SlideShare a Scribd company logo
1 of 22
Download to read offline
Keeping Your Personal Info Safe
  It’s All About Minimizing Risk
Welcome!



      Chris Schroeder, CISM,
      Lowe’s Companies, Inc.



      Ken Robey, CISSP

      Security in Focus, Inc.




           NPower Charlotte Region | Proprietary and Confidential | Not for Distribution   2
NPower Charlotte Region | Proprietary and Confidential | Not for Distribution   3
a




Learn how to protect your personal data wherever you go.




              NPower Charlotte Region | Proprietary and Confidential | Not for Distribution   4
Today’s Roadmap to Protecting Your Data


● Avoid “scammers”
● Learn wireless network basics
● Picking passwords
    Creation
    Protection

● Backing up your data
● Q&A


            NPower Charlotte Region | Proprietary and Confidential | Not for Distribution   5
6 Rules to Avoid Scammers

1. Don’t share personal info with anyone who calls you to ask for it.

2. Don’t share passwords.

3. Treat unexpected emails suspiciously.

4. Don’t respond to company emails requesting personal info.

5. Confirm the identity of anyone asking for personal info.

6. ALWAYS follow the correct procedure; don’t make exceptions.



                 NPower Charlotte Region | Proprietary and Confidential | Not for Distribution   6
Wireless Network Basics

                     4 Ways to Protect
                   Yourself from Network
                         Attackers       4
            1                                                              Enabling
      Renaming your                                                       password
       default SSID                                                       protection

                    2            3
             Preventing SSID   Using
              broadcasting   encryption



             NPower Charlotte Region | Proprietary and Confidential | Not for Distribution   7
1
                Wireless Network Basics
Renaming your
 default SSID



    • By default, the wireless access point’s SSID will typically
      be some form of a the manufacturer’s name example,
      Linksys wireless access points have SSIDs of “Linksys”.

    • Renaming the default SSID is the first step to hardening a
      wireless network from attacks.




                 NPower Charlotte Region | Proprietary and Confidential | Not for Distribution   8
2        Wireless Network Basics
Preventing SSID
 broadcasting



  ● Turn off SSID broadcasting on your wireless access point




                NPower Charlotte Region | Proprietary and Confidential | Not for Distribution   9
Wireless Network Basics
    3
  Using
encryption


   • Utilizing encryption ensures that someone cannot start a
     network analyzer and easily view all of the data you have
     transmitted to and/or received from the wireless access
     point.
   • Common wireless security specifications include, from
     weakest to strongest:
         • WEP (Bad)
         • WPA (Better)
         • WPA2 (Best)



              NPower Charlotte Region | Proprietary and Confidential | Not for Distribution   10
4                       Wireless Network Basics
 Enabling
password
protection


• By default, wireless access points do not require a
  password; the default to published admin password.
  Leaving your network open allows for unauthorized access.
• Secure your network by requiring a password and changing
  the default administrative password.

  **Password Hint**
     The longer and more complex the hard to crack.



              NPower Charlotte Region | Proprietary and Confidential | Not for Distribution   11
Creating and Protecting Passwords


Do Your                        ● While servers tend to have passwords
                                 on accounts, did you know that most
Passwords                                        workstations do not?


Pass the                                    ● We all believe our systems have
                                           passwords – have you ever checked
Test?                                                           every system?

                                              ● Do you have strong passwords?

                                                   ● Do you know what is a strong
                                                                     password?

            NPower Charlotte Region | Proprietary and Confidential | Not for Distribution   12
Passing the Password Test



      Length                                                Characters                Alpha
                The longer the                                                        Numeric
                better                                                                Casing
                                                                                      Special



   Example: Alpha, Numeric and Casing (16 Characters Long)
                    ‘Passw0rdPassw0rd’

47,672,401,706,823,533,450,263,330,816 (47 octillion combinations)

           53,493,822,905,617 53 trillion years to crack
                NPower Charlotte Region | Proprietary and Confidential | Not for Distribution   13
Password Protection

• Use a Password Safe to
  securely store your
  passwords
   •   LastPass.com
   •   Passwordsafe.sourceforge.net
   •   Keypass.info


• Do not use the same
  password on every
  site/system
   •   If one is compromised, so are
       the others



                    NPower Charlotte Region | Proprietary and Confidential | Not for Distribution   14
What is Your Backup Plan?


