SlideShare a Scribd company logo
1 of 61
Download to read offline
Online Safety & Security
April-May 2014
Epiphany Technology Committee
Jeff Squyres, Jim Cabral
Clickable links to additional
information are included at the end
of this presentation
Agenda
● Why Should I Care About Security?
● Who Is Attacking Me?
● What Do I Need to Protect?
● What Can Happen?
● What Increases My Risk?
● How Can I Protect Myself?
● What If I Get Hacked?
Disclaimer
● We’re Just Trying to Help
● Don’t blame us if things go bad
● We’re volunteers (with day jobs)
Why Should I Care About Security?
“Just like any other public environment, the Internet
requires awareness and caution. Just as you use
locks to keep criminals out of your home, you also
need safeguards to secure your computer. Many of
the crimes that occur in real life are now done - or
at least facilitated - through the Internet. Theft,
abuse, and more can be and are being done online.
Many scammers target older Americans via emails
and websites for charitable donations, dating
services, auctions, health care, and prescription
medications.”
US Department of Homeland Security.
The “Heartbleed” bug
The “Heartbleed” bug: Fun facts
● Only 38% of users have
changed their passwords
○ 6% have changed all
○ 16% changed “some”
○ 16% changed “a few”
The “Heartbleed” bug
● The Internet depends on encryption
○ “https” → S = secure (encryption)
○ Encryption between computers
Encrypted connection
The “Heartbleed” bug
● This encryption is known as “SSL”
○ “Secure Sockets Layer”
SSL encrypted connection
The “Heartbleed” bug
● ⅔ of web sites use the same software for SSL
○ OpenSSL
SSL encrypted connection
Open
SSL
● Software bug in OpenSSL since March 2012
The “Heartbleed” bug
Open
SSL
● Software bug in OpenSSL since March 2012
The “Heartbleed” bug
Open
SSL
The “Heartbleed” bug
It’s like walking through a
crowded restaurant with a
video camera.
Joe Smith:
your total is
$98.17Here’s my
credit card
Please log me in;
my username is
“bobcat371”, my
password is
“LouCardsRule”
You catch snippets of
conversations and images.
Most aren’t important.
But some are.
● Most web sites have fixed the problem
○ It is now safe to go change all your
passwords
● You can’t know if your password was
stolen
○ (there was no way to track the guy
with the video camera)
The “Heartbleed” bug
Who Is Attacking Me?
Albert Gonzales: stole 170M
credit / ATM cards from TJ Maxx
Who Is Attacking Me?
Nigerian (“419”) scammers
Also related:
● Guaranteed loan/credit scams
● Lottery scams
● Overpayment / refund scams
● Disaster relief scams
● Travel scams
● Tech/computer help scams
Who Is Attacking Me?
Dating, foreign
bride, sex scams
Who Is Attacking Me?
State-sponsored
“I’m not important”
● “No one cares
about my Facebook
account…”
● Wrong
○ They care a lot
“I’m not important”
● They’ll use the
same username /
password to login
elsewhere
● They’ll impersonate
you
What Do I Need to Protect?
What Can Happen?
Identity and Data Theft
Surveillance/Spying
Inappropriate Content
Your
child
What Increases My Risk?
Poor Passwords
● Simple passwords
● Old or reused
passwords
● Lack of 2-factor
authentication
“Do I really need a different password on
every web site?”
Yes
(sorry)
“But I can’t remember all those passwords!”
● Use a password-keeper program
● Two good ones:
○ LastPass
○ DashLane
● Both are
“Freemium”
Sidenote: What is 2-factor authentication?
1. Something you know
○ Your password
2. Something you have
○ Your cell phone
Sidenote: What is 2-factor authentication?
Login: bobcat371, LouCardsRule
Sidenote: What is 2-factor authentication?
Text bobcat371’s phone: code is 998321
This code changes every time
Sidenote: What is 2-factor authentication?
Text bobcat371’s phone: code is 998321
This code changes every time
What’s the code?
Sidenote: What is 2-factor authentication?
Text bobcat371’s phone: code is 998321
bobcat371, code is 998321
This code changes every time
Sidenote: What is 2-factor authentication?
You’re logged in!
Why is that useful?
Text bobcat371’s phone:
code is 796537
Login: bobcat371,
LouCardsRule
Why is that useful?
Text bobcat371’s phone:
code is 796537
What’s the code?
Why is that useful?
Text bobcat371’s phone:
code is 796537
Uh...
Why is that useful?
Text bobcat371’s phone:
code is 796537
Uh...
Who supports 2-factor?
Who supports 2-factor?
These are only a few
Many more support 2-factor
authentication
Check your favorite web sites to see if
they support 2-factor authentication
Back to:
What Increases My Risk?
Unpatched Software
● Windows and MacOS
● Applications (PDF, Office)
● Mobile phones, tablets
● Web Servers
(Heartbleed)
● Others (Java)
Insecure Configurations
● Software not set to auto-
update
● Open home WiFi
“I’m not important”
● “No one cares about my
home wifi network”
● Wrong
They care a lot
Wifi reaches outside of your home
With protected wifi
Your home / wifi
Bad guy
can’t get in your
network
With protected wifi
Your home / wifi
Bad guy connects
from the street -- he’s
in your network!
Unprotected wifi
“Unprotected wifi is not
only like leaving your
front door unlocked; it’s
like leaving it wide open
with a ‘Welcome’ mat out
front.”
How Can I Protect Myself?
Use Safe Online Behaviors
● Change ALL your passwords now
○ Use complex, unique
passwords for each site
● Avoid suspicious emails,
messages, websites and public
WiFi
○ If it’s too good to be true, it
probably is
● Monitor your credit cards
Get Help to Setup Security
● Set phones, tablets
and computers to
auto update
● Back up critical
information
● Encrypt your home
WiFi (use WPA2)
Get Help to Setup Security
Get Help to Setup Security
Everyone’s
setup is
different; we
can’t help
you in this
seminar
Get personal
or
professional
help
What If I Get Hacked?
Good Response Better Response
Recap
● The internet is a
dangerous place
○ BUT IT IS
MANAGEABLE!
○ Be sensible, be safe
○ Stop. Think. Connect.
Recap
● You can take actions NOW to protect yourself
○ Change ALL your passwords
■ Use good passwords
■ Get a password keeper
■ Setup 2-factor where possible
○ Ensure your firewall / anti-virus is up to date
○ Upgrade away from Windows XP
○ Set all your software to auto-update
○ Protect your home wifi
○ Setup off-site backups
Questions?
Helpful links
● STOP. THINK. CONNECT.: From the Dept. of Homeland Security
○ http://stopthinkconnect.org
● Malwarebytes: Handy PC software to remove viruses
○ A good second line of defense
○ https://www.malwarebytes.org/
● Lastpass: Password keeper
○ https://lastpass.com/
○ They also run a Hearbleed checker: https://lastpass.com/heartbleed
● Free annual credit report: From the US government
○ https://www.annualcreditreport.com/
● XKCD: Simple cartoon showing how Heartbleed works
○ http://imgs.xkcd.com/comics/heartbleed_explanation.png
Helpful links
● OpenDNS: Parental controls for filtering web sites at home
○ http://www.opendns.com/
● Microsoft Family Safety:
○ https://familysafety.live.com/
● Reporting Computer Crime:
○ http://www.justice.gov/criminal/cybercrime/reporting.html
Thank you!

