4. Anil Dash
One of the biggest benefits of that reality is that I now have control.
The information I choose to reveal...
Granted, I'll never have total control. But look at most people who are
concerned with privacy. They're fighting a losing battle, trying to
prevent their personal information from being available on the web at
all.
If you recognize that it's going to happen, your best bet is to choose
how, when, and where it shows up.
9. Facts
★ 50% of security breaches have come from federal/state
government (since 2005)
★ Spear Phishing US Government email resulted 74,000
compromised computers
★ State actors -- Google v China -- East Europe Mafia
10. Top Problems
★ Social Engineering
★ Spear Phishing
★ Updates
★ Passwords
★ Identity Theft
11. OBE -- (not top problems)
★ Anti-Virus
★ Identity Theft
★ Passwords (kinda)
20. Passwords
Strong Password Definition, Requirements and Guidelines
•A strong password is a password that meets the following guidelines:
•Be 7 or 14 characters long.
•Contain both uppercase and lowercase letters.
•Contain numbers.
•Contain symbols, such as ` ! " ? $ ? % ^ & * ( ) _ - + = { [ } ] : ; @ ' ~ # | < , > . ? /
•Contain a symbol in the second, third, fourth, fifth or sixth position (due to the way in which encryption
works).
•Not resemble any of your previous passwords.
•Not be your name, your friend's or family member's name, or your login.
•Not be a dictionary word or common name.