SlideShare a Scribd company logo
1 of 17
Download to read offline
Information Security for Nomads
Sébastien Arbogast - 2023
How to take good care of your stuff?
Horror stories?
What if…?
Your laptop stopped working
Your laptop got stolen
Your phone got left behind
Your email (or socials) got hacked
Safety Protocol
• Passwords
• Data protection
• Internet connection
• Gear
• Financials
• Borders
• Best practices
Passwords
• Check this out!
• Use a password manager: 1password, Dashlane,
LastPass
• Synchronize it across all your devices
• Generate unique passwords for everything
• Change passwords for your critical accounts
• Email accounts
• Social accounts
• Accounts with your credit card on them
• Progressively all the others
• Enable 2FA, but not with SMS (Google
Authenticator or Yubikey)
https://haveibeenpwned.com/
Data protection
• Full remote backup: Backblaze, or at the very least Dropbox or Google Drive
• Encrypt your hard drive
• MacOS: enable Filevault
• Windows:
• make sure BitLocker is enabled
• CipherShed or VeraCrypt
Internet connection
• Antivirus if you are on Windows (Defender might not be enough)
• Avira
• Kaspersky
• Bitdefender
• Keep your OS up-to-date
• Use a VPN everywhere you don't trust
• ExpressVPN
• NordVPN
• ProtonVPN
• Sometimes VPNs are blocked (we see you Starbucks)
Gear
• Laptop recovery:
• iCloud (mac)
• HiddenApp
• Prey
• Use a webcam cover
• Lock your devices systematically
• Biometric is best
• At least 6-digit PIN
• You need a PIN, really
• AirTags are awesome!
• Theft-proof backpack
Financials
• Neobanks are the best
• Revolut
• N26
• Wise
• Never give you credit card details
over the phone, or at least use a virtual one
• Crypto-currencies
• Use a hardware wallet: Ledger Nano X or Trezor
• Or at least a software wallet: Exodus or Coinbase Wallet
• But DO NOT keep your crypto on online marketplaces
Borders
• Do not share your socials with customs
• Lock your phone with your PIN before crossing the border (disable
biometrics)
• Avoid giving away your IMEI
Best practices
• Generate unique random passwords
• Store everything sensitive in your password manager
• Never open attachments you don't trust
• Never answer emails that ask for your info
• Avoid writing your credit card details in an email or on paper (rentals)
• If you have to give a password, change it afterwards
• Always use a VPN on public wi
fi
s
• Check if some of your accounts have been compromised: https://haveibeenpwned.com/
• Beware of social engineering
• Beware of random USB keys
• Don't share pictures of your boarding passes
https://bit.ly/
informationsecurityfornomads

More Related Content

Similar to Digital Hygiene for Nomads

Information Security Awareness With Shawn Changes
Information Security Awareness With Shawn ChangesInformation Security Awareness With Shawn Changes
Information Security Awareness With Shawn ChangesMichael Dessecker
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self DefenseBarry Caplin
 
11 Commandments of Cyber Security for the Home
11 Commandments of Cyber Security for the Home11 Commandments of Cyber Security for the Home
11 Commandments of Cyber Security for the Homezaimorkai
 
Protecting Bitcoin and cryptocurrency Keys
Protecting Bitcoin and cryptocurrency KeysProtecting Bitcoin and cryptocurrency Keys
Protecting Bitcoin and cryptocurrency Keysdimitrist
 
How To Secure Your Cryptocurrency In 2020
How To Secure Your Cryptocurrency In 2020How To Secure Your Cryptocurrency In 2020
How To Secure Your Cryptocurrency In 2020Christian Sales
 
Don't Forget Your (Virtual) Keys: Creating and Using Strong Passwords
Don't Forget Your (Virtual) Keys: Creating and Using Strong PasswordsDon't Forget Your (Virtual) Keys: Creating and Using Strong Passwords
Don't Forget Your (Virtual) Keys: Creating and Using Strong Passwordsrmortiz66
 
EEAS - Cultivate your data protection
EEAS - Cultivate your data protectionEEAS - Cultivate your data protection
EEAS - Cultivate your data protectionTommy Vandepitte
 
Living With Passwords: Personal Password Management
Living With Passwords: Personal Password ManagementLiving With Passwords: Personal Password Management
Living With Passwords: Personal Password ManagementNuno Loureiro
 
Anti Whaling Hardening Up Your Net Presence
Anti   Whaling   Hardening Up Your Net PresenceAnti   Whaling   Hardening Up Your Net Presence
Anti Whaling Hardening Up Your Net PresenceEngineers Australia
 
Anti Whaling Hardening Up Your Net Presence
Anti   Whaling   Hardening Up Your Net PresenceAnti   Whaling   Hardening Up Your Net Presence
Anti Whaling Hardening Up Your Net Presencegueste0b5fe
 
