SlideShare a Scribd company logo
Securing Your Digital Shadow
Ernest Staats
MS Information Assurance, CISSP, CEH, CWNA,
Security+, MCSE, CNA, I-Net+, Network+, Server+, A​+
Security Tips
• Don't sign up using anothersocialnetworkingaccount
• Lock down those socialnetworkprivacy settings
• Think before you post
• Lie. About. Everything
More Security Tips
• Usea passwordmanager andtwo-factor authentication
• Disposableemail DoNotTrackMe, and Yahoodisposable
emails MeltMail
• Usesecure browser suchasFirefox withlistedaddons
• Create personal andprofessional personas
• Delete yourInformationon Google
• Google ads
https://www.google.com/settings/u/0/ads/authenticated
• Privacyhttps://myaccount.google.com/
Identity Protection Tips
• Ask questions before you share it
• Lock it up
• Shred it before you put intrash
• Password protect it
• Freeze Credit (for allfamilymembers)
• Checkall familymembers digital foot print
• Set Google Alerts for family
• https://www.google.com/alerts#
Understand Risk
Mobile + IoT + Digital Shadow = Digital Monster
• IoT Scanner https://iotscanner.bullguard.com/
• IoT Search - Shodan https://www.shodan.io/explore
Protect Personal & Work Data
• Use and maintain anti-virus software and
a firewall
• Regularly scan your computer for
spyware
• Keep software up to date
• Evaluate your software's settings
• Remove unused software programs/Apps
• Consider creating separate user accounts
• Use passwords and encrypt sensitive files
• Dispose of sensitive information properly
Protecting Your Privacy
• Do business with credible companies
• Do not use primary email in online
submissions
• Avoid submitting credit card
information online
• Devote one credit card to online
purchases
Safe Social Networking
• Lie
• Limit personal information you post
• Internet is a public resource
• Be skeptical
• Evaluate your settings
• Be wary of third-party applications
• Use strong passwords
Avoid Identity Theft
• Do business with reputable companies
• Check privacy policies
• Be careful what information you
publicize
• Use and maintain anti-virus software
and a firewall
• Be aware of your account activity
Has your identity been stolen
• Unusual or unexplainable charges on
your bills
• Phone calls or bills for accounts,
products, or services that you do not
have
• Failure to receive regular bills or mail
• New, strange accounts appearing on
your credit report
• Unexpected denial of your credit card
What is IoT
The ‘S” in IoT
Common Passwords IoT
IoT Discovery Security
• Check your network from the outside
– https://iotscanner.bullguard.com/
• If found then run https://www.shodan.io/
• Download and Run RIoT
– https://www.beyondtrust.com/free-iot-
vulnerability-scanner/
IoT Protection
• Monthly check IoT & router's firmware
• Change administration passwords
• Change your Wi-Fi network name
• Select WPA2 encryption for Wi-Fi
• Stick a cut-off headset plug in laptop's
microphone
• Put Cover on Cam
• Research smart-home devices
Check your System Firewall
• Checkpoints free FW Verification
• Ransomware
• Identity Theft / Phishing
• Zero Day Vulnerability
• Bot Infection
• Browser Attack
• Anonymizer Usage
• Sensitive Data leakage
http://www.cpcheckme.com/checkme/
Digital Shadow
• Nothing to hide
• Don’t care if others know
• Just the internet
– Looking for a job or applying for credit
• One in millions (still easy to find)
• I get discounts (at what cost)
• I am getting something for Free (no)
Known Digital Shadows
PeekYou
Give a lot ofInformationfor free just wait andscroll down
http://www.peekyou.com/
Pipl
Search fora person using nameandlocationhttps://pipl.com/
Check Mate
Search fora person using nameandlocation
https://www.instantcheckmate.com
Spokeo
Searches lots ofpublic Records to find informationabout someone
http://www.spokeo.com
US Search
Search fora person using emailnameor user name
http://www.ussearch.com/
Unknown Digital Shadows
Pandora
What do theylisten to and who is following them http://www.pandora.com/
Twitter
See what they post online https://twitter.com/
Amazon
What aretheir likes wishes and look at comments http://www.amazon.com/
Facebook
Pay attention tofamily connections posting GPS
https://www.facebook.com/
Linkedin
What arethey posting https://www.linkedin.com/
Browser Trackers
• Visible Trackers:
– Google's red