More Related Content

Viewers also liked (9)

Object Orinted Programing(OOP) concepts \
Object Orinted Programing(OOP) concepts \Object Orinted Programing(OOP) concepts \
Object Orinted Programing(OOP) concepts \
 
Seminar presentation on 5G
Seminar presentation on 5GSeminar presentation on 5G
Seminar presentation on 5G
 
Quality Function Deployment (QFD) Seminar Presentation
Quality Function Deployment (QFD) Seminar PresentationQuality Function Deployment (QFD) Seminar Presentation
Quality Function Deployment (QFD) Seminar Presentation
 
Basics of ups seminar presentation
Basics of ups   seminar presentationBasics of ups   seminar presentation
Basics of ups seminar presentation
 
Brain fingerprinting
Brain fingerprintingBrain fingerprinting
Brain fingerprinting
 
Rapid Prototyping and its Applications
Rapid Prototyping and its ApplicationsRapid Prototyping and its Applications
Rapid Prototyping and its Applications
 
Product and service design
Product and service designProduct and service design
Product and service design
 
Classroom Management Techniques
Classroom Management TechniquesClassroom Management Techniques
Classroom Management Techniques
 
Basics of c++ Programming Language
Basics of c++ Programming LanguageBasics of c++ Programming Language
Basics of c++ Programming Language
 

Similar to Computer Security Seminar: Protect your internet account information

Cybersecurity Awareness Training Presentation v1.1
Cybersecurity Awareness Training Presentation v1.1Cybersecurity Awareness Training Presentation v1.1
Cybersecurity Awareness Training Presentation v1.1
DallasHaselhorst
 
Cybersecurity Awareness Training Presentation v1.2
Cybersecurity Awareness Training Presentation v1.2Cybersecurity Awareness Training Presentation v1.2
Cybersecurity Awareness Training Presentation v1.2
DallasHaselhorst
 
Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08
DallasHaselhorst
 

Similar to Computer Security Seminar: Protect your internet account information (20)

Computer Security For Activists & Everyone (Oct 2018)
Computer Security For Activists & Everyone (Oct 2018)Computer Security For Activists & Everyone (Oct 2018)
Computer Security For Activists & Everyone (Oct 2018)
 
Cybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaCybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 Sofia
 
Cybersecurity Awareness Training Presentation v1.1
Cybersecurity Awareness Training Presentation v1.1Cybersecurity Awareness Training Presentation v1.1
Cybersecurity Awareness Training Presentation v1.1
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Cybersecurity Awareness Training Presentation v1.2
Cybersecurity Awareness Training Presentation v1.2Cybersecurity Awareness Training Presentation v1.2
Cybersecurity Awareness Training Presentation v1.2
 
DSRY_Cybersecurity Awareness Presentation
DSRY_Cybersecurity Awareness PresentationDSRY_Cybersecurity Awareness Presentation
DSRY_Cybersecurity Awareness Presentation
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0
 
Internet safety and security
Internet safety and securityInternet safety and security
Internet safety and security
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08
 
Remote Office Tech Support
Remote Office Tech SupportRemote Office Tech Support
Remote Office Tech Support
 
IESBGA 2014 Cybercrime Seminar by John Bambenek
IESBGA 2014 Cybercrime Seminar by John BambenekIESBGA 2014 Cybercrime Seminar by John Bambenek
IESBGA 2014 Cybercrime Seminar by John Bambenek
 
Progscon cybercrime and the developer
Progscon cybercrime and the developerProgscon cybercrime and the developer
Progscon cybercrime and the developer
 
Online Privacy & Computer Security Basics (September 2017)
Online Privacy & Computer Security Basics (September 2017)Online Privacy & Computer Security Basics (September 2017)
Online Privacy & Computer Security Basics (September 2017)
 
hamad.pwrpoint.pdf
hamad.pwrpoint.pdfhamad.pwrpoint.pdf
hamad.pwrpoint.pdf
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Webinar: How to avoid the 12 Scams of Christmas
Webinar: How to avoid the 12 Scams of ChristmasWebinar: How to avoid the 12 Scams of Christmas
Webinar: How to avoid the 12 Scams of Christmas
 
Basic Digital Security
Basic Digital SecurityBasic Digital Security
Basic Digital Security
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 

