watch your back: let’s talk web safety and personal identity theft

35
Jennifer Brooks // Schipul – The Web Marketing Co [email protected] Rodney Sabrsula// Schipul – The Web Marketing Co [email protected] WATCH YOUR BACK Let’s Talk Web Safety and Personal Identity Theft

Upload: schipul-the-web-marketing-company

Post on 14-May-2015

1.822 views

Category:

Technology


2 download

DESCRIPTION

Jennifer Brooks and Rodney Sabrsula break down Personal Web Safety in this presentation. They'll review Password Security, Virus Scanners and more! This is need-to-know information to guard your identity online.

TRANSCRIPT

Page 1: Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft

Jennifer Brooks // Schipul – The Web Marketing [email protected]

Rodney Sabrsula// Schipul – The Web Marketing [email protected]

WATCH YOUR BACKLet’s Talk Web Safety and Personal Identity Theft

Page 2: Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft

Overview

• Password Security• Email Security• Virus Scanners• Social Engineering• Home/Wireless Security

Page 3: Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft

PASSWORD SECURITY

Page 4: Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft

Best Practices

• Writing down passwords– If you must, store securely, and destroy when no

longer needed

Page 5: Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft

Best Practices

• NEVER share passwords

Page 6: Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft

Best Practices

• Use different passwords for every account

Page 7: Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft

Best Practices

• Change immediately if a password is compromised

Page 8: Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft

Best Practices

• Be careful about storing on your computer

Page 9: Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft

Best Practices

• Always use strong passwords

Page 10: Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft

Strong Passwords

• A strong password:– Should be at least 7 characters long– Does not contain your user name, real name, or

company name– Does not contain a complete dictionary word– Is significantly different from previous passwords• Incremental (password 1, password 2…) are not strong

– Contains uppercase, lowercase, numerical, and at least one special character

Page 11: Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft

Common Password

Page 12: Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft

Common Password Themes

• Children’s Names• Birthdates• Spouse’s Name• Religious• Username• Pet’s Name• Sports Team

Page 13: Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft

EMAIL SECURITY

Page 14: Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft

Email Spoofing

• Reading email headers

• Recognizing Spoofed emails

Page 15: Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft

Top 10 Spam Subject Lines1. You’ve received a greeting ecard2. Virtualization Webinar3. Masters degree with no efforts4. Career Advancement Opportunities – July of 20095. Webinar: Think Big: Create Efficiencies With an Enterprise-Wide6. Non-Profit job from home7. Administrative Certification: Increase Productivity with Superior

Organizational Skills8. Administrative Certification: Gain Credibility by Maximizing Your Productivity9. you can wear tag heuer watch now;10. you can wear cartier watch now

Source: http://www.mcafee.com/us/threat_center/anti_spam/spam_top10.html

Page 16: Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft

Do Not Download These Types of FilesFile Extension Description File

Extension DescriptionADE Microsoft Access Project Extension MDB Microsoft Access Application

ADP Microsoft Access Project MDE Microsoft Access MDE Database

BAS Visual Basic® Class Module MSC Microsoft Common Console Document

BAT Batch File MSI Windows Installer Package

CHM Compiled HTML Help File MSP Windows Installer Patch

CMD Windows NT® Command Scrip MST Visual Test Source File

COM MS-DOS® Application PCD Photo CD Image

CPL Control Panel Extension PIF Shortcut to MS-DOS Program

CRT Security Certificate REG Registration Entries

EXE Application SCR Screen Saver

HLP Windows® Help File SCT Windows Script Component

HTA HTML Applications SHS Shell Scrap Object

INF Setup Information File URL Internet Shortcut (Uniform Resource Locator)

INS Internet Communication Settings VB VBScript File

ISP Internet Communication Settings VBE VBScript Encoded Script File

JS JScript® File VBS VBScript Script File

JSE JScript Encoded Script File WSC Windows Script Component

LNK Shortcut WSF Windows Script File

WSH Windows Scripting Host Settings File

Source: http://www.novatone.net/mag/mailsec.htm

Page 17: Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft

Safe File Extensions for Email Downloads

File Extension Description

GIF Picture - Graphics Interchange Format (ConmuServe)

