SlideShare a Scribd company logo
1 of 22
Information Security for the
Jobseeker
Allison R. Peirce III, CISSP, GSLC
May 9, 2016
Allison R. Peirce III - 2016
 Security is a choice –make the choice and protect
yourself
 Security through obscurity is really no security at all
 DO NOT SHARE CREDENTIALS!!!!
Information Security for the
Jobseeker
Allison R. Peirce III - 2016
 Information security – a modern necessity
 Imposed in the workplace
 Instituted by function (online banking, Amazon, etc.)
 Ignore the excuses
 ‘Nobody wants to hack me’
 ‘It takes too much time – it’s too complicated’
 ‘Why does my password have to be so hard?’
Introduction
Allison R. Peirce III - 2016
 The 2015 Identity Fraud Study, released by Javelin
Strategy & Research, found that $16 billion was stolen
from 12.7 million U.S. consumers in 2014, compared
with $18 billion and 13.1 million victims a year earlier.
There was a new identity fraud victim every two
seconds in 2014.
 Data breaches totaled 1,540 worldwide in 2014 -- up
46 percent from the year before -- and led to the
compromise of more than one billion data records.
Reality I
Allison R. Peirce III - 2016
 You are outside of your comfort zone with modified
behavior.
 You are not aware of who is watching you.
 What is the impact of a job search
 Short term
 Long term
Focus on the Jobseeker
Allison R. Peirce III - 2016
 What is involved?
 Environments to consider
 Hardware
 Desktop
 Laptop
 Mobile
 Router/Modem/Printer
 Webcam
 Software (OS, Browser, Tools)
 The Internet
Personal Information Security
Allison R. Peirce III - 2016
 Multiple users (what have the others been doing)
 Static network connection
 Firmware not an issue
 Insure power on/BIOS settings are what you want
 Boot order
 Eligible boot devices
 Security settings
Hardware - Desktop
Allison R. Peirce III - 2016
 Laptop
 Multiple accounts (and/or users)
 Multiple network connections defined
 Firmware – only from OEM site
 Check BIOS settings
 Mobile – Tablets and smartphones
 Multiple admin accounts
 Multiple network connections
Hardware - Portable
Allison R. Peirce III - 2016
 Router/Modem/Printer
 Router configuration
 Printers are web enabled
 Webcam
 Can be hacked and used without notice
 Preference – disable integrated webcam, use external
via USB connection
Hardware – Peripheral
Allison R. Peirce III - 2016
 Acceptable
 Windows 7, 8, 8.1, 10
 Current Linux distro (Linux Mint, Ubuntu, etc.)
 Unsupported
 Windows Vista
 Run Away, Run Away
 Windows XP, ME, 98
Software Environment - OS
Allison R. Peirce III - 2016
 Chrome (1a – 1b)
 FireFox (1a – 1b)
 Opera
 IE 11 (support ended for IE 8, 9 and 10 - 1/12/2016)
 Edge (windows 10) – lightweight but some driver
issues
 Do not use unsupported browsers!
Browsers, Browsers, Everywhere
Allison R. Peirce III - 2016
 Default Browser – this will not change ‘by itself’
 Default Search Provider
 Privacy and History settings
 ‘Delete my browser history…….’
 Security Settings
 Extensions, add-ons, BHO’s
 Maintain currency – check for updates
Browser Settings
Allison R. Peirce III - 2016
 Personal exercise – map your usage
 Review your habits
 Blogging, YouTube posting, eBay and Amazon accounts
 Social media activity
 Facebook, Twitter, Instagram (most cameras are GPS
enabled and embed data in photo)
 Private or Incognito browsing does not equal security!
 Beware clickbait
 Chrome - Adblock
The Internet
Allison R. Peirce III - 2016
Safety video
Allison R. Peirce III - 2016
 Disable Guest accounts
 Change default accounts – ID if possible, password
change mandatory
 Verify software source before download or install
 Keep patching up to date
 Validate external storage – disk, DVD/CD, Flash drive
 Router – use password for network access, different
password for router admin account
 Not necessary to hide SSID of network
Safe Practices
Allison R. Peirce III - 2016
 Email – spoofing vs hacking (check sent folder on
client and host)
 Use integral spam filters – set high as comfortable
 If unknown – DO NOT OPEN
 Use rules for routing/sorting
 Archive (but don’t go crazy) – use archive to delete
 Do not click on ‘unsubscribe’ button
 Do not reply with personal data
Email practices - 1
Allison R. Peirce III - 2016
 Attachments
 Only accept from trusted sources
 No .zip, .msi, .exe files
 Office files (.doc/x, .xls/x, .ppt/x) may contain macros –
do not enable by default
 Hover over attachment – view true name
Email practices - 2
Allison R. Peirce III - 2016
 Sharing – not recommended on a default basis
 Bluetooth – turn off or restrict – not secure
 Webcams – keep under control – external preferred
 Remote Support – disable and deny any request for
this level of access
 GoTo Meeting – Exercise extreme caution
 PC Anywhere – NO! (It’s dead, Jim)
Additional practices
Allison R. Peirce III - 2016
It’s Tool time
 Tools you can use (and they’re free)
 Firewall (ZoneAlarm, windows 10 firewall)
 Anti-virus
 Panda, AVG, Avast, ZoneAlarm (FW+AV)
 Malwarebytes (2nd level support) (not free)
 System tools
 Ccleaner, Spybot, Windows Defender
 More is not better – overhead and conflict can let
attackers through
Allison R. Peirce III - 2016
 Software – verify source prior to download/install
 Beware of BHO and ‘companion’ products
 Watch for excessive permission requests
(smartphones)
 Job search sites
 Indeed, CareerBuilder, Dice, Monster
 Valid company career sites
General Practices
Allison R. Peirce III - 2016
 Personal VPN’s – should you use? Free and paid
versions
 Overhead considerations – YMMV
 Encryption
 MS Office, Bit Locker, Axcrypt
 Research and decide
 Social Media
 Watch your posts
 Control access to your content
Last notes
Allison R. Peirce III - 2016
Questions?
Allison R. Peirce III - 2016