– G+ button
– Facebook's "like”
– Twitter's little blue bird .
Digital Hygiene
• Keep an eye on your bank accounts - Click here
to learn how to set up two-factor authentication.
• Investigate your email address - Have I Been
Pwned
• Change your password - Read this article to help
you create hack-proof passwords.
• Close unused accounts - Here's an easy way to
manage all of your online accounts at once.
• Beware of phishing scams - Take our phishing
IQ test to see if you can spot a fake email.
• Manage passwords - LastPass or KeePass
Remove WiFi Networks
• iPhone or Ipad:
Settings → General → Reset → Reset
Network Settings.
• On Android phones and your computer
you can see the wifi networks you've
connected to before, and delete them
individually.
Understand Your Shadow
• Logout & clear browser of all settings
• Search your Name, place of work, school,
use google and DuckDuckGo
• Sign into Google
– https://google.com/history
– https://google.com/takeout
• Sign into Twitter
– request your advertiser list
– see your own interests
• About the Data What is stored
– https://aboutthedata.com/portal/registration/step1
About the Data
Browser Fingerprinting
• Use Electronic Frontier Foundation
Panopticlick tool
– "Test Me”
• Sticky Trackers
– "stick" in your
browser - instead of disappearing when you
leave a website
Clean your Shadow
• Clean Web Browser
– Use Ccleaner
• DEMO
• Delete Apps you don’t use
• Turn Off location settings
– Demo
• Use VPN
• Like Random things
• Delete mobile Number/ school/ work online
• Check App permissions
• Backup photos
• Use Password Manager
Basic Privacy Settings
• Facebook go to settings Privacy
– Turn off location
– Select Friends for post, phone, email address
– No to search engines outside of Facebook
• Twitter profile picture>Settings>Security
– Photo tagging do not allow
– Protect my tweets
– Uncheck add location to tweets
– Uncheck let others find me by my email
Metadata
• The most common types of metadata are:
– Software Version
– File share / servers
– Phone numbers, emails and usernames
– Location data: where your mobile phone is
– Date- and time-stamps on phone calls,
emails, files, and photos.
– Information about the device you are using
– The subject lines of your emails
• Covered in NY DFS Security Regulation “nonpublic information”
Scrubbing Meta Data
Discover Meta Data on websites
FOCA https://www.elevenpaths.com/labstools/foca/index.htm
Software
Jpg andPNGmetadatastriperhttp://www.steelbytes.com/?mid=30
BatchPurifierLITE
http://www.digitalconfidence.com/downloads.html
DocScrubber
http://www.javacoolsoftware.com/dsdownload.html
See MetaData in photos
http://regex.info/exif.cgi
Secure Mobile
• Mobile WiFi Demo:
Protect Mobile
• Keep all applications and system patched and
updated
• Use 5 digit Pin to lock device (at least)
• Don't install 'off-road' Android apps
• Don't jailbreak/root your mobile
• Install antivirus
• Enable two-factor authentication on every account
• Remove apps you don't use
• Use a password manager
• Cover WebCam / headphone-Mic Jack
• Turn Off WiFI – BlueTooth (when not using)
How Many APPS?
• The Number of Apps on your Device
impacts your security exposure:
– 0-19 Low
– 20-39 Moderate
– 40-59 High
– 60+ Very High
• What does the App do for you… at what
cost?
Mobile Device Encryption
• Encrypt Mobile and Backups
– freshly-rebooted, without being unlocked
TURN OFF WiFi/Bluetooth
NIST Cybersecurity Framework
Before Crossing The Border
• Register with Smart Traveler Enrollment Program
https://step.state.gov/step/
• First Backup Device and settings
• Establish a VPN account i.e. https://www.privateinternetaccess.com
• Make sure it is Encrypted Mobile, Laptop, & USB drive
• Factory Reset / reimage
– Configure VPN you established before
• Encrypt mobile
• Strong passcode six digit at least (No Fingerprint)
More - Before Crossing The Border
• Use a Secure phone - Silent Circle Phone
“Blackphone” https://goo.gl/WnXfOa
• Turn Off WiFi and Bluetooth
– Forget/ Remove all Wireless and Bluetooth networks (all the time)
• Disable Location tracking and history
https://maps.google.com/locationhistory/b/0
• Delete all History before stepping off plane
• Turn off all location and tracking information
• Setup a Temp email i.e. PBJapple@gmail.com Forward email if
needed

