SlideShare a Scribd company logo
Welcome!
We will start soon. Please stand by.
S U C U R I W E B I N A R
Nikki Gerren
Brand Messaging Specialist
Tweet #AskSucuri to @SucuriSecurity
W E B I N A R H O S T
Security Beyond Your Website
Victor Santoyo
Account Executive
S U C U R I W E B I N A R
Online Privacy & Security Tips
Tweet #AskSucuri to @SucuriSecurity
Housekeeping Items:
• We want to hear from you!
• Q&A tab in Zoom.
• Tweet @SucuriSecurity using #AskSucuri.
• Many questions will be answered at the end.
• All questions will receive a response post webinar.
• Video and slides coming in a few days!
• Please share this content with other website owners!
Victor Santoyo
Account Executive
Tweet #AskSucuri to @SucuriSecurity
W E B I N A R S P E A K E R
Victor Santoyo
Tweet #AskSucuri to @SucuriSecurity
W E B I N A R S P E A K E R
• Father to two tightly-bonded sons
• Training for a half-marathon with my wife
• Turned 31 25 this month!
Tweet #AskSucuri to @SucuriSecurity
• Security for Household Devices
• Multi-Factor Authentication
• Online Account Management
In this webinar you will learn:
Tweet #AskSucuri to @SucuriSecurity
• This webinar is specific to everyone.
• You, your mother, your grandmother.
Who is this webinar for?
Tweet #AskSucuri to @SucuriSecurity
Tweet #AskSucuri to @SucuriSecurity
What else do we connect to everyday?
Routers Desktops Mobile Devices
Tweet #AskSucuri to @SucuriSecurity
Securing your WiFi Network
Tweet #AskSucuri to @SucuriSecurity
Securing your WiFi Network
The admin settings login IP address / hostname
Your default admin username.
Your default admin password.
Tweet #AskSucuri to @SucuriSecurity
Change Router Admin
Tweet #AskSucuri to @SucuriSecurity
Other WiFi Router Best Practices
1. Change Network Name / SSID
Tweet #AskSucuri to @SucuriSecurity
Other WiFi Router Best Practices
1. Change Network Name / SSID
2. Update the Firmware
Tweet #AskSucuri to @SucuriSecurity
Other WiFi Router Best Practices
1. Change Network Name / SSID
2. Update the Firmware
3. Use WPA2 Encryption
Tweet #AskSucuri to @SucuriSecurity
Other WiFi Router Best Practices
1. Change Network Name / SSID
2. Update the Firmware
3. Use WPA2 Encryption
4. Limiting Access When Away
Tweet #AskSucuri to @SucuriSecurity
Securing your Windows / Mac OS
Tweet #AskSucuri to @SucuriSecurity
Steps toward Securing your Windows / Mac OS
1. Log in & Timeout
When you log in to your computer, use a strong password and change it every six months.
Screensaver should come up after a period of inactivity (2 mins or less) and ask for the password.
Mac timeout settings for Screen SaverWindows screen saver timeout
Tweet #AskSucuri to @SucuriSecurity
Steps toward Securing your Windows / Mac OS
2. Remove Unwanted Programs
If you aren’t sure of the purpose of a specific application, do some research online to
confirm whether it is a necessary application or something you can safely remove.
Windows:
1. Open the Add/Remove Programs panel.
2. Uninstall any applications you do not need.
3. If you have issues uninstalling a particular
application, try which removes all Windows
registry entries and orphaned files related
to the program.
Mac:
1. Open the Applications folder.
2. Delete any applications you do not need.
Tweet #AskSucuri to @SucuriSecurity
Steps toward Securing your Windows / Mac OS
3. Enable Built-in Security Measures
You should be sure to enable the default firewall in your Network settings on both Mac and Windows. For any
network you connect to, make sure to select the Public option as that blocks incoming connections by default.
Tweet #AskSucuri to @SucuriSecurity
Steps toward Securing your Windows / Mac OS
4. Cover Up Your Webcam!
I’d recommend covering up your
webcam, as I do. Malware has been
known to take pictures and video
without the user’s knowledge.
Tweet #AskSucuri to @SucuriSecurity
Securing your mobile devices!
Tweet #AskSucuri to @SucuriSecurity
Steps toward Securing Your Android / iPhone
1. Unlocking your phone!
Apple and Android (7+) both do a decent job of
encrypting data, but the level of security depends
on the password you use to unlock your device.
iOS: Settings > Touch ID & Passcode
Android: Settings > Lock Screen & Security
Tweet #AskSucuri to @SucuriSecurity
Steps toward Securing Your Android / iPhone
2. Lock Screen Timeout
I ensure that the password is required immediately after locking the screen. I would say the longest amount
of time that I would consider safe is after 1 minute.
Under the Display settings, I also selected to turn off the screen “after 15 seconds of inactivity.”
