Identity theft is becoming more common and personal data is at risk from many sources. Protecting personal data requires vigilance both offline and online. Some key steps include using strong and unique passwords for all accounts, enabling two-factor authentication whenever possible, keeping software and devices updated, using a password manager to generate and store passwords, and employing a VPN and ad blockers when browsing online. The "Internet of Things" introduces new risks as more devices collect and transmit personal data, so security settings on devices must be carefully reviewed and adjusted. Overall, people need a tailored system for protecting their data and digital lifestyle.
2. “Identity Theft Is Becoming the Third Certainty in Life.
It’s Prevalent, It’s Getting Worse.”
Adam K. Levin
Former Director, New Jersey Office of Consumer Affairs
At Some Point In Our Lives
Most Of Us Will Experience It To Some Degree.
3. WHAT MAKES UP YOUR IDENTITY?
IT’S YOUR PERSONALLY IDENTIFYING INFORMATION
• Name, Address
• Date of Birth
• Email Address
• Passport Number
• Biometrics
• Facial Recognition, Fingerprints, Retina Scanning, Voice
Recognition
• SOCIAL SECURITY NUMBER
Think For A Moment About All The Places This PDI May Be Stored!
4. There Are Many Things We Can Do To Protect Ourselves.
Some Are Easy, Others Are More Complicated.
We Should Do The Easy Things Diligently.
We Should Consider Which of the Complicated Things
Are Necessary For Our Lifestyle.
5. We Should Each Have In Place
A System of Data Protection
That Fits Our Lifestyle.
6. BOTH OFFLINE AND ONLINE ACTIONS CAN RESULT IN IDENTITY
THEFT OR DIRECT THEFT OF YOUR MONEY
DETECTIVE SERGEANT ADAM BOHANNON WILL FOCUS ON SCAMS THAT
ATTEMPT TO STEAL FROM YOU DIRECTLY ON APRIL 10
THIS PRESENTATION WILL FOCUS ON ONLINE
CAPTURE AND USE AND OF YOUR PERSONAL DATA
WHICH CAN LEAD TO ANNOYANCE AND
THEFT OF YOUR IDENTITY
7. WHAT WE’RE GOING TO DISCUSS TODAY
• Protecting Your Data From Tracking, Abuse and Theft
• Techniques And Tools For Protection In A Connected World
• A Few ‘Roberts Rules’ For Protecting Yourself, Your Devices
8. The Word ‘Online’ Chosen To Include
Internet, Mobile And Other Connected Devices
All Of This Applies to Both Internet And Mobile
• Most Of Your Account Settings Carry Over To Mobile
• Mobile Less Likely To Have Viruses and Malware
• Sadly, That Is Beginning To Change
9. WARNING SIGNS OF A VIRUS ON A MOBILE DEVICE
• Unwarranted Increase In Data Use
• Apps Crashing
• Pop-Up Ads Appearing Frequently
• App You Are Not Aware of Downloading (Don’t Open!)
• Significant Drop in Battery Life
You May Have To Format Your Phone
Ask Your Mobile Provider For Help!
10. !! MOST IMPORTANT-KEEP SETTINGS UPDATED !!
ALSO
• Turn On 2-Factor Authentication
• Enable Passcode In Case Phone
Lost Or Stolen (Each Sign-in)
• Both Protect Your Phone Number
• Don’t Download Unknown Apps
• Don’t Click On Unknown Links
11. PROTECTING THE DATA THAT’S ALREADY OUT THERE
Businesses
Health Care Providers, Financial Services Firms
Government
Educational Institutions
Charitable Organizations
12. According to Privacy Rights Clearinghouse
10,062,681,966 Accounts were Compromised in 2017
2017
• Equifax
• Recent info says tax and driver’s
license numbers as well as email
• Verizon
• Columbia Falls, Montana
• Indiana Medicaid, PA Women’s
Health Center, Washington St. U
Prior
• Yahoo (2013; Revealed 2016)
• Uber (2016)
• eBay (2014)
• Target (2013)
13.
14.
15. READ PRIVACY POLICIES
• On Websites
• When Mailed
• Financial Services, Health Care
• Pay Attention to Privacy Notices
16. If You Set Up Accounts--
With Retailers for Example—
Don’t Save Your Credit Card Number.
18. HOW IMPORTANT TO PREVENT EMAIL TRACKING?
• DO Protect Your Email Account
• 2 Step Verification (Every Sign In)
• 2 Factor Authentication
(When Account Changes Made)
• Should You Protect Your Email Content?
• Never Send Sensitive Information By Email
• Account Numbers, Passwords, etc.
• Then Don’t Worry About Encryption
19. PROTECTING YOURSELF WHILE BROWSING THE WEB
• There Are A Number Of Browser Extensions That Block Ads
• Some Are Open Source And Free
• All Work Differently/Work On Various Browsers
• Google Chrome Has A New Blocker
• Adblock Plus, Disconnect, Ublock Origin, Ghostery
• Protecting Against ISP Selling Web Use Data—Explained On
Privacy Policy
• HTTPS Everywhere
• Use a VPN
• Adjust DNS—Fairly Technical
• Will ISP Block Your Service If You Use Any Of These?
