Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Digital self defense 101 me rit

44 views

Published on

Staying safe online presentation by Ben Woelk CISSP. Creative Commons 3.0 license.

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Digital self defense 101 me rit

  1. 1. DSD 101: Tips, Tools, and Best Practices to Stay Safe Online Ben Woelk ISO Program Manager infosec@rit.edu
  2. 2. 2
  3. 3. You’re a Target. Why? • Enter your ideas into the chat 3
  4. 4. You’re a Target. Why? 4
  5. 5. Top online safety practices? • What should someone do to stay safe online? • Enter your recommendations into the chat 5
  6. 6. Top online safety practices? http://googleonlinesecurity.blogspot.com/2015/07/new‐research‐comparing‐how‐security.html 6
  7. 7. Protecting Your Computer and Information https://www.rit.edu/security/content/desktop‐ and‐portable‐computer‐security‐standard (Additional standards/requirements  https://www.rit.edu/security/content/requirement s‐facultystaff) 7
  8. 8. Protecting Your Computer and Information • Policies and Standards https://www.rit.edu/security/content/desktop‐ and‐portable‐computer‐security‐standard (Additional standards/requirements  https://www.rit.edu/security/content/requirement s‐facultystaff) 8
  9. 9. Protecting Your Computer and Information • Policies and Standards • Anti‐virus https://www.rit.edu/security/content/desktop‐ and‐portable‐computer‐security‐standard (Additional standards/requirements  https://www.rit.edu/security/content/requirement s‐facultystaff) 9
  10. 10. Protecting Your Computer and Information • Policies and Standards • Anti‐virus • Firewalls https://www.rit.edu/security/content/desktop‐ and‐portable‐computer‐security‐standard (Additional standards/requirements  https://www.rit.edu/security/content/requirement s‐facultystaff) 10
  11. 11. Protecting Your Computer and Information • Policies and Standards • Anti‐virus • Firewalls • Patching and updates https://www.rit.edu/security/content/desktop‐ and‐portable‐computer‐security‐standard (Additional standards/requirements  https://www.rit.edu/security/content/requirement s‐facultystaff) 11
  12. 12. Protecting Your Computer and Information • Policies and Standards • Anti‐virus • Firewalls • Patching and updates • Passwords/passphrases https://www.rit.edu/security/content/desktop‐ and‐portable‐computer‐security‐standard (Additional standards/requirements  https://www.rit.edu/security/content/requirement s‐facultystaff) 12
  13. 13. http://xkcd.com/936/ Passwords/Passphrases https://www.rit.edu/security/content/password 13
  14. 14. How Strong is Your Password? https://www.grc.com/haystack.htm 14
  15. 15. Six all lower case letters 15
  16. 16. Change one letter to a number 16
  17. 17. Change one letter to uppercase 17
  18. 18. Change one letter to a special character 18
  19. 19. Add length—8 characters 19
  20. 20. 10 characters 20
  21. 21. 12 characters 21
  22. 22. Passphrases It was a dark and  stormy night  22
  23. 23. Passphrases It was a dark and  stormy night  becomes 23
  24. 24. Passphrases It was a dark and  stormy night  becomes ItwasaDark215&StormyNight 24
  25. 25. Passphrases It was a dark and  stormy night  becomes ItwasaDark215&StormyNight Length   > complexity 25
  26. 26. Our passphrase— 25 characters 26
  27. 27. Password Managers 27
  28. 28. Quiz Slide • Do you use a password manager? • Yes • No • ??? 28
  29. 29. Multi-Factor Authentication 29 www.turnon2FA.com
  30. 30. 30 Most Common Way of Getting a Password? • Enter your ideas into the chat
  31. 31. 31 Most Common Way of Getting a Password?
  32. 32. 32 Most Common Way of Getting a Password?
  33. 33. Fraud, Scams, and Malware • Employee Information • Invoices • Attachments 33 http://www.csoonline.com/article/3091795/security/phishing‐scam‐focuses‐on‐the‐basics‐to‐harvest‐ business‐credentials.html
  34. 34. Protecting your identity 34
  35. 35. Ransomware 35
  36. 36. What are the Top Three Ways to Protect Yourself? 36
  37. 37. 37
  38. 38. Mobile Devices, Smartphones, Tablets • Protection commensurate with risk of information accessed or  stored • Storage of private information is prohibited https://www.rit.edu/security/content/desktop‐HTMLStandard 38
  39. 39. QUIZ--Mobile Security Apps • Do you have a mobile security app on your phone? • Yes • No 39
  40. 40. Mobile Security Apps • Lookout Security & Antivirus (Android, iOS) • Avast Mobile Security (Android) • Avast SecureMe (iOS) • Google Authenticator (Android, iOS) • Find My iPhone (iOS) • iVault (iOS) 40
  41. 41. Protecting Your Information 41 https://www.rit.edu/security/content/infor mation‐access‐protection‐standard
  42. 42. Never assume privacy Learn and set social network privacy settings 42
  43. 43. Privacy Settings 43
  44. 44. Login Alerts 44
  45. 45. Google Alerts Monitor  use of  your  name 45
  46. 46. Google My Account Dashboard 46
  47. 47. Google Reverse Image Search • See how often that LinkedIn profile photo is being used. • Go to LinkedIn profile. • Chrome—Right click on image and choose  Search Google for Image • Right click on image. Copy image address. • Click on camera icon in Google search  window. • Paste in image address. 47
  48. 48. Protecting Your Reputation 48
  49. 49. Questions (and maybe some answers) Ben Woelk Ben.woelk@rit.edu ben@benwoelk.com 49
  50. 50. Benwoelk.com 50
  51. 51. Resources • RIT Information Security Standards http://www.rit.edu/security  • Google Research on User vs Expert Practices http://googleonlinesecurity.blogspot.com/2015/07/new‐ research‐comparing‐how‐security.html 51

×