More Related Content

What's hot

security privacy,security,web,internet,prevention from hackers,the onion rout...
security privacy,security,web,internet,prevention from hackers,the onion rout...security privacy,security,web,internet,prevention from hackers,the onion rout...
security privacy,security,web,internet,prevention from hackers,the onion rout...ABHAY PATHAK
 
100812 internet security2.0
100812 internet security2.0100812 internet security2.0
100812 internet security2.0dkp205
 
Lessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! HackLessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! HackImperva
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?Lookout
 
Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1rubal_9
 
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)Akhil Sharma
 
Mobile Security at the World Cup
Mobile Security at the World CupMobile Security at the World Cup
Mobile Security at the World CupLookout
 
Internet Safety
Internet SafetyInternet Safety
Internet SafetyTsenn13
 
Ethical Hacking and Network Security
Ethical Hacking and Network SecurityEthical Hacking and Network Security
Ethical Hacking and Network Securitysumit dimri
 
WordPress Website Security - Trends, Threats, Defenses
WordPress Website Security - Trends, Threats, DefensesWordPress Website Security - Trends, Threats, Defenses
WordPress Website Security - Trends, Threats, DefensesTony Perez
 
7 Things People Do To Endanger Their Networks
7 Things People Do To Endanger Their Networks7 Things People Do To Endanger Their Networks
7 Things People Do To Endanger Their Networksjaymemcree
 
Basic Digital Security
Basic Digital SecurityBasic Digital Security
Basic Digital SecurityUjjwal Acharya
 
Threat Modeling 101
Threat Modeling 101Threat Modeling 101
Threat Modeling 101Atlassian
 

What's hot (20)

security privacy,security,web,internet,prevention from hackers,the onion rout...
security privacy,security,web,internet,prevention from hackers,the onion rout...security privacy,security,web,internet,prevention from hackers,the onion rout...
security privacy,security,web,internet,prevention from hackers,the onion rout...
 
