slide handouts

Digital Self Defense
101
DSD 101: Tips, Tools, and
Best Practices to Stay Safe Online
Ben Woelk
ISO Program Manager
[email protected]
2
You’re a Target. Why?
3
What are the Top Three Ways to
Protect Yourself?
4
Top online safety practices?
5
http://googleonlinesecurity.blogspot.com/2015/07/new-research-comparing-how-security.html
Protecting Your
Computer
•
•
•
•
Anti-virus
Firewalls
Patching and updates
Passwords/passphrases
6
https://www.rit.edu/security/content/desktopand-portable-computer-security-standard
7
Update and Browser Tools
8
Passwords/Passphrases
9
http://xkcd.com/936/
https://www.rit.edu/security/content/password
How Strong is Your Password?
10
https://www.grc.com/haystack.htm
Passphrases
It was a dark and
stormy night
becomes
ItwasaDark215&StormyNight
Length
> complexity
11
Password Managers
12
Two-Factor Authentication
13
Two Factor Authentication
www.turnon2FA.com
14
Mobile Devices,
Smartphones, Tablets
• Protection commensurate with risk of information accessed or
stored
• Storage of private information is prohibited
15
https://www.rit.edu/security/content/desktop-HTMLStandard
Mobile Security Apps
•
•
•
•
•
•
Lookout Security & Antivirus (Android, iOS)
Avast Mobile Security (Android)
Avast SecureMe (iOS)
Google Authenticator (Android, iOS)
Find My iPhone (iOS)
iVault (iOS)
16
What about Physical Security?
17
Protecting
your
identity
18
Phishing
19
20
Protecting Your
Information
21
https://www.rit.edu/security/content/infor
mation-access-protection-standard
Never
assume
privacy
22
Learn and set social network privacy settings
Privacy Settings
23
Login Alerts
24
Login Alerts
25
Who’s
following
you?
Tagged photos on Instagram can be seen by?
Protecting
Your
Reputation
27
Google My Account Dashboard
28
Google Alerts
Monitor
use of
your
name
29
Questions (and maybe some
answers)
Ben Woelk
[email protected]
[email protected]
http://rit.facebook.com/RITInfosec
http://twitter.com/RIT_InfoSec
30
Resources
• RIT Information Security Standards
http://www.rit.edu/security
• Google Research on User vs Expert Practices
http://googleonlinesecurity.blogspot.com/2015/07/newresearch-comparing-how-security.html
31