Protecting your digital and online privacy

David Strom
David Stromfreelance IT writer and speaker, editorial and business consultant at David Strom Inc.
Protecting your
digital privacy
David Strom
David Strom
October 10, 2019 Venture Cafe
You are being tracked!
Protecting your digital and online privacy
Take this
quick security
quiz
I share the same password across
different websites.
Should I leave my laptop in my hotel
room or car when I am elsewhere?
When should I click on a link in an email
message?
I don’t have to worry about the security
of any of my smartphone apps
I don’t need a phone PIN, I have nothing
to hide
Protecting your digital and online privacy
Agenda
Protecting your digital and online privacy
Protecting your digital and online privacy
Protecting your digital and online privacy
Protecting your digital and online privacy
New smart devices test labs
Protecting your digital and online privacy
Protecting your digital and online privacy
Protecting your digital and online privacy
Protecting your digital and online privacy
Protecting your digital and online privacy
Protecting your digital and online privacy
Protecting your digital and online privacy
Protecting your digital and online privacy
Email privacy
Protecting your digital and online privacy
Protecting your digital and online privacy
Tools to protect your privacy
• Jumboprivacy.com app (shown here)
• Use “fake” birthdays everywhere
• Some other helpful apps
Protecting your digital and online privacy
Password
problems
Protecting your digital and online privacy
Protecting your digital and online privacy
Wifi networks
Protecting your digital and online privacy
Protecting your digital and online privacy
Protecting your digital and online privacy
Protecting your digital and online privacy
Use
authentication
apps whenever
possible
Protecting your digital and online privacy
Protecting your digital and online privacy
Protecting your digital and online privacy
Protecting your digital and online privacy
Protecting your digital and online privacy
Additional suggestions
Don’t pick
Don’t pick
some tech
that is too
difficult to
manage
Change
Change one
or two
habits at a
time until
you feel
comfortable
Eliminate
Eliminate
personal info
on Facebook
et al. (e.g.
Jan 1
“birthday”)
Delete
Delete
unnecessary
apps and
know which
ones are
leaking data
Choose
Choose a
different
browser and
search
engine
Protecting your digital and online privacy
http://strominator.com 41
Good luck and stay safe!
David Strom
(314) 277-7832
david@strom.com
Twiiter: @dstrom
http://strominator.com
Slides available:
http://slideshare.net/davidstrom
1 of 41

Recommended

Et 5083 week 3 assignment - technology safety, security, & filtering traini... by
Et 5083   week 3 assignment - technology safety, security, & filtering traini...Et 5083   week 3 assignment - technology safety, security, & filtering traini...
Et 5083 week 3 assignment - technology safety, security, & filtering traini...jsoderst75
398 views6 slides
Digital Technology Self-efficacy Measure by
Digital Technology Self-efficacy MeasureDigital Technology Self-efficacy Measure
Digital Technology Self-efficacy MeasureJoan E. Hughes, Ph.D.
4.6K views2 slides
Managing digital distraction v3 by
Managing digital distraction v3Managing digital distraction v3
Managing digital distraction v3Jonathan Martin
648 views18 slides
The Computer Virus-Interactive by
The Computer Virus-InteractiveThe Computer Virus-Interactive
The Computer Virus-InteractiveGronHatchat
384 views8 slides
The Nasty of Computers by
The Nasty of ComputersThe Nasty of Computers
The Nasty of ComputersGronHatchat
510 views8 slides
2011_Parent_Information_Presentation by
2011_Parent_Information_Presentation2011_Parent_Information_Presentation
2011_Parent_Information_PresentationDERNSW
526 views31 slides

More Related Content

What's hot

HELE 4 Lesson 2: Safe and Responsible Use of ICT by
HELE 4 Lesson 2: Safe and Responsible Use of ICTHELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICTBenandro Palor
2.5K views17 slides
New Media: So Many Options To Try 04 by
New Media: So Many Options To Try 04New Media: So Many Options To Try 04
New Media: So Many Options To Try 04Douglas Welch
399 views23 slides
Electronic information and accessible technology by
Electronic information and accessible technologyElectronic information and accessible technology
Electronic information and accessible technologyJoseph Dolson
302 views21 slides
CyberSecThreats_R_U_atRisk_Watson by
CyberSecThreats_R_U_atRisk_WatsonCyberSecThreats_R_U_atRisk_Watson
CyberSecThreats_R_U_atRisk_WatsonPatricia M Watson
430 views17 slides
9 interesting ways_to_teach_internet_safety_in by
9 interesting ways_to_teach_internet_safety_in9 interesting ways_to_teach_internet_safety_in
9 interesting ways_to_teach_internet_safety_inMrWright
1.1K views11 slides
Parent presentation information literacy by
Parent presentation   information literacyParent presentation   information literacy
Parent presentation information literacyJames McConville
2.3K views33 slides