Tweet #AskSucuri to @SucuriSecurity
Steps toward Securing Your Android / iPhone
3. Hiding Notifications
You still get notifications, but
the content is not shown while
your device is locked. This way
no one with physical access to
your phone can see anything
sensitive.
Tweet #AskSucuri to @SucuriSecurity
Steps toward Securing Your Android / iPhone
4. Keep up with software updates!
When it comes to your website,
software updates often include
security patches. The same is true for
all of your devices. You should set
automatic updates, but also check
manually.
Also be sure to check for updates on
your apps, as the core software won’t
automatically update your apps.
Android Updates iOS Updates
Tweet #AskSucuri to @SucuriSecurity
Steps toward Securing Your Android / iPhone
5. Network Housekeeping
If you have had your phone for a
while, you probably have it connected
to a lot of different networks that you
won’t connect to again and don’t tend
to keep.
iOS: General > Reset > Reset Network Settings
(will require you to re-enter your WiFi password).
Android: Connections > Wi-Fi > Advanced >
Manage networks (disable individual connections)
Tweet #AskSucuri to @SucuriSecurity
Securing your browsing experience!
Tweet #AskSucuri to @SucuriSecurity
Securing your browsing experience!
1. Password Management
Password managers hold all of
your passwords and auto-fill them
into login windows.
Many popular password managers
also include a password generator.
You need a master password to
log into your password vault. It
goes without saying that your
master password should be one of
your strongest passwords.
Tweet #AskSucuri to @SucuriSecurity
Securing your browsing experience!
1. Password Management
Password managers hold all of
your passwords and auto-fill them
into login windows.
Many popular password managers
also include a password generator.
You need a master password to
log into your password vault. It
goes without saying that your
master password should be one of
your strongest passwords.
Tweet #AskSucuri to @SucuriSecurity
Securing your browsing experience!
2. Two-Factor Authentication
Enabling 2FA means adding a
second line of defense after your
password is entered.
This secondary key is often time-
limited and available inside a
mobile app like Google
Authenticator.
This means an attacker would
also need to have access to your
mobile device in order to unlock
your account.
Tweet #AskSucuri to @SucuriSecurity
Securing your browsing experience!
2. Two-Factor Authentication
Enabling 2FA means adding a
second line of defense after your
password is entered.
This secondary key is often time-
limited and available inside a
mobile app like Google
Authenticator.
This means an attacker would
also need to have access to your
mobile device in order to unlock
your account.
Tweet #AskSucuri to @SucuriSecurity
Securing your browsing experience!
2. Two-Factor Authentication
Enabling 2FA means adding a
second line of defense after your
password is entered.
This secondary key is often time-
limited and available inside a
mobile app like Google
Authenticator.
This means an attacker would
also need to have access to your
mobile device in order to unlock
your account.
Tweet #AskSucuri to @SucuriSecurity
Securing your browsing experience!
2. Online Account Inventory Management
Old unused accounts can be troublesome,
especially when they contain personal
information. If you don’t need an account
anymore, delete it.
1. Search Your Username(s)
2. Look for Old Emails
3. Go Through Your Saved Logins (LastPass / KeePass)
4. Check Your Google and Facebook Accounts
5. Use Online Services such as: haveibeenpwned.com
haveibeenpwned.com
Tweet #AskSucuri to @SucuriSecurity
Securing your browsing experience!
2. Online Account Inventory Management
Old unused accounts can be troublesome,
especially when they contain personal
information. If you don’t need an account
anymore, delete it.
Tweet #AskSucuri to @SucuriSecurity
“If you put a key under the mat for the cops, a
burglar can find it, too. Criminals are using every
technology tool at their disposal to hack into
people’s accounts. If they know there’s a key hidden
somewhere, they won’t stop until they find it.”
Tim Cook
Apple’s CEO
Tweet #AskSucuri to @SucuriSecurity
Go to blog.sucuri.net to stay ahead
of all emerging security threats.
Submit your questions in the chat below or
tweet us @SucuriSecurity using the hashtag #AskSucuri
Victor Santoyo
You can reach me at victor@sucuri.net

