Your SlideShare is downloading. ×
Judy Taylour's Digital Privacy Day 2014 Presentation
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Judy Taylour's Digital Privacy Day 2014 Presentation

232
views

Published on

Published in: Technology

1 Comment
0 Likes
Statistics
Notes
  • Free Download : http://gg.gg/114bb
    Hi I just wanna share something to you guys..
    I am using a great tool, as of now it is still
    working perfect.. you can download the full file
    for free here
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Be the first to like this

No Downloads
Views
Total Views
232
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
5
Comments
1
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. January 9, 2014 LONG BEACH COMPUTER CLUB
  • 2. What is Data Privacy Day (DPD) • Data Privacy Day is January 28, 2014. • DPD encourages everyone to make protecting privacy and data a greater priority. • It is an International effort to empower and educate people to protect their privacy and control their digital footprint. http://www.staysafeonline.org/data-privacy-day/ 2
  • 3. Data Privacy Day • So much of our lives today is electronic data. • From Social Security to credit card to our date of birth; they are all numbers that need to be kept private. • These numbers exist on our computers and mobile devices. 3
  • 4. Data Privacy Day • And because they are all connected to the internet, those numbers are there as well. It's not just numbers, we have contracts, wills, financial agreements, family history, photos and videos that should be kept private as well. • This is your digital footprint. 4
  • 5. Data Privacy Day • Today's presentation is designed to give you the knowledge about those power tools. • Many of them are free or low cost and once you set them up, they become second nature. 5
  • 6. Data Privacy Day • If you don‟t take advantage of them, you will be exposed to the people who want to steal your data. • This could lead to identity theft and other headaches. 6
  • 7. Operating Systems & Programs / Apps • The operating system (OS) is the behind-the- scene genie that makes your device work it‟s magic. • OS X, Linux, iOS, Windows and Android are all operating systems. • From time to time, they do need patching and updating to plug security holes. 7
  • 8. Operating Systems & Programs / Apps • Today‟s OS‟ are set by default to prompt you when an update is available. • You should do the update within a few days. • If you have an OS older than 5 years, you need to seriously think about some kind of upgrade. 8
  • 9. Operating Systems & Programs / Apps • Programs & Apps are your productivity tools – Web browsers – Games – Audio / visuals tools – Calendars – Address books and more • Many of them will prompt when updates are available. • Some will auto-update themselves or the OS will update them for you. 9
  • 10. Operating Systems & Programs / Apps • There are programs that can help you keep your programs up-to-date – FileHippo – Secunia – Ninite • Don‟t forget Microsoft‟s monthly Tuesday updates • They need to be installed 10
  • 11. Be a Good Online Citizen • Be empowered • Control your digital footprint by – Taking good care of your personal data – Don‟t share it online • Don‟t share other‟s personal data – Bcc: is Confidential – Use for all e-mail addresses • Educate others by letting them know to use Bcc: 11
  • 12. Don’t Forward Questionable E-mails Check Them Out • http://www.snopes.com/ – Definitive Internet reference source for urban legends, folklore, myths, rumors, and misinformation • http://www.hoax-slayer.com/ – Debunking email hoaxes and exposing Internet scams since 2003 • http://urbanlegends.about.com/ 12
  • 13. Don’t Forward Questionable E-mails Check Them Out • http://www.thatsnonsense.com/ • http://bobsullivan.net/ 13
  • 14. Make Passwords Long, Strong & Unique • Secure your devices • Smartphone, Tablet, Laptop or PC • Use passwords or passphrases – Different for each account – Include numbers, symbols and letters – capital & lowercase • Passphrases = multiple words that create a phrase (longer / stronger than a password) 14
  • 15. Make Passwords Long, Strong & Unique • A list of childhood pets – more=stronger – NobleR!ngoBa!leyAlexT!gerPumpk!nJohnnyGage9 • An uncommon sentence – !Can‟tBelieveIIntroducedGrantToAlice9 • Use Microsoft‟s Password Checker 15
  • 16. Make Passwords Long, Strong & Unique • Is your personal memory getting full? • A different password for each account can drive • • • • you crazy Use a Password program to remember all of your passwords https://www.dashlane.com/ https://www.passwordbox.com/ https://agilebits.com/onepassword 16
  • 17. Make Passwords Long, Strong & Unique • https://lastpass.com/ • http://keepass.info/ • http://roboform.com 17
  • 18. Safer Online Banking • It‟s convenient • But comes with certain risks • Just like people being robbed at ATMs, or having their cards cloned, online banking can be vulnerable • Follow these tips and you can minimize risks to your finances and bank safely online 18