Computer Security Seminar: Protect your internet account information

  • 1. Online Safety & Security April-May 2014 Epiphany Technology Committee Jeff Squyres, Jim Cabral
  • 2. Clickable links to additional information are included at the end of this presentation
  • 3. Agenda ● Why Should I Care About Security? ● Who Is Attacking Me? ● What Do I Need to Protect? ● What Can Happen? ● What Increases My Risk? ● How Can I Protect Myself? ● What If I Get Hacked?
  • 4. Disclaimer ● We’re Just Trying to Help ● Don’t blame us if things go bad ● We’re volunteers (with day jobs)
  • 5. Why Should I Care About Security? “Just like any other public environment, the Internet requires awareness and caution. Just as you use locks to keep criminals out of your home, you also need safeguards to secure your computer. Many of the crimes that occur in real life are now done - or at least facilitated - through the Internet. Theft, abuse, and more can be and are being done online. Many scammers target older Americans via emails and websites for charitable donations, dating services, auctions, health care, and prescription medications.” US Department of Homeland Security.
  • 7. The “Heartbleed” bug: Fun facts ● Only 38% of users have changed their passwords ○ 6% have changed all ○ 16% changed “some” ○ 16% changed “a few”
  • 8. The “Heartbleed” bug ● The Internet depends on encryption ○ “https” → S = secure (encryption) ○ Encryption between computers Encrypted connection
  • 9. The “Heartbleed” bug ● This encryption is known as “SSL” ○ “Secure Sockets Layer” SSL encrypted connection
  • 10. The “Heartbleed” bug ● ⅔ of web sites use the same software for SSL ○ OpenSSL SSL encrypted connection Open SSL
  • 11. ● Software bug in OpenSSL since March 2012 The “Heartbleed” bug Open SSL
  • 12. ● Software bug in OpenSSL since March 2012 The “Heartbleed” bug Open SSL
  • 13. The “Heartbleed” bug It’s like walking through a crowded restaurant with a video camera. Joe Smith: your total is $98.17Here’s my credit card Please log me in; my username is “bobcat371”, my password is “LouCardsRule” You catch snippets of conversations and images. Most aren’t important. But some are.
  • 14. ● Most web sites have fixed the problem ○ It is now safe to go change all your passwords ● You can’t know if your password was stolen ○ (there was no way to track the guy with the video camera) The “Heartbleed” bug
  • 15. Who Is Attacking Me? Albert Gonzales: stole 170M credit / ATM cards from TJ Maxx
  • 16. Who Is Attacking Me? Nigerian (“419”) scammers Also related: ● Guaranteed loan/credit scams ● Lottery scams ● Overpayment / refund scams ● Disaster relief scams ● Travel scams ● Tech/computer help scams
  • 17. Who Is Attacking Me? Dating, foreign bride, sex scams
  • 18. Who Is Attacking Me? State-sponsored
  • 19. “I’m not important” ● “No one cares about my Facebook account…” ● Wrong ○ They care a lot
  • 20. “I’m not important” ● They’ll use the same username / password to login elsewhere ● They’ll impersonate you
  • 21. What Do I Need to Protect?
  • 27. Poor Passwords ● Simple passwords ● Old or reused passwords ● Lack of 2-factor authentication
  • 28. “Do I really need a different password on every web site?” Yes (sorry)
  • 29. “But I can’t remember all those passwords!” ● Use a password-keeper program ● Two good ones: ○ LastPass ○ DashLane ● Both are “Freemium”
  • 30. Sidenote: What is 2-factor authentication? 1. Something you know ○ Your password 2. Something you have ○ Your cell phone
  • 31. Sidenote: What is 2-factor authentication? Login: bobcat371, LouCardsRule
  • 32. Sidenote: What is 2-factor authentication? Text bobcat371’s phone: code is 998321 This code changes every time
  • 33. Sidenote: What is 2-factor authentication? Text bobcat371’s phone: code is 998321 This code changes every time What’s the code?
  • 34. Sidenote: What is 2-factor authentication? Text bobcat371’s phone: code is 998321 bobcat371, code is 998321 This code changes every time
  • 35. Sidenote: What is 2-factor authentication? You’re logged in!
  • 36. Why is that useful? Text bobcat371’s phone: code is 796537 Login: bobcat371, LouCardsRule
  • 37. Why is that useful? Text bobcat371’s phone: code is 796537 What’s the code?
  • 38. Why is that useful? Text bobcat371’s phone: code is 796537 Uh...
  • 39. Why is that useful? Text bobcat371’s phone: code is 796537 Uh...
  • 41. Who supports 2-factor? These are only a few Many more support 2-factor authentication Check your favorite web sites to see if they support 2-factor authentication
  • 43. Unpatched Software ● Windows and MacOS ● Applications (PDF, Office) ● Mobile phones, tablets ● Web Servers (Heartbleed) ● Others (Java)
  • 44. Insecure Configurations ● Software not set to auto- update ● Open home WiFi
  • 45. “I’m not important” ● “No one cares about my home wifi network” ● Wrong They care a lot
  • 46. Wifi reaches outside of your home
  • 47. With protected wifi Your home / wifi Bad guy can’t get in your network
  • 48. With protected wifi Your home / wifi Bad guy connects from the street -- he’s in your network!
  • 49. Unprotected wifi “Unprotected wifi is not only like leaving your front door unlocked; it’s like leaving it wide open with a ‘Welcome’ mat out front.”
  • 50. How Can I Protect Myself?
  • 51. Use Safe Online Behaviors ● Change ALL your passwords now ○ Use complex, unique passwords for each site ● Avoid suspicious emails, messages, websites and public WiFi ○ If it’s too good to be true, it probably is ● Monitor your credit cards
  • 52. Get Help to Setup Security ● Set phones, tablets and computers to auto update ● Back up critical information ● Encrypt your home WiFi (use WPA2)
  • 53. Get Help to Setup Security
  • 54. Get Help to Setup Security Everyone’s setup is different; we can’t help you in this seminar Get personal or professional help
  • 55. What If I Get Hacked? Good Response Better Response
  • 56. Recap ● The internet is a dangerous place ○ BUT IT IS MANAGEABLE! ○ Be sensible, be safe ○ Stop. Think. Connect.
  • 57. Recap ● You can take actions NOW to protect yourself ○ Change ALL your passwords ■ Use good passwords ■ Get a password keeper ■ Setup 2-factor where possible ○ Ensure your firewall / anti-virus is up to date ○ Upgrade away from Windows XP ○ Set all your software to auto-update ○ Protect your home wifi ○ Setup off-site backups
  • 59. Helpful links ● STOP. THINK. CONNECT.: From the Dept. of Homeland Security ○ http://stopthinkconnect.org ● Malwarebytes: Handy PC software to remove viruses ○ A good second line of defense ○ https://www.malwarebytes.org/ ● Lastpass: Password keeper ○ https://lastpass.com/ ○ They also run a Hearbleed checker: https://lastpass.com/heartbleed ● Free annual credit report: From the US government ○ https://www.annualcreditreport.com/ ● XKCD: Simple cartoon showing how Heartbleed works ○ http://imgs.xkcd.com/comics/heartbleed_explanation.png
  • 60. Helpful links ● OpenDNS: Parental controls for filtering web sites at home ○ http://www.opendns.com/ ● Microsoft Family Safety: ○ https://familysafety.live.com/ ● Reporting Computer Crime: ○ http://www.justice.gov/criminal/cybercrime/reporting.html