What's hot(10)

HELE 4 Lesson 2: Safe and Responsible Use of ICT by Benandro Palor
HELE 4 Lesson 2: Safe and Responsible Use of ICTHELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICT
Benandro Palor2.5K views
New Media: So Many Options To Try 04 by Douglas Welch
New Media: So Many Options To Try 04New Media: So Many Options To Try 04
New Media: So Many Options To Try 04
Douglas Welch399 views
Electronic information and accessible technology by Joseph Dolson
Electronic information and accessible technologyElectronic information and accessible technology
Electronic information and accessible technology
Joseph Dolson302 views
9 interesting ways_to_teach_internet_safety_in by MrWright
9 interesting ways_to_teach_internet_safety_in9 interesting ways_to_teach_internet_safety_in
9 interesting ways_to_teach_internet_safety_in
MrWright1.1K views
Parent presentation information literacy by James McConville
Parent presentation   information literacyParent presentation   information literacy
Parent presentation information literacy
James McConville2.3K views
Internet safety guide by mjtheman
Internet safety guideInternet safety guide
Internet safety guide
mjtheman1.6K views
Student presentation by suzybelonga
Student presentationStudent presentation
Student presentation
suzybelonga172 views
Smartphone and tablet basics by Karen F
Smartphone and tablet basicsSmartphone and tablet basics
Smartphone and tablet basics
Karen F131 views

Similar to Protecting your digital and online privacy

Top Ten Ways to Shockproof Your Use of Social Media by
Top Ten Ways to Shockproof Your Use of Social MediaTop Ten Ways to Shockproof Your Use of Social Media
Top Ten Ways to Shockproof Your Use of Social MediaBen Woelk, CISSP, CPTC
562 views22 slides
Basic Digital Security by
Basic Digital SecurityBasic Digital Security
Basic Digital SecurityUjjwal Acharya
272 views66 slides
A Basic Guide to Safe Surfing on the Internet by
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet- Mark - Fullbright
1.3K views27 slides
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure by
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data SecureSmartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data SecureHeimdal Security
930 views27 slides
Private Data and Prying Eyes by
Private Data and Prying EyesPrivate Data and Prying Eyes
Private Data and Prying EyesEllie Sherven
77 views35 slides
Digital safety[1] by
Digital safety[1]Digital safety[1]
Digital safety[1]sheenau
225 views23 slides

Similar to Protecting your digital and online privacy(20)

A Basic Guide to Safe Surfing on the Internet by - Mark - Fullbright
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet
- Mark - Fullbright1.3K views
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure by Heimdal Security
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data SecureSmartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Heimdal Security930 views
Private Data and Prying Eyes by Ellie Sherven
Private Data and Prying EyesPrivate Data and Prying Eyes
Private Data and Prying Eyes
Ellie Sherven77 views
Digital safety[1] by sheenau
Digital safety[1]Digital safety[1]
Digital safety[1]
sheenau225 views
IT Consumerization – iPad’ing the Enterprise or BYO Malware? by Barry Caplin
IT Consumerization – iPad’ing the Enterprise or BYO Malware?IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
Barry Caplin580 views
Onlinesecurityrecomendations2014 141230081030-conversion-gate02 by amiinaaa
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
amiinaaa289 views
Computer And Internet Security by JFashant
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
JFashant304 views
Social & mobile security by Ernest Staats
Social & mobile securitySocial & mobile security
Social & mobile security
Ernest Staats768 views
Employee Security Awareness Training by Denis kisina
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
Denis kisina40.7K views
Information security awareness - 101 by mateenzero
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
mateenzero580 views
Smartphone 7 aug14 by Naval OPSEC
Smartphone 7 aug14Smartphone 7 aug14
Smartphone 7 aug14
Naval OPSEC5.7K views
Part Security Threats A Facebook data breach revealed more.docx by write4
Part Security Threats A Facebook data breach revealed more.docxPart Security Threats A Facebook data breach revealed more.docx
Part Security Threats A Facebook data breach revealed more.docx
write45 views