JPG or JPEG Picture - Joint Photographic Expert Group

TIF or TIFF Picture - Tagged Image File Format (Adobe)

MPG or MPEG Movie - Motion Picture Expert Group

MP3 Sound – MPEG compressed audio

WAV Sound – Audio (Microsoft)

Source: http://www.novatone.net/mag/mailsec.htm

Page 18: Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft

VIRUS SCANNERS

Page 19: Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft

AVG Free

Get a free virus scanner at: http://free.avg.com/

Hint: Don’t install the tool bar!

Page 20: Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft

Current Virus Threats

• Change Daily• Scheduled Signature Updates• Sources of Latest Threat and Severity

Page 21: Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft

What to do with a Virus

• Isolate• Cure• Identify Source

Page 22: Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft

SOCIAL ENGINEERING

Page 23: Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft

Phone Calls

• Know who you’re talking to• Provide no confidential data• Call them back

Page 24: Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft

Phishing

• Definition– In the field of computer security, phishing is the

criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details to “catch” financial information and passwords.

Source: http://en.wikipedia.org/wiki/Phishing

Page 25: Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft

Top 10 Phishing Scams1. security alert!2. account notification!3. account notification4. please confirm your data!5. Chase Bank: online banking notification6. Chase Bank: necessary to be read!7. Chase Bank: important notice8. Chase Bank: important security notice9. Chase Bank: account secure confirmation10. Chase Bank customer service: security alert

Source: http://www.mcafee.com/us/threat_center/anti_phishing/phishing_top10.html

Page 26: Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft

Top Brands Exploited by Phishing Scams

http://www.mcafee.com/us/threat_center/anti_phishing/phishing_top10.html

Page 27: Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft

Flash Drive Example

• USB Flash Drives Pose Security Risk

Page 28: Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft

HOME/WIRELESS SECURITY

Page 29: Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft

Set-Up

• You may be at risk by default• Create a strong administrative password• Do not share your connection

Page 30: Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft

Password/Encryption

• The key to your data• Lock them away physically and electronically

Page 31: Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft

Definition: Firewall

• A firewall is a part of a computer system or network that is designed to block unauthorized access while permitting authorized communications.

Page 32: Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft

Definition: IP Address

• Internet Protocol (IP) address- a numerical label that is assigned to devices participating in a computer network utilizing the Internet Protocol for communication between its devices.

Page 33: Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft

Photo Credits• http://www.flickr.com/photos/9483141@N02/1043482672/• http://www.flickr.com/photos/35034348736@N01/6091103/• http://www.flickr.com/photos/30055137@N05/2874818735/• http://www.flickr.com/photos/71038389@N00/2335148856/• http://www.flickr.com/photos/80682954@N00/3168425434/• http://www.flickr.com/photos/26811362@N05/3169491395/• http://www.braswellcomputers.com/images/hackers.jpg• http://www.flickr.com/photos/26260213@N05/3093056683/• http://www.flickr.com/photos/34957438@N05/3416525003/• http://static.howstuffworks.com/• http://www.esat.kuleuven.be/• http://www.computermantorbay.com/• http://www.amsys.co.uk/• http://engageology.wordpress.com/• http://www.cscisd.net/• http://www.vietnamalbum.com/• http://www.noticebored.com/• http://www.ehow.com/• http://www.gadgetsnews.co.uk/• http://www.webmastersbydesign.com/• http://www.reasoft.com/solutions/

Page 34: Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft

RODNEY SABRSULASchipul

Personal Brand: rsabrsula

Facebook: http://facebook.com/sabrsulaTwitter: http://twitter.com/rsabrsula

Page 35: Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft

JENNIFER BROOKSSchipul

Personal Brand: jbrooks

Facebook: http://facebook.com/jbrooksTwitter: http://twitter.com/jbrooks

Find this presentation here: www.schipulcon.com/presentations