SlideShare a Scribd company logo
1 of 26
Download to read offline
The Secure Communicator
Protect Yourself and Your Client
Ben Woelk, CISSP
Program Manager
Information Security Office
Rochester Institute of Technology
Why Worry?
Ben Woelk--The Secure Communicator 2
Overview
• Threat Landscape
• Solutions
• Cool Tools
• Q&A
Ben Woelk--The Secure Communicator 3
THREAT
LANDSCAPE
2015
Ben Woelk--The Secure Communicator 4
What’sStolen?
Ben Woelk--The Secure Communicator 5
Value?
Ben Woelk--The Secure Communicator 6
Social Media
Ben Woelk--The Secure Communicator 7
Mobile
Ben Woelk--The Secure Communicator 8
Ransomware
Ben Woelk--The Secure Communicator 9
Ben Woelk--The Secure Communicator 10
Solutions
Ben Woelk--The Secure Communicator 11
Protecting
Your
Computer
• Anti-virus
• Firewalls
• Patching
Ben Woelk--The Secure Communicator 12
Protecting
Your
Reputation
Ben Woelk--The Secure Communicator 13
Protecting
Your
Information
Ben Woelk--The Secure Communicator 14
Protecting
Your
Identity
Ben Woelk--The Secure Communicator 15
Passwords
Ben Woelk--The Secure Communicator 16
Passphrase
It was a dark and
stormy night
becomes
ItwasaDark215&StormyNight
Length > complexity
Ben Woelk--The Secure Communicator 17
Cool Tools
• Password Safes
• Google Dashboard
• Browser Plugins
– Netcraft
– McAfee Site Advisor
• Secunia PSI
• Mobile Security Apps
Ben Woelk--The Secure Communicator 18
Password Safes
Ben Woelk--The Secure Communicator 19
Google Dashboard
Monitor
use of
your
name
Ben Woelk--The Secure Communicator 20
Browser Plugins
– Netcraft
Ben Woelk--The Secure Communicator 21
– McAfee Site Advisor
Browser Plugins
Ben Woelk--The Secure Communicator 22
SecuniaPSI
Ben Woelk--The Secure Communicator 23
Mobile Security Apps
• Lookout Security & Antivirus (Android,
iOS)
• Avast Mobile Security (Android)
• Avast SecureMe (iOS)
• Google Authenticator (Android, iOS)
• Find My iPhone (iOS)
• iVault (iOS)
Ben Woelk--The Secure Communicator 24
Resources
• Goodreads Cyber Security Library
https://www.goodreads.com/search?q=cyber+secur
ity+library
• Infosec Communicator Blog
benwoelk.com
• Shockproofing Your Use of Social
Media eBook (free 6/21–6/25)
http://amzn.com/B00OJMK4T2
• ISTR20 Internet Security Threat Report, April
2015, Symantec
http://www.symantec.com/security_response/publications/th
reatreport.jsp
Ben Woelk--The Secure Communicator 25
Questions (and maybe some
answers)
Ben Woelk
Ben.woelk@gmail.com
Benwoelk.com
@benwoelk
www.linkedin.com/in/benwoelk/
Ben Woelk--The Secure Communicator 26

More Related Content

More from Ben Woelk, CISSP, CPTC

Perspectives on Mentoring: Selected Stories
Perspectives on Mentoring: Selected StoriesPerspectives on Mentoring: Selected Stories
Perspectives on Mentoring: Selected StoriesBen Woelk, CISSP, CPTC
 
We're All Winners--Gamification and Security Awareness
We're All Winners--Gamification and Security AwarenessWe're All Winners--Gamification and Security Awareness
We're All Winners--Gamification and Security AwarenessBen Woelk, CISSP, CPTC
 
The Introvert in the Workplace--Strategies for Success
The Introvert in the Workplace--Strategies for SuccessThe Introvert in the Workplace--Strategies for Success
The Introvert in the Workplace--Strategies for SuccessBen Woelk, CISSP, CPTC
 
Building a Culture of Digital Self Defense
Building a Culture of Digital Self DefenseBuilding a Culture of Digital Self Defense
Building a Culture of Digital Self DefenseBen Woelk, CISSP, CPTC
 
