The Secure Communicator 
Best Practices for Surviving Heartbleed and 
Other Threats 
Ben Woelk 
Program Manager, Informati...
Why Worry?
Threat Landscape 
http://www.symantec.com/content/en/us/enterprise/images/security_response/SYM-ISTR- 
SMB-Infograph.jpg
Threat Landscape
Threat Landscape
Threat Landscape
Threat Landscape
Adopting a Security Mindset 
Inside the Twisted Mind of the Security Professional 
http://www.schneier.com/essay-210.html
About that mindset…
The 
Basics 
• Anti-virus 
• Anti-spyware 
• Firewalls 
• Patching
Protecting 
Your 
Information
Protecting 
Your 
Identity
Protecting 
Your 
Reputation
Passwords
Passphrase 
It was a dark and 
stormy night 
becomes 
ItwasaDark215&StormyNight 
Length > complexity
Cool Tools 
• Google Dashboard 
• Browser Plugins 
– Netcraft 
– McAfee Site Advisor 
– Web of Trust (WoT) 
• Secunia PSI ...
Resources 
• Goodreads Cyber Security Library 
• https://www.goodreads.com/search?q=cyber+security+library 
• Infosec Comm...
Questions (and Maybe Some 
Answers) 
Ben Woelk 
Ben.woelk@gmail.com 
Benwoelk.com 
@benwoelk 
www.linkedin.com/in/benwoelk/
The Secure Communicator: Best Practices for Surviving Heartbleed and Other Threats
Upcoming SlideShare
Loading in...5
×

The Secure Communicator: Best Practices for Surviving Heartbleed and Other Threats

1,365

Published on

Do you understand how you’ve been affected by the Heartbleed bug? Are you worried about maintaining your privacy online? (You should be.) Do you know how to best protect client or company information? Is it safe to use social media? Have you heard of ransomware? Are you worried about identity theft?

Most technical communicators know that it’s important to secure their work and online presence, but many don’t know how to do it effectively. Good security can enable—not hinder—your work. Join the presenter as he discusses the steps you can take to adopt a security lifestyle that protects you and enables you to work effectively:

Protecting your computer
Protecting your reputation
Protecting your information
Protecting your identity
Creating strong and memorable passwords
Leveraging cool tools

Published in: Technology
0 Comments
5 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
1,365
On Slideshare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
4
Comments
0
Likes
5
Embeds 0
No embeds

No notes for slide
  • Because it’s getting dangerous out there!
  • 2012 Symantec Internet Threat Report

    You’re vulnerable.
    What could they want from you?
    Anoynmizer
    Identity Theft, Corporate secrets
  • Heartbleed
    Data from server memory was accessible on “secure” connections.
  • Wonder Fu!
    What do I use it for?
    What could I use it for that wasn’t intended?
  • Mail the ants
  • Run down the basics
  • Encrypted connections (VPN); SSL; trucrypt; encrypted USBs, hard drives. Encrypt dropbox. Correct addressing.
  • What info are you posting about yourself. Use multiple passwords. Be careful on social networking sites.
  • Reputation management services. Don’t know that they’re worth it.
    Keep pumping out good content.
    Google alerts.
  • Password vaults. Don’t use the same password for multiple accounts.
  • PSI—Personal Software Inspector
  • The Secure Communicator: Best Practices for Surviving Heartbleed and Other Threats

    1. 1. The Secure Communicator Best Practices for Surviving Heartbleed and Other Threats Ben Woelk Program Manager, Information Security Office Rochester Institute of Technology Director and Community Affairs Committee Chair Society for Technical Communication Ben.woelk@gmail.com Benwoelk.com @benwoelk Author of Shockproofing Your Use of Social Media, available on Amazon.
    2. 2. Why Worry?
    3. 3. Threat Landscape http://www.symantec.com/content/en/us/enterprise/images/security_response/SYM-ISTR- SMB-Infograph.jpg
    4. 4. Threat Landscape
    5. 5. Threat Landscape
    6. 6. Threat Landscape
    7. 7. Threat Landscape
    8. 8. Adopting a Security Mindset Inside the Twisted Mind of the Security Professional http://www.schneier.com/essay-210.html
    9. 9. About that mindset…
    10. 10. The Basics • Anti-virus • Anti-spyware • Firewalls • Patching
    11. 11. Protecting Your Information
    12. 12. Protecting Your Identity
    13. 13. Protecting Your Reputation
    14. 14. Passwords
    15. 15. Passphrase It was a dark and stormy night becomes ItwasaDark215&StormyNight Length > complexity
    16. 16. Cool Tools • Google Dashboard • Browser Plugins – Netcraft – McAfee Site Advisor – Web of Trust (WoT) • Secunia PSI • Password Safes
    17. 17. Resources • Goodreads Cyber Security Library • https://www.goodreads.com/search?q=cyber+security+library • Infosec Communicator Blog benwoelk.com • Shockproofing Your Use of Social Media eBook
    18. 18. Questions (and Maybe Some Answers) Ben Woelk Ben.woelk@gmail.com Benwoelk.com @benwoelk www.linkedin.com/in/benwoelk/
    1. A particular slide catching your eye?

      Clipping is a handy way to collect important slides you want to go back to later.

    ×