20. PROTECTING YOURSELF FROM UNWANTED PHONE CALLS
NOT ONLY ANNOYING, THEY ARE OFTEN SCAMMING
• Stopping Robo Calls on Your Land Line
• Sign Up For The Do Not Call Registry (FCC)
• Nomorobo
• Stopping Robo Calls on Your Smart Phone
• Most Carriers Offer An App To Block Robo Calls
21. PROTECTING YOUR DATA ON THE WEB
A Virtual Public Network Is A Secure Private Network Built
On Public Infrastructure (The Web).
It Encrypts The Data Traveling Over The Network
And Adds Other Security Measures.
Use A Highly Rated One.
Most Have Free Trials, Even Free Plans, For Low Volume
Users.
22. ROBERTS’ RULES FOR FINDING A GOOD VPN—
OR ANY OTHER INTERNET TOOL
• Search “The Best”
• Consider Adding The Current Year To Your Search Term
• Read The Reviews
• In 2018 Don’t Consider Reviews Written Before 2017
• Choose The Tool That Best Meets Your Needs And Lifestyle
• Download The Tool
• Follow Instructions
• Carefully Examine The Settings
26. THE IMPORTANCE OF STRONG PASSWORDS
CANNOT BE OVERSTATED
• Never Reuse Passwords
• Passwords Should Be Long, Strong and Complex
• Don’t Use Obvious Terms—Address, Birthday, Children, Pets, etc.
• Be Careful Where You Store Them
• Use Multi-Factor Authentication Whenever Possible
TOO MUCH TROUBLE, RIGHT???
27. THERE IS AN ANSWER—
AN EFFECTIVE PASSWORD MANAGER!
28. A PASSWORD MANAGER HAS SEVERAL FUNCTIONS
• Secure Way To Keep Track Of All Your Passwords
• Can Build Strong Passwords For All Your Accounts
• Can Automatically Sign You Into Many Accounts
• Can Store Credit Card Info, Making Purchasing Online (Too?) Easy
• 1Password Can Now Determine If Your Password Has Been pwned (defeated)
• Again, Choose Carefully (Roberts’ Rules)
29.
30. SECURITY PROGRAM ESSENTIAL
• Virus Protection
• Firewall
• Other Features
• Parental Controls; Gaming Protection; Protect Email Against
Spam, Spyware, Phishing
• Most ISPs Offer Free Security Program
• If You Choose Your Own, Use A Paid Program
31. MOST DATA THEFT IS RESULT OF SOME TYPE OF MALWARE
• “All The Bad Stuff”
• Viruses And More
• Good Security Program Will Get Most
• A Good Anti-Malware Package Will Catch A Few More
• There Are Free Versions
FOR SERIOUS PROBLEMS, HAVE YOUR COMPUTER PROFESSIONALLY CLEANED.
35. Anything Connected To The Internet Is Capable of
Collecting And Transmitting Data.
The Questions Are ‘What Data,’ ‘What Uses?’
If It’s Free, There’s A High Probability the App/Tool is Collecting Data.
This Also Applies To Advertising Supported Sites.
Anything Data Stored, By Any Service, Is Susceptible To Hacking.
36. ITEMS IN YOUR HOME THAT COLLECT DATA
THE QUESTION IS—DO THEY STORE IT, SELL IT?
37. HOW TO PROTECT YOUR ‘SMART HOME’ SYSTEM
• ALWAYS Change The Default Password Of Any New Device
• Update All Security Settings on Devices, Even New Ones
• Be Thoughtful About The Maker Of The Product
• Be Wary Of Public Wi-Fi
• Study The Settings Of Your Device--Can Do, Can’t Do
• Put Connected Devices on Separate Network From
Computer, Phone
39. • Should Be Approved By One Of FTC-Approved Watchdogs
• Search Online, Especially News
• Read Privacy Policy Carefully
• If Third Parties Involved In Data Handling, Research Them
• Connect Toys Only To Secure Wi-Fi
• If It Uses Bluetooth, That Should Require PINs, Passwords
• Data Transmission To Wi-Fi Should Be Encrypted
• If It Can Receive Updates, Security Patches, Keep Them
Updated
How Old Should Children Be To Have A Toy With Such Capabilities?
40. • Devices Can Not Only Listen To You, The TV, But Potentially
All Conversations Within Range
• Use Voice Recognition
• Use A PIN With The Purchasing Function
• Recordings Are Sent To Storage; Listen And Then Delete Them
• Don’t Connect Speaker To Home Security - Smart Door Locks, etc.
• Don’t Store Sensitive Info – Bank Account, Credit Card, etc.
• Mute It When Leaving For Long Period Of Time
41. SOME MORE OF ROBERTS’ RULES
FOR LIVING SAFELY IN A CONNECTED WORLD
42. THE ESSENTIALS
• First, Think Carefully About How Connected You Want To Be
• Then Think About Who You Want To Share With
• Think About How Devices Can Make Your Life Safer, More
Convenient, More Enjoyable
• Add The Security Features That Fit Your Life
NEVER MAKE TWO CHANGES TO YOUR SYSTEM AT ONCE!
MAKE A CHANGE, WAIT A COUPLE OF WEEKS TO BE SURE IT’S
WORKING, THEN MAKE ANOTHER CHANGE.
43. THEN THINK ABOUT ADD-ONS
• Be Careful About Devices That Say They’ll Solve All Problems
• Don’t Believe Promises Unless They Are Backed In Writing
• Do You Know And Trust The Company?
• Don’t Throw Money At Unnecessary Solutions
• Do Your Own Homework – Especially Before Hiring Someone
Don’t Be Afraid To Call In Professional Help When Needed!