SlideShare a Scribd company logo
Identity Theft
Protecting Your Personal Data
Eastham Public Library
March 2018
“Identity Theft Is Becoming the Third Certainty in Life.
It’s Prevalent, It’s Getting Worse.”
Adam K. Levin
Former Director, New Jersey Office of Consumer Affairs
At Some Point In Our Lives
Most Of Us Will Experience It To Some Degree.
WHAT MAKES UP YOUR IDENTITY?
IT’S YOUR PERSONALLY IDENTIFYING INFORMATION
• Name, Address
• Date of Birth
• Email Address
• Passport Number
• Biometrics
• Facial Recognition, Fingerprints, Retina Scanning, Voice
Recognition
• SOCIAL SECURITY NUMBER
Think For A Moment About All The Places This PDI May Be Stored!
There Are Many Things We Can Do To Protect Ourselves.
Some Are Easy, Others Are More Complicated.
We Should Do The Easy Things Diligently.
We Should Consider Which of the Complicated Things
Are Necessary For Our Lifestyle.
We Should Each Have In Place
A System of Data Protection
That Fits Our Lifestyle.
BOTH OFFLINE AND ONLINE ACTIONS CAN RESULT IN IDENTITY
THEFT OR DIRECT THEFT OF YOUR MONEY
DETECTIVE SERGEANT ADAM BOHANNON WILL FOCUS ON SCAMS THAT
ATTEMPT TO STEAL FROM YOU DIRECTLY ON APRIL 10
THIS PRESENTATION WILL FOCUS ON ONLINE
CAPTURE AND USE AND OF YOUR PERSONAL DATA
WHICH CAN LEAD TO ANNOYANCE AND
THEFT OF YOUR IDENTITY
WHAT WE’RE GOING TO DISCUSS TODAY
• Protecting Your Data From Tracking, Abuse and Theft
• Techniques And Tools For Protection In A Connected World
• A Few ‘Roberts Rules’ For Protecting Yourself, Your Devices
The Word ‘Online’ Chosen To Include
Internet, Mobile And Other Connected Devices
All Of This Applies to Both Internet And Mobile
• Most Of Your Account Settings Carry Over To Mobile
• Mobile Less Likely To Have Viruses and Malware
• Sadly, That Is Beginning To Change
WARNING SIGNS OF A VIRUS ON A MOBILE DEVICE
• Unwarranted Increase In Data Use
• Apps Crashing
• Pop-Up Ads Appearing Frequently
• App You Are Not Aware of Downloading (Don’t Open!)
• Significant Drop in Battery Life
You May Have To Format Your Phone
Ask Your Mobile Provider For Help!
!! MOST IMPORTANT-KEEP SETTINGS UPDATED !!
ALSO
• Turn On 2-Factor Authentication
• Enable Passcode In Case Phone
Lost Or Stolen (Each Sign-in)
• Both Protect Your Phone Number
• Don’t Download Unknown Apps
• Don’t Click On Unknown Links
PROTECTING THE DATA THAT’S ALREADY OUT THERE
Businesses
Health Care Providers, Financial Services Firms
Government
Educational Institutions
Charitable Organizations
According to Privacy Rights Clearinghouse
10,062,681,966 Accounts were Compromised in 2017
2017
• Equifax
• Recent info says tax and driver’s
license numbers as well as email
• Verizon
• Columbia Falls, Montana
• Indiana Medicaid, PA Women’s
Health Center, Washington St. U
Prior
• Yahoo (2013; Revealed 2016)
• Uber (2016)
• eBay (2014)
• Target (2013)
Protecting Yourself From Data and Identity Theft
Protecting Yourself From Data and Identity Theft
READ PRIVACY POLICIES
• On Websites
• When Mailed
• Financial Services, Health Care
• Pay Attention to Privacy Notices
If You Set Up Accounts--
With Retailers for Example—
Don’t Save Your Credit Card Number.
PREVENTING ADVERTISERS AND OTHERS
FROM TRACKING YOU
HOW IMPORTANT TO PREVENT EMAIL TRACKING?
• DO Protect Your Email Account
• 2 Step Verification (Every Sign In)
• 2 Factor Authentication
(When Account Changes Made)
• Should You Protect Your Email Content?
• Never Send Sensitive Information By Email
• Account Numbers, Passwords, etc.
• Then Don’t Worry About Encryption
PROTECTING YOURSELF WHILE BROWSING THE WEB
• There Are A Number Of Browser Extensions That Block Ads
• Some Are Open Source And Free
• All Work Differently/Work On Various Browsers
• Google Chrome Has A New Blocker
• Adblock Plus, Disconnect, Ublock Origin, Ghostery
• Protecting Against ISP Selling Web Use Data—Explained On
Privacy Policy
• HTTPS Everywhere
• Use a VPN
• Adjust DNS—Fairly Technical
• Will ISP Block Your Service If You Use Any Of These?
PROTECTING YOURSELF FROM UNWANTED PHONE CALLS
NOT ONLY ANNOYING, THEY ARE OFTEN SCAMMING
• Stopping Robo Calls on Your Land Line
• Sign Up For The Do Not Call Registry (FCC)
• Nomorobo
• Stopping Robo Calls on Your Smart Phone
• Most Carriers Offer An App To Block Robo Calls
PROTECTING YOUR DATA ON THE WEB
A Virtual Public Network Is A Secure Private Network Built
On Public Infrastructure (The Web).
It Encrypts The Data Traveling Over The Network
And Adds Other Security Measures.
Use A Highly Rated One.
