DSD 101: Tips, Tools, and Best Practices to Stay Safe Online Ben Woelk ISO Program Manager infosec@rit.edu
You’re a Target. Why?
Top online safety practices? http://googleonlinesecurity.blogspot.com/2015/07/new-research-comparing-how-security.html
Passwords/Passphrases http://xkcd.com/936/ https://www.rit.edu/security/content/password
How Strong is Your Password? https://www.grc.com/haystack.htm
Six all lower case letters
Change one letter to a number
Change one letter to uppercase
Change one letter to a special character
Add length—8 characters
10 characters
12 characters
Passphrases ItwasaDark215&StormyNight It was a dark and stormy night becomes ItwasaDark215&StormyNight Length > complexity Password vaults. Don’t use the same password for multiple accounts.
Our passphrase— 25 characters
Password Managers
Multi-Factor Authentication www.turnon2FA.com
Most Common Way of Getting a Password?
Fraud, Scams, and Malware Employee Information Invoices Attachments http://www.csoonline.com/article/3091795/security/phishing-scam-focuses-on-the-basics-to-harvest-business-credentials.html
Ransomware
What are the Top Three Ways to Protect Yourself?
Mobile Security Apps Lookout Security & Antivirus (Android, iOS) Avast Mobile Security (Android) Avast SecureMe (iOS) Google Authenticator (Android, iOS) Find My iPhone (iOS) iVault (iOS)
Protecting Your Information Encrypted connections (VPN); SSL; encrypted USBs, hard drives. Encrypt dropbox. Correct addressing. https://www.rit.edu/security/content/information-access-protection-standard
Learn and set social network privacy settings Never assume privacy Tip #10: Don’t assume privacy. In fact, assume that anything you post online is going to stay private. Think before you post about how information can be used. Do you want Facebook or anyone else tracking everything you do? Learn and set social network privacy settings
Google My Account Dashboard
Google Reverse Image Search See how often that LinkedIn profile photo is being used. Go to LinkedIn profile. Chrome—Right click on image and choose Search Google for Image Right click on image. Copy image address. Click on camera icon in Google search window. Paste in image address.
Protecting Your Reputation
Questions (and maybe some answers) Ben Woelk Ben.woelk@rit.edu ben@benwoelk.com
Resources RIT Information Security Standards http://www.rit.edu/security Google Research on User vs Expert Practices http://googleonlinesecurity.blogspot.com/2015/07/new-research-comparing-how-security.html