More Related Content

What's hot

An Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & AnywhereAn Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & Anywhere
Blake Carver
 
An Introduction To IT Security And Privacy - Servers And More
An Introduction To IT Security And Privacy - Servers And MoreAn Introduction To IT Security And Privacy - Servers And More
An Introduction To IT Security And Privacy - Servers And More
Blake Carver
 
Cyber Safety 101
Cyber Safety 101Cyber Safety 101
Cyber Safety 101
Jeff Niebaum, M.A
 
Implementing security for your library | PLAN Tech Day Conference
Implementing security for  your library | PLAN Tech Day ConferenceImplementing security for  your library | PLAN Tech Day Conference
Implementing security for your library | PLAN Tech Day Conference
Brian Pichman
 
The Mirai Botnet and Massive DDoS Attacks of October 2016
The Mirai Botnet and Massive DDoS Attacks of October 2016The Mirai Botnet and Massive DDoS Attacks of October 2016
The Mirai Botnet and Massive DDoS Attacks of October 2016
William Slater III
 
Mobile Hacking
Mobile HackingMobile Hacking
Mobile Hacking
Novizul Evendi
 
Android Application Security Awareness Talk, OWASP MEETUP Q3, 2015
Android Application Security Awareness Talk, OWASP MEETUP Q3, 2015Android Application Security Awareness Talk, OWASP MEETUP Q3, 2015
Android Application Security Awareness Talk, OWASP MEETUP Q3, 2015
Sina Manavi
 
So you want to be a wireless hacker
So you want to be a wireless hackerSo you want to be a wireless hacker
So you want to be a wireless hacker
Casey Dunham
 
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Tom Eston
 
Hacking Mobile Apps
Hacking Mobile AppsHacking Mobile Apps
Hacking Mobile Apps
Sophos Benelux
 
Infosec 4 The Home
Infosec 4 The HomeInfosec 4 The Home
Infosec 4 The Home
jaysonstreet
 
Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08
DallasHaselhorst
 
Login cat tekmonks - v3
Login cat   tekmonks - v3Login cat   tekmonks - v3
Login cat tekmonks - v3
TEKMONKS
 
Trial by Fire: Security @ DEF CON 21
Trial by Fire: Security @ DEF CON 21Trial by Fire: Security @ DEF CON 21
Trial by Fire: Security @ DEF CON 21
Lookout
 
Internet security
Internet securityInternet security
Internet security
Carmen Gorda
 
Cybersecurity Awareness Training Presentation v1.1
Cybersecurity Awareness Training Presentation v1.1Cybersecurity Awareness Training Presentation v1.1
Cybersecurity Awareness Training Presentation v1.1
DallasHaselhorst
 
Document safer online for nonprofits guide
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guide
Nguyen Xuan Quang
 
7 Cybersecurity Sins When Working From Home
7 Cybersecurity Sins When Working From Home7 Cybersecurity Sins When Working From Home
7 Cybersecurity Sins When Working From Home
DallasHaselhorst
 
Cyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyCyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spy
b coatesworth
 

What's hot (20)

An Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & AnywhereAn Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & Anywhere
 
An Introduction To IT Security And Privacy - Servers And More
An Introduction To IT Security And Privacy - Servers And MoreAn Introduction To IT Security And Privacy - Servers And More
An Introduction To IT Security And Privacy - Servers And More
 
Cyber Safety 101
Cyber Safety 101Cyber Safety 101
Cyber Safety 101
 
Implementing security for your library | PLAN Tech Day Conference
Implementing security for  your library | PLAN Tech Day ConferenceImplementing security for  your library | PLAN Tech Day Conference
Implementing security for your library | PLAN Tech Day Conference
 
The Mirai Botnet and Massive DDoS Attacks of October 2016
The Mirai Botnet and Massive DDoS Attacks of October 2016The Mirai Botnet and Massive DDoS Attacks of October 2016
The Mirai Botnet and Massive DDoS Attacks of October 2016
 
Mobile Hacking
Mobile HackingMobile Hacking
Mobile Hacking
 
Android Application Security Awareness Talk, OWASP MEETUP Q3, 2015
Android Application Security Awareness Talk, OWASP MEETUP Q3, 2015Android Application Security Awareness Talk, OWASP MEETUP Q3, 2015
Android Application Security Awareness Talk, OWASP MEETUP Q3, 2015
 
So you want to be a wireless hacker
So you want to be a wireless hackerSo you want to be a wireless hacker
So you want to be a wireless hacker
 
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
 
Hacking Mobile Apps
Hacking Mobile AppsHacking Mobile Apps
Hacking Mobile Apps
 
Infosec 4 The Home
Infosec 4 The HomeInfosec 4 The Home
Infosec 4 The Home
 
INTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDSINTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDS
 
Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08
 
Login cat tekmonks - v3
Login cat   tekmonks - v3Login cat   tekmonks - v3
Login cat tekmonks - v3
 
Trial by Fire: Security @ DEF CON 21
Trial by Fire: Security @ DEF CON 21Trial by Fire: Security @ DEF CON 21
Trial by Fire: Security @ DEF CON 21
 
Internet security
Internet securityInternet security
Internet security
 
Cybersecurity Awareness Training Presentation v1.1
Cybersecurity Awareness Training Presentation v1.1Cybersecurity Awareness Training Presentation v1.1
Cybersecurity Awareness Training Presentation v1.1
 
Document safer online for nonprofits guide
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guide
 
7 Cybersecurity Sins When Working From Home
7 Cybersecurity Sins When Working From Home7 Cybersecurity Sins When Working From Home
7 Cybersecurity Sins When Working From Home
 
Cyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyCyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spy
 

Similar to Harbin clinic iot-mobile-no-vid

Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security Practice
Brian Pichman
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
Kazi Sarwar Hossain
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
Community IT Innovators
 
Security best practices for regular users
Security best practices for regular usersSecurity best practices for regular users
Security best practices for regular users
Geoffrey Vaughan
 
