Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Loading in …3
×
1 of 26

The Secure Communicator: Protect Yourself and Your Client, STC Summit 2015

1

Share

Download to read offline

Do you understand how you’ve been affected by the Heartbleed bug? Are you worried about maintaining your privacy online? (You should be.) Do you know how to best protect client or company information? Is it safe to use social media? Have you heard of ransomware? Are you worried about identity theft?

It’s not getting any safer out there! If your head is spinning after considering these questions, you need to attend The Secure Communicator—Protect Yourself and Your Client

Most technical communicators know that it’s important to secure their work and online presence, but many don’t know how to do it effectively. Good security can enable—not hinder—your work. Join the presenter as he discusses the steps you can take to adopt a security lifestyle that protects you and enables you to work effectively:
Protecting your computer
Protecting your reputation
Protecting your information
Protecting your identity
Creating strong and memorable passwords
Leveraging cool tools

More Related Content

You Might Also Like

Related Books

Free with a 30 day trial from Scribd

See all

Related Audiobooks

Free with a 30 day trial from Scribd

See all

The Secure Communicator: Protect Yourself and Your Client, STC Summit 2015

  1. 1. The Secure Communicator Protect Yourself and Your Client Ben Woelk, CISSP Program Manager Information Security Office Rochester Institute of Technology
  2. 2. Why Worry? Ben Woelk--The Secure Communicator 2
  3. 3. Overview • Threat Landscape • Solutions • Cool Tools • Q&A Ben Woelk--The Secure Communicator 3
  4. 4. THREAT LANDSCAPE 2015 Ben Woelk--The Secure Communicator 4
  5. 5. What’sStolen? Ben Woelk--The Secure Communicator 5
  6. 6. Value? Ben Woelk--The Secure Communicator 6
  7. 7. Social Media Ben Woelk--The Secure Communicator 7
  8. 8. Mobile Ben Woelk--The Secure Communicator 8
  9. 9. Ransomware Ben Woelk--The Secure Communicator 9
  10. 10. Ben Woelk--The Secure Communicator 10
  11. 11. Solutions Ben Woelk--The Secure Communicator 11
  12. 12. Protecting Your Computer • Anti-virus • Firewalls • Patching Ben Woelk--The Secure Communicator 12
  13. 13. Protecting Your Reputation Ben Woelk--The Secure Communicator 13
  14. 14. Protecting Your Information Ben Woelk--The Secure Communicator 14
  15. 15. Protecting Your Identity Ben Woelk--The Secure Communicator 15
  16. 16. Passwords Ben Woelk--The Secure Communicator 16
  17. 17. Passphrase It was a dark and stormy night becomes ItwasaDark215&StormyNight Length > complexity Ben Woelk--The Secure Communicator 17
  18. 18. Cool Tools • Password Safes • Google Dashboard • Browser Plugins – Netcraft – McAfee Site Advisor • Secunia PSI • Mobile Security Apps Ben Woelk--The Secure Communicator 18
  19. 19. Password Safes Ben Woelk--The Secure Communicator 19
  20. 20. Google Dashboard Monitor use of your name Ben Woelk--The Secure Communicator 20
  21. 21. Browser Plugins – Netcraft Ben Woelk--The Secure Communicator 21
  22. 22. – McAfee Site Advisor Browser Plugins Ben Woelk--The Secure Communicator 22
  23. 23. SecuniaPSI Ben Woelk--The Secure Communicator 23
  24. 24. Mobile Security Apps • Lookout Security & Antivirus (Android, iOS) • Avast Mobile Security (Android) • Avast SecureMe (iOS) • Google Authenticator (Android, iOS) • Find My iPhone (iOS) • iVault (iOS) Ben Woelk--The Secure Communicator 24
  25. 25. Resources • Goodreads Cyber Security Library https://www.goodreads.com/search?q=cyber+secur ity+library • Infosec Communicator Blog benwoelk.com • Shockproofing Your Use of Social Media eBook (free 6/21–6/25) http://amzn.com/B00OJMK4T2 • ISTR20 Internet Security Threat Report, April 2015, Symantec http://www.symantec.com/security_response/publications/th reatreport.jsp Ben Woelk--The Secure Communicator 25
  26. 26. Questions (and maybe some answers) Ben Woelk Ben.woelk@gmail.com Benwoelk.com @benwoelk www.linkedin.com/in/benwoelk/ Ben Woelk--The Secure Communicator 26

Editor's Notes

  • Because it’s getting dangerous out there!
  • 2015 Symantec Internet Threat Report

    You’re vulnerable.
    What could they want from you?
    Anonymity
    Identity Theft, Corporate secrets
  • 2015 Symantec Internet Threat Report

    You’re vulnerable.
    What could they want from you?
    Anonymity
    Identity Theft, Corporate secrets
  • More than doubled in 2014 from 4.1 million to 8.8 million (11K/day to 24K/day)
  • Run down the basics
  • Reputation management services. Don’t know that they’re worth it.
    Keep pumping out good content.
    Google alerts.
  • Encrypted connections (VPN); SSL; encrypted USBs, hard drives. Encrypt dropbox. Correct addressing.
  • Be careful on social networking sites.
  • Password vaults. Don’t use the same password for multiple accounts.
  • PSI—Personal Software Inspector
  • You may want to use a Password Safe or Vault. Two good ones are Password Gorilla and LastPass, a browser plug in. The vault generates long complex passwords and stores them. You protect your password safe or vault with a long passphrase. When you visit a website, LastPass will supply the password you need to log in.
  • Search for your name. Set up a Google Alert in Google Dashboard to let you know every day how your name is appearing online. You can set up a search for anything. So if there’s something you want to track online, set up the alert.
  • ×