2. What is Data Privacy Day (DPD)
• Data Privacy Day is January 28, 2014.
• DPD encourages everyone to make protecting
privacy and data a greater priority.
• It is an International effort to empower and
educate people to protect their privacy and
control their digital footprint.
http://www.staysafeonline.org/data-privacy-day/
2
3. Data Privacy Day
• So much of our lives today is electronic data.
• From Social Security to credit card to our date
of birth; they are all numbers that need to be
kept private.
• These numbers exist on our computers and
mobile devices.
3
4. Data Privacy Day
• And because they are all connected to the
internet, those numbers are there as well. It's
not just numbers, we have contracts, wills,
financial agreements, family history, photos
and videos that should be kept private as well.
• This is your digital footprint.
4
5. Data Privacy Day
• Today's presentation is designed to give you the
knowledge about those power tools.
• Many of them are free or low cost and once you
set them up, they become second nature.
5
6. Data Privacy Day
• If you don‟t take advantage of them, you will be
exposed to the people who want to steal your
data.
• This could lead to identity theft and other
headaches.
6
7. Operating Systems & Programs / Apps
• The operating system (OS) is the behind-the-
scene genie that makes your device work it‟s
magic.
• OS X, Linux, iOS, Windows and Android are all
operating systems.
• From time to time, they do need patching and
updating to plug security holes.
7
8. Operating Systems & Programs / Apps
• Today‟s OS‟ are set by default to prompt you
when an update is available.
• You should do the update within a few days.
• If you have an OS older than 5 years, you need
to seriously think about some kind of upgrade.
8
9. Operating Systems & Programs / Apps
• Programs & Apps are your productivity tools
– Web browsers
– Games
– Audio / visuals tools
– Calendars
– Address books and more
• Many of them will prompt when updates are
available.
• Some will auto-update themselves or the OS
will update them for you.
9
10. Operating Systems & Programs / Apps
• There are programs that can help you keep your
programs up-to-date
– FileHippo
– Secunia
– Ninite
• Don‟t forget Microsoft‟s monthly Tuesday
updates
• They need to be installed
10
11. Be a Good Online Citizen
• Be empowered
• Control your digital footprint by
– Taking good care of your personal data
– Don‟t share it online
• Don‟t share other‟s personal data
– Bcc: is Confidential
– Use for all e-mail addresses
• Educate others by letting them know to use Bcc:
11
12. Don’t Forward Questionable E-mails
Check Them Out
• http://www.snopes.com/
– Definitive Internet reference source for urban
legends, folklore, myths, rumors, and
misinformation
• http://www.hoax-slayer.com/
– Debunking email hoaxes and exposing Internet
scams since 2003
• http://urbanlegends.about.com/
12
13. Don’t Forward Questionable E-mails
Check Them Out
• http://www.thatsnonsense.com/
• http://bobsullivan.net/
13
14. Make Passwords Long, Strong &
Unique
• Secure your devices
• Smartphone, Tablet, Laptop or PC
• Use passwords or passphrases
– Different for each account
– Include numbers, symbols and letters – capital &
lowercase
• Passphrases = multiple words that create a
phrase (longer / stronger than a password)
14
15. Make Passwords Long, Strong &
Unique
• A list of childhood pets – more=stronger
– NobleR!ngoBa!leyAlexT!gerPumpk!nJohnnyGage9
• An uncommon sentence
– !Can‟tBelieveIIntroducedGrantToAlice9
• Use Microsoft‟s Password Checker
15
16. Make Passwords Long, Strong &
Unique
• Is your personal memory getting full?