More from David Strom

Spark Twitter fails Mar2023 by
Spark Twitter fails Mar2023Spark Twitter fails Mar2023
Spark Twitter fails Mar2023David Strom
7 views38 slides
Getting Your First Cybersecurity Job by
Getting Your First Cybersecurity JobGetting Your First Cybersecurity Job
Getting Your First Cybersecurity JobDavid Strom
279 views12 slides
Understanding passwordless technologies by
Understanding passwordless technologiesUnderstanding passwordless technologies
Understanding passwordless technologiesDavid Strom
562 views34 slides
What endpoint protection solutions are available on the market today? by
What endpoint protection solutions are available on the market today?What endpoint protection solutions are available on the market today?
What endpoint protection solutions are available on the market today?David Strom
125 views38 slides
Fears and fulfillment with IT security by
Fears and fulfillment with IT securityFears and fulfillment with IT security
Fears and fulfillment with IT securityDavid Strom
232 views33 slides
AI and cyber security: new directions, old fears by
AI and cyber security: new directions, old fearsAI and cyber security: new directions, old fears
AI and cyber security: new directions, old fearsDavid Strom
813 views20 slides

More from David Strom(20)

Spark Twitter fails Mar2023 by David Strom
Spark Twitter fails Mar2023Spark Twitter fails Mar2023
Spark Twitter fails Mar2023
David Strom7 views
Getting Your First Cybersecurity Job by David Strom
Getting Your First Cybersecurity JobGetting Your First Cybersecurity Job
Getting Your First Cybersecurity Job
David Strom279 views
Understanding passwordless technologies by David Strom
Understanding passwordless technologiesUnderstanding passwordless technologies
Understanding passwordless technologies
David Strom562 views
What endpoint protection solutions are available on the market today? by David Strom
What endpoint protection solutions are available on the market today?What endpoint protection solutions are available on the market today?
What endpoint protection solutions are available on the market today?
David Strom125 views
Fears and fulfillment with IT security by David Strom
Fears and fulfillment with IT securityFears and fulfillment with IT security
Fears and fulfillment with IT security
David Strom232 views
AI and cyber security: new directions, old fears by David Strom
AI and cyber security: new directions, old fearsAI and cyber security: new directions, old fears
AI and cyber security: new directions, old fears
David Strom813 views
The legalities of hacking back by David Strom
The legalities of  hacking backThe legalities of  hacking back
The legalities of hacking back
David Strom238 views
How to market your book in today's social media world by David Strom
How to market your book in today's social media worldHow to market your book in today's social media world
How to market your book in today's social media world
David Strom228 views
​Understanding the Internet of Things by David Strom
​Understanding the Internet of Things​Understanding the Internet of Things
​Understanding the Internet of Things
David Strom292 views
How to make your mobile phone safe from hackers by David Strom
How to make your mobile phone safe from hackersHow to make your mobile phone safe from hackers
How to make your mobile phone safe from hackers
David Strom851 views
Implications and response to large security breaches by David Strom
Implications and response to large security breaches Implications and response to large security breaches
Implications and response to large security breaches
David Strom650 views
Using social networks to find your next job (2017) by David Strom
Using social networks to find your next job (2017)Using social networks to find your next job (2017)
Using social networks to find your next job (2017)
David Strom207 views
Security v. Privacy: the great debate by David Strom
Security v. Privacy: the great debateSecurity v. Privacy: the great debate
Security v. Privacy: the great debate
David Strom1.9K views
Using OpenStack to Control VM Chaos by David Strom
Using OpenStack to Control VM ChaosUsing OpenStack to Control VM Chaos
Using OpenStack to Control VM Chaos
David Strom521 views
Notable Twitter fails by David Strom
Notable Twitter failsNotable Twitter fails
Notable Twitter fails
David Strom625 views
How to make the move towards hybrid cloud computing by David Strom
How to make the move towards hybrid cloud computingHow to make the move towards hybrid cloud computing
How to make the move towards hybrid cloud computing
David Strom956 views
Listen to Your Customers: How IT Can Provide Better Support by David Strom
Listen to Your Customers: How IT Can Provide Better SupportListen to Your Customers: How IT Can Provide Better Support
Listen to Your Customers: How IT Can Provide Better Support
David Strom653 views
Network security practice: then and now by David Strom
Network security practice: then and nowNetwork security practice: then and now
Network security practice: then and now
David Strom292 views
Biggest startup mistakes by David Strom
Biggest startup mistakesBiggest startup mistakes
Biggest startup mistakes
David Strom244 views
Picking the right Single Sign On Tool to protect your network by David Strom
Picking the right Single Sign On Tool to protect your networkPicking the right Single Sign On Tool to protect your network
Picking the right Single Sign On Tool to protect your network
David Strom955 views

