SlideShare a Scribd company logo
1 of 11
Lunch and Learn:
How to Protect
Yourself On-line
National Cybersecurity Awareness Month
October 2020
Created by Ken Fishkin
Today’s Agenda
• Securing Your Home
• Social Media
• On-line Shopping
• Identity Theft
3
1
If a bank calls or texts you, don’t give out any information. Call them
back at their official number, if they need info from you.
3 Don’t overshare on social media
5 Purchase identity theft services and consider a family plan
2 Review your credit reports, phone bill and credit card statements
4 Put a freeze on your credit and your kids as well
6 Create social media and USPS informed delivery accounts
IDENTITY THEFT
https://www.consumer.ftc.gov/articles/0497-credit-freeze-faqs
4
20% of all English-speaking respondents answered "pizza“ to their favorite food.
“What is your mother's maiden name?" can often be answered by searching
through the publicly available birth and marriage records.
Knowledge-based authentication answers can either be secure or memorable;
very rarely are they both.
THE FLAWS OF KNOWLEDGE-BASED
AUTHENTICATION
5
MOST IMPORTANT TIP TO PREVENT
IDENTITY THEFT
USE IT FOR ALL INTERNET SERVICES!
6
1 Back up your data!
3 Turn on automatic security patching
5 Look into purchasing a robust anti-malware software package
2
4 Use strong wireless encryption at home (WPA2)
6 Make sure your computer is current (no Windows 7 or XP)
SECURING YOUR HOME
https://www.consumerreports.org/cro/antivirus-software.htm
Organize and centralize your data
7
1 Encrypt your laptop if you are worried about it being lost or stolen
3 Secure WiFi devices, such as surveillance cameras and other on-line
gadgets
2
SECURING YOUR HOME (cont.)
Don’t reuse passwords and consider using a password manager
8
1 Only use credit cards or PayPal - no debit cards
3 Never give more info than needed
5 Don’t use sites that require you to enter personal information to
access coupons or discount codes
2
4 Don’t save your credit card information with companies that are
not name brand companies
6 Be vigilant about reviewing your credit card statements
ON-LINE SHOPPING
Shop directly from on-line store, don’t click on social media ads
9
1
Don’t pay credit card bills via a link from an email – pay directly at
vendor’s site
3 Don’t go “out of bounds” for communication
2
4
ON-LINE SHOPPING (cont.)
Always be skeptical of any unexpected invoice, or request to get
or pay for anything by using gift cards
Beware of deals that are too good to be true
10
1 Don’t overshare!
3 Clean up your friends list
5 Stop geo-tagging photos when you are on vacation
2
4 No legitimate company will ever ask for your password via email
or phone
6
Don't post your birth date, or at least don't post the year you were
born
SOCIAL MEDIA
Only accept friend requests from people that you know
11
1
When you receive an email from a friend about their account being
deleted, directly contact them to confirm
3 Learn how to regain control of a hacked account
5
2
4 Your name, profile picture and cover photo are public
SOCIAL MEDIA (cont.)
Make sure that your privacy settings are set so that your friends
list, photos, and personal information are hidden from the public
Whatever you post online, stays online!

More Related Content

What's hot

What's hot (8)

Social Media and America's Favorite Pastime
Social Media and America's Favorite PastimeSocial Media and America's Favorite Pastime
Social Media and America's Favorite Pastime
 
Insurance Agents and Facebook
Insurance Agents and FacebookInsurance Agents and Facebook
Insurance Agents and Facebook
 
Cabela's: Fall in love with customers on social, presented by Adam Buchanan
Cabela's: Fall in love with customers on social, presented by Adam BuchananCabela's: Fall in love with customers on social, presented by Adam Buchanan
Cabela's: Fall in love with customers on social, presented by Adam Buchanan
 
It’s the most wonderful time of the year
It’s the most wonderful time of the yearIt’s the most wonderful time of the year
It’s the most wonderful time of the year
 
CRM / Loyalty Marketing Experts To Follow On Twitter
CRM / Loyalty Marketing Experts To Follow On TwitterCRM / Loyalty Marketing Experts To Follow On Twitter
CRM / Loyalty Marketing Experts To Follow On Twitter
 
Who's afraid of the FCA? How to comply and thrive on social media
Who's afraid of the FCA? How to comply and thrive on social mediaWho's afraid of the FCA? How to comply and thrive on social media
Who's afraid of the FCA? How to comply and thrive on social media
 
20% OFF
20% OFF20% OFF
20% OFF
 
Bf
BfBf
Bf
 

Similar to National Cybersecurity Awareness Month - Personal Security and Privacy Tips for 2020

ID Theft Prevention
ID Theft PreventionID Theft Prevention
ID Theft Prevention
OremDPS
 
Scam types and its avoidance
Scam types and its avoidanceScam types and its avoidance
Scam types and its avoidance
scamtools
 
Identity Theft article_Good Neighbor magazine
Identity Theft article_Good Neighbor magazineIdentity Theft article_Good Neighbor magazine
Identity Theft article_Good Neighbor magazine
Kristi Valentini
 

Similar to National Cybersecurity Awareness Month - Personal Security and Privacy Tips for 2020 (20)