Security Best Practices for Regular Users
Security Best Practices for Regular UsersSecurity Best Practices for Regular Users
Security Best Practices for Regular Users
Security Innovation
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
Priyab Satoshi
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security Innovation
Priyanka Aash
 
It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version
Brian Pichman
 
Digital Security and Hygiene.pptx
Digital Security and Hygiene.pptxDigital Security and Hygiene.pptx
Digital Security and Hygiene.pptx
Ultimate Multimedia Consult
 
eSecurity! Keeping your Business and Customers Safe
eSecurity! Keeping your Business and Customers SafeeSecurity! Keeping your Business and Customers Safe
eSecurity! Keeping your Business and Customers Safe
AVG Technologies AU
 
Securing your cyberspace_Watson
Securing your cyberspace_WatsonSecuring your cyberspace_Watson
Securing your cyberspace_Watson
Patricia M Watson
 
Iron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyIron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data Responsibly
Gabor Szathmari
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
OoXair
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
MansoorAhmed57263
 
Personal Threat Models
Personal Threat ModelsPersonal Threat Models
Personal Threat Models
Geoffrey Vaughan
 
ICT Security is Everyone's Business
ICT Security is Everyone's BusinessICT Security is Everyone's Business
ICT Security is Everyone's Business
International Institute of Tropical Agriculture
 
One of 2 protect your business
One of 2 protect your businessOne of 2 protect your business
One of 2 protect your business
Management Insights LLC
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness TrainingRandy Bowman
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
Ronald Soh
 

Similar to Harbin clinic iot-mobile-no-vid (20)

Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security Practice
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
Security best practices for regular users
Security best practices for regular usersSecurity best practices for regular users
Security best practices for regular users
 
Security Best Practices for Regular Users
Security Best Practices for Regular UsersSecurity Best Practices for Regular Users
Security Best Practices for Regular Users
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security Innovation
 
It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version
 
Digital Security and Hygiene.pptx
Digital Security and Hygiene.pptxDigital Security and Hygiene.pptx
Digital Security and Hygiene.pptx
 
eSecurity! Keeping your Business and Customers Safe
eSecurity! Keeping your Business and Customers SafeeSecurity! Keeping your Business and Customers Safe
eSecurity! Keeping your Business and Customers Safe
 
Securing your cyberspace_Watson
Securing your cyberspace_WatsonSecuring your cyberspace_Watson
Securing your cyberspace_Watson
 
001 ho basic computer
001 ho basic computer001 ho basic computer
001 ho basic computer
 
Iron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyIron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data Responsibly
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
 
Personal Threat Models
Personal Threat ModelsPersonal Threat Models
Personal Threat Models
 
ICT Security is Everyone's Business
ICT Security is Everyone's BusinessICT Security is Everyone's Business
ICT Security is Everyone's Business
 
One of 2 protect your business
One of 2 protect your businessOne of 2 protect your business
One of 2 protect your business
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
 

More from Ernest Staats

Information security trends and steps for (OSAC) Middle East divsion
Information security trends and steps for (OSAC) Middle East divsion Information security trends and steps for (OSAC) Middle East divsion
Information security trends and steps for (OSAC) Middle East divsion
Ernest Staats
 
Tsc2021 cyber-issues
Tsc2021 cyber-issuesTsc2021 cyber-issues
Tsc2021 cyber-issues
Ernest Staats
 
IT Staff NDA Template Employee Confidentiality Agreement
IT Staff NDA Template Employee Confidentiality AgreementIT Staff NDA Template Employee Confidentiality Agreement
IT Staff NDA Template Employee Confidentiality Agreement
Ernest Staats
 
A guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityA guide to Sustainable Cyber Security
A guide to Sustainable Cyber Security
Ernest Staats
 
Cy safe 2.0_workbook
Cy safe 2.0_workbookCy safe 2.0_workbook
Cy safe 2.0_workbook
Ernest Staats
 
Privacies are Coming
Privacies are ComingPrivacies are Coming
Privacies are Coming
Ernest Staats
 
Parenting and the media challenge
Parenting and the media challengeParenting and the media challenge
Parenting and the media challenge
Ernest Staats
 
How to use technology in ministry & parenting
How to use technology in ministry & parentingHow to use technology in ministry & parenting
How to use technology in ministry & parenting
Ernest Staats
 
Privacies are coming
Privacies are comingPrivacies are coming
Privacies are coming
Ernest Staats
 
Idwg bimonthly security exchange cyber only section
Idwg bimonthly security exchange cyber only sectionIdwg bimonthly security exchange cyber only section
Idwg bimonthly security exchange cyber only section
Ernest Staats
 
Data Detox Kit Optimized
Data Detox Kit Optimized Data Detox Kit Optimized
Data Detox Kit Optimized
Ernest Staats
 