Harnessing Your Innate Strengths--Introverted Leadership
Harnessing Your Innate Strengths--Introverted LeadershipHarnessing Your Innate Strengths--Introverted Leadership
Harnessing Your Innate Strengths--Introverted LeadershipBen Woelk, CISSP, CPTC
 
The Introvert in the Workplace: Becoming an Influencer and Leader #STC18
The Introvert in the Workplace: Becoming an Influencer and Leader #STC18The Introvert in the Workplace: Becoming an Influencer and Leader #STC18
The Introvert in the Workplace: Becoming an Influencer and Leader #STC18Ben Woelk, CISSP, CPTC
 
Follow the yellow brick road: A Leadership Journey to the Emerald City
Follow the yellow brick road: A Leadership Journey to the Emerald CityFollow the yellow brick road: A Leadership Journey to the Emerald City
Follow the yellow brick road: A Leadership Journey to the Emerald CityBen Woelk, CISSP, CPTC
 
Cyber Safety for Middle School Students and Parents
Cyber Safety for Middle School Students and ParentsCyber Safety for Middle School Students and Parents
Cyber Safety for Middle School Students and ParentsBen Woelk, CISSP, CPTC
 
Staying Safe Online for HR Professionals
Staying Safe Online for HR ProfessionalsStaying Safe Online for HR Professionals
Staying Safe Online for HR ProfessionalsBen Woelk, CISSP, CPTC
 
Shockproofing Your Use of Social Media (professional development progression)
Shockproofing Your Use of Social Media (professional development progression)Shockproofing Your Use of Social Media (professional development progression)
Shockproofing Your Use of Social Media (professional development progression)Ben Woelk, CISSP, CPTC
 
Empowering the Introvert Within: Becoming an Outstanding Leader
Empowering the Introvert Within: Becoming an Outstanding Leader Empowering the Introvert Within: Becoming an Outstanding Leader
Empowering the Introvert Within: Becoming an Outstanding Leader Ben Woelk, CISSP, CPTC
 

More from Ben Woelk, CISSP, CPTC (20)

Perspectives on Mentoring: Selected Stories
Perspectives on Mentoring: Selected StoriesPerspectives on Mentoring: Selected Stories
Perspectives on Mentoring: Selected Stories
 
We're All Winners--Gamification and Security Awareness
We're All Winners--Gamification and Security AwarenessWe're All Winners--Gamification and Security Awareness
We're All Winners--Gamification and Security Awareness
 
The Introvert in the Workplace--Strategies for Success
The Introvert in the Workplace--Strategies for SuccessThe Introvert in the Workplace--Strategies for Success
The Introvert in the Workplace--Strategies for Success
 
Building a Culture of Digital Self Defense
Building a Culture of Digital Self DefenseBuilding a Culture of Digital Self Defense
Building a Culture of Digital Self Defense
 
Harnessing Your Innate Strengths--Introverted Leadership
Harnessing Your Innate Strengths--Introverted LeadershipHarnessing Your Innate Strengths--Introverted Leadership
Harnessing Your Innate Strengths--Introverted Leadership
 
The Introvert in the Workplace: Becoming an Influencer and Leader #STC18
The Introvert in the Workplace: Becoming an Influencer and Leader #STC18The Introvert in the Workplace: Becoming an Influencer and Leader #STC18
The Introvert in the Workplace: Becoming an Influencer and Leader #STC18
 
Digital self defense 101 me rit
Digital self defense 101 me ritDigital self defense 101 me rit
Digital self defense 101 me rit
 
Follow the yellow brick road: A Leadership Journey to the Emerald City
Follow the yellow brick road: A Leadership Journey to the Emerald CityFollow the yellow brick road: A Leadership Journey to the Emerald City
Follow the yellow brick road: A Leadership Journey to the Emerald City
 
Digital Self Defense at RIT
Digital Self Defense at RITDigital Self Defense at RIT
Digital Self Defense at RIT
 
Cyber Safety for Middle School Students and Parents
Cyber Safety for Middle School Students and ParentsCyber Safety for Middle School Students and Parents
Cyber Safety for Middle School Students and Parents
 
Staying Safe Online for HR Professionals
Staying Safe Online for HR ProfessionalsStaying Safe Online for HR Professionals
Staying Safe Online for HR Professionals
 
Succession Planning and Volunteering
Succession Planning and VolunteeringSuccession Planning and Volunteering
Succession Planning and Volunteering
 
