Staying Safe Online for HR Professionals

Ben Woelk, CISSP, CPTC
Ben Woelk, CISSP, CPTCSecurity awareness expert | Content strategist | Professor | Introverted leadership mentor, coach | Speaker | Writer
Staying Safe Online for HR Professionals
Introduction
Awareness is
the key
Everyone is a target
Organized crime
funds the
attacks
Threat Landscape—
What’s Being Stolen
Staying Safe Online for HR Professionals
Staying Safe Online for HR Professionals
Staying Safe Online for HR Professionals
Staying Safe Online for HR Professionals
Staying Safe Online for HR Professionals
Staying Safe Online for HR Professionals
Creating and
using strong
passwords, aka
passphrases
Length > complexity
TIP #1
It was a dark and
stormy night
becomes
ItwasaDark215andStormyNight
https://www.grc.com/haystack.htm
Staying Safe Online for HR Professionals
Keep Your Software (and Hardware
up to date!
TIP #2
TIP #3
Use
protection
Recognize
phishing &
scams
TIP #4
Use social
networks
safely
TIP #5
Staying Safe Online for HR Professionals
Remember
who else
is there
• Employers
• Identity thieves
• Online predators
TIP #6
Don’t post
inappropriate
photos!
Be
wary
of
others
Is this really your friend..?
TIP #7
TIP #8
Monitor
use of
your
name
Guard your
personal
information
Watch out for Facebook
applications!
TIP #9
Never
assume
privacy
TIP #10
Staying Safe Online for HR Professionals
Staying Safe Online for HR Professionals
Questions (and maybe some
answers)
Ben Woelk
Ben.woelk@gmail.com
Benwoelk.com
@benwoelk
www.linkedin.com/in/benwoelk/
1 of 27

More Related Content

What's hot(14)

Rules for success when developing for cameras.Rules for success when developing for cameras.
Rules for success when developing for cameras.
Evercam - Construction Time-lapse & Project Management Cameras1.5K views
Internet security lessons for IoTInternet security lessons for IoT
Internet security lessons for IoT
Dirk Zittersteyn314 views
Cyber Espionage: Are You Being Hunted?Cyber Espionage: Are You Being Hunted?
Cyber Espionage: Are You Being Hunted?
5 Minute Webinars453 views
Securing blockchain assetsSecuring blockchain assets
Securing blockchain assets
Simon Wilson137 views
Cybersecurity of studentsCybersecurity of students
Cybersecurity of students
Constantinos Loizou (Msc Engineer)155 views
10 rules to be safe on internet10 rules to be safe on internet
10 rules to be safe on internet
Constanza Godoy33 views
Practical Cyber DefensePractical Cyber Defense
Practical Cyber Defense
Paul Dutot IEng MIET MBCS CITP OSCP CSTM778 views
Wi fi quizWi fi quiz
Wi fi quiz
andycrute167 views
Audit and securityAudit and security
Audit and security
Raymond Long58 views
Privacy in Wireless NetworksPrivacy in Wireless Networks
Privacy in Wireless Networks
Michael Boman754 views

Viewers also liked(6)

Digital Self Defense at RITDigital Self Defense at RIT
Digital Self Defense at RIT
Ben Woelk, CISSP, CPTC659 views
Cyber Safety for Middle School Students and ParentsCyber Safety for Middle School Students and Parents
Cyber Safety for Middle School Students and Parents
Ben Woelk, CISSP, CPTC933 views
2012 parents - student online safety2012 parents - student online safety
2012 parents - student online safety
SchoolTechPolicies.com359 views
Internet SafetyInternet Safety
Internet Safety
uarkgradstudent878 views
Plagiarism PigstyPlagiarism Pigsty
Plagiarism Pigsty
Linda McSweeney4.3K views

Similar to Staying Safe Online for HR Professionals(20)