GDPR Benefits and a Technical Overview
GDPR  Benefits and a Technical OverviewGDPR  Benefits and a Technical Overview
GDPR Benefits and a Technical Overview
Ernest Staats
 
Compter Forensics Intro for Students
Compter Forensics Intro for Students Compter Forensics Intro for Students
Compter Forensics Intro for Students
Ernest Staats
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security
Ernest Staats
 
Why security is the kidney not the tail of the dog v3
Why security is the kidney not the tail of the dog v3Why security is the kidney not the tail of the dog v3
Why security is the kidney not the tail of the dog v3
Ernest Staats
 
FBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise WorkshopFBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise Workshop
Ernest Staats
 
FBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise WorkshopFBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise Workshop
Ernest Staats
 
Securely Erase your Device
Securely Erase your DeviceSecurely Erase your Device
Securely Erase your Device
Ernest Staats
 
Social & mobile security
Social & mobile securitySocial & mobile security
Social & mobile securityErnest Staats
 
Social mobile safety
Social mobile safetySocial mobile safety
Social mobile safetyErnest Staats
 

More from Ernest Staats (20)

Information security trends and steps for (OSAC) Middle East divsion
Information security trends and steps for (OSAC) Middle East divsion Information security trends and steps for (OSAC) Middle East divsion
Information security trends and steps for (OSAC) Middle East divsion
 
Tsc2021 cyber-issues
Tsc2021 cyber-issuesTsc2021 cyber-issues
Tsc2021 cyber-issues
 
IT Staff NDA Template Employee Confidentiality Agreement
IT Staff NDA Template Employee Confidentiality AgreementIT Staff NDA Template Employee Confidentiality Agreement
IT Staff NDA Template Employee Confidentiality Agreement
 
A guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityA guide to Sustainable Cyber Security
A guide to Sustainable Cyber Security
 
Cy safe 2.0_workbook
Cy safe 2.0_workbookCy safe 2.0_workbook
Cy safe 2.0_workbook
 
Privacies are Coming
Privacies are ComingPrivacies are Coming
Privacies are Coming
 
Parenting and the media challenge
Parenting and the media challengeParenting and the media challenge
Parenting and the media challenge
 
How to use technology in ministry & parenting
How to use technology in ministry & parentingHow to use technology in ministry & parenting
How to use technology in ministry & parenting
 
Privacies are coming
Privacies are comingPrivacies are coming
Privacies are coming
 
Idwg bimonthly security exchange cyber only section
Idwg bimonthly security exchange cyber only sectionIdwg bimonthly security exchange cyber only section
Idwg bimonthly security exchange cyber only section
 
Data Detox Kit Optimized
Data Detox Kit Optimized Data Detox Kit Optimized
Data Detox Kit Optimized
 
GDPR Benefits and a Technical Overview
GDPR  Benefits and a Technical OverviewGDPR  Benefits and a Technical Overview
GDPR Benefits and a Technical Overview
 
Compter Forensics Intro for Students
Compter Forensics Intro for Students Compter Forensics Intro for Students
Compter Forensics Intro for Students
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security
 
Why security is the kidney not the tail of the dog v3
Why security is the kidney not the tail of the dog v3Why security is the kidney not the tail of the dog v3
Why security is the kidney not the tail of the dog v3
 
FBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise WorkshopFBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise Workshop
 
FBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise WorkshopFBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise Workshop
 
Securely Erase your Device
Securely Erase your DeviceSecurely Erase your Device
Securely Erase your Device
 
Social & mobile security
Social & mobile securitySocial & mobile security
Social & mobile security
 
Social mobile safety
Social mobile safetySocial mobile safety
Social mobile safety
 

Recently uploaded

Opinions on EVs: Metro Atlanta Speaks 2023
Opinions on EVs: Metro Atlanta Speaks 2023Opinions on EVs: Metro Atlanta Speaks 2023
Opinions on EVs: Metro Atlanta Speaks 2023
ARCResearch
 
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdfPNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
ClaudioTebaldi2
 
NHAI_Under_Implementation_01-05-2024.pdf
NHAI_Under_Implementation_01-05-2024.pdfNHAI_Under_Implementation_01-05-2024.pdf
NHAI_Under_Implementation_01-05-2024.pdf
AjayVejendla3
 
PPT Item # 6 - 7001 Broadway ARB Case # 933F
PPT Item # 6 - 7001 Broadway ARB Case # 933FPPT Item # 6 - 7001 Broadway ARB Case # 933F
PPT Item # 6 - 7001 Broadway ARB Case # 933F
ahcitycouncil
 
Many ways to support street children.pptx
Many ways to support street children.pptxMany ways to support street children.pptx
Many ways to support street children.pptx
SERUDS INDIA
 
Russian anarchist and anti-war movement in the third year of full-scale war
Russian anarchist and anti-war movement in the third year of full-scale warRussian anarchist and anti-war movement in the third year of full-scale war
Russian anarchist and anti-war movement in the third year of full-scale war
Antti Rautiainen
 