More Related Content

What's hot

Sucuri Webinar: How to clean hacked WordPress sites
Sucuri Webinar: How to clean hacked WordPress sitesSucuri Webinar: How to clean hacked WordPress sites
Sucuri Webinar: How to clean hacked WordPress sites
Sucuri
 
Sucuri Webinar: Tis the Season for Credit Card Scraping and Malware Trends
Sucuri Webinar: Tis the Season for Credit Card Scraping and Malware Trends Sucuri Webinar: Tis the Season for Credit Card Scraping and Malware Trends
Sucuri Webinar: Tis the Season for Credit Card Scraping and Malware Trends
Sucuri
 
Sucuri Webinar: WAF (Firewall) and CDN Feature Benefit Guide
Sucuri Webinar: WAF (Firewall) and CDN Feature Benefit GuideSucuri Webinar: WAF (Firewall) and CDN Feature Benefit Guide
Sucuri Webinar: WAF (Firewall) and CDN Feature Benefit Guide
Sucuri
 
Sucuri Webinar: Is SSL enough to secure your website?
Sucuri Webinar: Is SSL enough to secure your website?Sucuri Webinar: Is SSL enough to secure your website?
Sucuri Webinar: Is SSL enough to secure your website?
Sucuri
 
Sucuri Webinar: Preventing Cross-Site Contamination for Beginners
Sucuri Webinar: Preventing Cross-Site Contamination for BeginnersSucuri Webinar: Preventing Cross-Site Contamination for Beginners
Sucuri Webinar: Preventing Cross-Site Contamination for Beginners
Sucuri
 
Sucuri Webinar: How to Clean a Hacked Magento Website
Sucuri Webinar: How to Clean a Hacked Magento WebsiteSucuri Webinar: How to Clean a Hacked Magento Website
Sucuri Webinar: How to Clean a Hacked Magento Website
Sucuri
 
Sucuri Webinar: How Websites Get Hacked
Sucuri Webinar: How Websites Get HackedSucuri Webinar: How Websites Get Hacked
Sucuri Webinar: How Websites Get Hacked
Sucuri
 
Sucuri Webinar: Defending Your Google Brand Reputation and Analytics Reports
Sucuri Webinar: Defending Your Google Brand Reputation and Analytics ReportsSucuri Webinar: Defending Your Google Brand Reputation and Analytics Reports
Sucuri Webinar: Defending Your Google Brand Reputation and Analytics Reports
Sucuri
 
Sucuri Webinar: Website Security for Web Agencies
Sucuri Webinar: Website Security for Web AgenciesSucuri Webinar: Website Security for Web Agencies
Sucuri Webinar: Website Security for Web Agencies
Sucuri
 
Sucuri Webinar: Hacked Website Trend Report Q1/2016
Sucuri Webinar: Hacked Website Trend Report Q1/2016Sucuri Webinar: Hacked Website Trend Report Q1/2016
Sucuri Webinar: Hacked Website Trend Report Q1/2016
Sucuri
 
Sucuri Webinar: Impacts of a website compromise
Sucuri Webinar: Impacts of a website compromiseSucuri Webinar: Impacts of a website compromise
Sucuri Webinar: Impacts of a website compromise
Sucuri
 
2018 Hacked Website Trends
2018 Hacked Website Trends2018 Hacked Website Trends
2018 Hacked Website Trends
Sucuri
 
Webinar: CWAF for Mid Market/Enterprise Organizations
Webinar: CWAF for Mid Market/Enterprise OrganizationsWebinar: CWAF for Mid Market/Enterprise Organizations
Webinar: CWAF for Mid Market/Enterprise Organizations
Sucuri
 
Sucuri Webinar: Leveraging Sucuri's API
Sucuri Webinar: Leveraging Sucuri's APISucuri Webinar: Leveraging Sucuri's API
Sucuri Webinar: Leveraging Sucuri's API
Sucuri
 
WordPress Security - Learning From Hacks
WordPress Security - Learning From HacksWordPress Security - Learning From Hacks
WordPress Security - Learning From HacksTony Perez
 
WP Security - Master Class #SMWLagos2014
WP Security - Master Class #SMWLagos2014WP Security - Master Class #SMWLagos2014
WP Security - Master Class #SMWLagos2014
sabinovates
 
Death to passwords - DroidCon Paris 2014
Death to passwords - DroidCon Paris 2014Death to passwords - DroidCon Paris 2014
Death to passwords - DroidCon Paris 2014
Paris Android User Group
 
WordPress Security 2014 - The Basics of Security
WordPress Security 2014 - The Basics of SecurityWordPress Security 2014 - The Basics of Security
WordPress Security 2014 - The Basics of SecurityTony Perez
 
Hacked - What do you do now?
Hacked - What do you do now?Hacked - What do you do now?
Hacked - What do you do now?
Tony Perez
 
WPSecurity best practices of securing a word press website
WPSecurity best practices of securing a word press websiteWPSecurity best practices of securing a word press website
WPSecurity best practices of securing a word press website
Deola Kayode
 

What's hot (20)

Sucuri Webinar: How to clean hacked WordPress sites
Sucuri Webinar: How to clean hacked WordPress sitesSucuri Webinar: How to clean hacked WordPress sites
Sucuri Webinar: How to clean hacked WordPress sites
 
Sucuri Webinar: Tis the Season for Credit Card Scraping and Malware Trends
Sucuri Webinar: Tis the Season for Credit Card Scraping and Malware Trends Sucuri Webinar: Tis the Season for Credit Card Scraping and Malware Trends
Sucuri Webinar: Tis the Season for Credit Card Scraping and Malware Trends
 
Sucuri Webinar: WAF (Firewall) and CDN Feature Benefit Guide
Sucuri Webinar: WAF (Firewall) and CDN Feature Benefit GuideSucuri Webinar: WAF (Firewall) and CDN Feature Benefit Guide
Sucuri Webinar: WAF (Firewall) and CDN Feature Benefit Guide
 
Sucuri Webinar: Is SSL enough to secure your website?
Sucuri Webinar: Is SSL enough to secure your website?Sucuri Webinar: Is SSL enough to secure your website?
Sucuri Webinar: Is SSL enough to secure your website?
 