  • 19. Safer Online Banking • Create a strong password • You know the drill • Minimum of 8 characters – the longer the better • DON‟T use – Your name, initials, date of birth or anything that pertains to your relatives 19
  • 20. Safer Online Banking • If your bank asks you to provide answers to security questions, the answers don‟t need to be the real ones • Thumper really doesn‟t have to be the name of your first pet  20
  • 21. Safer Online Banking • Secure your computer and keep it up-to-date • You‟ve also heard this over and over again but are you doing it • Have a good, reliable security program • Use Malwarebytes to double check your program – www.malwarebytes.com • Keep your operating system and other software up-to-date 21
  • 22. Safer Online Banking • Don‟t click through on a link in an e-mail from • • • • • your „bank‟ Banks won‟t get in touch Are you really expecting a shipment from UPS or FedEx Phishing is the name of the game – they want your info and if you give it your money is gone! Starbucks, McDonalds, etc. Wi-Fi Banks won‟t call you on the phone and ask for info, either 22
  • 23. Safer Online Banking • Don‟t access your bank account(s) via hotel, S • Always log out of your online banking session • Always look for the "lock" icon and https:// to be sure you have a safe connection. • Do you have private browsing set up on your browser or smart phone? • Set your browser to clear its cache when you shut down your computer 23
  • 24. Safer Online Banking Internet Explorer 24 Chrome
  • 25. Safer Online Banking Internet Explorer Chrome 25
  • 26. Safer Online Banking • Set up account notifications (if available) – Does a withdrawal match or exceed a specified – – – – amount Is your account balance below a certain point Alerts could give quick notice of suspicious activity on your account Monitor your accounts regularly Don‟t wait a whole month to discover a discrepancy 26
  • 27. Safer Online Banking • NEVER use your debit card online • Have a credit card with a low limit OR • Have bank set up a virtual card for you to use for online purchases • Set up two-factor authentication • It‟s one of the best things you can do to make sure your accounts don't get hacked 27
  • 28. Safer Online Banking Do you want to receive your access code via: 28
  • 29. Cover Your Tracks • Searching with Google? – Click on a link and your search term is usually sent – – – – – – – to that site, along with computer & browser info Can uniquely identify you 3rd party ads – they can build a profile on you That‟s why those ads can follow you Your profile can be sold Google keeps your searches Can be legally requested Google can be hacked 29
  • 30. Cover Your Tracks • Browse with DuckDuckGo • Doesn‟t send your searches to other sites • Or store any personal information at all 30
  • 31. Cover Your Tracks • Browse with Ixquick • It Protects Your Privacy! • Does NOT collect or share ANY personal information! – Nada. Zilch. Nothing. • World's most powerful search engine employing the most advanced metasearch technology • Comprehensive …. Accurate 31
  • 32. Cover Your Tracks • Browse with blekko • Delivers high quality, curated results and organizing content into categories – Curated = cherry picks the best content that is important and relevant to share • Sophisticated search technology powers suite of products – Web search engine – Mobile app – Social news platform 32
  • 33. Cover Your Tracks • Use DoNotTrackMe by Abine • Blocks companies from tracking your browsing and helps protect your personal info online • PC – Tablet – Smart Phone – Access DoNotTrackMe or any browser or device to manage your privacy anywhere www.abine.com 33
  • 34. Cover Your Tracks • Also by Abine • MaskMe – Keeps you private as you browse and shop the web – Creates and manages secure passwords • DeleteMe – Removes your public profile, contact and personal info, and photos of you from leading data sites 34
  • 35. Block Those Pesky Ads • AdBlock Plus • Surf the web without annoying ads! • Blocks banners, pop-ups and video ads - even on Facebook and YouTube • Protects your online privacy www.adblockplus.org 35
  • 36. Block Those Pesky Ads 36
  • 37. Block Those Pesky Ads with Abine 37
  • 38. Mobile Devices • What information does your smartphone have about you? • Smartphones store and transmit a wide range of personal data which third parties can access– including contact lists, pictures, browsing history, certain identifying information and stored location data. • Secure your phone with a long, strong and unique password, security software and other privacy features. 38
  • 39. Do You Keep a Clean Device? • Smartphones can be vulnerable to viruses and malware that can compromise personal information. • Protect your phone with security software and by updating operating systems and apps. • Avast.com • Norton.com 39
