Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

The Secure Communicator

1,010 views

Published on

Do you understand how you’ve been affected by the Heartbleed bug? Are you worried about maintaining your privacy online? (You should be.) Do you know how to best protect client or company information? Is it safe to use social media? Have you heard of ransomware? Are you worried about identity theft?

Most technical communicators know that it’s important to secure their work and online presence, but many don’t know how to do it effectively. Good security can enable—not hinder—your work. Join Ben as he discusses the steps you can take to adopt a security lifestyle that protects you and enables you to work effectively:

Protecting your computer
Protecting your reputation
Protecting your information
Protecting your identity
Creating strong and memorable passwords
Leveraging cool tools

Published in: Internet
  • Be the first to comment

The Secure Communicator

  1. 1. The Secure Communicator Protect Yourself and Your Client Ben Woelk, CISSP Program Manager, Information Security Office Rochester Institute of Technology Director and Community Affairs Committee Chair Society for Technical Communication 2015
  2. 2. Why Worry?
  3. 3. Threat Landscape http://www.symantec.com/content/en/us/enterprise/images/security_response/ SYM-ISTR-SMB-Infograph.jpg
  4. 4. Threat Landscape
  5. 5. Threat Landscape
  6. 6. Threat Landscape
  7. 7. Threat Landscape
  8. 8. Adopting a Security Mindset Inside the Twisted Mind of the Security Professional http://www.schneier.com/essay-210.html
  9. 9. About that mindset…
  10. 10. The Basics • Anti-virus • Anti-spyware • Firewalls • Patching
  11. 11. Protecting Your Information
  12. 12. Protecting Your Identity
  13. 13. Protecting Your Reputation
  14. 14. Passwords
  15. 15. Passphrase It was a dark and stormy night becomes ItwasaDark215&StormyNight Length > complexity
  16. 16. Cool Tools • Google Dashboard • Browser Plugins – Netcraft – McAfee Site Advisor – Web of Trust (WoT) • Secunia PSI • Password Safes
  17. 17. Resources • Goodreads Cyber Security Library https://www.goodreads.com/search?q=cyber+security+li brary • Infosec Communicator Blog benwoelk.com • Shockproofing Your Use of Social Media eBook http://amzn.com/B00OJMK4T2 (free 3/28-4/1)
  18. 18. Questions (and Maybe Some Answers) Ben Woelk Ben.woelk@gmail.com Benwoelk.com @benwoelk www.linkedin.com/in/benwoelk/

×