consumerization Imperative NG Security
 
Embracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveEmbracing the IT Consumerization Imperitive
Embracing the IT Consumerization Imperitive
 
Embracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveEmbracing the IT Consumerization Imperitive
Embracing the IT Consumerization Imperitive
 
Stuff my ciso says
Stuff my ciso saysStuff my ciso says
Stuff my ciso says
 
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
 
Toys in the office 11
Toys in the office 11Toys in the office 11
Toys in the office 11
 
Accidental Insider
Accidental InsiderAccidental Insider
Accidental Insider
 
Teens 2.0 - Teens and Social Networks
Teens 2.0 - Teens and Social NetworksTeens 2.0 - Teens and Social Networks
Teens 2.0 - Teens and Social Networks
 
Laws of the Game For Valley United Soccer Club travel soccer refs
Laws of the Game For Valley United Soccer Club travel soccer refsLaws of the Game For Valley United Soccer Club travel soccer refs
Laws of the Game For Valley United Soccer Club travel soccer refs
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 

Online Self Defense

  • 1. Online Self-Defense Don’t Let Bad Stuff Happen To You Barry Caplin Chief Information Security Officer Minnesota Department of Human Services barry.caplin@state.mn.us Slides on InfoLink
  • 2. Happy CyberSecurity Month! (and belated Happy National Coffee day!)
  • 3.
  • 4. 2 Main Issues • Passwords • Clicking on Links
  • 5. Passwords Why Are They A Problem? •Hard to remember •Hard to enter •Need too many •Inconsistent Rules •Changes
  • 6. How Passwords Work • Site saves encrypted pw • At login – enter pw – it’s encrypted and compared to stored value • Some sites: – Don’t encrypt well – Don’t encrypt at all!
  • 7. Password Hacks in the News It was a busy year
  • 8. How Passwords Get Hacked • Site attacked – many methods • Encrypted pw file downloaded (should be more difficult!) • Over time, hackers crack the file • What does that get them?
  • 9. Passwords • Avg. web user has: – 25 separate accounts but – 6.5 unique passwords  password reuse – not good • So…
  • 10. Password Self-Defense 1. Don’t reuse passwords 2. Only enter on secure sites 3. Login notifications 4. Choose good (long) passwords
  • 11. Password Self-Defense 5. Vault it 6. Care with “secret” questions 7. Care with linking accounts 8. 2-step authentication 9. Use separate email addresses
  • 12. Password Self-Defense Handouts • Password Self-Defense tips and resources
  • 13. Safe Computer Use and Web Surfing
  • 15. How Your Computer Gets Sick • Attachments • Downloads – Intentional • Clicks • URL shortening – Unintentional - Website Visits/Drive- By
  • 16. Attachments • File sent via email • Can execute when clicked • doc, xls, pdf, jpg (and other images), etc. • Even zip files can cause problems • Only open expected attachments • Don’t open chain emails • Watch holiday emails
  • 17. Downloads • Intentional – Clicking on link downloads page or file Click here to download http://www.download.com/filename
  • 18. Downloads • Only some executables ask permission – Dialog boxes often ignored
  • 19. URL shortening • http://ht.cdn.turner.com/si/danpatrick/aud io/2009/11/03/DP-Hr3_11-03- 2009_stream.mp3 or… • http://bit.ly/2d5LUP • bit.ly, tinyurl.com, others • Some browsers support URL lengthening – Long URL Please
  • 21. Safe Surfing Tips • Look before you click • Use Link Rating • Consider the source (subjective) • Beware – file sharing, gaming, gambling, questionable legality
  • 22. Safe Surfing Tips • Use Care – Social Networking (limit apps), ads, pop-ups, banners • https and lock for shopping, banking, etc. • Limit – open/public networks, scripts • Protect web pw’s
  • 23. Safe Surfing Tips Handouts • PC Protection Tips/Tools • Safe Surfing Tips
  • 25. Phishing Looks real, but rarely is From a familiar business (not) May threaten to close account, warn of fraud or virus Legitimate businesses will not ask for private info via email
  • 27. Phishing on Social Networks Scams seem real when they come from a “friend” Malicious links/apps Spread quickly when posted or “liked” “Just say no” to apps
  • 28. • Installs app • Grabs info • Posts on your wall • Click-fraud
  • 29. Phone Phishing At work: gain access/info, supplement intel Impersonate user/exec/vendor Ask probing questions or for access At home: get personal/financial info Verify cc, ssn, etc. Use fear of theft or fraud to commit theft or fraud!
  • 30. Tips to Avoid Phishing Look before you Click - Don’t click links asking for personal info Never enter personal info in a pop-up Use spam filters, anti-virus/spyware, and keep updated Only open email attachments you’re expecting Don’t give out personal info over the phone unless you initiated the call
  • 31. Tips to Avoid Phishing Know what you’ve posted about yourself on social networks Know who your “friends” are Use care with apps Recheck your social network privacy settings Verify callers asking for “too much” info Initiate calls to known numbers for banks, etc. Act immediately if you’ve been hooked
  • 32. Tips for Avoiding Phishing Handouts • Top Tips to Help Avoid Phishing Scams • 10 Tips for Social Networking Safety
  • 33. Mobile Devices Computer is always with you •Device theft •Data theft •Wireless networks •Malicious software •Geolocation
  • 34. Device Theft • How to protect your devices when you’re mobile? • Keep it with you, or • Lock it up – out of sight
  • 35. Data Theft • Most people have a device: smartphone, tablet, netbook, laptop • Do you know your surroundings? • What network are you using?
  • 37. Data Theft • USB devices • “evil maid” • Be aware of your surroundings
  • 38.
  • 39. Wireless Networks • Open Wi-Fi • “evil twin” • firesheep
  • 40. Wireless Networks • Use Wi-fi with WPA2 • Verify your connection (ask the provider) • 3G/4G relatively safer… for now
  • 41. Malicious Software • There’s an app for that! • Use official app markets • Use anti- malware
  • 42. Geolocation The world knows • Where you are • Where you are not
  • 43. Tips for Mobile Devices • Use official app markets • Use anti-malware • Keep your device close or locked-up out of sight • Watch your surroundings • Be stingy with your personal data
  • 44. Tips for Mobile Devices • No government data on personal devices • Use only DHS-managed connections 
  • 45. Tips for Mobile Devices Handouts • 10 Tips for Securing Your Mobile Device
  • 46. Let’s Be Careful Out There

Notas del editor

  1. Foursquare, google latitude, pleaserobme