   Sooner or later, you                                             You MUST backup
    will lose your data                                                 your data


    Hard-drive will crash
                                                                      Back up regularly
    Computer gets stolen
                                                                       Back up on-site
    Building burns down
                                                                       Back up off-site
     Phone lost/stolen




             NPower Charlotte Region | Proprietary and Confidential | Not for Distribution   15
Backups




• Ensure the backups are encrypted
• Use a cloud based backup for off-site, $5.00/month




              NPower Charlotte Region | Proprietary and Confidential | Not for Distribution   16
Protecting Your Personal Data on the Street




            NPower Charlotte Region | Proprietary and Confidential | Not for Distribution   17
Protecting Your Personal Data


    What’s wrong with
       this ATM?




            NPower Charlotte Region | Proprietary and Confidential | Not for Distribution   18
Protecting Your Personal Data



                                   A card reader is placed
                                      over the original!




            NPower Charlotte Region | Proprietary and Confidential | Not for Distribution   19
Protecting Your Personal Data


  Anything wrong here?




            NPower Charlotte Region | Proprietary and Confidential | Not for Distribution   20
Protecting Your Personal Data


                                      The pamphlet holder
                                         has a camera!




            NPower Charlotte Region | Proprietary and Confidential | Not for Distribution   21
Questions?




NPower Charlotte Region | Proprietary and Confidential | Not for Distribution   22

More Related Content

Similar to Personal Data Security

eSecurity! Keeping your Business and Customers Safe
eSecurity! Keeping your Business and Customers SafeeSecurity! Keeping your Business and Customers Safe
eSecurity! Keeping your Business and Customers SafeAVG Technologies AU
 
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...Tom Eston
 
CompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four ReviewCompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four ReviewDCPS
 
Unified Threat Management
Unified Threat ManagementUnified Threat Management
Unified Threat ManagementTapas Shome
 
Web application security: Threats & Countermeasures
Web application security: Threats & CountermeasuresWeb application security: Threats & Countermeasures
Web application security: Threats & CountermeasuresAung Thu Rha Hein
 
Internet security lessons for IoT
Internet security lessons for IoTInternet security lessons for IoT
Internet security lessons for IoTDirk Zittersteyn
 
Howtohackwirelessinternetconnections 100105124156-phpapp01
Howtohackwirelessinternetconnections 100105124156-phpapp01Howtohackwirelessinternetconnections 100105124156-phpapp01
Howtohackwirelessinternetconnections 100105124156-phpapp01Alf Tero
 
Dama - Protecting Sensitive Data on a Database
Dama - Protecting Sensitive Data on a DatabaseDama - Protecting Sensitive Data on a Database
Dama - Protecting Sensitive Data on a Databasejohanswart1234
 
Tingling wireless security
Tingling wireless securityTingling wireless security
Tingling wireless securityrash2kool
 
WiFi Intrustion Detection from WireShark SharkFest
WiFi Intrustion Detection from WireShark SharkFestWiFi Intrustion Detection from WireShark SharkFest
WiFi Intrustion Detection from WireShark SharkFestDavid Sweigert
 
Save Your Network – Protecting Manufacturing Data from Deadly Breaches
Save Your Network – Protecting Manufacturing Data from Deadly BreachesSave Your Network – Protecting Manufacturing Data from Deadly Breaches
Save Your Network – Protecting Manufacturing Data from Deadly BreachesLancope, Inc.
 