Shockproofing your Use of Social Media: 2014Shockproofing your Use of Social Media: 2014
Shockproofing your Use of Social Media: 2014
Ben Woelk, CISSP, CPTC2.8K views
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
ritik shukla4.9K views
Netiquette  on using internetNetiquette  on using internet
Netiquette on using internet
Maricrs Alfarö2.2K views
ch07-Security.pptxch07-Security.pptx
ch07-Security.pptx
LuckySaigon18 views
Internet safetyInternet safety
Internet safety
Sofia Cennini Zezere489 views
HackingHacking
Hacking
NarendraGadde246 views
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
ICT Frame Magazine Pvt. Ltd.590 views
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
davidcurriecia5.3K views
Drooger, jack   cyber securityDrooger, jack   cyber security
Drooger, jack cyber security
Hagerstown Chamber Business Expo328 views
Opsec for familiesOpsec for families
Opsec for families
Lindy Kyzer2.9K views
Top Ten Ways to Shockproof Your Use of Social MediaTop Ten Ways to Shockproof Your Use of Social Media
Top Ten Ways to Shockproof Your Use of Social Media
Ben Woelk, CISSP, CPTC562 views
Shockproofing Your Use of Social MediaShockproofing Your Use of Social Media
Shockproofing Your Use of Social Media
Carolina Chapter of STC1.1K views
Computer & internet SecurityComputer & internet Security
Computer & internet Security
Gerard Lamusse1.4K views

More from Ben Woelk, CISSP, CPTC(20)

Saying "Yes, and...?" to Leadership OpportunitiesSaying "Yes, and...?" to Leadership Opportunities
Saying "Yes, and...?" to Leadership Opportunities
Ben Woelk, CISSP, CPTC157 views
Perspectives on Mentoring: Selected StoriesPerspectives on Mentoring: Selected Stories
Perspectives on Mentoring: Selected Stories
Ben Woelk, CISSP, CPTC140 views
Building a Culture of Digital Self DefenseBuilding a Culture of Digital Self Defense
Building a Culture of Digital Self Defense
Ben Woelk, CISSP, CPTC260 views
Digital self defense 101 me ritDigital self defense 101 me rit
Digital self defense 101 me rit
Ben Woelk, CISSP, CPTC131 views
An Introvert's Journey to LeadershipAn Introvert's Journey to Leadership
An Introvert's Journey to Leadership
Ben Woelk, CISSP, CPTC1.9K views
Digital self defense iia isaca it audit seminarDigital self defense iia isaca it audit seminar
Digital self defense iia isaca it audit seminar
Ben Woelk, CISSP, CPTC1.1K views
Succession Planning and VolunteeringSuccession Planning and Volunteering
Succession Planning and Volunteering
Ben Woelk, CISSP, CPTC974 views
Digital Self DefenseDigital Self Defense
Digital Self Defense
Ben Woelk, CISSP, CPTC697 views
A Techcomm Bestiary Summit14A Techcomm Bestiary Summit14
A Techcomm Bestiary Summit14
Ben Woelk, CISSP, CPTC2.8K views
A Techcomm Bestiary Spectrum14A Techcomm Bestiary Spectrum14
A Techcomm Bestiary Spectrum14
Ben Woelk, CISSP, CPTC2.2K views
UNYCC Information Security DiscussionUNYCC Information Security Discussion
UNYCC Information Security Discussion
Ben Woelk, CISSP, CPTC1.5K views
Empowering the Introvert Within stc13Empowering the Introvert Within stc13
Empowering the Introvert Within stc13
Ben Woelk, CISSP, CPTC1.5K views

Recently uploaded(20)

Effective Supervisory SkillEffective Supervisory Skill
Effective Supervisory Skill
Seta Wicaksana13 views
The Business Tycoons(March-2023) - Womens Day MagazineThe Business Tycoons(March-2023) - Womens Day Magazine
The Business Tycoons(March-2023) - Womens Day Magazine
Global India Business Forum14 views
Corporate DeckCorporate Deck
Corporate Deck
Equinox Gold Corp.228 views
PROGRAMME.pdfPROGRAMME.pdf
PROGRAMME.pdf
HiNedHaJar64 views
Car license plate holder.pdfCar license plate holder.pdf
Car license plate holder.pdf
JAWADIQBAL4028 views
Forex secret Forex secret
Forex secret
konghatatih10 views
ZARA.pptxZARA.pptx
ZARA.pptx
merlinjenma52918 views
Skilled Landscape ContractorSkilled Landscape Contractor
Skilled Landscape Contractor
EmmanuelRyker12 views
Greece opens countless opportunities for techiesGreece opens countless opportunities for techies
Greece opens countless opportunities for techies
Abhinav Immigration Services Pvt. Ltd.16 views
valuation firm.valuation firm.
valuation firm.
NandniDhyani9 views
23BBA10204-ASHNISH KUMAR.pdf23BBA10204-ASHNISH KUMAR.pdf
23BBA10204-ASHNISH KUMAR.pdf
shreyajha73121 views