• A different password for each account can drive
•
•
•
•
you crazy
Use a Password program to remember all of
your passwords
https://www.dashlane.com/
https://www.passwordbox.com/
https://agilebits.com/onepassword
16
18. Safer Online Banking
• It‟s convenient
• But comes with certain risks
• Just like people being robbed at ATMs, or
having their cards cloned, online banking can
be vulnerable
• Follow these tips and you can minimize risks to
your finances and bank safely online
18
19. Safer Online Banking
• Create a strong password
• You know the drill
• Minimum of 8 characters – the longer the
better
• DON‟T use
– Your name, initials, date of birth or anything that
pertains to your relatives
19
20. Safer Online Banking
• If your bank asks you to provide answers to
security questions, the answers don‟t need to be
the real ones
• Thumper really doesn‟t have to be the name of
your first pet
20
21. Safer Online Banking
• Secure your computer and keep it up-to-date
• You‟ve also heard this over and over again but
are you doing it
• Have a good, reliable security program
• Use Malwarebytes to double check your
program – www.malwarebytes.com
• Keep your operating system and other software
up-to-date
21
22. Safer Online Banking
• Don‟t click through on a link in an e-mail from
•
•
•
•
•
your „bank‟
Banks won‟t get in touch
Are you really expecting a shipment from UPS
or FedEx
Phishing is the name of the game – they want
your info and if you give it your money is gone!
Starbucks, McDonalds, etc. Wi-Fi
Banks won‟t call you on the phone and ask for
info, either
22
23. Safer Online Banking
• Don‟t access your bank account(s) via hotel, S
• Always log out of your online banking session
• Always look for the "lock" icon and https:// to
be sure you have a safe connection.
• Do you have private browsing set up on your
browser or smart phone?
• Set your browser to clear its cache when you
shut down your computer
23
26. Safer Online Banking
• Set up account notifications (if available)
– Does a withdrawal match or exceed a specified
–
–
–
–
amount
Is your account balance below a certain point
Alerts could give quick notice of suspicious
activity on your account
Monitor your accounts regularly
Don‟t wait a whole month to discover a
discrepancy
26
27. Safer Online Banking
• NEVER use your debit card online
• Have a credit card with a low limit OR
• Have bank set up a virtual card for you to use
for online purchases
• Set up two-factor authentication
• It‟s one of the best things you can do to make
sure your accounts don't get hacked
27
29. Cover Your Tracks
• Searching with Google?
– Click on a link and your search term is usually sent
–
–
–
–
–
–
–
to that site, along with computer & browser info
Can uniquely identify you
3rd party ads – they can build a profile on you
That‟s why those ads can follow you
Your profile can be sold
Google keeps your searches
Can be legally requested
Google can be hacked
29
30. Cover Your Tracks
• Browse with DuckDuckGo
• Doesn‟t send your searches to other sites
• Or store any personal information at all
30
31. Cover Your Tracks
• Browse with Ixquick
• It Protects Your Privacy!
• Does NOT collect or share ANY personal
information!
– Nada. Zilch. Nothing.
• World's most powerful search engine employing
the most advanced metasearch technology
• Comprehensive …. Accurate
31
32. Cover Your Tracks
• Browse with blekko
• Delivers high quality, curated results and
organizing content into categories
– Curated = cherry picks the best content that is
important and relevant to share
• Sophisticated search technology powers suite of
products
– Web search engine
– Mobile app
– Social news platform
32
33. Cover Your Tracks
• Use DoNotTrackMe by Abine
• Blocks companies from tracking
your browsing and helps
protect your personal info online
• PC – Tablet – Smart Phone
– Access DoNotTrackMe or any
browser or device to manage your
privacy anywhere
www.abine.com
33
34. Cover Your Tracks
• Also by Abine
• MaskMe
– Keeps you private as you browse and shop the web
– Creates and manages secure passwords
• DeleteMe
– Removes your public profile, contact and personal
info, and photos of you from leading data sites
34
35. Block Those Pesky Ads
• AdBlock Plus
• Surf the web without annoying ads!
• Blocks banners, pop-ups and video ads - even
on Facebook and YouTube
• Protects your online privacy
www.adblockplus.org
35
38. Mobile Devices
• What information does your smartphone have
about you?
• Smartphones store and transmit a wide range of
personal data which third parties can access–
including contact lists, pictures, browsing
history, certain identifying information and
stored location data.
• Secure your phone with a long, strong and
unique password, security software and other
privacy features.
38
39. Do You Keep a Clean Device?
• Smartphones can be vulnerable to viruses and
malware that can compromise personal
information.
• Protect your phone with security software and
by updating operating systems and apps.
• Avast.com
• Norton.com
39
40. Think Before You Text
• We‟ve heard this before about e-mail
• Keep in mind how the message might be read
before you send it.
