Digital Self Defense 101 - Rochester Institute of …...• See how often that LinkedIn profile...

16
7/15/2016 1 Digital Self Defense 101 DSD 101: Tips, Tools, and Best Practices to Stay Safe Online Ben Woelk ISO Program Manager [email protected] 2

Transcript of Digital Self Defense 101 - Rochester Institute of …...• See how often that LinkedIn profile...

Page 1: Digital Self Defense 101 - Rochester Institute of …...• See how often that LinkedIn profile photo is being used. • Go to LinkedIn profile. • Right click on image. Copy image

7/15/2016

1

DigitalSelfDefense101

DSD 101: Tips, Tools, and Best Practices to Stay Safe Online

Ben WoelkISO Program Manager

[email protected]

2

Page 2: Digital Self Defense 101 - Rochester Institute of …...• See how often that LinkedIn profile photo is being used. • Go to LinkedIn profile. • Right click on image. Copy image

7/15/2016

2

You’re a Target. Why?

3

What are the Top Three Ways to Protect Yourself?

4

Page 3: Digital Self Defense 101 - Rochester Institute of …...• See how often that LinkedIn profile photo is being used. • Go to LinkedIn profile. • Right click on image. Copy image

7/15/2016

3

Top online safety practices?

http://googleonlinesecurity.blogspot.com/2015/07/new‐research‐comparing‐how‐security.html

5

Protecting Your Computer• Anti‐virus

• Firewalls

• Patching and updates

• Passwords/passphrases

https://www.rit.edu/security/content/desktop‐and‐portable‐computer‐security‐standard(Additional standards/requirements https://www.rit.edu/security/content/requirements‐facultystaff)

6

Page 4: Digital Self Defense 101 - Rochester Institute of …...• See how often that LinkedIn profile photo is being used. • Go to LinkedIn profile. • Right click on image. Copy image

7/15/2016

4

7

Update and Browser Tools

8

Note that Secunia is not for individual use on RIT computers.

Page 5: Digital Self Defense 101 - Rochester Institute of …...• See how often that LinkedIn profile photo is being used. • Go to LinkedIn profile. • Right click on image. Copy image

7/15/2016

5

http://xkcd.com/936/

Passwords/Passphrases

https://www.rit.edu/security/content/password

9

How Strong is Your Password?

https://www.grc.com/haystack.htm

10

Page 6: Digital Self Defense 101 - Rochester Institute of …...• See how often that LinkedIn profile photo is being used. • Go to LinkedIn profile. • Right click on image. Copy image

7/15/2016

6

PassphrasesIt was a dark and stormy night 

becomes

ItwasaDark215&StormyNight

Length   > complexity

11

Password Managers

12

Page 7: Digital Self Defense 101 - Rochester Institute of …...• See how often that LinkedIn profile photo is being used. • Go to LinkedIn profile. • Right click on image. Copy image

7/15/2016

7

Two-Factor Authentication

13

Two Factor Authenticationwww.turnon2FA.com

14

Page 8: Digital Self Defense 101 - Rochester Institute of …...• See how often that LinkedIn profile photo is being used. • Go to LinkedIn profile. • Right click on image. Copy image

7/15/2016

8

Mobile Devices, Smartphones, Tablets• Protection commensurate with risk of information accessed or stored

• Storage of private information is prohibited

https://www.rit.edu/security/content/desktop‐HTMLStandard

15

Mobile Security Apps• Lookout Security & Antivirus (Android, iOS)

• Avast Mobile Security (Android)

• Avast SecureMe (iOS)

• Google Authenticator (Android, iOS)

• Find My iPhone (iOS)

• iVault (iOS)

16

Page 9: Digital Self Defense 101 - Rochester Institute of …...• See how often that LinkedIn profile photo is being used. • Go to LinkedIn profile. • Right click on image. Copy image

7/15/2016

9

What about Physical Security?

17

Protecting your identity

18

Page 10: Digital Self Defense 101 - Rochester Institute of …...• See how often that LinkedIn profile photo is being used. • Go to LinkedIn profile. • Right click on image. Copy image

7/15/2016

10

19

How Many Compromised Accounts?

Fraud, Scams, and Malware• Employee Information

• Invoices

• Attachments

20

http://www.csoonline.com/article/3091795/security/phishing‐scam‐focuses‐on‐the‐basics‐to‐harvest‐business‐credentials.html

Page 11: Digital Self Defense 101 - Rochester Institute of …...• See how often that LinkedIn profile photo is being used. • Go to LinkedIn profile. • Right click on image. Copy image

7/15/2016

11

21

ProtectingYourInformation

22https://www.rit.edu/security/content/information‐access‐protection‐standard

Page 12: Digital Self Defense 101 - Rochester Institute of …...• See how often that LinkedIn profile photo is being used. • Go to LinkedIn profile. • Right click on image. Copy image

7/15/2016

12

Never assume privacy

Learn and set social network privacy settings

23

Privacy Settings

24

Page 13: Digital Self Defense 101 - Rochester Institute of …...• See how often that LinkedIn profile photo is being used. • Go to LinkedIn profile. • Right click on image. Copy image

7/15/2016

13

Login Alerts

25

Who’s following

you?

Tagged photos on Instagram can be seen by? 

Page 14: Digital Self Defense 101 - Rochester Institute of …...• See how often that LinkedIn profile photo is being used. • Go to LinkedIn profile. • Right click on image. Copy image

7/15/2016

14

Protecting Your Reputation

27

Google My Account Dashboard

28

Page 15: Digital Self Defense 101 - Rochester Institute of …...• See how often that LinkedIn profile photo is being used. • Go to LinkedIn profile. • Right click on image. Copy image

7/15/2016

15

Google Alerts

Monitor use of your name

29

Google Reverse Image Search• See how often that LinkedIn profile photo is being used.

• Go to LinkedIn profile.

• Right click on image. Copy image address.

• Click on camera icon in Google search window.

• Paste in image address.

30

Page 16: Digital Self Defense 101 - Rochester Institute of …...• See how often that LinkedIn profile photo is being used. • Go to LinkedIn profile. • Right click on image. Copy image

7/15/2016

16

Questions (and maybe some answers)

Ben Woelk

[email protected]

[email protected]

http://rit.facebook.com/RITInfosec

http://twitter.com/RIT_InfoSec31

Resources• RIT Information Security Standardshttp://www.rit.edu/security 

• Google Research on User vs Expert Practiceshttp://googleonlinesecurity.blogspot.com/2015/07/new‐research‐comparing‐how‐security.html

32