Staying Safe Online for HR Professionals

Editor's Notes

  1. Hi, I’m Ben Woelk. I’m the Policy and Awareness Analyst in the RIT information Security Office. Part of my role is to build a culture of security awareness. Today we’re going to learn about Shockproofing Your Use of Social Media. In other words, how to stay safe online.
  2. Does anybody see anything wrong with this picture? Here’s the problem, Everyone is a Target. Identity theft is big business. It’s not done by hackers sitting in their basements. Well maybe some of the people committing identity theft are hackers in their basements, but they’re funded by organized crime.
  3. Here’s the big problem: You can’t rely on others to protect you. You need to learn to protect yourself. That’s what this presentation is all about—giving you ten tips to stay safe online.
  4. 2012 Symantec Internet Threat Report You’re vulnerable. What could they want from you? Anoynmizer Identity Theft, Corporate secrets
  5. 2012 Symantec Internet Threat Report You’re vulnerable. What could they want from you? Anoynmizer Identity Theft, Corporate secrets
  6. Tip #1: Use a Passphrase. We’ve all heard about passwords. I want you to start using passphrases. Passphrases are long, but easier to remember than a password. Length is more important than complexity. Throw in some numbers and capital letters and the phrase on the screen becomes ItwasaDark215andStormyNight. Easy to remember.
  7. You may want to use a Password Safe or Vault. Two good ones are Password Gorilla and LastPass, a browser plug in. The vault generates long complex passwords and stores them. You protect your password safe or vault with a long passphrase. When you visit a website, LastPass will supply the password you need to log in.
  8. Tip # 2: Stay up to date. Attackers exploit vulnerabilities in software. Software vendors release patches to address these vulnerabilities. We all know that we need to keep our operating systems up to date. You also need to keep your applications up to date. Make sure you’ve turned on auto update.
  9. Tip #3: Use Protection. No, there’s no such thing as an iCondom. However, one of the best ways to protect your computer is to use layers of security. Use anti-virus, a firewall, and anti-spyware. Mac users need antivirus and need to make sure your firewall is enabled. And don’t forget about your mobile devices. They’re starting to become more and more of a target.
  10. Tip #4: Recognize Phishing and scams. Many of you met Phishy at move in. Phishy is here to help raise our awareness about phishing. It’s pretty basic. Never respond to email requests for your password. (Or over the phone)
  11. Tip #5: Use Social Networks Safely. Don’t post information about where you live or where you’re going to be on Facebook or Twitter. Yes, it’s rare, but if you have an open profile on Facebook or you’re using FourSquare and tweeting your whereabouts publicly, you’re putting yourself at risk.
  12. Watch out for phishing on social networking sites. How many of you have a friend whose profile has been compromised because their password was hacked? Have you revealed enough information about yourself that someone could steal your identity? Can they figure out your mother’s maiden name?
  13. Tip #6: Remember who else is there. Employers will try to find out as much about you as they can online. They may try to access your social media profiles. There was a court case this month, where the court decided that what you post online is not protected. Think before you post about the image you’re portraying.
  14. Don’t post inappropriate photos. Untag inappropriate photos of you your friends post. Would you hire this guy? People WILL judge you by what you post online. Think before you post! Clean up your profiles now.
  15. Tip #7: Be wary of others. How do you know the person claiming to be 19 years old isn’t a 40 something who’s masquerading as someone else? How do you know he or she isn’t a wolf in sheep’s clothing? Be careful.
  16. Tip #8: Search for your name. Set up a Google Alert in Google Dashboard to let you know every day how your name is appearing online. You can set up a search for anything. So if there’s something you want to track online, set up the alert.
  17. Tip #9: Guard your personal information. Wouldn’t you like to have a guard dog like this protecting your information? Hmm. Maybe not. Protecting your personal information hasn’t been a big deal for you so far. It will be as you develop a credit history.
  18. Tip #10: Don’t assume privacy. In fact, assume that anything you post online is going to stay private. Think before you post about how information can be used. Do you want Facebook or anyone else tracking everything you do?
  19. PSI—Personal Software Inspector