SlideShare a Scribd company logo
1 of 14
Mission Impossible ,[object Object],[object Object],[object Object],[object Object],Val’s Tricks & Tools
What Kinds of Tools Do We Need? Val’s Tricks & Tools TEXT HERE
Does This Sound Familiar? ,[object Object],Val’s Tricks & Tools
Encryption: ,[object Object],[object Object],[object Object],[object Object],Val’s Tricks & Tools
Comparison of Platforms: ,[object Object],[object Object],Val’s Tricks & Tools $$ Chuuuh - Chingg $$
There Are Less Expensive Alternatives! ,[object Object],Val’s Tricks & Tools
So, What Are the Best Programs? ,[object Object],Val’s Tricks & Tools
Primary “Gotta Have These:” Val’s Tricks & Tools *1Password*Evernote *Sophos*SpiderOak *Dropbox
Start by Saving All Client Data in Encrypted Form in Files on Your Computer Val’s Tricks & Tools
And for the PC Users... ,[object Object],[object Object],Val’s Tricks & Tools
1Password:   Can sync across devices- encrypted & can generate passwords ,[object Object],Val’s Tricks & Tools
Dropbox:  is  not secure ,  but if you put encrypted data into it- it’s ok & the cross-device syncing is perfect! SpiderOak:  is  secure   because the password is never stored on their server & all encrypted. Evernote:  is  not secure .  Fantastic program for saving articles, web clippings,with file sharing and ability to sync with all of your devices. Val’s Tricks & Tools
TigerText Pro:  HIPAA Compliant Text Messaging for iPhones, Androids and Blackberries PLUS: 3 pages of resources from YouTube Val’s Tricks & Tools
For Computer Security:   Sophos   is the Winner- Swept the Competition in Europe this Month ,[object Object],Val’s Tricks & Tools

More Related Content

What's hot (7)

Angelo Alviar OSINT 101 Presentation - Forensics and Security Technology
Angelo Alviar OSINT 101 Presentation - Forensics and Security TechnologyAngelo Alviar OSINT 101 Presentation - Forensics and Security Technology
Angelo Alviar OSINT 101 Presentation - Forensics and Security Technology
 
DataSploit - BlackHat Asia 2017
DataSploit - BlackHat Asia 2017 DataSploit - BlackHat Asia 2017
DataSploit - BlackHat Asia 2017
 
Internet
InternetInternet
Internet
 
International Data Privacy Day 2017
International Data Privacy Day 2017International Data Privacy Day 2017
International Data Privacy Day 2017
 
Zyra presentation
Zyra presentationZyra presentation
Zyra presentation
 
Cybersecurity Awareness Month Tips
Cybersecurity Awareness Month TipsCybersecurity Awareness Month Tips
Cybersecurity Awareness Month Tips
 
How to-become-secure-and-stay-secure
How to-become-secure-and-stay-secureHow to-become-secure-and-stay-secure
How to-become-secure-and-stay-secure
 

Similar to Mission Impossible Short Version

IT Security Seminar Cougar CPS
IT  Security  Seminar  Cougar  CPSIT  Security  Seminar  Cougar  CPS
IT Security Seminar Cougar CPS
cougarcps
 
Webinar Security: Apps of Steel transcription
Webinar Security:  Apps of Steel transcriptionWebinar Security:  Apps of Steel transcription
Webinar Security: Apps of Steel transcription
Service2Media
 

Similar to Mission Impossible Short Version (20)

Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and Exploitation
 
Securing your digital life - Jason Addie
Securing your digital life -  Jason AddieSecuring your digital life -  Jason Addie
Securing your digital life - Jason Addie
 
Digital Security and safety for journalists
Digital Security and safety for journalistsDigital Security and safety for journalists
Digital Security and safety for journalists
 
Protecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyProtecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World Safety
 
Module 1 content EN.pptx
Module 1 content EN.pptxModule 1 content EN.pptx
Module 1 content EN.pptx
 
Data management and office communication
Data management and office communicationData management and office communication
Data management and office communication
 
IT Security Seminar Cougar CPS
IT  Security  Seminar  Cougar  CPSIT  Security  Seminar  Cougar  CPS
IT Security Seminar Cougar CPS
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
Webinar Security: Apps of Steel transcription
Webinar Security:  Apps of Steel transcriptionWebinar Security:  Apps of Steel transcription
Webinar Security: Apps of Steel transcription
 
An Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & AnywhereAn Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & Anywhere
 
Desktop Security 8 9 07
Desktop Security 8 9 07Desktop Security 8 9 07
Desktop Security 8 9 07
 
Cyber security for journalists
Cyber security for journalistsCyber security for journalists
Cyber security for journalists
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Security
 
"Using Web 2.0 as a Weapon Against Corruption"
"Using Web 2.0 as a Weapon Against Corruption" "Using Web 2.0 as a Weapon Against Corruption"
"Using Web 2.0 as a Weapon Against Corruption"
 
DMA - Stupid Cyber Criminal Tricks
DMA - Stupid Cyber Criminal TricksDMA - Stupid Cyber Criminal Tricks
DMA - Stupid Cyber Criminal Tricks
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Open Source Shareware Freeware
Open Source Shareware FreewareOpen Source Shareware Freeware
Open Source Shareware Freeware
 
An Introduction To IT Security And Privacy In Libraries
 An Introduction To IT Security And Privacy In Libraries An Introduction To IT Security And Privacy In Libraries
An Introduction To IT Security And Privacy In Libraries
 

More from Valerie Houghton (6)

Mission Impossible Short Version
Mission Impossible Short VersionMission Impossible Short Version
Mission Impossible Short Version
 
Parental Contact Resistance
Parental Contact ResistanceParental Contact Resistance
Parental Contact Resistance
 
Parental Contact Resistance Post-Elkins: Whose Voice Are We Hearing?
Parental Contact Resistance Post-Elkins: Whose Voice Are We Hearing?Parental Contact Resistance Post-Elkins: Whose Voice Are We Hearing?
Parental Contact Resistance Post-Elkins: Whose Voice Are We Hearing?
 
Mission impossible: Protect Your Date from Cyberspace & HIPAA Violations
Mission impossible: Protect Your Date from Cyberspace & HIPAA ViolationsMission impossible: Protect Your Date from Cyberspace & HIPAA Violations
Mission impossible: Protect Your Date from Cyberspace & HIPAA Violations
 
9.8.10 VRH At Racial Dialogue.Com
9.8.10 VRH At Racial Dialogue.Com9.8.10 VRH At Racial Dialogue.Com
9.8.10 VRH At Racial Dialogue.Com
 
The Clients Virtual File
The Clients Virtual FileThe Clients Virtual File
The Clients Virtual File
 

Mission Impossible Short Version

  • 1.
  • 2. What Kinds of Tools Do We Need? Val’s Tricks & Tools TEXT HERE
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8. Primary “Gotta Have These:” Val’s Tricks & Tools *1Password*Evernote *Sophos*SpiderOak *Dropbox
  • 9. Start by Saving All Client Data in Encrypted Form in Files on Your Computer Val’s Tricks & Tools
  • 10.
  • 11.
  • 12. Dropbox: is not secure , but if you put encrypted data into it- it’s ok & the cross-device syncing is perfect! SpiderOak: is secure because the password is never stored on their server & all encrypted. Evernote: is not secure . Fantastic program for saving articles, web clippings,with file sharing and ability to sync with all of your devices. Val’s Tricks & Tools
  • 13. TigerText Pro: HIPAA Compliant Text Messaging for iPhones, Androids and Blackberries PLUS: 3 pages of resources from YouTube Val’s Tricks & Tools
  • 14.