Sucuri Webinar: Preventing Cross-Site Contamination for Beginners
Sucuri Webinar: Preventing Cross-Site Contamination for BeginnersSucuri Webinar: Preventing Cross-Site Contamination for Beginners
Sucuri Webinar: Preventing Cross-Site Contamination for Beginners
 
Sucuri Webinar: How to Clean a Hacked Magento Website
Sucuri Webinar: How to Clean a Hacked Magento WebsiteSucuri Webinar: How to Clean a Hacked Magento Website
Sucuri Webinar: How to Clean a Hacked Magento Website
 
Sucuri Webinar: How Websites Get Hacked
Sucuri Webinar: How Websites Get HackedSucuri Webinar: How Websites Get Hacked
Sucuri Webinar: How Websites Get Hacked
 
Sucuri Webinar: Defending Your Google Brand Reputation and Analytics Reports
Sucuri Webinar: Defending Your Google Brand Reputation and Analytics ReportsSucuri Webinar: Defending Your Google Brand Reputation and Analytics Reports
Sucuri Webinar: Defending Your Google Brand Reputation and Analytics Reports
 
Sucuri Webinar: Website Security for Web Agencies
Sucuri Webinar: Website Security for Web AgenciesSucuri Webinar: Website Security for Web Agencies
Sucuri Webinar: Website Security for Web Agencies
 
Sucuri Webinar: Hacked Website Trend Report Q1/2016
Sucuri Webinar: Hacked Website Trend Report Q1/2016Sucuri Webinar: Hacked Website Trend Report Q1/2016
Sucuri Webinar: Hacked Website Trend Report Q1/2016
 
Sucuri Webinar: Impacts of a website compromise
Sucuri Webinar: Impacts of a website compromiseSucuri Webinar: Impacts of a website compromise
Sucuri Webinar: Impacts of a website compromise
 
2018 Hacked Website Trends
2018 Hacked Website Trends2018 Hacked Website Trends
2018 Hacked Website Trends
 
Webinar: CWAF for Mid Market/Enterprise Organizations
Webinar: CWAF for Mid Market/Enterprise OrganizationsWebinar: CWAF for Mid Market/Enterprise Organizations
Webinar: CWAF for Mid Market/Enterprise Organizations
 
Sucuri Webinar: Leveraging Sucuri's API
Sucuri Webinar: Leveraging Sucuri's APISucuri Webinar: Leveraging Sucuri's API
Sucuri Webinar: Leveraging Sucuri's API
 
WordPress Security - Learning From Hacks
WordPress Security - Learning From HacksWordPress Security - Learning From Hacks
WordPress Security - Learning From Hacks
 
WP Security - Master Class #SMWLagos2014
WP Security - Master Class #SMWLagos2014WP Security - Master Class #SMWLagos2014
WP Security - Master Class #SMWLagos2014
 
Death to passwords - DroidCon Paris 2014
Death to passwords - DroidCon Paris 2014Death to passwords - DroidCon Paris 2014
Death to passwords - DroidCon Paris 2014
 
WordPress Security 2014 - The Basics of Security
WordPress Security 2014 - The Basics of SecurityWordPress Security 2014 - The Basics of Security
WordPress Security 2014 - The Basics of Security
 
Hacked - What do you do now?
Hacked - What do you do now?Hacked - What do you do now?
Hacked - What do you do now?
 
WPSecurity best practices of securing a word press website
WPSecurity best practices of securing a word press websiteWPSecurity best practices of securing a word press website
WPSecurity best practices of securing a word press website
 

Similar to Webinar: Personal Online Privacy - Sucuri Security

Modicare Mighty Guard
Modicare Mighty GuardModicare Mighty Guard
Modicare Mighty Guard
Amritansh Barnwal
 
2 Factor Authentication for Wordpress
2 Factor Authentication for Wordpress2 Factor Authentication for Wordpress
2 Factor Authentication for Wordpress
Askkiz - Security, Cloud & Social Media GRCS
 
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptxORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
PiedadCES
 
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptxORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
JohnSimLabayan2
 
Six steps to protect your password from hackers
Six steps to protect your password from hackersSix steps to protect your password from hackers
Six steps to protect your password from hackers
niraj joshi
 
Top 10 tricks to keep your bitcoin wallet safe
Top 10 tricks to keep your bitcoin wallet safeTop 10 tricks to keep your bitcoin wallet safe
Top 10 tricks to keep your bitcoin wallet safe
Blockchain Council
 
Protecting your online identity - Managing your passwords
Protecting your online identity -  Managing your passwordsProtecting your online identity -  Managing your passwords
Protecting your online identity - Managing your passwords
Bunmi Sowande
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
mateenzero
 
Digital safety
Digital safetyDigital safety
Digital safetypsusmith
 
Basic Digital Security
Basic Digital SecurityBasic Digital Security
Basic Digital Security
Ujjwal Acharya
 
Spring Security
Spring SecuritySpring Security
Spring Security
Knoldus Inc.
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02amiinaaa
 