• Be aware that texts can be forwarded.
40
41. Are You Respecting Others’ Privacy?
• Make sure you have someone‟s permission
before taking pictures or videos of them with
your phone.
• What you do online has the potential to affect
everyone – at home, at work and around the
world.
• Practicing good online habits benefits the global
digital community.
41
42. Think Before You App
• Own your online presence - It‟s ok to limit how
and with whom you share information.
• Before downloading a mobile app, understand
what information (your location, access to
social networks, etc.) the app accesses to
function
• Many applications do not need geo-location
enabled in order to provide the service.
• Opt-out of the location service feature on your
phone.
42
43. Are You Savvy About Wi-Fi Hotspots?
• Limit the type of business you conduct on your
smartphone or tablet via Wi-Fi hotspots and
adjust the security settings on your device to
limit who can access your machine.
• Wi-Fi hotspots are convenient but can leave you
vulnerable to intrusion.
43
44. Back-it Up
• Store digital copies of your valuable work,
music, photos and other information on an
external hard drive or online cloud.
44
45. Voice Over Internet Protocol (VoIP)
• BEWARE!
• Skype, Vonage, ooma, magicJack….
• SPIT (Spam over Internet Telephony)
– Fast, cheap and invasive way for telemarketing
messages to reach you
• Spoofing
– Attacker pretends to be a trusted
VoIP caller, such as your bank
45
46. Voice Over Internet Protocol (VoIP)
• ID Theft
– Cyber criminals gather bits of information collected
from your conversations
• Eavesdropping
– Hackers steal VoIP features like voicemail to get
information about the user
• Vishing attacks (voice phishing)
– Gain access to your personal and financial
information in identity theft schemes
46
47. Voice Over Internet Protocol (VoIP)
• Data sniffing
– Hackers identify, modify, store and play back your
conversations
• Compromising your confidentiality
– Is your phone call private and secure
• VoIP risks and safety issues continue to grow as
more and more people rely on this service to
make phone calls.
• Always be aware of the information you're
sharing and that others may be listening in.
47
48. Social Networking
• Only post what you would be comfortable
hanging on your front door….Abby Stokes
• DON‟T share:
– Phone numbers
– Home address
– Full date of birth
– Date of graduation
– Travel plans
– Email address
– Compromising photos
48
49. Social Networking
• Personal information you share online could
give cyber criminals enough to piece together
your email address and password, mother‟s
maiden name --- all that personal info we‟re not
supposed to share
• Don‟t rely on “recommended” settings or
default settings.
• Learn about the controls available and make
your own decisions.
49
50. Social Networking
• Set the privacy and security settings to your
personal comfort level for information sharing
• It's okay to limit with whom you share your
information
• When you update your status with your
whereabouts on a regular basis, you could tip
someone off to your routine
– Possible real-life threats like robberies, break-ins or
stalking
50
51. Social Networking
• Geotags can expose where you live, when you're
traveling and even what car you drive
– Could make you a target for robbery
• Most smartphones and digital cameras have a
function that automatically geotags all your
photos unless you turn it off
• Do you really want everyone to know the
location of your newest grandchild?
51
52. Social Networking
• If you are in someone‟s home or at their event,
get their OK before sharing their private space
with your social media friends
• It‟s a MUST to ask them first if you plan to
geotag anything
52
54. Ransomware
• Two common types….
• Lockscreen ransomware: displays an image that
prevents you from accessing your computer
– FBI Ransomeware
• Encryption ransomware: encrypts files on your
system's hard drive, preventing you from
opening them
– Cryptolocker
54
55. Ransomeware
• The terms ransomware and scareware are often
used interchangeably.
• Both are schemes that attempt to make you
provide a payment for something you don't
want and is probably useless.
• Having a recent backup of your data, and taking
your computer to a technician if it becomes
affected, can mitigate the damage of such
schemes.
55
56. Ransomeware
• Two common types….
• Lockscreen ransomware: displays an image that
prevents you from accessing your computer
– FBI Ransomeware
• Encryption ransomware: encrypts files
on your system's hard drive,
preventing you from
opening them
– Cryptolocker
56