DSD 101: Tips, Tools, and Best Practices to Stay Safe Online

Slides:



Advertisements
Similar presentations
Review Ch. 3 – Connecting to the Worlds Information © 2010, 2006 South-Western, Cengage Learning.
Advertisements

Internet Safety May 2014 – KS3 AIMS  To find out what you know about staying safe online  To improve on your knowledge on internet safety  To be clear.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
THAT STRANGER IS NOT YOUR FRIEND Facebook 101:. Housekeeping This presentation is not exhaustive It is just enough information to get you started; making.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Tracking, Privacy, You & The 21 st Century When you talk online the internet listens.
How to Login into SSA ?. Home Page Click on My Profile.
Information Assurance Outreach. Overview Survey Results Password Security Safety Internet Privacy Social Media Privacy and Safety Technology Demonstration.
MANAGING YOUR ONLINE PROFILE WHAT DOES THIS MEAN AND WHY SHOULD YOU CARE? Sarah Morris UT Libraries.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
PAGE 1 Company Proprietary and Confidential Internet Safety and Security Presented January 13, 2014.
By: Daniel Krueger ITC 525: Computers for Educators Summer II 2010 Click Here to Begin.
IT security By Tilly Gerlack.
FACEBOOK IS THE BEST THING THAT EVER HAPPENED TO FRIENDSHIP WHY I LIKE FACEBOOK! By Mike Matthews.
A Guide to Getting Started. 2 Free social learning network for teachers, students, schools and districts Safe and easy way to connect Exchange ideas Share.
Pitfalls and Mistakes. Agenda Who We Are Social Media Today Pitfalls and Mistakes –Policies –Poor Decisions Online Reputation Accepting Random People.
Online Safety and You!. Introduction The good and the bad about the internet Protecting your Personal Information –Password protection Safety.
Using LastPass. Great password management is impossible w/o a great tool Auto-fill (hands-free login) will save you approximately one hour per month You.
Student Experience It’s your education Type the web site address into the browser given to you by your junior high or high school Select “I am a student”
Cyber Security and Staying Safe Online Mark D. Riley College of Health Sciences and Professions.
A Guide to Getting Started. 2 Free social learning network for teachers, students, schools and districts Safe and easy way to connect Exchange ideas Share.
Activity 4 Protecting Ourselves. Keeping Safe There are lots of different ways we can be at risk on the Internet. How can we protect ourselves and keep.
Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away.
Internet safety By Kyle Allan. Top tip No:10 Don’t give out personal information such as a : Phone numbers and also addresses.
Internet Safety and Productivity Tips Presented by ITS Kerri Sorenson and Sean Hernandez December 11, 8:30-9:00 am.
By John Williams. Why Secure Passwords Matter Passwords protect everything about you online. Once those passwords are discovered and used by someone else.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
1. Guard your privacy. What people know about you is up to you. 2. Protect your reputation. Self-reflect before you self-reveal. What’s funny or edgy.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
KS2 E-Safety assembly How to be smart and keep safe online.
Phillip Schneider Information Services Librarian Gail Borden Public Library District Cybersecurity: Keeping Your Computers & Devices Safe.
Computer Security Keeping you and your computer safe in the digital world.
PUBLIC COMPUTER SAFETY
Hoover Middle School Cyber Safety Discussion
Creating your online identity
Keeping Children Safe Online
Fraud Protection.
Social Media Security: Understanding how to keep yourself safe.
Fraud protection.
What does your digital footprint say about you?
Hotspot Shield Protect Your Online Identity
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
Internet Identity, Safety, & Security
Unit 4 IT Security.
How to use the internet safely and How to protect my personal data?
Information Security.
How to use the internet safely and How to protect my personal data?
Table of Contents Tips for Success Send s
Social Media: What You Should Know
ARE YOU A TARGET? YOU MAY NOT REALIZE IT, BUT YOU ARE A TARGET FOR CYBER CRIMINALS. IDENTITY THEFT IS ON THE RISE. BE AWARE AND TAKE PREVENTIVE ACTIONS.
Backup your Data © EIT, Author Gay Robertson, 2017.
Lesson 2- Protecting Yourself Online
Avast - Antivirus | Internet Security. Introduction Avast Antivirus is afamily of internet security application developed by Avast for windows,mac OS,
Information Security Awareness 101
THIS IS A TIPS & TRICKS SLIDE FOR YOU
Social Media Safety Freshman Seminar.
Staying safe on the internet
Internet safety By DAGAS YACMAS team.
Student Experience It’s your education.
Online safety, social manners, and digital footprint
Creating Passphrases Include Examples NOT REQUIRED
E SAFETY ASSEMBLY.
Internet Safety – Social Media
Mr Douglass Subject Leader ICT & Computing
Lesson 2- Protecting Yourself Online
Keeping your passwords safe
Getting Started With LastPass Enterprise
How to give Student Voice Surveys
Online Safety; Privacy and Sharing
Online Safety; Privacy and Sharing
Presentation transcript:

DSD 101: Tips, Tools, and Best Practices to Stay Safe Online Ben Woelk ISO Program Manager infosec@rit.edu

You’re a Target. Why?

Top online safety practices? http://googleonlinesecurity.blogspot.com/2015/07/new-research-comparing-how-security.html

Passwords/Passphrases http://xkcd.com/936/ https://www.rit.edu/security/content/password

How Strong is Your Password? https://www.grc.com/haystack.htm

Six all lower case letters

Change one letter to a number

Change one letter to uppercase

Change one letter to a special character

Add length—8 characters

10 characters

12 characters

Passphrases ItwasaDark215&StormyNight It was a dark and stormy night becomes ItwasaDark215&StormyNight Length > complexity Password vaults. Don’t use the same password for multiple accounts.

Our passphrase— 25 characters

Password Managers

Multi-Factor Authentication www.turnon2FA.com

Most Common Way of Getting a Password?

Fraud, Scams, and Malware Employee Information Invoices Attachments http://www.csoonline.com/article/3091795/security/phishing-scam-focuses-on-the-basics-to-harvest-business-credentials.html

Ransomware

What are the Top Three Ways to Protect Yourself?

Mobile Security Apps Lookout Security & Antivirus (Android, iOS) Avast Mobile Security (Android) Avast SecureMe (iOS) Google Authenticator (Android, iOS) Find My iPhone (iOS) iVault (iOS)

Protecting Your Information Encrypted connections (VPN); SSL; encrypted USBs, hard drives. Encrypt dropbox. Correct addressing. https://www.rit.edu/security/content/information-access-protection-standard

Learn and set social network privacy settings Never assume privacy Tip #10: Don’t assume privacy. In fact, assume that anything you post online is going to stay private. Think before you post about how information can be used. Do you want Facebook or anyone else tracking everything you do? Learn and set social network privacy settings

Google My Account Dashboard

Google Reverse Image Search See how often that LinkedIn profile photo is being used. Go to LinkedIn profile. Chrome—Right click on image and choose Search Google for Image Right click on image. Copy image address. Click on camera icon in Google search window. Paste in image address.

Protecting Your Reputation

Questions (and maybe some answers) Ben Woelk Ben.woelk@rit.edu ben@benwoelk.com

Resources RIT Information Security Standards http://www.rit.edu/security Google Research on User vs Expert Practices http://googleonlinesecurity.blogspot.com/2015/07/new-research-comparing-how-security.html