PD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptx
PD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptxPD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptx
PD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptx
RIDPRO11
 
PPT Item # 9 - 2024 Street Maintenance Program(SMP) Amendment
PPT Item # 9 - 2024 Street Maintenance Program(SMP) AmendmentPPT Item # 9 - 2024 Street Maintenance Program(SMP) Amendment
PPT Item # 9 - 2024 Street Maintenance Program(SMP) Amendment
ahcitycouncil
 
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Congressional Budget Office
 
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
ukyewh
 
MHM Roundtable Slide Deck WHA Side-event May 28 2024.pptx
MHM Roundtable Slide Deck WHA Side-event May 28 2024.pptxMHM Roundtable Slide Deck WHA Side-event May 28 2024.pptx
MHM Roundtable Slide Deck WHA Side-event May 28 2024.pptx
ILC- UK
 
PPT Item # 8 - Tuxedo Columbine 3way Stop
PPT Item # 8 - Tuxedo Columbine 3way StopPPT Item # 8 - Tuxedo Columbine 3way Stop
PPT Item # 8 - Tuxedo Columbine 3way Stop
ahcitycouncil
 
The Role of a Process Server in real estate
The Role of a Process Server in real estateThe Role of a Process Server in real estate
The Role of a Process Server in real estate
oklahomajudicialproc1
 
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
850fcj96
 
2024: The FAR - Federal Acquisition Regulations, Part 37
2024: The FAR - Federal Acquisition Regulations, Part 372024: The FAR - Federal Acquisition Regulations, Part 37
2024: The FAR - Federal Acquisition Regulations, Part 37
JSchaus & Associates
 
PACT launching workshop presentation-Final.pdf
PACT launching workshop presentation-Final.pdfPACT launching workshop presentation-Final.pdf
PACT launching workshop presentation-Final.pdf
Mohammed325561
 
PPT Item # 5 - 5330 Broadway ARB Case # 930F
PPT Item # 5 - 5330 Broadway ARB Case # 930FPPT Item # 5 - 5330 Broadway ARB Case # 930F
PPT Item # 5 - 5330 Broadway ARB Case # 930F
ahcitycouncil
 
ZGB - The Role of Generative AI in Government transformation.pdf
ZGB - The Role of Generative AI in Government transformation.pdfZGB - The Role of Generative AI in Government transformation.pdf
ZGB - The Role of Generative AI in Government transformation.pdf
Saeed Al Dhaheri
 
Get Government Grants and Assistance Program
Get Government Grants and Assistance ProgramGet Government Grants and Assistance Program
Get Government Grants and Assistance Program
Get Government Grants
 
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
850fcj96
 

Recently uploaded (20)

Opinions on EVs: Metro Atlanta Speaks 2023
Opinions on EVs: Metro Atlanta Speaks 2023Opinions on EVs: Metro Atlanta Speaks 2023
Opinions on EVs: Metro Atlanta Speaks 2023
 
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdfPNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
 
NHAI_Under_Implementation_01-05-2024.pdf
NHAI_Under_Implementation_01-05-2024.pdfNHAI_Under_Implementation_01-05-2024.pdf
NHAI_Under_Implementation_01-05-2024.pdf
 
PPT Item # 6 - 7001 Broadway ARB Case # 933F
PPT Item # 6 - 7001 Broadway ARB Case # 933FPPT Item # 6 - 7001 Broadway ARB Case # 933F
PPT Item # 6 - 7001 Broadway ARB Case # 933F
 
Many ways to support street children.pptx
Many ways to support street children.pptxMany ways to support street children.pptx
Many ways to support street children.pptx
 
Russian anarchist and anti-war movement in the third year of full-scale war
Russian anarchist and anti-war movement in the third year of full-scale warRussian anarchist and anti-war movement in the third year of full-scale war
Russian anarchist and anti-war movement in the third year of full-scale war
 
PD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptx
PD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptxPD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptx
PD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptx
 
PPT Item # 9 - 2024 Street Maintenance Program(SMP) Amendment
PPT Item # 9 - 2024 Street Maintenance Program(SMP) AmendmentPPT Item # 9 - 2024 Street Maintenance Program(SMP) Amendment
PPT Item # 9 - 2024 Street Maintenance Program(SMP) Amendment
 
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
 
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
 
MHM Roundtable Slide Deck WHA Side-event May 28 2024.pptx
MHM Roundtable Slide Deck WHA Side-event May 28 2024.pptxMHM Roundtable Slide Deck WHA Side-event May 28 2024.pptx
MHM Roundtable Slide Deck WHA Side-event May 28 2024.pptx
 
PPT Item # 8 - Tuxedo Columbine 3way Stop
PPT Item # 8 - Tuxedo Columbine 3way StopPPT Item # 8 - Tuxedo Columbine 3way Stop
PPT Item # 8 - Tuxedo Columbine 3way Stop
 
