Uploaded on

Presentation given at the April 14, 2011 MacPeople Macintosh Users Group. A massive data breach at Episolon compromised the names and email addresses of customers of many major U.S. companies. If you …

Presentation given at the April 14, 2011 MacPeople Macintosh Users Group. A massive data breach at Episolon compromised the names and email addresses of customers of many major U.S. companies. If you do business with Best Buy, Wallgreens, TiVo, Chase, Target or a host of other companies, you have probably been impacted. We expect to see very targeted "spear phishing" attacks come out of this data breach in the near future. We'll talk about the seriousness of the breach, what precautions you need to take now that this data is out and how you can keep yourself safe from these types of breaches in the future.

More in: Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
914
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
0
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Online Security MacPeople April 14, 2011
  • 2. In The News:• Epsilon Data Breach • Epsilon holds the marketing lists of more than 2500 companies was breached exposing email addresses.• Gawker Passwords Hacked • Responsible for popular internet sites like Gawker, GIzmodo, Lifehacker and others exposed passwords of 1.3 million users.
  • 3. Epsilon• What’s the Danger? • Email addresses exposed • Marketing information about individuals exposed. (Who you do business with) • Increase in phishing attacks • Spear Phishing Attacks likely
  • 4. Gawker• What’s the Danger? • Access to your Gawker accounts • If you use the same or similar usernames and/or passwords across multiple sites, you’ve exposed those sites as well.
  • 5. Immediate Action:• Be extra vigilant about emails, even from companies you regularly do business with.• Activate or put in place Spam protection.• Make your friends and family aware of the increased risk.
  • 6. Long Term Action:• Get your Passwords in order• Limit online credit card exposure• Consider using a secondary email address• Limit Personal Information Available Online
  • 7. Passwords
  • 8. Passwords• Do not repeat passwords
  • 9. Passwords• Do not use dictionary words
  • 10. Passwords• Use a combination of letters, numbers and symbols, upper and lower case letters
  • 11. Passwords• Don’t store passwords in obvious or insecure places.
  • 12. Passwords• Use 8 or more characters
  • 13. Passwords• Techniques for Remembering Passwords from Lifehacker: • Create the password based on the site • Substitute letters for numbers • Use abbreviations based on song lyrics or phrases.
  • 14. Password Managers
  • 15. 1Password
  • 16. LastPass
  • 17. 1Password
  • 18. 1Password• Search by password• Don’t reuse passwords
  • 19. 1Password• Quickly view the strength of your passwords.
  • 20. 1Password• Generate strong passwords on the fly
  • 21. 1Password
  • 22. Limit Credit Card Exposure
  • 23. Limit Exposure• Consider using only limiting your online purchases to one credit card.
  • 24. Limit Exposure• Use a “virtual card” service is your bank offers it.
  • 25. Don’t Store Cards• Don’t store your cards online.
  • 26. Secondary Email
  • 27. Secondary Email• Keeps your personal address safe• May “throw away” if becomes compromised.• Best for dealing with non-humans• One more thing to manage
  • 28. Spam Filtering
  • 29. Secondary Email• Gmail will check other email accounts• Consolidate multiple accounts into one.
  • 30. Email Filtering
  • 31. Email Filtering
  • 32. Forwarding• Forward mail to your primary account so you don’t miss a message.
  • 33. Email Alias
  • 34. Limit Personal Information
  • 35. Use Privacy Settings
  • 36. Don’t Over-share
  • 37. Don’t Over-share• Don’t use your full birthdate• Don’t include your address or phone number• Don’t include any information you use for passwords
  • 38. Remember...if it’s out there, it can be compromised!