Recently uploaded

Igniting Next Level Productivity with AI-Infused Data Integration Workflows by
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Safe Software
225 views86 slides
handbook for web 3 adoption.pdf by
handbook for web 3 adoption.pdfhandbook for web 3 adoption.pdf
handbook for web 3 adoption.pdfLiveplex
19 views16 slides
Lilypad @ Labweek, Istanbul, 2023.pdf by
Lilypad @ Labweek, Istanbul, 2023.pdfLilypad @ Labweek, Istanbul, 2023.pdf
Lilypad @ Labweek, Istanbul, 2023.pdfAlly339821
9 views45 slides
Web Dev - 1 PPT.pdf by
Web Dev - 1 PPT.pdfWeb Dev - 1 PPT.pdf
Web Dev - 1 PPT.pdfgdsczhcet
55 views45 slides
Piloting & Scaling Successfully With Microsoft Viva by
Piloting & Scaling Successfully With Microsoft VivaPiloting & Scaling Successfully With Microsoft Viva
Piloting & Scaling Successfully With Microsoft VivaRichard Harbridge
10 views160 slides
Report 2030 Digital Decade by
Report 2030 Digital DecadeReport 2030 Digital Decade
Report 2030 Digital DecadeMassimo Talia
14 views41 slides

Recently uploaded(20)

Igniting Next Level Productivity with AI-Infused Data Integration Workflows by Safe Software
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Safe Software225 views
handbook for web 3 adoption.pdf by Liveplex
handbook for web 3 adoption.pdfhandbook for web 3 adoption.pdf
handbook for web 3 adoption.pdf
Liveplex19 views
Lilypad @ Labweek, Istanbul, 2023.pdf by Ally339821
Lilypad @ Labweek, Istanbul, 2023.pdfLilypad @ Labweek, Istanbul, 2023.pdf
Lilypad @ Labweek, Istanbul, 2023.pdf
Ally3398219 views
Web Dev - 1 PPT.pdf by gdsczhcet
Web Dev - 1 PPT.pdfWeb Dev - 1 PPT.pdf
Web Dev - 1 PPT.pdf
gdsczhcet55 views
Piloting & Scaling Successfully With Microsoft Viva by Richard Harbridge
Piloting & Scaling Successfully With Microsoft VivaPiloting & Scaling Successfully With Microsoft Viva
Piloting & Scaling Successfully With Microsoft Viva
SAP Automation Using Bar Code and FIORI.pdf by Virendra Rai, PMP
SAP Automation Using Bar Code and FIORI.pdfSAP Automation Using Bar Code and FIORI.pdf
SAP Automation Using Bar Code and FIORI.pdf
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... by Bernd Ruecker
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
Bernd Ruecker26 views
STPI OctaNE CoE Brochure.pdf by madhurjyapb
STPI OctaNE CoE Brochure.pdfSTPI OctaNE CoE Brochure.pdf
STPI OctaNE CoE Brochure.pdf
madhurjyapb12 views
Case Study Copenhagen Energy and Business Central.pdf by Aitana
Case Study Copenhagen Energy and Business Central.pdfCase Study Copenhagen Energy and Business Central.pdf
Case Study Copenhagen Energy and Business Central.pdf
Aitana12 views
Spesifikasi Lengkap ASUS Vivobook Go 14 by Dot Semarang
Spesifikasi Lengkap ASUS Vivobook Go 14Spesifikasi Lengkap ASUS Vivobook Go 14
Spesifikasi Lengkap ASUS Vivobook Go 14
Dot Semarang35 views
Voice Logger - Telephony Integration Solution at Aegis by Nirmal Sharma
Voice Logger - Telephony Integration Solution at AegisVoice Logger - Telephony Integration Solution at Aegis
Voice Logger - Telephony Integration Solution at Aegis
Nirmal Sharma17 views
Data-centric AI and the convergence of data and model engineering: opportunit... by Paolo Missier
Data-centric AI and the convergence of data and model engineering:opportunit...Data-centric AI and the convergence of data and model engineering:opportunit...
Data-centric AI and the convergence of data and model engineering: opportunit...
Paolo Missier34 views
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive by Network Automation Forum
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Black and White Modern Science Presentation.pptx by maryamkhalid2916
Black and White Modern Science Presentation.pptxBlack and White Modern Science Presentation.pptx
Black and White Modern Science Presentation.pptx
maryamkhalid291614 views
Five Things You SHOULD Know About Postman by Postman
Five Things You SHOULD Know About PostmanFive Things You SHOULD Know About Postman
Five Things You SHOULD Know About Postman
Postman27 views

Protecting your digital and online privacy