C 7
C 7C 7
C 7
 
Health Information Privacy and Security
Health Information Privacy and SecurityHealth Information Privacy and Security
Health Information Privacy and Security
 
100812 internet security2.0
100812 internet security2.0100812 internet security2.0
100812 internet security2.0
 
Lessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! HackLessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! Hack
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
 
Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1
 
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
 
SECURITY AWARENESS
SECURITY AWARENESSSECURITY AWARENESS
SECURITY AWARENESS
 
Spyware
SpywareSpyware
Spyware
 
Mobile Security at the World Cup
Mobile Security at the World CupMobile Security at the World Cup
Mobile Security at the World Cup
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Ethical Hacking and Network Security
Ethical Hacking and Network SecurityEthical Hacking and Network Security
Ethical Hacking and Network Security
 
Spyware
SpywareSpyware
Spyware
 
WordPress Website Security - Trends, Threats, Defenses
WordPress Website Security - Trends, Threats, DefensesWordPress Website Security - Trends, Threats, Defenses
WordPress Website Security - Trends, Threats, Defenses
 
7 Things People Do To Endanger Their Networks
7 Things People Do To Endanger Their Networks7 Things People Do To Endanger Their Networks
7 Things People Do To Endanger Their Networks
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPESMALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Spyware and key loggers
Spyware and key loggersSpyware and key loggers
Spyware and key loggers
 
Basic Digital Security
Basic Digital SecurityBasic Digital Security
Basic Digital Security
 
Threat Modeling 101
Threat Modeling 101Threat Modeling 101
Threat Modeling 101
 

Viewers also liked

CISSP Week 13
CISSP Week 13CISSP Week 13
CISSP Week 13jemtallon
 
What is ISO 27001 and why you should get compliant
What is ISO 27001 and why you should get compliant What is ISO 27001 and why you should get compliant
What is ISO 27001 and why you should get compliant Ajay Unni
 
Enumerating software security design flaws throughout the ssdlc cosac - 201...
Enumerating software security design flaws throughout the ssdlc   cosac - 201...Enumerating software security design flaws throughout the ssdlc   cosac - 201...
Enumerating software security design flaws throughout the ssdlc cosac - 201...John M. Willis
 
Top management role to implement ISO 27001
Top management role to implement ISO 27001Top management role to implement ISO 27001
Top management role to implement ISO 27001PECB
 
Pactera Cybersecurity - Application Security Penetration Testing - Mobile, We...
Pactera Cybersecurity - Application Security Penetration Testing - Mobile, We...Pactera Cybersecurity - Application Security Penetration Testing - Mobile, We...
Pactera Cybersecurity - Application Security Penetration Testing - Mobile, We...Kyle Lai
 
Pactera - Cloud, Application, Cyber Security Trend 2016
Pactera - Cloud, Application, Cyber Security Trend 2016Pactera - Cloud, Application, Cyber Security Trend 2016
Pactera - Cloud, Application, Cyber Security Trend 2016Kyle Lai
 
Slide Deck - CISSP Mentor Program Class Session 1
Slide Deck - CISSP Mentor Program Class Session 1Slide Deck - CISSP Mentor Program Class Session 1
Slide Deck - CISSP Mentor Program Class Session 1FRSecure
 
CISSP introduction 2016 Udemy Course
CISSP introduction 2016 Udemy CourseCISSP introduction 2016 Udemy Course
CISSP introduction 2016 Udemy CourseAdrian Mikeliunas
 
CISSP Prep: Ch 9. Software Development Security
CISSP Prep: Ch 9. Software Development SecurityCISSP Prep: Ch 9. Software Development Security
CISSP Prep: Ch 9. Software Development SecuritySam Bowne
 
What is ISO 27001 ISMS
What is ISO 27001 ISMSWhat is ISO 27001 ISMS
What is ISO 27001 ISMSBusiness Beam
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Securitybelsis
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 pptvasanthimuniasamy
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITYAhmed Moussa
 
Enumerating software security design flaws throughout the SSDLC
Enumerating software security design flaws throughout the SSDLCEnumerating software security design flaws throughout the SSDLC
Enumerating software security design flaws throughout the SSDLCJohn M. Willis
 

Viewers also liked (16)

CISSP Week 13
CISSP Week 13CISSP Week 13
CISSP Week 13
 
What and Why of ISO9001
What and Why of ISO9001 What and Why of ISO9001
What and Why of ISO9001
 
What is ISO 27001 and why you should get compliant
What is ISO 27001 and why you should get compliant What is ISO 27001 and why you should get compliant
What is ISO 27001 and why you should get compliant
 
Enumerating software security design flaws throughout the ssdlc cosac - 201...
Enumerating software security design flaws throughout the ssdlc   cosac - 201...Enumerating software security design flaws throughout the ssdlc   cosac - 201...
Enumerating software security design flaws throughout the ssdlc cosac - 201...
 