Most Have Free Trials, Even Free Plans, For Low Volume
Users.
ROBERTS’ RULES FOR FINDING A GOOD VPN—
OR ANY OTHER INTERNET TOOL
• Search “The Best”
• Consider Adding The Current Year To Your Search Term
• Read The Reviews
• In 2018 Don’t Consider Reviews Written Before 2017
• Choose The Tool That Best Meets Your Needs And Lifestyle
• Download The Tool
• Follow Instructions
• Carefully Examine The Settings
https://youtu.be/iynVbynSwOg
There Is Also The Tor Browser
It Uses Technology
That Significantly Slows Your Browsing
PREVENTING THEFT OF YOUR DATA
THE IMPORTANCE OF STRONG PASSWORDS
CANNOT BE OVERSTATED
• Never Reuse Passwords
• Passwords Should Be Long, Strong and Complex
• Don’t Use Obvious Terms—Address, Birthday, Children, Pets, etc.
• Be Careful Where You Store Them
• Use Multi-Factor Authentication Whenever Possible
TOO MUCH TROUBLE, RIGHT???
THERE IS AN ANSWER—
AN EFFECTIVE PASSWORD MANAGER!
A PASSWORD MANAGER HAS SEVERAL FUNCTIONS
• Secure Way To Keep Track Of All Your Passwords
• Can Build Strong Passwords For All Your Accounts
• Can Automatically Sign You Into Many Accounts
• Can Store Credit Card Info, Making Purchasing Online (Too?) Easy
• 1Password Can Now Determine If Your Password Has Been pwned (defeated)
• Again, Choose Carefully (Roberts’ Rules)
Protecting Yourself From Data and Identity Theft
SECURITY PROGRAM ESSENTIAL
• Virus Protection
• Firewall
• Other Features
• Parental Controls; Gaming Protection; Protect Email Against
Spam, Spyware, Phishing
• Most ISPs Offer Free Security Program
• If You Choose Your Own, Use A Paid Program
MOST DATA THEFT IS RESULT OF SOME TYPE OF MALWARE
• “All The Bad Stuff”
• Viruses And More
• Good Security Program Will Get Most
• A Good Anti-Malware Package Will Catch A Few More
• There Are Free Versions
FOR SERIOUS PROBLEMS, HAVE YOUR COMPUTER PROFESSIONALLY CLEANED.
Potentially Unwanted Program
WHAT ABOUT THIRD-PARTY
IDENTITY PROTECTION SERVICES?
PROTECTING YOURSELF IN A CONNECTED WORLD
Anything Connected To The Internet Is Capable of
Collecting And Transmitting Data.
The Questions Are ‘What Data,’ ‘What Uses?’
If It’s Free, There’s A High Probability the App/Tool is Collecting Data.
This Also Applies To Advertising Supported Sites.
Anything Data Stored, By Any Service, Is Susceptible To Hacking.
ITEMS IN YOUR HOME THAT COLLECT DATA
THE QUESTION IS—DO THEY STORE IT, SELL IT?
HOW TO PROTECT YOUR ‘SMART HOME’ SYSTEM
• ALWAYS Change The Default Password Of Any New Device
• Update All Security Settings on Devices, Even New Ones
• Be Thoughtful About The Maker Of The Product
• Be Wary Of Public Wi-Fi
• Study The Settings Of Your Device--Can Do, Can’t Do
• Put Connected Devices on Separate Network From
Computer, Phone
Dojo By BullGuard Monitors A Home System
• Should Be Approved By One Of FTC-Approved Watchdogs
• Search Online, Especially News
• Read Privacy Policy Carefully
• If Third Parties Involved In Data Handling, Research Them
• Connect Toys Only To Secure Wi-Fi
• If It Uses Bluetooth, That Should Require PINs, Passwords
• Data Transmission To Wi-Fi Should Be Encrypted
• If It Can Receive Updates, Security Patches, Keep Them
Updated
How Old Should Children Be To Have A Toy With Such Capabilities?
• Devices Can Not Only Listen To You, The TV, But Potentially
All Conversations Within Range
• Use Voice Recognition
• Use A PIN With The Purchasing Function
• Recordings Are Sent To Storage; Listen And Then Delete Them
• Don’t Connect Speaker To Home Security - Smart Door Locks, etc.
• Don’t Store Sensitive Info – Bank Account, Credit Card, etc.
• Mute It When Leaving For Long Period Of Time
SOME MORE OF ROBERTS’ RULES
FOR LIVING SAFELY IN A CONNECTED WORLD
THE ESSENTIALS
• First, Think Carefully About How Connected You Want To Be
• Then Think About Who You Want To Share With
• Think About How Devices Can Make Your Life Safer, More
Convenient, More Enjoyable
• Add The Security Features That Fit Your Life
NEVER MAKE TWO CHANGES TO YOUR SYSTEM AT ONCE!
MAKE A CHANGE, WAIT A COUPLE OF WEEKS TO BE SURE IT’S
WORKING, THEN MAKE ANOTHER CHANGE.
THEN THINK ABOUT ADD-ONS
• Be Careful About Devices That Say They’ll Solve All Problems
• Don’t Believe Promises Unless They Are Backed In Writing
• Do You Know And Trust The Company?
• Don’t Throw Money At Unnecessary Solutions
• Do Your Own Homework – Especially Before Hiring Someone
Don’t Be Afraid To Call In Professional Help When Needed!
THANK YOU!
AND NOW FOR QUESTIONS!