Digital Self Defense
Digital Self DefenseDigital Self Defense
Digital Self Defense
 
A Techcomm Bestiary Summit14
A Techcomm Bestiary Summit14A Techcomm Bestiary Summit14
A Techcomm Bestiary Summit14
 
A Techcomm Bestiary Spectrum14
A Techcomm Bestiary Spectrum14A Techcomm Bestiary Spectrum14
A Techcomm Bestiary Spectrum14
 
UNYCC Information Security Discussion
UNYCC Information Security DiscussionUNYCC Information Security Discussion
UNYCC Information Security Discussion
 
Shockproofing Your Use of Social Media (professional development progression)
Shockproofing Your Use of Social Media (professional development progression)Shockproofing Your Use of Social Media (professional development progression)
Shockproofing Your Use of Social Media (professional development progression)
 
Security Awareness at RIT 2012-2013
Security Awareness at RIT 2012-2013Security Awareness at RIT 2012-2013
Security Awareness at RIT 2012-2013
 
Empowering the Introvert Within: Becoming an Outstanding Leader
Empowering the Introvert Within: Becoming an Outstanding Leader Empowering the Introvert Within: Becoming an Outstanding Leader
Empowering the Introvert Within: Becoming an Outstanding Leader
 
Bulletproofing Your Career Online
Bulletproofing Your Career OnlineBulletproofing Your Career Online
Bulletproofing Your Career Online
 

Recently uploaded

trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdftrending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdfMintel Group
 
Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsIndiaMART InterMESH Limited
 
digital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingdigital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingrajputmeenakshi733
 
Paul Turovsky - Real Estate Professional
Paul Turovsky - Real Estate ProfessionalPaul Turovsky - Real Estate Professional
Paul Turovsky - Real Estate ProfessionalPaul Turovsky
 
Andrii Rodionov: What can go wrong in a distributed system – experience from ...
Andrii Rodionov: What can go wrong in a distributed system – experience from ...Andrii Rodionov: What can go wrong in a distributed system – experience from ...
Andrii Rodionov: What can go wrong in a distributed system – experience from ...Lviv Startup Club
 
WSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfWSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfJamesConcepcion7
 
Neha Jhalani Hiranandani: A Guide to Her Life and Career
Neha Jhalani Hiranandani: A Guide to Her Life and CareerNeha Jhalani Hiranandani: A Guide to Her Life and Career
Neha Jhalani Hiranandani: A Guide to Her Life and Careerr98588472
 
Planetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifePlanetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifeBhavana Pujan Kendra
 
Saffron and Dates opportunities from Iran .pdf
Saffron and Dates opportunities from Iran .pdfSaffron and Dates opportunities from Iran .pdf
Saffron and Dates opportunities from Iran .pdfRezaSeif2
 
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...SOFTTECHHUB
 
Ivey Leveraging Information Technology MBA 2024
Ivey Leveraging Information Technology MBA 2024Ivey Leveraging Information Technology MBA 2024
Ivey Leveraging Information Technology MBA 2024Nihal Nishadul
 
Certificate of Good Standing Ferber Enterprises USA LLC
Certificate of Good Standing Ferber Enterprises USA LLCCertificate of Good Standing Ferber Enterprises USA LLC
Certificate of Good Standing Ferber Enterprises USA LLCFerber Enterprises
 
How to Conduct a Service Gap Analysis for Your Business
How to Conduct a Service Gap Analysis for Your BusinessHow to Conduct a Service Gap Analysis for Your Business
How to Conduct a Service Gap Analysis for Your BusinessHelp Desk Migration
 
Entrepreneurial ecosystem- Wider context
Entrepreneurial ecosystem- Wider contextEntrepreneurial ecosystem- Wider context
Entrepreneurial ecosystem- Wider contextP&CO
 
Healthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterHealthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterJamesConcepcion7
 
EQX-PPT-20240405-CorporateDeck-slideshare
EQX-PPT-20240405-CorporateDeck-slideshareEQX-PPT-20240405-CorporateDeck-slideshare
EQX-PPT-20240405-CorporateDeck-slideshareEquinox Gold Corp.
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 
Unveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesUnveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesDoe Paoro
 
WSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfWSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfJamesConcepcion7
 