ID Theft Prevention
ID Theft PreventionID Theft Prevention
ID Theft Prevention
 
Don't Get Taxed by Scams Spotting Phony IRS Tricks in 2024 - BookkeeperLive
Don't Get Taxed by Scams Spotting Phony IRS Tricks in 2024 - BookkeeperLiveDon't Get Taxed by Scams Spotting Phony IRS Tricks in 2024 - BookkeeperLive
Don't Get Taxed by Scams Spotting Phony IRS Tricks in 2024 - BookkeeperLive
 
Common Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid ThemCommon Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid Them
 
Identity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your RiskIdentity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your Risk
 
Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16
 
Tips to avoid Identity Theft
Tips to avoid Identity TheftTips to avoid Identity Theft
Tips to avoid Identity Theft
 
Identity Theft Tips
Identity Theft TipsIdentity Theft Tips
Identity Theft Tips
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14
 
You Can Fight Identity Theft
You Can Fight Identity TheftYou Can Fight Identity Theft
You Can Fight Identity Theft
 
You Have the Power to Stop Identity Theft
You Have the Power to Stop Identity TheftYou Have the Power to Stop Identity Theft
You Have the Power to Stop Identity Theft
 
Youth Protection Guide - Canada
Youth Protection Guide - CanadaYouth Protection Guide - Canada
Youth Protection Guide - Canada
 
Scam types and its avoidance
Scam types and its avoidanceScam types and its avoidance
Scam types and its avoidance
 
Child identity-theft-101
Child identity-theft-101Child identity-theft-101
Child identity-theft-101
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Theft
 
Identity Theft article_Good Neighbor magazine
Identity Theft article_Good Neighbor magazineIdentity Theft article_Good Neighbor magazine
Identity Theft article_Good Neighbor magazine
 
Holiday scams
Holiday scamsHoliday scams
Holiday scams
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid It
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
 
Ballamy LLP's 2016 Christmas card to residential care homes
Ballamy LLP's 2016 Christmas card to residential care homesBallamy LLP's 2016 Christmas card to residential care homes
Ballamy LLP's 2016 Christmas card to residential care homes
 

Recently uploaded

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Recently uploaded (20)

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

National Cybersecurity Awareness Month - Personal Security and Privacy Tips for 2020

  • 1. Lunch and Learn: How to Protect Yourself On-line National Cybersecurity Awareness Month October 2020 Created by Ken Fishkin
  • 2. Today’s Agenda • Securing Your Home • Social Media • On-line Shopping • Identity Theft
  • 3. 3 1 If a bank calls or texts you, don’t give out any information. Call them back at their official number, if they need info from you. 3 Don’t overshare on social media 5 Purchase identity theft services and consider a family plan 2 Review your credit reports, phone bill and credit card statements 4 Put a freeze on your credit and your kids as well 6 Create social media and USPS informed delivery accounts IDENTITY THEFT https://www.consumer.ftc.gov/articles/0497-credit-freeze-faqs
  • 4. 4 20% of all English-speaking respondents answered "pizza“ to their favorite food. “What is your mother's maiden name?" can often be answered by searching through the publicly available birth and marriage records. Knowledge-based authentication answers can either be secure or memorable; very rarely are they both. THE FLAWS OF KNOWLEDGE-BASED AUTHENTICATION
  • 5. 5 MOST IMPORTANT TIP TO PREVENT IDENTITY THEFT USE IT FOR ALL INTERNET SERVICES!
  • 6. 6 1 Back up your data! 3 Turn on automatic security patching 5 Look into purchasing a robust anti-malware software package 2 4 Use strong wireless encryption at home (WPA2) 6 Make sure your computer is current (no Windows 7 or XP) SECURING YOUR HOME https://www.consumerreports.org/cro/antivirus-software.htm Organize and centralize your data
  • 7. 7 1 Encrypt your laptop if you are worried about it being lost or stolen 3 Secure WiFi devices, such as surveillance cameras and other on-line gadgets 2 SECURING YOUR HOME (cont.) Don’t reuse passwords and consider using a password manager
  • 8. 8 1 Only use credit cards or PayPal - no debit cards 3 Never give more info than needed 5 Don’t use sites that require you to enter personal information to access coupons or discount codes 2 4 Don’t save your credit card information with companies that are not name brand companies 6 Be vigilant about reviewing your credit card statements ON-LINE SHOPPING Shop directly from on-line store, don’t click on social media ads
  • 9. 9 1 Don’t pay credit card bills via a link from an email – pay directly at vendor’s site 3 Don’t go “out of bounds” for communication 2 4 ON-LINE SHOPPING (cont.) Always be skeptical of any unexpected invoice, or request to get or pay for anything by using gift cards Beware of deals that are too good to be true
  • 10. 10 1 Don’t overshare! 3 Clean up your friends list 5 Stop geo-tagging photos when you are on vacation 2 4 No legitimate company will ever ask for your password via email or phone 6 Don't post your birth date, or at least don't post the year you were born SOCIAL MEDIA Only accept friend requests from people that you know
  • 11. 11 1 When you receive an email from a friend about their account being deleted, directly contact them to confirm 3 Learn how to regain control of a hacked account 5 2 4 Your name, profile picture and cover photo are public SOCIAL MEDIA (cont.) Make sure that your privacy settings are set so that your friends list, photos, and personal information are hidden from the public Whatever you post online, stays online!