Henrik Strøm - IPv6 from the attacker's perspective
Henrik Strøm - IPv6 from the attacker's perspectiveHenrik Strøm - IPv6 from the attacker's perspective
Henrik Strøm - IPv6 from the attacker's perspectiveIKT-Norge
 
Hacktrikz - Introduction to Information Security & Ethical Hacking
Hacktrikz - Introduction to Information Security & Ethical HackingHacktrikz - Introduction to Information Security & Ethical Hacking
Hacktrikz - Introduction to Information Security & Ethical HackingRavi Sankar
 

Similar to Personal Data Security (20)

eSecurity! Keeping your Business and Customers Safe
eSecurity! Keeping your Business and Customers SafeeSecurity! Keeping your Business and Customers Safe
eSecurity! Keeping your Business and Customers Safe
 
IT infrastructure security 101
IT infrastructure security 101IT infrastructure security 101
IT infrastructure security 101
 
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
 
CompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four ReviewCompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four Review
 
Unified Threat Management
Unified Threat ManagementUnified Threat Management
Unified Threat Management
 
Wireless v2
Wireless v2Wireless v2
Wireless v2
 
Web application security: Threats & Countermeasures
Web application security: Threats & CountermeasuresWeb application security: Threats & Countermeasures
Web application security: Threats & Countermeasures
 
Internet security lessons for IoT
Internet security lessons for IoTInternet security lessons for IoT
Internet security lessons for IoT
 
Myles firewalls
Myles firewallsMyles firewalls
Myles firewalls
 
WiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & DefenceWiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & Defence
 
Howtohackwirelessinternetconnections 100105124156-phpapp01
Howtohackwirelessinternetconnections 100105124156-phpapp01Howtohackwirelessinternetconnections 100105124156-phpapp01
Howtohackwirelessinternetconnections 100105124156-phpapp01
 
Dama - Protecting Sensitive Data on a Database
Dama - Protecting Sensitive Data on a DatabaseDama - Protecting Sensitive Data on a Database
Dama - Protecting Sensitive Data on a Database
 
Tingling wireless security
Tingling wireless securityTingling wireless security
Tingling wireless security
 
Kerberos
KerberosKerberos
Kerberos
 
WiFi Intrustion Detection from WireShark SharkFest
WiFi Intrustion Detection from WireShark SharkFestWiFi Intrustion Detection from WireShark SharkFest
WiFi Intrustion Detection from WireShark SharkFest
 
Airheads dallas 2011 wireless security
Airheads dallas 2011   wireless securityAirheads dallas 2011   wireless security
Airheads dallas 2011 wireless security
 
Save Your Network – Protecting Manufacturing Data from Deadly Breaches
Save Your Network – Protecting Manufacturing Data from Deadly BreachesSave Your Network – Protecting Manufacturing Data from Deadly Breaches
Save Your Network – Protecting Manufacturing Data from Deadly Breaches
 
Henrik Strøm - IPv6 from the attacker's perspective
Henrik Strøm - IPv6 from the attacker's perspectiveHenrik Strøm - IPv6 from the attacker's perspective
Henrik Strøm - IPv6 from the attacker's perspective
 
Hacktrikz - Introduction to Information Security & Ethical Hacking
Hacktrikz - Introduction to Information Security & Ethical HackingHacktrikz - Introduction to Information Security & Ethical Hacking
Hacktrikz - Introduction to Information Security & Ethical Hacking
 
The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?
 

Recently uploaded

Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxnelietumpap1
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 

Recently uploaded (20)

TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptx
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 