The Role of a Process Server in real estate
The Role of a Process Server in real estateThe Role of a Process Server in real estate
The Role of a Process Server in real estate
 
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
 
2024: The FAR - Federal Acquisition Regulations, Part 37
2024: The FAR - Federal Acquisition Regulations, Part 372024: The FAR - Federal Acquisition Regulations, Part 37
2024: The FAR - Federal Acquisition Regulations, Part 37
 
PACT launching workshop presentation-Final.pdf
PACT launching workshop presentation-Final.pdfPACT launching workshop presentation-Final.pdf
PACT launching workshop presentation-Final.pdf
 
PPT Item # 5 - 5330 Broadway ARB Case # 930F
PPT Item # 5 - 5330 Broadway ARB Case # 930FPPT Item # 5 - 5330 Broadway ARB Case # 930F
PPT Item # 5 - 5330 Broadway ARB Case # 930F
 
ZGB - The Role of Generative AI in Government transformation.pdf
ZGB - The Role of Generative AI in Government transformation.pdfZGB - The Role of Generative AI in Government transformation.pdf
ZGB - The Role of Generative AI in Government transformation.pdf
 
Get Government Grants and Assistance Program
Get Government Grants and Assistance ProgramGet Government Grants and Assistance Program
Get Government Grants and Assistance Program
 