Basic mobile and internet security
Basic mobile and internet securityBasic mobile and internet security
Basic mobile and internet security
Moses Ngeth
 
Harbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidHarbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vid
Ernest Staats
 
Passwords are passé. WebAuthn is simpler, stronger and ready to go
Passwords are passé. WebAuthn is simpler, stronger and ready to goPasswords are passé. WebAuthn is simpler, stronger and ready to go
Passwords are passé. WebAuthn is simpler, stronger and ready to go
Michael Furman
 
Information security questions
Information security questions Information security questions
Information security questions
gamemaker762
 
LastPass Password Manager - the last password you'll ever have to remember
LastPass Password Manager - the last password you'll ever have to rememberLastPass Password Manager - the last password you'll ever have to remember
LastPass Password Manager - the last password you'll ever have to remember
iSiteBuild.com
 
A4 Cybersecurity Awareness Posters Part 9
A4 Cybersecurity Awareness Posters Part 9A4 Cybersecurity Awareness Posters Part 9
A4 Cybersecurity Awareness Posters Part 9
Data Hops
 
Securitytips
SecuritytipsSecuritytips
Securitytips
Santosh Khadsare
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
ICT Frame Magazine Pvt. Ltd.
 

Similar to Webinar: Personal Online Privacy - Sucuri Security (20)

Modicare Mighty Guard
Modicare Mighty GuardModicare Mighty Guard
Modicare Mighty Guard
 
2 Factor Authentication for Wordpress
2 Factor Authentication for Wordpress2 Factor Authentication for Wordpress
2 Factor Authentication for Wordpress
 
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptxORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
 
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptxORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
 
Six steps to protect your password from hackers
Six steps to protect your password from hackersSix steps to protect your password from hackers
Six steps to protect your password from hackers
 
Top 10 tricks to keep your bitcoin wallet safe
Top 10 tricks to keep your bitcoin wallet safeTop 10 tricks to keep your bitcoin wallet safe
Top 10 tricks to keep your bitcoin wallet safe
 
Protecting your online identity - Managing your passwords
Protecting your online identity -  Managing your passwordsProtecting your online identity -  Managing your passwords
Protecting your online identity - Managing your passwords
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
Digital safety
Digital safetyDigital safety
Digital safety
 
Basic Digital Security
Basic Digital SecurityBasic Digital Security
Basic Digital Security
 
Spring Security
Spring SecuritySpring Security
Spring Security
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
Basic mobile and internet security
Basic mobile and internet securityBasic mobile and internet security
Basic mobile and internet security
 
Harbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidHarbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vid
 
Passwords are passé. WebAuthn is simpler, stronger and ready to go
Passwords are passé. WebAuthn is simpler, stronger and ready to goPasswords are passé. WebAuthn is simpler, stronger and ready to go
Passwords are passé. WebAuthn is simpler, stronger and ready to go
 
Information security questions
Information security questions Information security questions
Information security questions
 
LastPass Password Manager - the last password you'll ever have to remember
LastPass Password Manager - the last password you'll ever have to rememberLastPass Password Manager - the last password you'll ever have to remember
LastPass Password Manager - the last password you'll ever have to remember
 
A4 Cybersecurity Awareness Posters Part 9
A4 Cybersecurity Awareness Posters Part 9A4 Cybersecurity Awareness Posters Part 9
A4 Cybersecurity Awareness Posters Part 9
 
Securitytips
SecuritytipsSecuritytips
Securitytips
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 

More from Sucuri

Sucuri Webinar: How To Know For Sure You Can Trust A Plugin
Sucuri Webinar: How To Know For Sure You Can Trust A PluginSucuri Webinar: How To Know For Sure You Can Trust A Plugin
Sucuri Webinar: How To Know For Sure You Can Trust A Plugin
Sucuri
 
Sucuri Webinar: Sucuri Introduces the Sales Enablement Department
Sucuri Webinar: Sucuri Introduces the Sales Enablement DepartmentSucuri Webinar: Sucuri Introduces the Sales Enablement Department
Sucuri Webinar: Sucuri Introduces the Sales Enablement Department
Sucuri
 
Sucuri Webinar: Getting Started with Sucuri
Sucuri Webinar: Getting Started with SucuriSucuri Webinar: Getting Started with Sucuri
Sucuri Webinar: Getting Started with Sucuri
Sucuri
 
Webinar: eCommerce Compliance - PCI meets GDPR
Webinar: eCommerce Compliance - PCI meets GDPRWebinar: eCommerce Compliance - PCI meets GDPR
Webinar: eCommerce Compliance - PCI meets GDPR
Sucuri
 
Webinar: 10 Consejos para Mejorar la Postura de Seguridad de tu Sitio Web
Webinar: 10 Consejos para Mejorar la Postura de Seguridad de tu Sitio WebWebinar: 10 Consejos para Mejorar la Postura de Seguridad de tu Sitio Web
Webinar: 10 Consejos para Mejorar la Postura de Seguridad de tu Sitio Web
Sucuri
 
