SlideShare a Scribd company logo
1 of 30
Security Awareness Overview
Security Overview Making Security Personal Security Responsibilities Security Policies, Standards and Procedures Information Asset Privacy and Acceptable Use Questions
Making Security Personal What is your personal stake in security?  It’s your job  You are protecting your data and information You or someone you know has received a letter notifying them they will need to change out a credit card due to some form of data breach. Use information security practices at work and at home Protect your data  Protect the companies data with same vigilance
Making Security Personal Security breaches carry real costs that affect prices, company valuation, benefits and salaries Average security breach can cost a company between $90 and $305 per lost record  The number of instances of identity theft are growing exponentially every year  Legislation and industry standards are starting to hold companies and individuals accountable for security
Making Security Personal Identity thieves pose as representatives of banks, Internet service providers (ISPs) and even government agencies to gain your trust and reveal your SSN, mother's maiden name, account numbers, and other identifying information Federal Trade Commission reported 1 in 6 consumers will be a victim of identity theft this year alone  Victims spend on average $1,200 in out-of-pocket expenses and an average of 175 hours in your efforts to resolve the many problems caused by identity thieves
Making Security Personal Identity thieves use: Steal your mail or submit a change of address form for your mail Steal personnel records from their employers Family member assume identity Be aware and cautious of social engineering methods at home or at work. ,[object Object]
fool you into giving them information you would normally not disclose.,[object Object]
Creative Social Engineering Internet scam - hybrid cars in North Dakota have been tagged with fake parking citations that include a Web address hosting malicious software that drops a Trojan onto the computer. Trojan programs - Zlob is one of the most common types of software programs used to attack Windows these days. The victim is sent a link to what looks like an interesting video. When the link is clicked, the user is told to install a multimedia codec file in order to watch the video. That file is actually malicious software. Phishing kits -Some fraudsters have developed websites to sell ready-made products to other fraudsters, such as phishing kits. Recently, the RSA FraudAction Research Lab traced a new type of service on a particular website to sell HTML injections, which can be combined with Trojan attacks.
Very Creative Social Engineering Suspects entered the business, selected merchandise worth almost $8,000. They handed a credit card with no financial backing to the clerk which when swiped was rejected by the cash register's computer. The suspects then informed the clerk that this rejection was expected and to contact the credit card company by phone to receive a payment approval confirmation code. The clerk was then given a number to call which was answered by another person in the scam who approved the purchase and gave a bogus confirmation number. The suspects then left the store with the unpaid merchandise .
Creative Social Engineering Google Calendar phishing attacks - Google Calendar phishing uses event invitations to Calendar users asking them to “Verify Your Account” or face account deletion. Victims of this phish are asked to accept the invitation and confirm their user name, password and date of birth, in their acceptance  Malware - hijacks the victim’s browser and directs them to a fake site masquerading as AVG – a Antivirus and antispyware protection vendor.
Making Security Personal More Social Engineering techniques: Skimming - thieves create an electronic device which they attach to a card reader such as an ATM. Pocket skimmers often used in restaurant settings. USB drop – hackers drop USB thumb drives with rootkits that instantly and secretly installs software (HACKSAW)  that watches logins, email keystrokes and steals documents Fake wireless - Laptops will connect to "Any available network". Bogus hotspots will pass network traffic to internet and watch your activity. If file and printer sharing is enabled your files can be exposed. Mail and any purchases recorded.
Physical Access Controls Facilities is restricted using physical access controls Allaccess to facilities requires visual identification All employees are issued a photo security badge. The badge should be visible at all times  Employees who don't have their badge when they come to work are required to obtain a temporary access badge.  Lost or stolen badges should be reported immediately
Physical Access Controls Employees are expected to ask those who don't have a proper security badge to sign in at reception.  Every Employee must swipe their access card when entering secured access doors. The door must completely close between each person in order to provide a complete access log. Piggy backing behind another employee is not permitted.   Attempts to access facilities without visual identification should be reported to Security