5 Digital Onboarding Trends To Watch In 2024.pdf
5 Digital Onboarding Trends To Watch In 2024.pdf5 Digital Onboarding Trends To Watch In 2024.pdf
5 Digital Onboarding Trends To Watch In 2024.pdfVeri5digital
 

Recently uploaded (20)

trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdftrending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
 
Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan Dynamics
 
digital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingdigital marketing , introduction of digital marketing
digital marketing , introduction of digital marketing
 
Paul Turovsky - Real Estate Professional
Paul Turovsky - Real Estate ProfessionalPaul Turovsky - Real Estate Professional
Paul Turovsky - Real Estate Professional
 
Andrii Rodionov: What can go wrong in a distributed system – experience from ...
Andrii Rodionov: What can go wrong in a distributed system – experience from ...Andrii Rodionov: What can go wrong in a distributed system – experience from ...
Andrii Rodionov: What can go wrong in a distributed system – experience from ...
 
WSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfWSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdf
 
Neha Jhalani Hiranandani: A Guide to Her Life and Career
Neha Jhalani Hiranandani: A Guide to Her Life and CareerNeha Jhalani Hiranandani: A Guide to Her Life and Career
Neha Jhalani Hiranandani: A Guide to Her Life and Career
 
Planetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifePlanetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in Life
 
Saffron and Dates opportunities from Iran .pdf
Saffron and Dates opportunities from Iran .pdfSaffron and Dates opportunities from Iran .pdf
Saffron and Dates opportunities from Iran .pdf
 
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
 
Ivey Leveraging Information Technology MBA 2024
Ivey Leveraging Information Technology MBA 2024Ivey Leveraging Information Technology MBA 2024
Ivey Leveraging Information Technology MBA 2024
 
Certificate of Good Standing Ferber Enterprises USA LLC
Certificate of Good Standing Ferber Enterprises USA LLCCertificate of Good Standing Ferber Enterprises USA LLC
Certificate of Good Standing Ferber Enterprises USA LLC
 
How to Conduct a Service Gap Analysis for Your Business
How to Conduct a Service Gap Analysis for Your BusinessHow to Conduct a Service Gap Analysis for Your Business
How to Conduct a Service Gap Analysis for Your Business
 
Entrepreneurial ecosystem- Wider context
Entrepreneurial ecosystem- Wider contextEntrepreneurial ecosystem- Wider context
Entrepreneurial ecosystem- Wider context
 
Healthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterHealthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare Newsletter
 
EQX-PPT-20240405-CorporateDeck-slideshare
EQX-PPT-20240405-CorporateDeck-slideshareEQX-PPT-20240405-CorporateDeck-slideshare
EQX-PPT-20240405-CorporateDeck-slideshare
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 
Unveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesUnveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic Experiences
 
WSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfWSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdf
 
5 Digital Onboarding Trends To Watch In 2024.pdf
5 Digital Onboarding Trends To Watch In 2024.pdf5 Digital Onboarding Trends To Watch In 2024.pdf
5 Digital Onboarding Trends To Watch In 2024.pdf
 

The Secure Communicator: Protect Yourself and Your Client, STC Summit 2015

Editor's Notes

  1. Because it’s getting dangerous out there!
  2. 2015 Symantec Internet Threat Report You’re vulnerable. What could they want from you? Anonymity Identity Theft, Corporate secrets
  3. 2015 Symantec Internet Threat Report You’re vulnerable. What could they want from you? Anonymity Identity Theft, Corporate secrets
  4. More than doubled in 2014 from 4.1 million to 8.8 million (11K/day to 24K/day)
  5. Run down the basics
  6. Reputation management services. Don’t know that they’re worth it. Keep pumping out good content. Google alerts.
  7. Encrypted connections (VPN); SSL; encrypted USBs, hard drives. Encrypt dropbox. Correct addressing.
  8. Be careful on social networking sites.
  9. Password vaults. Don’t use the same password for multiple accounts.
  10. PSI—Personal Software Inspector
  11. You may want to use a Password Safe or Vault. Two good ones are Password Gorilla and LastPass, a browser plug in. The vault generates long complex passwords and stores them. You protect your password safe or vault with a long passphrase. When you visit a website, LastPass will supply the password you need to log in.
  12. Search for your name. Set up a Google Alert in Google Dashboard to let you know every day how your name is appearing online. You can set up a search for anything. So if there’s something you want to track online, set up the alert.