Ecommerce Website Security
Ecommerce Website SecurityEcommerce Website Security
Ecommerce Website Security
Sucuri
 
Kludges and PHP. Why Should You Use a WAF?
Kludges and PHP. Why Should You Use a WAF?Kludges and PHP. Why Should You Use a WAF?
Kludges and PHP. Why Should You Use a WAF?
Sucuri
 
Otimização de Websites para Ganho de Performance & Resiliência
Otimização de Websites para Ganho de Performance & ResiliênciaOtimização de Websites para Ganho de Performance & Resiliência
Otimização de Websites para Ganho de Performance & Resiliência
Sucuri
 
Guia de Segurança para WordPress
Guia de Segurança para WordPressGuia de Segurança para WordPress
Guia de Segurança para WordPress
Sucuri
 
Gambiarra e PHP. Por que você deveria usar um WAF?
Gambiarra e PHP. Por que você deveria usar um WAF?Gambiarra e PHP. Por que você deveria usar um WAF?
Gambiarra e PHP. Por que você deveria usar um WAF?
Sucuri
 
Segurança para Agências: Proteja seus Clientes
Segurança para Agências: Proteja seus ClientesSegurança para Agências: Proteja seus Clientes
Segurança para Agências: Proteja seus Clientes
Sucuri
 
Seguridad para Agencias de Desarrollo Web: Protege tus Clientes y tu Negocio
Seguridad para Agencias de Desarrollo Web: Protege tus Clientes y tu NegocioSeguridad para Agencias de Desarrollo Web: Protege tus Clientes y tu Negocio
Seguridad para Agencias de Desarrollo Web: Protege tus Clientes y tu Negocio
Sucuri
 
WHDusa 2017: Bridging the Divide between Human Behavior & Security
WHDusa 2017: Bridging the Divide between Human Behavior & SecurityWHDusa 2017: Bridging the Divide between Human Behavior & Security
WHDusa 2017: Bridging the Divide between Human Behavior & Security
Sucuri
 
Sucuri Webinar: Beginner's Guide to CDNs
Sucuri Webinar: Beginner's Guide to CDNsSucuri Webinar: Beginner's Guide to CDNs
Sucuri Webinar: Beginner's Guide to CDNs
Sucuri
 

More from Sucuri (14)

Sucuri Webinar: How To Know For Sure You Can Trust A Plugin
Sucuri Webinar: How To Know For Sure You Can Trust A PluginSucuri Webinar: How To Know For Sure You Can Trust A Plugin
Sucuri Webinar: How To Know For Sure You Can Trust A Plugin
 
Sucuri Webinar: Sucuri Introduces the Sales Enablement Department
Sucuri Webinar: Sucuri Introduces the Sales Enablement DepartmentSucuri Webinar: Sucuri Introduces the Sales Enablement Department
Sucuri Webinar: Sucuri Introduces the Sales Enablement Department
 
Sucuri Webinar: Getting Started with Sucuri
Sucuri Webinar: Getting Started with SucuriSucuri Webinar: Getting Started with Sucuri
Sucuri Webinar: Getting Started with Sucuri
 
Webinar: eCommerce Compliance - PCI meets GDPR
Webinar: eCommerce Compliance - PCI meets GDPRWebinar: eCommerce Compliance - PCI meets GDPR
Webinar: eCommerce Compliance - PCI meets GDPR
 
Webinar: 10 Consejos para Mejorar la Postura de Seguridad de tu Sitio Web
Webinar: 10 Consejos para Mejorar la Postura de Seguridad de tu Sitio WebWebinar: 10 Consejos para Mejorar la Postura de Seguridad de tu Sitio Web
Webinar: 10 Consejos para Mejorar la Postura de Seguridad de tu Sitio Web
 
Ecommerce Website Security
Ecommerce Website SecurityEcommerce Website Security
Ecommerce Website Security
 
Kludges and PHP. Why Should You Use a WAF?
Kludges and PHP. Why Should You Use a WAF?Kludges and PHP. Why Should You Use a WAF?
Kludges and PHP. Why Should You Use a WAF?
 
Otimização de Websites para Ganho de Performance & Resiliência
Otimização de Websites para Ganho de Performance & ResiliênciaOtimização de Websites para Ganho de Performance & Resiliência
Otimização de Websites para Ganho de Performance & Resiliência
 
Guia de Segurança para WordPress
Guia de Segurança para WordPressGuia de Segurança para WordPress
Guia de Segurança para WordPress
 
Gambiarra e PHP. Por que você deveria usar um WAF?
Gambiarra e PHP. Por que você deveria usar um WAF?Gambiarra e PHP. Por que você deveria usar um WAF?
Gambiarra e PHP. Por que você deveria usar um WAF?
 