Bypassing Physical Access Controls Physical access controls should never be bypassed. Never Ever
Information Access Controls Logical, physical and procedural controls have been put in place to protect information assets Access to information resources are based on business need You will only have the access level needed to perform your job (read, change, etc) Access to information resources is tracked Don't attempt to access data you have no need to access
Bypassing Information Access Controls Information access controls should never be bypassed. Access is logged
Protecting Against Malicious Software Use common sense and due care to protect your desktop the companies systems and the  network from malicious code  Be vigilant with email and email attachments  Don't disable anti-virus software or attempt to change the AV configuration settings  Don't bypass security controls and allow malicious code to enter the network
Protecting Against Malicious Software  Be careful downloading Internet Explorer ActiveX Controls or web applets  Be careful downloading and installing applications from the internet (including freeware and shareware)  Don't download content from the Internet (MP3s, AVIs, MP4s, all audio and video content)  Never consent to trust all software from a provider when prompted
Creating a Strong Password A secure computer has strong passwords for all user accounts  Hello2U! is a relatively weak password  H!elZl2o is a strong password  Use the extended ASCII character set, e.g. Tf©$0p#»g¤5ªhc Windows passwords can be up to 127 characters long. Use the first letter of each word from a line in a book, song, or poem: Bad Boys, Bad Boys Who you gonna call ruffly translated into BBbbWhoUgc?2 Use numbers and letters to create an imaginary vanity license plate password like iLove2Fly<->
Creating a Strong Password Passwords need to have upper and lower case alpha characters Passwords need to have at least 1 numeric or special character (!, @, #, etc.) Passwords need to be a minimum of 7 characters long Shouldn’t re-use passwords (previous 5 passwords) Passwords shouldn’t contain the same character next to each other Passwords need to be changed every 90 days (45 for administrators) Passwords shouldn’t contain your user name or the user’s full name Don’t base password on information such as user name, DOB, SSN, phone number, PIN, etc.
Securing Your Workstation Always “lock” workstation when leaving it unattended with Ctrl-Alt-Del and then Lock Computer  Always log off or shut down workstation when leaving work  Use a password protected screen saver from the list of available screen savers on your system (don't download and install screensavers) When traveling always secure an unattended laptop with a cable lock to attach it to a heavy chair, table, or desk . Use a screen guard to prevent people from peeking over your shoulder as you work on sensitive information in a public place
Securing your Laptop  Don't store sensitive information on laptops  If confidential information must be stored on laptop, use disk encryption  Don't leave laptop in your car ,[object Object]
Theft is major concern Don’t be a target. ,[object Object]
Lock laptop in trunk of car if necessary
Always take your laptop on the plane rather then checking it with your luggage ,[object Object]
Securing Your Laptop Wireless networking  Be on the lookout for fraudulent hotspots (free wireless) where data thieves mimic a valid wireless source. Verify hotspot with local coffee shop, hotel or airport Never automatically connect to available wireless sources. Always update your operating system with when critical patch notifications are issued
Securing Your Laptop     Bluetooth is a radio communications technology allowing computers to communicate with other devices over a short range  Disable Bluetooth device when not in use.  Bluetooth should be “hidden” or "not discoverable“ mode when in use Password protect if available
Securing Your Laptop Infrared Infrared ports can be used to connect to two computers together. This may enable another computer to then browse your hard disc and access data
Protect Yourself from Fraud Do not write PIN on your debit card Protect access to your PIN, cover your hand to protect against video and skimming Limit amount in debit account Have alternative access to funds and credit in case your account is frozen do to fraud. Signup for purchase notification if available, e.g. Discover has alert on purchases over X amount. Use Paypal/eBay pin security device Email and restaurants number one attack vectors for electronic theft.
Privacy on Facebook February 12, 2009 – 6:25 AM This is an excellent article that lists 10 ways to protect your privacy on Facebook.  Read the article for the full details, but here’s a quick summary: Use Your Friend Lists  Remove Yourself From Facebook Search Results  Remove Yourself From Google  Avoid the Infamous Photo/Video Tag Mistake  Protect Your Albums  Prevent Stories From Showing Up in Your Friends’ News Feeds  Protect Against Published Application Stories  Make Your Contact Information Private  Avoid Embarrassing Wall Posts  Keep Your Friendships Private  Good advice for all Facebook users.

