Your SlideShare is downloading. ×
Online Security     MacPeople    April 14, 2011
In The News:• Epsilon Data Breach • Epsilon holds the marketing lists of more    than 2500 companies was breached    expos...
Epsilon• What’s the Danger? • Email addresses exposed • Marketing information about individuals    exposed. (Who you do bu...
Gawker• What’s the Danger? • Access to your Gawker accounts • If you use the same or similar usernames    and/or passwords...
Immediate Action:• Be extra vigilant about emails, even from  companies you regularly do business with.• Activate or put i...
Long Term Action:• Get your Passwords in order• Limit online credit card exposure• Consider using a secondary email addres...
Passwords
Passwords• Do not repeat  passwords
Passwords• Do not use dictionary  words
Passwords• Use a combination of  letters, numbers and  symbols, upper and  lower case letters
Passwords• Don’t store  passwords in obvious  or insecure places.
Passwords• Use 8 or more  characters
Passwords• Techniques for Remembering Passwords  from Lifehacker: • Create the password based on the site • Substitute let...
Password Managers
1Password
LastPass
1Password
1Password• Search by password• Don’t reuse passwords
1Password• Quickly view the  strength of your  passwords.
1Password• Generate strong  passwords on  the fly
1Password
Limit Credit Card    Exposure
Limit Exposure• Consider using  only limiting your  online purchases  to one credit card.
Limit Exposure• Use a “virtual  card” service is  your bank offers it.
Don’t Store Cards• Don’t store your cards online.
Secondary Email
Secondary Email• Keeps your personal address safe• May “throw away” if becomes  compromised.• Best for dealing with non-hu...
Spam Filtering
Secondary Email• Gmail will check other email accounts• Consolidate multiple accounts into one.
Email Filtering
Email Filtering
Forwarding• Forward mail to your primary account so  you don’t miss a message.
Email Alias
Limit Personal Information
Use Privacy Settings
Don’t Over-share
Don’t Over-share• Don’t use your full birthdate• Don’t include your address or phone  number• Don’t include any informatio...
Remember...if it’s out  there, it can be  compromised!
Online security
Online security
Upcoming SlideShare
Loading in...5
×

Online security

958

Published on

Presentation given at the April 14, 2011 MacPeople Macintosh Users Group. A massive data breach at Episolon compromised the names and email addresses of customers of many major U.S. companies. If you do business with Best Buy, Wallgreens, TiVo, Chase, Target or a host of other companies, you have probably been impacted. We expect to see very targeted "spear phishing" attacks come out of this data breach in the near future. We'll talk about the seriousness of the breach, what precautions you need to take now that this data is out and how you can keep yourself safe from these types of breaches in the future.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
958
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "Online security"

  1. 1. Online Security MacPeople April 14, 2011
  2. 2. In The News:• Epsilon Data Breach • Epsilon holds the marketing lists of more than 2500 companies was breached exposing email addresses.• Gawker Passwords Hacked • Responsible for popular internet sites like Gawker, GIzmodo, Lifehacker and others exposed passwords of 1.3 million users.
  3. 3. Epsilon• What’s the Danger? • Email addresses exposed • Marketing information about individuals exposed. (Who you do business with) • Increase in phishing attacks • Spear Phishing Attacks likely
  4. 4. Gawker• What’s the Danger? • Access to your Gawker accounts • If you use the same or similar usernames and/or passwords across multiple sites, you’ve exposed those sites as well.
  5. 5. Immediate Action:• Be extra vigilant about emails, even from companies you regularly do business with.• Activate or put in place Spam protection.• Make your friends and family aware of the increased risk.
  6. 6. Long Term Action:• Get your Passwords in order• Limit online credit card exposure• Consider using a secondary email address• Limit Personal Information Available Online
  7. 7. Passwords
  8. 8. Passwords• Do not repeat passwords
  9. 9. Passwords• Do not use dictionary words
  10. 10. Passwords• Use a combination of letters, numbers and symbols, upper and lower case letters
  11. 11. Passwords• Don’t store passwords in obvious or insecure places.
  12. 12. Passwords• Use 8 or more characters
  13. 13. Passwords• Techniques for Remembering Passwords from Lifehacker: • Create the password based on the site • Substitute letters for numbers • Use abbreviations based on song lyrics or phrases.
  14. 14. Password Managers
  15. 15. 1Password
  16. 16. LastPass
  17. 17. 1Password
  18. 18. 1Password• Search by password• Don’t reuse passwords
  19. 19. 1Password• Quickly view the strength of your passwords.
  20. 20. 1Password• Generate strong passwords on the fly
  21. 21. 1Password
  22. 22. Limit Credit Card Exposure
  23. 23. Limit Exposure• Consider using only limiting your online purchases to one credit card.
  24. 24. Limit Exposure• Use a “virtual card” service is your bank offers it.
  25. 25. Don’t Store Cards• Don’t store your cards online.
  26. 26. Secondary Email
  27. 27. Secondary Email• Keeps your personal address safe• May “throw away” if becomes compromised.• Best for dealing with non-humans• One more thing to manage
  28. 28. Spam Filtering
  29. 29. Secondary Email• Gmail will check other email accounts• Consolidate multiple accounts into one.
  30. 30. Email Filtering
  31. 31. Email Filtering
  32. 32. Forwarding• Forward mail to your primary account so you don’t miss a message.
  33. 33. Email Alias
  34. 34. Limit Personal Information
  35. 35. Use Privacy Settings
  36. 36. Don’t Over-share
  37. 37. Don’t Over-share• Don’t use your full birthdate• Don’t include your address or phone number• Don’t include any information you use for passwords
  38. 38. Remember...if it’s out there, it can be compromised!

×