Be Cyber Smart! (DLH 10/25/2019)
Be Cyber Smart! (DLH 10/25/2019)Be Cyber Smart! (DLH 10/25/2019)
Be Cyber Smart! (DLH 10/25/2019)David Herrington
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptxCharithraaAR
 
“Secure Password Managers” and “Military-Grade Encryption” on Smartphones:...
“Secure Password Managers” and   “Military-Grade Encryption” on  Smartphones:...“Secure Password Managers” and   “Military-Grade Encryption” on  Smartphones:...
“Secure Password Managers” and “Military-Grade Encryption” on Smartphones:...Positive Hack Days
 
Mr. Andrey Belenko - secure password managers and military-grade encryption o...
Mr. Andrey Belenko - secure password managers and military-grade encryption o...Mr. Andrey Belenko - secure password managers and military-grade encryption o...
Mr. Andrey Belenko - secure password managers and military-grade encryption o...nooralmousa
 
Computer / Internet Security
Computer / Internet SecurityComputer / Internet Security
Computer / Internet SecurityDavid Cirella
 
Protecting cryptocurrency keys
Protecting cryptocurrency keysProtecting cryptocurrency keys
Protecting cryptocurrency keysdimitrist
 
Man vs Internet - Current challenges and future tendencies of establishing tr...
Man vs Internet - Current challenges and future tendencies of establishing tr...Man vs Internet - Current challenges and future tendencies of establishing tr...
Man vs Internet - Current challenges and future tendencies of establishing tr...Luis Grangeia
 

Similar to Digital Hygiene for Nomads (20)

Personal security
Personal securityPersonal security
Personal security
 
Information Security Awareness With Shawn Changes
Information Security Awareness With Shawn ChangesInformation Security Awareness With Shawn Changes
Information Security Awareness With Shawn Changes
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self Defense
 
11 Commandments of Cyber Security for the Home
11 Commandments of Cyber Security for the Home11 Commandments of Cyber Security for the Home
11 Commandments of Cyber Security for the Home
 
Protecting Bitcoin and cryptocurrency Keys
Protecting Bitcoin and cryptocurrency KeysProtecting Bitcoin and cryptocurrency Keys
Protecting Bitcoin and cryptocurrency Keys
 
How To Secure Your Cryptocurrency In 2020
How To Secure Your Cryptocurrency In 2020How To Secure Your Cryptocurrency In 2020
How To Secure Your Cryptocurrency In 2020
 
Don't Forget Your (Virtual) Keys: Creating and Using Strong Passwords
Don't Forget Your (Virtual) Keys: Creating and Using Strong PasswordsDon't Forget Your (Virtual) Keys: Creating and Using Strong Passwords
Don't Forget Your (Virtual) Keys: Creating and Using Strong Passwords
 
EEAS - Cultivate your data protection
EEAS - Cultivate your data protectionEEAS - Cultivate your data protection
EEAS - Cultivate your data protection
 
Living With Passwords: Personal Password Management
Living With Passwords: Personal Password ManagementLiving With Passwords: Personal Password Management
Living With Passwords: Personal Password Management
 
Anti Whaling Hardening Up Your Net Presence
Anti   Whaling   Hardening Up Your Net PresenceAnti   Whaling   Hardening Up Your Net Presence
Anti Whaling Hardening Up Your Net Presence
 
Anti Whaling Hardening Up Your Net Presence
Anti   Whaling   Hardening Up Your Net PresenceAnti   Whaling   Hardening Up Your Net Presence
Anti Whaling Hardening Up Your Net Presence
 
Making Secure Choices
Making Secure ChoicesMaking Secure Choices
Making Secure Choices
 
Be Cyber Smart! (DLH 10/25/2019)
Be Cyber Smart! (DLH 10/25/2019)Be Cyber Smart! (DLH 10/25/2019)
Be Cyber Smart! (DLH 10/25/2019)
 
Internet security
Internet securityInternet security
Internet security
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
“Secure Password Managers” and “Military-Grade Encryption” on Smartphones:...
“Secure Password Managers” and   “Military-Grade Encryption” on  Smartphones:...“Secure Password Managers” and   “Military-Grade Encryption” on  Smartphones:...
“Secure Password Managers” and “Military-Grade Encryption” on Smartphones:...
 
Mr. Andrey Belenko - secure password managers and military-grade encryption o...
Mr. Andrey Belenko - secure password managers and military-grade encryption o...Mr. Andrey Belenko - secure password managers and military-grade encryption o...
Mr. Andrey Belenko - secure password managers and military-grade encryption o...
 