More Related Content

What's hot

Lock It Down, Keep It Safe
Lock It Down, Keep It SafeLock It Down, Keep It Safe
Lock It Down, Keep It Safeaaberra
 
Cyber crime introduction awareness program at st. xavier
Cyber crime introduction   awareness program at st. xavierCyber crime introduction   awareness program at st. xavier
Cyber crime introduction awareness program at st. xavierMo Han
 
secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger Abhishek Hirapara
 
e-Commerce: Chapter 6
e-Commerce: Chapter 6e-Commerce: Chapter 6
e-Commerce: Chapter 6annwhyjay
 
Computer hacking
Computer hackingComputer hacking
Computer hackingArjun Tomar
 
Phishing
PhishingPhishing
Phishingdefquon
 
E-commerce & Security
E-commerce & SecurityE-commerce & Security
E-commerce & SecurityNetstarterSL
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerceSensePost
 
e commerce security and fraud protection
e commerce security and fraud protectione commerce security and fraud protection
e commerce security and fraud protectiontumetr1
 
Risks of E-commerce
Risks of E-commerceRisks of E-commerce
Risks of E-commerceanshutomar6
 
IT Threats and Computer Security
IT Threats and Computer SecurityIT Threats and Computer Security
IT Threats and Computer SecurityKongChunLeong1
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy   a point of viewWhy is password protection a fallacy   a point of view
Why is password protection a fallacy a point of viewYury Chemerkin
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An IntroductionJayaseelan Vejayon
 
Cyber Crime Campain Messages_Poster_Final
Cyber Crime Campain Messages_Poster_FinalCyber Crime Campain Messages_Poster_Final
Cyber Crime Campain Messages_Poster_FinalSiphiwe Msibi
 
Security Threats to Electronic Commerce
Security Threats to Electronic CommerceSecurity Threats to Electronic Commerce
Security Threats to Electronic CommerceDarlene Enderez
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1Abdelfatah hegazy
 

What's hot (20)

Lock It Down, Keep It Safe
Lock It Down, Keep It SafeLock It Down, Keep It Safe
Lock It Down, Keep It Safe
 
Cyber crime introduction awareness program at st. xavier
Cyber crime introduction   awareness program at st. xavierCyber crime introduction   awareness program at st. xavier
Cyber crime introduction awareness program at st. xavier
 
secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger
 
e-Commerce: Chapter 6
e-Commerce: Chapter 6e-Commerce: Chapter 6
e-Commerce: Chapter 6
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
 
Phishing
PhishingPhishing
Phishing
 
E-commerce & Security
E-commerce & SecurityE-commerce & Security
E-commerce & Security
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerce
 
e commerce security and fraud protection
e commerce security and fraud protectione commerce security and fraud protection
e commerce security and fraud protection
 
Risks of E-commerce
Risks of E-commerceRisks of E-commerce
Risks of E-commerce
 
Hackers
HackersHackers
Hackers
 
Hackers
HackersHackers
Hackers
 
IT Threats and Computer Security
IT Threats and Computer SecurityIT Threats and Computer Security
IT Threats and Computer Security
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy   a point of viewWhy is password protection a fallacy   a point of view
Why is password protection a fallacy a point of view
 
Security issues ethics in education chapter 8
Security issues ethics in education chapter 8Security issues ethics in education chapter 8
Security issues ethics in education chapter 8
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
 
Cyber Crime Campain Messages_Poster_Final
Cyber Crime Campain Messages_Poster_FinalCyber Crime Campain Messages_Poster_Final
Cyber Crime Campain Messages_Poster_Final
 
Security Threats to Electronic Commerce
Security Threats to Electronic CommerceSecurity Threats to Electronic Commerce
Security Threats to Electronic Commerce
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
 

Similar to Security Awareness 101

Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@R_Yanus
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006Ben Rothke
 
Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...
Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...
Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...Insurance Technologies Corporation (ITC)
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityAtlantic Training, LLC.
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014B2BPlanner Ltd.
 
Cyber Crime & Security.pdf
Cyber Crime & Security.pdfCyber Crime & Security.pdf
Cyber Crime & Security.pdfMohanPandey31
 
Internet Security for Non-Techies
Internet Security for Non-TechiesInternet Security for Non-Techies
Internet Security for Non-TechiesRichard Bush
 
Cyber Security School Workshop
Cyber Security School WorkshopCyber Security School Workshop
Cyber Security School WorkshopRahul Nayan
 
Infosec 4 The Home
Infosec 4 The HomeInfosec 4 The Home
Infosec 4 The Homejaysonstreet
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security riskK. A. M Lutfullah
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptxTapan Khilar
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security TipsInfusionsoft
 
Social Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus NetworkSocial Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus Networkthowell
 
I’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextI’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextBrian Pichman
 

Similar to Security Awareness 101 (20)

Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006
 
Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...
Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...
Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Crime & Security.pdf
Cyber Crime & Security.pdfCyber Crime & Security.pdf
Cyber Crime & Security.pdf
 
Internet Security for Non-Techies
Internet Security for Non-TechiesInternet Security for Non-Techies
Internet Security for Non-Techies
 