Top management role to implement ISO 27001
Top management role to implement ISO 27001Top management role to implement ISO 27001
Top management role to implement ISO 27001
 
Pactera Cybersecurity - Application Security Penetration Testing - Mobile, We...
Pactera Cybersecurity - Application Security Penetration Testing - Mobile, We...Pactera Cybersecurity - Application Security Penetration Testing - Mobile, We...
Pactera Cybersecurity - Application Security Penetration Testing - Mobile, We...
 
Pactera - Cloud, Application, Cyber Security Trend 2016
Pactera - Cloud, Application, Cyber Security Trend 2016Pactera - Cloud, Application, Cyber Security Trend 2016
Pactera - Cloud, Application, Cyber Security Trend 2016
 
Slide Deck - CISSP Mentor Program Class Session 1
Slide Deck - CISSP Mentor Program Class Session 1Slide Deck - CISSP Mentor Program Class Session 1
Slide Deck - CISSP Mentor Program Class Session 1
 
CISSP introduction 2016 Udemy Course
CISSP introduction 2016 Udemy CourseCISSP introduction 2016 Udemy Course
CISSP introduction 2016 Udemy Course
 
CISSP Prep: Ch 9. Software Development Security
CISSP Prep: Ch 9. Software Development SecurityCISSP Prep: Ch 9. Software Development Security
CISSP Prep: Ch 9. Software Development Security
 
What is ISO 27001 ISMS
What is ISO 27001 ISMSWhat is ISO 27001 ISMS
What is ISO 27001 ISMS
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 ppt
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 
Enumerating software security design flaws throughout the SSDLC
Enumerating software security design flaws throughout the SSDLCEnumerating software security design flaws throughout the SSDLC
Enumerating software security design flaws throughout the SSDLC
 
Digital in 2016
Digital in 2016Digital in 2016
Digital in 2016
 

Similar to Information Security for the Jobseeker

The Ins, Outs, and Nuances of Internet Privacy
The Ins, Outs, and Nuances of Internet PrivacyThe Ins, Outs, and Nuances of Internet Privacy
The Ins, Outs, and Nuances of Internet PrivacyeBoost Consulting
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Securitydkp205
 
Health Information Privacy and Security (November 8, 2021)
Health Information Privacy and Security (November 8, 2021)Health Information Privacy and Security (November 8, 2021)
Health Information Privacy and Security (November 8, 2021)Nawanan Theera-Ampornpunt
 
Health Information Privacy and Security (October 21, 2020)
Health Information Privacy and Security (October 21, 2020)Health Information Privacy and Security (October 21, 2020)
Health Information Privacy and Security (October 21, 2020)Nawanan Theera-Ampornpunt
 
Health Information Privacy and Security (October 30, 2019)
Health Information Privacy and Security (October 30, 2019)Health Information Privacy and Security (October 30, 2019)
Health Information Privacy and Security (October 30, 2019)Nawanan Theera-Ampornpunt
 
Securing, Buying, and buying computers 4-H
Securing, Buying, and buying computers 4-HSecuring, Buying, and buying computers 4-H
Securing, Buying, and buying computers 4-Hjmoore55
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pestspeterhitch
 
I’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextI’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextBrian Pichman
 
SL_Long Beach_Creative Artists_12_04_2015
SL_Long Beach_Creative Artists_12_04_2015SL_Long Beach_Creative Artists_12_04_2015
SL_Long Beach_Creative Artists_12_04_2015Jon Papp
 
Spyware.pdf
Spyware.pdfSpyware.pdf
Spyware.pdfDIU
 
Why My E Identity Needs Protection
Why My E Identity Needs ProtectionWhy My E Identity Needs Protection
Why My E Identity Needs Protectionecarrow
 
Why Two-Factor Isn't Enough
Why Two-Factor Isn't EnoughWhy Two-Factor Isn't Enough
Why Two-Factor Isn't EnoughSecureAuth
 
Protecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyProtecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyAEGILITY
 
Year 7 - Week 5 esafety
Year 7 - Week 5   esafetyYear 7 - Week 5   esafety
Year 7 - Week 5 esafetyteachesict
 

Similar to Information Security for the Jobseeker (20)

The Ins, Outs, and Nuances of Internet Privacy
The Ins, Outs, and Nuances of Internet PrivacyThe Ins, Outs, and Nuances of Internet Privacy
The Ins, Outs, and Nuances of Internet Privacy
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Security
 