Personal Data Security

  • 1. Keeping Your Personal Info Safe It’s All About Minimizing Risk
  • 2. Welcome! Chris Schroeder, CISM, Lowe’s Companies, Inc. Ken Robey, CISSP Security in Focus, Inc. NPower Charlotte Region | Proprietary and Confidential | Not for Distribution 2
  • 3. NPower Charlotte Region | Proprietary and Confidential | Not for Distribution 3
  • 4. a Learn how to protect your personal data wherever you go. NPower Charlotte Region | Proprietary and Confidential | Not for Distribution 4
  • 5. Today’s Roadmap to Protecting Your Data ● Avoid “scammers” ● Learn wireless network basics ● Picking passwords  Creation  Protection ● Backing up your data ● Q&A NPower Charlotte Region | Proprietary and Confidential | Not for Distribution 5
  • 6. 6 Rules to Avoid Scammers 1. Don’t share personal info with anyone who calls you to ask for it. 2. Don’t share passwords. 3. Treat unexpected emails suspiciously. 4. Don’t respond to company emails requesting personal info. 5. Confirm the identity of anyone asking for personal info. 6. ALWAYS follow the correct procedure; don’t make exceptions. NPower Charlotte Region | Proprietary and Confidential | Not for Distribution 6
  • 7. Wireless Network Basics 4 Ways to Protect Yourself from Network Attackers 4 1 Enabling Renaming your password default SSID protection 2 3 Preventing SSID Using broadcasting encryption NPower Charlotte Region | Proprietary and Confidential | Not for Distribution 7
  • 8. 1 Wireless Network Basics Renaming your default SSID • By default, the wireless access point’s SSID will typically be some form of a the manufacturer’s name example, Linksys wireless access points have SSIDs of “Linksys”. • Renaming the default SSID is the first step to hardening a wireless network from attacks. NPower Charlotte Region | Proprietary and Confidential | Not for Distribution 8
  • 9. 2 Wireless Network Basics Preventing SSID broadcasting ● Turn off SSID broadcasting on your wireless access point NPower Charlotte Region | Proprietary and Confidential | Not for Distribution 9
  • 10. Wireless Network Basics 3 Using encryption • Utilizing encryption ensures that someone cannot start a network analyzer and easily view all of the data you have transmitted to and/or received from the wireless access point. • Common wireless security specifications include, from weakest to strongest: • WEP (Bad) • WPA (Better) • WPA2 (Best) NPower Charlotte Region | Proprietary and Confidential | Not for Distribution 10
  • 11. 4 Wireless Network Basics Enabling password protection • By default, wireless access points do not require a password; the default to published admin password. Leaving your network open allows for unauthorized access. • Secure your network by requiring a password and changing the default administrative password. **Password Hint** The longer and more complex the hard to crack. NPower Charlotte Region | Proprietary and Confidential | Not for Distribution 11
  • 12. Creating and Protecting Passwords Do Your ● While servers tend to have passwords on accounts, did you know that most Passwords workstations do not? Pass the ● We all believe our systems have passwords – have you ever checked Test? every system? ● Do you have strong passwords? ● Do you know what is a strong password? NPower Charlotte Region | Proprietary and Confidential | Not for Distribution 12
  • 13. Passing the Password Test Length Characters Alpha The longer the Numeric better Casing Special Example: Alpha, Numeric and Casing (16 Characters Long) ‘Passw0rdPassw0rd’ 47,672,401,706,823,533,450,263,330,816 (47 octillion combinations) 53,493,822,905,617 53 trillion years to crack NPower Charlotte Region | Proprietary and Confidential | Not for Distribution 13
  • 14. Password Protection • Use a Password Safe to securely store your passwords • LastPass.com • Passwordsafe.sourceforge.net • Keypass.info • Do not use the same password on every site/system • If one is compromised, so are the others NPower Charlotte Region | Proprietary and Confidential | Not for Distribution 14
  • 15. What is Your Backup Plan? Sooner or later, you You MUST backup will lose your data your data Hard-drive will crash Back up regularly Computer gets stolen Back up on-site Building burns down Back up off-site Phone lost/stolen NPower Charlotte Region | Proprietary and Confidential | Not for Distribution 15
  • 16. Backups • Ensure the backups are encrypted • Use a cloud based backup for off-site, $5.00/month NPower Charlotte Region | Proprietary and Confidential | Not for Distribution 16
  • 17. Protecting Your Personal Data on the Street NPower Charlotte Region | Proprietary and Confidential | Not for Distribution 17
  • 18. Protecting Your Personal Data What’s wrong with this ATM? NPower Charlotte Region | Proprietary and Confidential | Not for Distribution 18
  • 19. Protecting Your Personal Data A card reader is placed over the original! NPower Charlotte Region | Proprietary and Confidential | Not for Distribution 19
  • 20. Protecting Your Personal Data Anything wrong here? NPower Charlotte Region | Proprietary and Confidential | Not for Distribution 20
  • 21. Protecting Your Personal Data The pamphlet holder has a camera! NPower Charlotte Region | Proprietary and Confidential | Not for Distribution 21
  • 22. Questions? NPower Charlotte Region | Proprietary and Confidential | Not for Distribution 22