The Secure Communicator: Best Practices for Surviving Heartbleed and Other Threats
Upcoming SlideShare
Loading in...5
×

Like this? Share it with your network

Share

The Secure Communicator: Best Practices for Surviving Heartbleed and Other Threats

  • 623 views
Uploaded on

Do you understand how you’ve been affected by the Heartbleed bug? Are you worried about maintaining your privacy online? (You should be.) Do you know how to best protect client or company......

Do you understand how you’ve been affected by the Heartbleed bug? Are you worried about maintaining your privacy online? (You should be.) Do you know how to best protect client or company information? Is it safe to use social media? Have you heard of ransomware? Are you worried about identity theft?

Most technical communicators know that it’s important to secure their work and online presence, but many don’t know how to do it effectively. Good security can enable—not hinder—your work. Join the presenter as he discusses the steps you can take to adopt a security lifestyle that protects you and enables you to work effectively:

Protecting your computer
Protecting your reputation
Protecting your information
Protecting your identity
Creating strong and memorable passwords
Leveraging cool tools

More in: Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
No Downloads

Views

Total Views
623
On Slideshare
431
From Embeds
192
Number of Embeds
2

Actions

Shares
Downloads
2
Comments
0
Likes
5

Embeds 192

http://benwoelk.com 173
https://www.rebelmouse.com 19

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide
  • Because it’s getting dangerous out there!
  • 2012 Symantec Internet Threat Report <br /> <br /> You’re vulnerable. <br /> What could they want from you? <br /> Anoynmizer <br /> Identity Theft, Corporate secrets <br />
  • Heartbleed <br /> Data from server memory was accessible on “secure” connections.
  • Wonder Fu! <br /> What do I use it for? <br /> What could I use it for that wasn’t intended?
  • Mail the ants
  • Run down the basics
  • Encrypted connections (VPN); SSL; trucrypt; encrypted USBs, hard drives. Encrypt dropbox. Correct addressing.
  • What info are you posting about yourself. Use multiple passwords. Be careful on social networking sites.
  • Reputation management services. Don’t know that they’re worth it. <br /> Keep pumping out good content. <br /> Google alerts.
  • Password vaults. Don’t use the same password for multiple accounts.
  • PSI—Personal Software Inspector

Transcript

  • 1. The Secure Communicator Best Practices for Surviving Heartbleed and Other Threats Ben Woelk Program Manager, Information Security Office Rochester Institute of Technology Director and Community Affairs Committee Chair Society for Technical Communication Ben.woelk@gmail.com Benwoelk.com @benwoelk Author of Shockproofing Your Use of Social Media, available on Amazon.
  • 2. Why Worry?
  • 3. Threat Landscape http://www.symantec.com/content/en/us/enterprise/images/security_response/SYM-ISTR- SMB-Infograph.jpg
  • 4. Threat Landscape
  • 5. Threat Landscape
  • 6. Threat Landscape
  • 7. Threat Landscape
  • 8. Adopting a Security Mindset Inside the Twisted Mind of the Security Professional http://www.schneier.com/essay-210.html
  • 9. About that mindset…
  • 10. The Basics • Anti-virus • Anti-spyware • Firewalls • Patching
  • 11. Protecting Your Information
  • 12. Protecting Your Identity
  • 13. Protecting Your Reputation
  • 14. Passwords
  • 15. Passphrase It was a dark and stormy night becomes ItwasaDark215&StormyNight Length > complexity
  • 16. Cool Tools • Google Dashboard • Browser Plugins – Netcraft – McAfee Site Advisor – Web of Trust (WoT) • Secunia PSI • Password Safes
  • 17. Resources • Goodreads Cyber Security Library • https://www.goodreads.com/search?q=cyber+security+library • Infosec Communicator Blog benwoelk.com • Shockproofing Your Use of Social Media eBook
  • 18. Questions (and Maybe Some Answers) Ben Woelk Ben.woelk@gmail.com Benwoelk.com @benwoelk www.linkedin.com/in/benwoelk/