Mobile security
Mobile securityMobile security
Mobile security
 
Information security
Information securityInformation security
Information security
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Cyber Security School Workshop
Cyber Security School WorkshopCyber Security School Workshop
Cyber Security School Workshop
 
Infosec 4 The Home
Infosec 4 The HomeInfosec 4 The Home
Infosec 4 The Home
 
Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security Tips
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Social Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus NetworkSocial Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus Network
 
I’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextI’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take Next
 

Security Awareness 101

  • 2. Security Overview Making Security Personal Security Responsibilities Security Policies, Standards and Procedures Information Asset Privacy and Acceptable Use Questions
  • 3. Making Security Personal What is your personal stake in security? It’s your job You are protecting your data and information You or someone you know has received a letter notifying them they will need to change out a credit card due to some form of data breach. Use information security practices at work and at home Protect your data Protect the companies data with same vigilance
  • 4. Making Security Personal Security breaches carry real costs that affect prices, company valuation, benefits and salaries Average security breach can cost a company between $90 and $305 per lost record The number of instances of identity theft are growing exponentially every year Legislation and industry standards are starting to hold companies and individuals accountable for security
  • 5. Making Security Personal Identity thieves pose as representatives of banks, Internet service providers (ISPs) and even government agencies to gain your trust and reveal your SSN, mother's maiden name, account numbers, and other identifying information Federal Trade Commission reported 1 in 6 consumers will be a victim of identity theft this year alone Victims spend on average $1,200 in out-of-pocket expenses and an average of 175 hours in your efforts to resolve the many problems caused by identity thieves
  • 6.
  • 7.
  • 8. Creative Social Engineering Internet scam - hybrid cars in North Dakota have been tagged with fake parking citations that include a Web address hosting malicious software that drops a Trojan onto the computer. Trojan programs - Zlob is one of the most common types of software programs used to attack Windows these days. The victim is sent a link to what looks like an interesting video. When the link is clicked, the user is told to install a multimedia codec file in order to watch the video. That file is actually malicious software. Phishing kits -Some fraudsters have developed websites to sell ready-made products to other fraudsters, such as phishing kits. Recently, the RSA FraudAction Research Lab traced a new type of service on a particular website to sell HTML injections, which can be combined with Trojan attacks.
  • 9. Very Creative Social Engineering Suspects entered the business, selected merchandise worth almost $8,000. They handed a credit card with no financial backing to the clerk which when swiped was rejected by the cash register's computer. The suspects then informed the clerk that this rejection was expected and to contact the credit card company by phone to receive a payment approval confirmation code. The clerk was then given a number to call which was answered by another person in the scam who approved the purchase and gave a bogus confirmation number. The suspects then left the store with the unpaid merchandise .
  • 10. Creative Social Engineering Google Calendar phishing attacks - Google Calendar phishing uses event invitations to Calendar users asking them to “Verify Your Account” or face account deletion. Victims of this phish are asked to accept the invitation and confirm their user name, password and date of birth, in their acceptance Malware - hijacks the victim’s browser and directs them to a fake site masquerading as AVG – a Antivirus and antispyware protection vendor.
  • 11. Making Security Personal More Social Engineering techniques: Skimming - thieves create an electronic device which they attach to a card reader such as an ATM. Pocket skimmers often used in restaurant settings. USB drop – hackers drop USB thumb drives with rootkits that instantly and secretly installs software (HACKSAW) that watches logins, email keystrokes and steals documents Fake wireless - Laptops will connect to "Any available network". Bogus hotspots will pass network traffic to internet and watch your activity. If file and printer sharing is enabled your files can be exposed. Mail and any purchases recorded.
  • 12. Physical Access Controls Facilities is restricted using physical access controls Allaccess to facilities requires visual identification All employees are issued a photo security badge. The badge should be visible at all times Employees who don't have their badge when they come to work are required to obtain a temporary access badge. Lost or stolen badges should be reported immediately
  • 13. Physical Access Controls Employees are expected to ask those who don't have a proper security badge to sign in at reception. Every Employee must swipe their access card when entering secured access doors. The door must completely close between each person in order to provide a complete access log. Piggy backing behind another employee is not permitted.  Attempts to access facilities without visual identification should be reported to Security