  • 40. Think Before You Text • We‟ve heard this before about e-mail • Keep in mind how the message might be read before you send it. • Be aware that texts can be forwarded. 40
  • 41. Are You Respecting Others’ Privacy? • Make sure you have someone‟s permission before taking pictures or videos of them with your phone. • What you do online has the potential to affect everyone – at home, at work and around the world. • Practicing good online habits benefits the global digital community. 41
  • 42. Think Before You App • Own your online presence - It‟s ok to limit how and with whom you share information. • Before downloading a mobile app, understand what information (your location, access to social networks, etc.) the app accesses to function • Many applications do not need geo-location enabled in order to provide the service. • Opt-out of the location service feature on your phone. 42
  • 43. Are You Savvy About Wi-Fi Hotspots? • Limit the type of business you conduct on your smartphone or tablet via Wi-Fi hotspots and adjust the security settings on your device to limit who can access your machine. • Wi-Fi hotspots are convenient but can leave you vulnerable to intrusion. 43
  • 44. Back-it Up • Store digital copies of your valuable work, music, photos and other information on an external hard drive or online cloud. 44
  • 45. Voice Over Internet Protocol (VoIP) • BEWARE! • Skype, Vonage, ooma, magicJack…. • SPIT (Spam over Internet Telephony) – Fast, cheap and invasive way for telemarketing messages to reach you • Spoofing – Attacker pretends to be a trusted VoIP caller, such as your bank 45
  • 46. Voice Over Internet Protocol (VoIP) • ID Theft – Cyber criminals gather bits of information collected from your conversations • Eavesdropping – Hackers steal VoIP features like voicemail to get information about the user • Vishing attacks (voice phishing) – Gain access to your personal and financial information in identity theft schemes 46
  • 47. Voice Over Internet Protocol (VoIP) • Data sniffing – Hackers identify, modify, store and play back your conversations • Compromising your confidentiality – Is your phone call private and secure • VoIP risks and safety issues continue to grow as more and more people rely on this service to make phone calls. • Always be aware of the information you're sharing and that others may be listening in. 47
  • 48. Social Networking • Only post what you would be comfortable hanging on your front door….Abby Stokes • DON‟T share: – Phone numbers – Home address – Full date of birth – Date of graduation – Travel plans – Email address – Compromising photos 48
  • 49. Social Networking • Personal information you share online could give cyber criminals enough to piece together your email address and password, mother‟s maiden name --- all that personal info we‟re not supposed to share • Don‟t rely on “recommended” settings or default settings. • Learn about the controls available and make your own decisions. 49
  • 50. Social Networking • Set the privacy and security settings to your personal comfort level for information sharing • It's okay to limit with whom you share your information • When you update your status with your whereabouts on a regular basis, you could tip someone off to your routine – Possible real-life threats like robberies, break-ins or stalking 50
  • 51. Social Networking • Geotags can expose where you live, when you're traveling and even what car you drive – Could make you a target for robbery • Most smartphones and digital cameras have a function that automatically geotags all your photos unless you turn it off • Do you really want everyone to know the location of your newest grandchild? 51
  • 52. Social Networking • If you are in someone‟s home or at their event, get their OK before sharing their private space with your social media friends • It‟s a MUST to ask them first if you plan to geotag anything 52
  • 53. Social Networking • Don‟t forget that long, strong and unique password 53
  • 54. Ransomware • Two common types…. • Lockscreen ransomware: displays an image that prevents you from accessing your computer – FBI Ransomeware • Encryption ransomware: encrypts files on your system's hard drive, preventing you from opening them – Cryptolocker 54
  • 55. Ransomeware • The terms ransomware and scareware are often used interchangeably. • Both are schemes that attempt to make you provide a payment for something you don't want and is probably useless. • Having a recent backup of your data, and taking your computer to a technician if it becomes affected, can mitigate the damage of such schemes. 55
  • 56. Ransomeware • Two common types…. • Lockscreen ransomware: displays an image that prevents you from accessing your computer – FBI Ransomeware • Encryption ransomware: encrypts files on your system's hard drive, preventing you from opening them – Cryptolocker 56
  • 57. Questions?