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
 

Harbin clinic iot-mobile-no-vid

  • 1. Securing Your Digital Shadow Ernest Staats MS Information Assurance, CISSP, CEH, CWNA, Security+, MCSE, CNA, I-Net+, Network+, Server+, A​+
  • 2. Security Tips • Don't sign up using anothersocialnetworkingaccount • Lock down those socialnetworkprivacy settings • Think before you post • Lie. About. Everything
  • 3. More Security Tips • Usea passwordmanager andtwo-factor authentication • Disposableemail DoNotTrackMe, and Yahoodisposable emails MeltMail • Usesecure browser suchasFirefox withlistedaddons • Create personal andprofessional personas • Delete yourInformationon Google • Google ads https://www.google.com/settings/u/0/ads/authenticated • Privacyhttps://myaccount.google.com/
  • 4. Identity Protection Tips • Ask questions before you share it • Lock it up • Shred it before you put intrash • Password protect it • Freeze Credit (for allfamilymembers) • Checkall familymembers digital foot print • Set Google Alerts for family • https://www.google.com/alerts#
  • 5. Understand Risk Mobile + IoT + Digital Shadow = Digital Monster • IoT Scanner https://iotscanner.bullguard.com/ • IoT Search - Shodan https://www.shodan.io/explore
  • 6. Protect Personal & Work Data • Use and maintain anti-virus software and a firewall • Regularly scan your computer for spyware • Keep software up to date • Evaluate your software's settings • Remove unused software programs/Apps • Consider creating separate user accounts • Use passwords and encrypt sensitive files • Dispose of sensitive information properly
  • 7. Protecting Your Privacy • Do business with credible companies • Do not use primary email in online submissions • Avoid submitting credit card information online • Devote one credit card to online purchases
  • 8. Safe Social Networking • Lie • Limit personal information you post • Internet is a public resource • Be skeptical • Evaluate your settings • Be wary of third-party applications • Use strong passwords
  • 9. Avoid Identity Theft • Do business with reputable companies • Check privacy policies • Be careful what information you publicize • Use and maintain anti-virus software and a firewall • Be aware of your account activity
  • 10. Has your identity been stolen • Unusual or unexplainable charges on your bills • Phone calls or bills for accounts, products, or services that you do not have • Failure to receive regular bills or mail • New, strange accounts appearing on your credit report • Unexpected denial of your credit card
  • 14. IoT Discovery Security • Check your network from the outside – https://iotscanner.bullguard.com/ • If found then run https://www.shodan.io/ • Download and Run RIoT – https://www.beyondtrust.com/free-iot- vulnerability-scanner/
  • 15. IoT Protection • Monthly check IoT & router's firmware • Change administration passwords • Change your Wi-Fi network name • Select WPA2 encryption for Wi-Fi • Stick a cut-off headset plug in laptop's microphone • Put Cover on Cam • Research smart-home devices
  • 16. Check your System Firewall • Checkpoints free FW Verification • Ransomware • Identity Theft / Phishing • Zero Day Vulnerability • Bot Infection • Browser Attack • Anonymizer Usage • Sensitive Data leakage http://www.cpcheckme.com/checkme/
  • 17. Digital Shadow • Nothing to hide • Don’t care if others know • Just the internet – Looking for a job or applying for credit • One in millions (still easy to find) • I get discounts (at what cost) • I am getting something for Free (no)
  • 18. Known Digital Shadows PeekYou Give a lot ofInformationfor free just wait andscroll down http://www.peekyou.com/ Pipl Search fora person using nameandlocationhttps://pipl.com/ Check Mate Search fora person using nameandlocation https://www.instantcheckmate.com Spokeo Searches lots ofpublic Records to find informationabout someone http://www.spokeo.com US Search Search fora person using emailnameor user name http://www.ussearch.com/
  • 19. Unknown Digital Shadows Pandora What do theylisten to and who is following them http://www.pandora.com/ Twitter See what they post online https://twitter.com/ Amazon What aretheir likes wishes and look at comments http://www.amazon.com/ Facebook Pay attention tofamily connections posting GPS https://www.facebook.com/ Linkedin What arethey posting https://www.linkedin.com/
  • 20. Browser Trackers • Visible Trackers: – Google's red – G+ button – Facebook's "like” – Twitter's little blue bird .
  • 21. Digital Hygiene • Keep an eye on your bank accounts - Click here to learn how to set up two-factor authentication. • Investigate your email address - Have I Been Pwned • Change your password - Read this article to help you create hack-proof passwords. • Close unused accounts - Here's an easy way to manage all of your online accounts at once. • Beware of phishing scams - Take our phishing IQ test to see if you can spot a fake email. • Manage passwords - LastPass or KeePass
  • 22. Remove WiFi Networks • iPhone or Ipad: Settings → General → Reset → Reset Network Settings. • On Android phones and your computer you can see the wifi networks you've connected to before, and delete them individually.
  • 23. Understand Your Shadow • Logout & clear browser of all settings • Search your Name, place of work, school, use google and DuckDuckGo • Sign into Google – https://google.com/history – https://google.com/takeout • Sign into Twitter – request your advertiser list – see your own interests • About the Data What is stored – https://aboutthedata.com/portal/registration/step1
  • 25. Browser Fingerprinting • Use Electronic Frontier Foundation Panopticlick tool – "Test Me” • Sticky Trackers – "stick" in your browser - instead of disappearing when you leave a website
  • 26. Clean your Shadow • Clean Web Browser – Use Ccleaner • DEMO • Delete Apps you don’t use • Turn Off location settings – Demo • Use VPN • Like Random things • Delete mobile Number/ school/ work online • Check App permissions • Backup photos • Use Password Manager
  • 27. Basic Privacy Settings • Facebook go to settings Privacy – Turn off location – Select Friends for post, phone, email address – No to search engines outside of Facebook • Twitter profile picture>Settings>Security – Photo tagging do not allow – Protect my tweets – Uncheck add location to tweets – Uncheck let others find me by my email
  • 28. Metadata • The most common types of metadata are: – Software Version – File share / servers – Phone numbers, emails and usernames – Location data: where your mobile phone is – Date- and time-stamps on phone calls, emails, files, and photos. – Information about the device you are using – The subject lines of your emails • Covered in NY DFS Security Regulation “nonpublic information”
  • 29. Scrubbing Meta Data Discover Meta Data on websites FOCA https://www.elevenpaths.com/labstools/foca/index.htm Software Jpg andPNGmetadatastriperhttp://www.steelbytes.com/?mid=30 BatchPurifierLITE http://www.digitalconfidence.com/downloads.html DocScrubber http://www.javacoolsoftware.com/dsdownload.html See MetaData in photos http://regex.info/exif.cgi
  • 31. Protect Mobile • Keep all applications and system patched and updated • Use 5 digit Pin to lock device (at least) • Don't install 'off-road' Android apps • Don't jailbreak/root your mobile • Install antivirus • Enable two-factor authentication on every account • Remove apps you don't use • Use a password manager • Cover WebCam / headphone-Mic Jack • Turn Off WiFI – BlueTooth (when not using)
  • 32. How Many APPS? • The Number of Apps on your Device impacts your security exposure: – 0-19 Low – 20-39 Moderate – 40-59 High – 60+ Very High • What does the App do for you… at what cost?
  • 33. Mobile Device Encryption • Encrypt Mobile and Backups – freshly-rebooted, without being unlocked
  • 35.
  • 37. Before Crossing The Border • Register with Smart Traveler Enrollment Program https://step.state.gov/step/ • First Backup Device and settings • Establish a VPN account i.e. https://www.privateinternetaccess.com • Make sure it is Encrypted Mobile, Laptop, & USB drive • Factory Reset / reimage – Configure VPN you established before • Encrypt mobile • Strong passcode six digit at least (No Fingerprint)
  • 38. More - Before Crossing The Border • Use a Secure phone - Silent Circle Phone “Blackphone” https://goo.gl/WnXfOa • Turn Off WiFi and Bluetooth – Forget/ Remove all Wireless and Bluetooth networks (all the time) • Disable Location tracking and history https://maps.google.com/locationhistory/b/0 • Delete all History before stepping off plane • Turn off all location and tracking information • Setup a Temp email i.e. PBJapple@gmail.com Forward email if needed