Digital Self Defense 101 DSD 101: Tips, Tools, and Best Practices to Stay Safe Online Ben Woelk ISO Program Manager [email protected] 2 You’re a Target. Why? 3 What are the Top Three Ways to Protect Yourself? 4 Top online safety practices? 5 http://googleonlinesecurity.blogspot.com/2015/07/new-research-comparing-how-security.html Protecting Your Computer • • • • Anti-virus Firewalls Patching and updates Passwords/passphrases 6 https://www.rit.edu/security/content/desktopand-portable-computer-security-standard 7 Update and Browser Tools 8 Passwords/Passphrases 9 http://xkcd.com/936/ https://www.rit.edu/security/content/password How Strong is Your Password? 10 https://www.grc.com/haystack.htm Passphrases It was a dark and stormy night becomes ItwasaDark215&StormyNight Length > complexity 11 Password Managers 12 Two-Factor Authentication 13 Two Factor Authentication www.turnon2FA.com 14 Mobile Devices, Smartphones, Tablets • Protection commensurate with risk of information accessed or stored • Storage of private information is prohibited 15 https://www.rit.edu/security/content/desktop-HTMLStandard Mobile Security Apps • • • • • • Lookout Security & Antivirus (Android, iOS) Avast Mobile Security (Android) Avast SecureMe (iOS) Google Authenticator (Android, iOS) Find My iPhone (iOS) iVault (iOS) 16 What about Physical Security? 17 Protecting your identity 18 Phishing 19 20 Protecting Your Information 21 https://www.rit.edu/security/content/infor mation-access-protection-standard Never assume privacy 22 Learn and set social network privacy settings Privacy Settings 23 Login Alerts 24 Login Alerts 25 Who’s following you? Tagged photos on Instagram can be seen by? Protecting Your Reputation 27 Google My Account Dashboard 28 Google Alerts Monitor use of your name 29 Questions (and maybe some answers) Ben Woelk [email protected] [email protected] http://rit.facebook.com/RITInfosec http://twitter.com/RIT_InfoSec 30 Resources • RIT Information Security Standards http://www.rit.edu/security • Google Research on User vs Expert Practices http://googleonlinesecurity.blogspot.com/2015/07/newresearch-comparing-how-security.html 31
© Copyright 2026 Paperzz