  • 14. Bypassing Physical Access Controls Physical access controls should never be bypassed. Never Ever
  • 15. Information Access Controls Logical, physical and procedural controls have been put in place to protect information assets Access to information resources are based on business need You will only have the access level needed to perform your job (read, change, etc) Access to information resources is tracked Don't attempt to access data you have no need to access
  • 16. Bypassing Information Access Controls Information access controls should never be bypassed. Access is logged
  • 17. Protecting Against Malicious Software Use common sense and due care to protect your desktop the companies systems and the network from malicious code Be vigilant with email and email attachments Don't disable anti-virus software or attempt to change the AV configuration settings Don't bypass security controls and allow malicious code to enter the network
  • 18. Protecting Against Malicious Software Be careful downloading Internet Explorer ActiveX Controls or web applets Be careful downloading and installing applications from the internet (including freeware and shareware) Don't download content from the Internet (MP3s, AVIs, MP4s, all audio and video content) Never consent to trust all software from a provider when prompted
  • 19. Creating a Strong Password A secure computer has strong passwords for all user accounts Hello2U! is a relatively weak password H!elZl2o is a strong password Use the extended ASCII character set, e.g. Tf©$0p#»g¤5ªhc Windows passwords can be up to 127 characters long. Use the first letter of each word from a line in a book, song, or poem: Bad Boys, Bad Boys Who you gonna call ruffly translated into BBbbWhoUgc?2 Use numbers and letters to create an imaginary vanity license plate password like iLove2Fly<->
  • 20. Creating a Strong Password Passwords need to have upper and lower case alpha characters Passwords need to have at least 1 numeric or special character (!, @, #, etc.) Passwords need to be a minimum of 7 characters long Shouldn’t re-use passwords (previous 5 passwords) Passwords shouldn’t contain the same character next to each other Passwords need to be changed every 90 days (45 for administrators) Passwords shouldn’t contain your user name or the user’s full name Don’t base password on information such as user name, DOB, SSN, phone number, PIN, etc.
  • 21. Securing Your Workstation Always “lock” workstation when leaving it unattended with Ctrl-Alt-Del and then Lock Computer Always log off or shut down workstation when leaving work Use a password protected screen saver from the list of available screen savers on your system (don't download and install screensavers) When traveling always secure an unattended laptop with a cable lock to attach it to a heavy chair, table, or desk . Use a screen guard to prevent people from peeking over your shoulder as you work on sensitive information in a public place
  • 22.
  • 23.
  • 24. Lock laptop in trunk of car if necessary
  • 25.
  • 26. Securing Your Laptop Wireless networking Be on the lookout for fraudulent hotspots (free wireless) where data thieves mimic a valid wireless source. Verify hotspot with local coffee shop, hotel or airport Never automatically connect to available wireless sources. Always update your operating system with when critical patch notifications are issued
  • 27. Securing Your Laptop Bluetooth is a radio communications technology allowing computers to communicate with other devices over a short range Disable Bluetooth device when not in use. Bluetooth should be “hidden” or "not discoverable“ mode when in use Password protect if available
  • 28. Securing Your Laptop Infrared Infrared ports can be used to connect to two computers together. This may enable another computer to then browse your hard disc and access data
  • 29. Protect Yourself from Fraud Do not write PIN on your debit card Protect access to your PIN, cover your hand to protect against video and skimming Limit amount in debit account Have alternative access to funds and credit in case your account is frozen do to fraud. Signup for purchase notification if available, e.g. Discover has alert on purchases over X amount. Use Paypal/eBay pin security device Email and restaurants number one attack vectors for electronic theft.
  • 30. Privacy on Facebook February 12, 2009 – 6:25 AM This is an excellent article that lists 10 ways to protect your privacy on Facebook.  Read the article for the full details, but here’s a quick summary: Use Your Friend Lists Remove Yourself From Facebook Search Results Remove Yourself From Google Avoid the Infamous Photo/Video Tag Mistake Protect Your Albums Prevent Stories From Showing Up in Your Friends’ News Feeds Protect Against Published Application Stories Make Your Contact Information Private Avoid Embarrassing Wall Posts Keep Your Friendships Private Good advice for all Facebook users.
  • 31. And Always Use antivirus software and keep it up-to-date to protect against the latest threats. Use a personal firewall, preferably one that offers both inbound and outbound permission-based monitoring. An excellent option is the free Comodo personal firewall. Consistently apply patches. Microsoft releases new patches the second Tuesday of every month. Don't neglect vendor software. Firefox users and Mac users need to be diligent about applying patches
  • 32. Free tools Malicious Software Removal Tool (MSRT) Comodo Firewall Truecrypt