Health Information Privacy and Security (November 8, 2021)
Health Information Privacy and Security (November 8, 2021)Health Information Privacy and Security (November 8, 2021)
Health Information Privacy and Security (November 8, 2021)
 
Cybersecurity (November 12, 2021)
Cybersecurity (November 12, 2021)Cybersecurity (November 12, 2021)
Cybersecurity (November 12, 2021)
 
Health Information Privacy and Security (October 21, 2020)
Health Information Privacy and Security (October 21, 2020)Health Information Privacy and Security (October 21, 2020)
Health Information Privacy and Security (October 21, 2020)
 
Overview of Information Security & Privacy
Overview of Information Security & PrivacyOverview of Information Security & Privacy
Overview of Information Security & Privacy
 
Health Information Privacy and Security (October 30, 2019)
Health Information Privacy and Security (October 30, 2019)Health Information Privacy and Security (October 30, 2019)
Health Information Privacy and Security (October 30, 2019)
 
IT Security for Small Business
IT Security for Small BusinessIT Security for Small Business
IT Security for Small Business
 
Securing, Buying, and buying computers 4-H
Securing, Buying, and buying computers 4-HSecuring, Buying, and buying computers 4-H
Securing, Buying, and buying computers 4-H
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
I’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextI’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take Next
 
SL_Long Beach_Creative Artists_12_04_2015
SL_Long Beach_Creative Artists_12_04_2015SL_Long Beach_Creative Artists_12_04_2015
SL_Long Beach_Creative Artists_12_04_2015
 
Spyware.pdf
Spyware.pdfSpyware.pdf
Spyware.pdf
 
Avoiding Common Security Breaches & HIPAA Violations
Avoiding Common Security Breaches & HIPAA ViolationsAvoiding Common Security Breaches & HIPAA Violations
Avoiding Common Security Breaches & HIPAA Violations
 
Why My E Identity Needs Protection
Why My E Identity Needs ProtectionWhy My E Identity Needs Protection
Why My E Identity Needs Protection
 
Why Two-Factor Isn't Enough
Why Two-Factor Isn't EnoughWhy Two-Factor Isn't Enough
Why Two-Factor Isn't Enough
 
Health Information Privacy and Security
Health Information Privacy and SecurityHealth Information Privacy and Security
Health Information Privacy and Security
 
Protecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyProtecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World Safety
 
Year 7 - Week 5 esafety
Year 7 - Week 5   esafetyYear 7 - Week 5   esafety
Year 7 - Week 5 esafety
 
Health Information Privacy and Security
Health Information Privacy and SecurityHealth Information Privacy and Security
Health Information Privacy and Security
 