Computer / Internet Security
Computer / Internet SecurityComputer / Internet Security
Computer / Internet Security
 
Protecting cryptocurrency keys
Protecting cryptocurrency keysProtecting cryptocurrency keys
Protecting cryptocurrency keys
 
Man vs Internet - Current challenges and future tendencies of establishing tr...
Man vs Internet - Current challenges and future tendencies of establishing tr...Man vs Internet - Current challenges and future tendencies of establishing tr...
Man vs Internet - Current challenges and future tendencies of establishing tr...
 

More from Sebastien Arbogast (17)

Feedback
FeedbackFeedback
Feedback
 
Intro to NLP
Intro to NLPIntro to NLP
Intro to NLP
 
How Chains Will Set Us Free v2
How Chains Will Set Us Free v2How Chains Will Set Us Free v2
How Chains Will Set Us Free v2
 
The Power of Gamification
The Power of GamificationThe Power of Gamification
The Power of Gamification
 
Pitch 101
Pitch 101Pitch 101
Pitch 101
 
Ethereum
EthereumEthereum
Ethereum
 
Bitcoin 101
Bitcoin 101Bitcoin 101
Bitcoin 101
 
Le progrès exponentiel
Le progrès exponentielLe progrès exponentiel
Le progrès exponentiel
 
Ethereum for visionary dummies
Ethereum for visionary dummiesEthereum for visionary dummies
Ethereum for visionary dummies
 
Pourquoi la blockchain?
Pourquoi la blockchain?Pourquoi la blockchain?
Pourquoi la blockchain?
 
Lean Startup for Developers - Devoxx Poland
Lean Startup for Developers - Devoxx PolandLean Startup for Developers - Devoxx Poland
Lean Startup for Developers - Devoxx Poland
 
Lean startup for developers conference
Lean startup for developers conferenceLean startup for developers conference
Lean startup for developers conference
 
Lean Startup for Developers University
Lean Startup for Developers UniversityLean Startup for Developers University
Lean Startup for Developers University
 
Apps on your Wrist
Apps on your WristApps on your Wrist
Apps on your Wrist
 
La vie de développeur
La vie de développeurLa vie de développeur
La vie de développeur
 
Lean startup for MBA students
Lean startup for MBA studentsLean startup for MBA students
Lean startup for MBA students
 
Lean startup for developers
Lean startup for developersLean startup for developers
Lean startup for developers
 

Recently uploaded

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 

Recently uploaded (20)

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 

Digital Hygiene for Nomads

  • 1. Information Security for Nomads Sébastien Arbogast - 2023 How to take good care of your stuff?
  • 6. Your phone got left behind
  • 7. Your email (or socials) got hacked
  • 8. Safety Protocol • Passwords • Data protection • Internet connection • Gear • Financials • Borders • Best practices
  • 9. Passwords • Check this out! • Use a password manager: 1password, Dashlane, LastPass • Synchronize it across all your devices • Generate unique passwords for everything • Change passwords for your critical accounts • Email accounts • Social accounts • Accounts with your credit card on them • Progressively all the others • Enable 2FA, but not with SMS (Google Authenticator or Yubikey)
  • 11. Data protection • Full remote backup: Backblaze, or at the very least Dropbox or Google Drive • Encrypt your hard drive • MacOS: enable Filevault • Windows: • make sure BitLocker is enabled • CipherShed or VeraCrypt
  • 12. Internet connection • Antivirus if you are on Windows (Defender might not be enough) • Avira • Kaspersky • Bitdefender • Keep your OS up-to-date • Use a VPN everywhere you don't trust • ExpressVPN • NordVPN • ProtonVPN • Sometimes VPNs are blocked (we see you Starbucks)
  • 13. Gear • Laptop recovery: • iCloud (mac) • HiddenApp • Prey • Use a webcam cover • Lock your devices systematically • Biometric is best • At least 6-digit PIN • You need a PIN, really • AirTags are awesome! • Theft-proof backpack
  • 14. Financials • Neobanks are the best • Revolut • N26 • Wise • Never give you credit card details over the phone, or at least use a virtual one • Crypto-currencies • Use a hardware wallet: Ledger Nano X or Trezor • Or at least a software wallet: Exodus or Coinbase Wallet • But DO NOT keep your crypto on online marketplaces
  • 15. Borders • Do not share your socials with customs • Lock your phone with your PIN before crossing the border (disable biometrics) • Avoid giving away your IMEI
  • 16. Best practices • Generate unique random passwords • Store everything sensitive in your password manager • Never open attachments you don't trust • Never answer emails that ask for your info • Avoid writing your credit card details in an email or on paper (rentals) • If you have to give a password, change it afterwards • Always use a VPN on public wi fi s • Check if some of your accounts have been compromised: https://haveibeenpwned.com/ • Beware of social engineering • Beware of random USB keys • Don't share pictures of your boarding passes