Segurança para Agências: Proteja seus Clientes
Segurança para Agências: Proteja seus ClientesSegurança para Agências: Proteja seus Clientes
Segurança para Agências: Proteja seus Clientes
 
Seguridad para Agencias de Desarrollo Web: Protege tus Clientes y tu Negocio
Seguridad para Agencias de Desarrollo Web: Protege tus Clientes y tu NegocioSeguridad para Agencias de Desarrollo Web: Protege tus Clientes y tu Negocio
Seguridad para Agencias de Desarrollo Web: Protege tus Clientes y tu Negocio
 
WHDusa 2017: Bridging the Divide between Human Behavior & Security
WHDusa 2017: Bridging the Divide between Human Behavior & SecurityWHDusa 2017: Bridging the Divide between Human Behavior & Security
WHDusa 2017: Bridging the Divide between Human Behavior & Security
 
Sucuri Webinar: Beginner's Guide to CDNs
Sucuri Webinar: Beginner's Guide to CDNsSucuri Webinar: Beginner's Guide to CDNs
Sucuri Webinar: Beginner's Guide to CDNs
 

Recently uploaded

急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
GTProductions1
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
VivekSinghShekhawat2
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 

Recently uploaded (20)

急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 

Webinar: Personal Online Privacy - Sucuri Security

  • 1. Welcome! We will start soon. Please stand by. S U C U R I W E B I N A R
  • 2. Nikki Gerren Brand Messaging Specialist Tweet #AskSucuri to @SucuriSecurity W E B I N A R H O S T
  • 3. Security Beyond Your Website Victor Santoyo Account Executive S U C U R I W E B I N A R Online Privacy & Security Tips
  • 4. Tweet #AskSucuri to @SucuriSecurity Housekeeping Items: • We want to hear from you! • Q&A tab in Zoom. • Tweet @SucuriSecurity using #AskSucuri. • Many questions will be answered at the end. • All questions will receive a response post webinar. • Video and slides coming in a few days! • Please share this content with other website owners!
  • 5. Victor Santoyo Account Executive Tweet #AskSucuri to @SucuriSecurity W E B I N A R S P E A K E R
  • 6. Victor Santoyo Tweet #AskSucuri to @SucuriSecurity W E B I N A R S P E A K E R • Father to two tightly-bonded sons • Training for a half-marathon with my wife • Turned 31 25 this month!
  • 7. Tweet #AskSucuri to @SucuriSecurity • Security for Household Devices • Multi-Factor Authentication • Online Account Management In this webinar you will learn:
  • 8. Tweet #AskSucuri to @SucuriSecurity • This webinar is specific to everyone. • You, your mother, your grandmother. Who is this webinar for?
  • 9. Tweet #AskSucuri to @SucuriSecurity
  • 10. Tweet #AskSucuri to @SucuriSecurity What else do we connect to everyday? Routers Desktops Mobile Devices
  • 11. Tweet #AskSucuri to @SucuriSecurity Securing your WiFi Network
  • 12. Tweet #AskSucuri to @SucuriSecurity Securing your WiFi Network The admin settings login IP address / hostname Your default admin username. Your default admin password.
  • 13. Tweet #AskSucuri to @SucuriSecurity Change Router Admin
  • 14. Tweet #AskSucuri to @SucuriSecurity Other WiFi Router Best Practices 1. Change Network Name / SSID
  • 15. Tweet #AskSucuri to @SucuriSecurity Other WiFi Router Best Practices 1. Change Network Name / SSID 2. Update the Firmware
  • 16. Tweet #AskSucuri to @SucuriSecurity Other WiFi Router Best Practices 1. Change Network Name / SSID 2. Update the Firmware 3. Use WPA2 Encryption
  • 17. Tweet #AskSucuri to @SucuriSecurity Other WiFi Router Best Practices 1. Change Network Name / SSID 2. Update the Firmware 3. Use WPA2 Encryption 4. Limiting Access When Away
  • 18. Tweet #AskSucuri to @SucuriSecurity Securing your Windows / Mac OS
  • 19. Tweet #AskSucuri to @SucuriSecurity Steps toward Securing your Windows / Mac OS 1. Log in & Timeout When you log in to your computer, use a strong password and change it every six months. Screensaver should come up after a period of inactivity (2 mins or less) and ask for the password. Mac timeout settings for Screen SaverWindows screen saver timeout
  • 20. Tweet #AskSucuri to @SucuriSecurity Steps toward Securing your Windows / Mac OS 2. Remove Unwanted Programs If you aren’t sure of the purpose of a specific application, do some research online to confirm whether it is a necessary application or something you can safely remove. Windows: 1. Open the Add/Remove Programs panel. 2. Uninstall any applications you do not need. 3. If you have issues uninstalling a particular application, try which removes all Windows registry entries and orphaned files related to the program. Mac: 1. Open the Applications folder. 2. Delete any applications you do not need.
  • 21. Tweet #AskSucuri to @SucuriSecurity Steps toward Securing your Windows / Mac OS 3. Enable Built-in Security Measures You should be sure to enable the default firewall in your Network settings on both Mac and Windows. For any network you connect to, make sure to select the Public option as that blocks incoming connections by default.
  • 22. Tweet #AskSucuri to @SucuriSecurity Steps toward Securing your Windows / Mac OS 4. Cover Up Your Webcam! I’d recommend covering up your webcam, as I do. Malware has been known to take pictures and video without the user’s knowledge.
  • 23. Tweet #AskSucuri to @SucuriSecurity Securing your mobile devices!