Information Security for the Jobseeker

  • 1. Information Security for the Jobseeker Allison R. Peirce III, CISSP, GSLC May 9, 2016 Allison R. Peirce III - 2016
  • 2.  Security is a choice –make the choice and protect yourself  Security through obscurity is really no security at all  DO NOT SHARE CREDENTIALS!!!! Information Security for the Jobseeker Allison R. Peirce III - 2016
  • 3.  Information security – a modern necessity  Imposed in the workplace  Instituted by function (online banking, Amazon, etc.)  Ignore the excuses  ‘Nobody wants to hack me’  ‘It takes too much time – it’s too complicated’  ‘Why does my password have to be so hard?’ Introduction Allison R. Peirce III - 2016
  • 4.  The 2015 Identity Fraud Study, released by Javelin Strategy & Research, found that $16 billion was stolen from 12.7 million U.S. consumers in 2014, compared with $18 billion and 13.1 million victims a year earlier. There was a new identity fraud victim every two seconds in 2014.  Data breaches totaled 1,540 worldwide in 2014 -- up 46 percent from the year before -- and led to the compromise of more than one billion data records. Reality I Allison R. Peirce III - 2016
  • 5.  You are outside of your comfort zone with modified behavior.  You are not aware of who is watching you.  What is the impact of a job search  Short term  Long term Focus on the Jobseeker Allison R. Peirce III - 2016
  • 6.  What is involved?  Environments to consider  Hardware  Desktop  Laptop  Mobile  Router/Modem/Printer  Webcam  Software (OS, Browser, Tools)  The Internet Personal Information Security Allison R. Peirce III - 2016
  • 7.  Multiple users (what have the others been doing)  Static network connection  Firmware not an issue  Insure power on/BIOS settings are what you want  Boot order  Eligible boot devices  Security settings Hardware - Desktop Allison R. Peirce III - 2016
  • 8.  Laptop  Multiple accounts (and/or users)  Multiple network connections defined  Firmware – only from OEM site  Check BIOS settings  Mobile – Tablets and smartphones  Multiple admin accounts  Multiple network connections Hardware - Portable Allison R. Peirce III - 2016
  • 9.  Router/Modem/Printer  Router configuration  Printers are web enabled  Webcam  Can be hacked and used without notice  Preference – disable integrated webcam, use external via USB connection Hardware – Peripheral Allison R. Peirce III - 2016
  • 10.  Acceptable  Windows 7, 8, 8.1, 10  Current Linux distro (Linux Mint, Ubuntu, etc.)  Unsupported  Windows Vista  Run Away, Run Away  Windows XP, ME, 98 Software Environment - OS Allison R. Peirce III - 2016
  • 11.  Chrome (1a – 1b)  FireFox (1a – 1b)  Opera  IE 11 (support ended for IE 8, 9 and 10 - 1/12/2016)  Edge (windows 10) – lightweight but some driver issues  Do not use unsupported browsers! Browsers, Browsers, Everywhere Allison R. Peirce III - 2016
  • 12.  Default Browser – this will not change ‘by itself’  Default Search Provider  Privacy and History settings  ‘Delete my browser history…….’  Security Settings  Extensions, add-ons, BHO’s  Maintain currency – check for updates Browser Settings Allison R. Peirce III - 2016
  • 13.  Personal exercise – map your usage  Review your habits  Blogging, YouTube posting, eBay and Amazon accounts  Social media activity  Facebook, Twitter, Instagram (most cameras are GPS enabled and embed data in photo)  Private or Incognito browsing does not equal security!  Beware clickbait  Chrome - Adblock The Internet Allison R. Peirce III - 2016
  • 14. Safety video Allison R. Peirce III - 2016
  • 15.  Disable Guest accounts  Change default accounts – ID if possible, password change mandatory  Verify software source before download or install  Keep patching up to date  Validate external storage – disk, DVD/CD, Flash drive  Router – use password for network access, different password for router admin account  Not necessary to hide SSID of network Safe Practices Allison R. Peirce III - 2016
  • 16.  Email – spoofing vs hacking (check sent folder on client and host)  Use integral spam filters – set high as comfortable  If unknown – DO NOT OPEN  Use rules for routing/sorting  Archive (but don’t go crazy) – use archive to delete  Do not click on ‘unsubscribe’ button  Do not reply with personal data Email practices - 1 Allison R. Peirce III - 2016
  • 17.  Attachments  Only accept from trusted sources  No .zip, .msi, .exe files  Office files (.doc/x, .xls/x, .ppt/x) may contain macros – do not enable by default  Hover over attachment – view true name Email practices - 2 Allison R. Peirce III - 2016
  • 18.  Sharing – not recommended on a default basis  Bluetooth – turn off or restrict – not secure  Webcams – keep under control – external preferred  Remote Support – disable and deny any request for this level of access  GoTo Meeting – Exercise extreme caution  PC Anywhere – NO! (It’s dead, Jim) Additional practices Allison R. Peirce III - 2016
  • 19. It’s Tool time  Tools you can use (and they’re free)  Firewall (ZoneAlarm, windows 10 firewall)  Anti-virus  Panda, AVG, Avast, ZoneAlarm (FW+AV)  Malwarebytes (2nd level support) (not free)  System tools  Ccleaner, Spybot, Windows Defender  More is not better – overhead and conflict can let attackers through Allison R. Peirce III - 2016
  • 20.  Software – verify source prior to download/install  Beware of BHO and ‘companion’ products  Watch for excessive permission requests (smartphones)  Job search sites  Indeed, CareerBuilder, Dice, Monster  Valid company career sites General Practices Allison R. Peirce III - 2016
  • 21.  Personal VPN’s – should you use? Free and paid versions  Overhead considerations – YMMV  Encryption  MS Office, Bit Locker, Axcrypt  Research and decide  Social Media  Watch your posts  Control access to your content Last notes Allison R. Peirce III - 2016