  • 24. Tweet #AskSucuri to @SucuriSecurity Steps toward Securing Your Android / iPhone 1. Unlocking your phone! Apple and Android (7+) both do a decent job of encrypting data, but the level of security depends on the password you use to unlock your device. iOS: Settings > Touch ID & Passcode Android: Settings > Lock Screen & Security
  • 25. Tweet #AskSucuri to @SucuriSecurity Steps toward Securing Your Android / iPhone 2. Lock Screen Timeout I ensure that the password is required immediately after locking the screen. I would say the longest amount of time that I would consider safe is after 1 minute. Under the Display settings, I also selected to turn off the screen “after 15 seconds of inactivity.”
  • 26. Tweet #AskSucuri to @SucuriSecurity Steps toward Securing Your Android / iPhone 3. Hiding Notifications You still get notifications, but the content is not shown while your device is locked. This way no one with physical access to your phone can see anything sensitive.
  • 27. Tweet #AskSucuri to @SucuriSecurity Steps toward Securing Your Android / iPhone 4. Keep up with software updates! When it comes to your website, software updates often include security patches. The same is true for all of your devices. You should set automatic updates, but also check manually. Also be sure to check for updates on your apps, as the core software won’t automatically update your apps. Android Updates iOS Updates
  • 28. Tweet #AskSucuri to @SucuriSecurity Steps toward Securing Your Android / iPhone 5. Network Housekeeping If you have had your phone for a while, you probably have it connected to a lot of different networks that you won’t connect to again and don’t tend to keep. iOS: General > Reset > Reset Network Settings (will require you to re-enter your WiFi password). Android: Connections > Wi-Fi > Advanced > Manage networks (disable individual connections)
  • 29. Tweet #AskSucuri to @SucuriSecurity Securing your browsing experience!
  • 30. Tweet #AskSucuri to @SucuriSecurity Securing your browsing experience! 1. Password Management Password managers hold all of your passwords and auto-fill them into login windows. Many popular password managers also include a password generator. You need a master password to log into your password vault. It goes without saying that your master password should be one of your strongest passwords.
  • 31. Tweet #AskSucuri to @SucuriSecurity Securing your browsing experience! 1. Password Management Password managers hold all of your passwords and auto-fill them into login windows. Many popular password managers also include a password generator. You need a master password to log into your password vault. It goes without saying that your master password should be one of your strongest passwords.
  • 32. Tweet #AskSucuri to @SucuriSecurity Securing your browsing experience! 2. Two-Factor Authentication Enabling 2FA means adding a second line of defense after your password is entered. This secondary key is often time- limited and available inside a mobile app like Google Authenticator. This means an attacker would also need to have access to your mobile device in order to unlock your account.
  • 33. Tweet #AskSucuri to @SucuriSecurity Securing your browsing experience! 2. Two-Factor Authentication Enabling 2FA means adding a second line of defense after your password is entered. This secondary key is often time- limited and available inside a mobile app like Google Authenticator. This means an attacker would also need to have access to your mobile device in order to unlock your account.
  • 34. Tweet #AskSucuri to @SucuriSecurity Securing your browsing experience! 2. Two-Factor Authentication Enabling 2FA means adding a second line of defense after your password is entered. This secondary key is often time- limited and available inside a mobile app like Google Authenticator. This means an attacker would also need to have access to your mobile device in order to unlock your account.
  • 35. Tweet #AskSucuri to @SucuriSecurity Securing your browsing experience! 2. Online Account Inventory Management Old unused accounts can be troublesome, especially when they contain personal information. If you don’t need an account anymore, delete it. 1. Search Your Username(s) 2. Look for Old Emails 3. Go Through Your Saved Logins (LastPass / KeePass) 4. Check Your Google and Facebook Accounts 5. Use Online Services such as: haveibeenpwned.com haveibeenpwned.com
  • 36. Tweet #AskSucuri to @SucuriSecurity Securing your browsing experience! 2. Online Account Inventory Management Old unused accounts can be troublesome, especially when they contain personal information. If you don’t need an account anymore, delete it.
  • 37. Tweet #AskSucuri to @SucuriSecurity “If you put a key under the mat for the cops, a burglar can find it, too. Criminals are using every technology tool at their disposal to hack into people’s accounts. If they know there’s a key hidden somewhere, they won’t stop until they find it.” Tim Cook Apple’s CEO
  • 38. Tweet #AskSucuri to @SucuriSecurity Go to blog.sucuri.net to stay ahead of all emerging security threats.
  • 39. Submit your questions in the chat below or tweet us @SucuriSecurity using the hashtag #AskSucuri Victor Santoyo You can reach me at victor@sucuri.net

Editor's Notes

  1. When name of the presentation is mentioned, switch to next slide!
  2. Mentioning my name – switch to next slide.