More Related Content

PPTX
Online Privacy and Security
PPTX
How you can protect your online identity, online privacy and VPNs
PPTX
Eset cybersecurity awareness (laxman giri)
PDF
Center for Identity Webcast: The Internet of Things
PDF
Cyber crime
PPTX
Internet Use, Privacy and security
PPT
Cyberlaw
PPTX
Online privacy & security
Online Privacy and Security
How you can protect your online identity, online privacy and VPNs
Eset cybersecurity awareness (laxman giri)
Center for Identity Webcast: The Internet of Things
Cyber crime
Internet Use, Privacy and security
Cyberlaw
Online privacy & security

What's hot (20)

PPT
It security in healthcare
PPTX
Cyber Security Tips for students_Deepak
PPTX
Cyber security
PPTX
Judy Taylour's Digital Privacy Day 2014 Presentation
PPTX
What is data privacy?
PDF
Utilizing Internet for Fraud Examination and Investigation
PDF
Information security & data security | Chandan Singh Ghodela
PPT
Computer crime
PDF
Cyber crime
PPTX
Updated Cyber Security and Fraud Prevention Tools Tactics
PPTX
Cybercrime Awareness
PPTX
Cybersecurity for the non-technical
PPTX
Cyber crime in india
PDF
State of Cyber Crime in Banking Sector Today: Threats and Solutions
PPTX
Cyber crime- a case study
PDF
Security In A Connected Society
PPTX
Dangers of Computer devices
PPTX
Traditional problem associated with cyber crime
PPTX
Cybercrime Awareness
PPTX
Cyber crimes and its security
It security in healthcare
Cyber Security Tips for students_Deepak
Cyber security
Judy Taylour's Digital Privacy Day 2014 Presentation
What is data privacy?
Utilizing Internet for Fraud Examination and Investigation
Information security & data security | Chandan Singh Ghodela
Computer crime
Cyber crime
Updated Cyber Security and Fraud Prevention Tools Tactics
Cybercrime Awareness
Cybersecurity for the non-technical
Cyber crime in india
State of Cyber Crime in Banking Sector Today: Threats and Solutions
Cyber crime- a case study
Security In A Connected Society
Dangers of Computer devices
Traditional problem associated with cyber crime
Cybercrime Awareness
Cyber crimes and its security
Ad

Similar to Protecting Yourself From Data and Identity Theft (20)

PPTX
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
PPTX
Internet Safety & Privacy
PPTX
CyberSecurity - Computers In Libraries 2024
PPTX
Internet Security
PPTX
Cyber Security Seminar
PDF
Securing and Safeguarding Your Library Setup
PPTX
Information Security Awareness: at Work, at Home, and For Your Kids
PDF
Steps and Tips to Protect Yourself and your Private Information while Online....
PPTX
Cyber security-1.pptx
PPTX
Cyber security (2) (2)
PPTX
Privacy, Encryption, and Anonymity in the Civil Legal Aid Context
PPTX
Personal Threat Models
PPT
Online Self Defense
PPT
Building Trust in the Digital Age
PPT
Rayane hazimeh building trust in the digital age teenagers and students
PPT
Rayane hazimeh building trust in the digital age teenagers and students
PPTX
Securing & Safeguarding Your Library Setup.pptx
PPT
Roadshow2013 revised 2 - miis
PPTX
Digital Security and Hygiene.pptx
PPT
Rayane hazimeh building trust in the digital age teenagers and students
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Internet Safety & Privacy
CyberSecurity - Computers In Libraries 2024
Internet Security
Cyber Security Seminar
Securing and Safeguarding Your Library Setup
Information Security Awareness: at Work, at Home, and For Your Kids
Steps and Tips to Protect Yourself and your Private Information while Online....
Cyber security-1.pptx
Cyber security (2) (2)
Privacy, Encryption, and Anonymity in the Civil Legal Aid Context
Personal Threat Models
Online Self Defense
Building Trust in the Digital Age
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
Securing & Safeguarding Your Library Setup.pptx
Roadshow2013 revised 2 - miis
Digital Security and Hygiene.pptx
Rayane hazimeh building trust in the digital age teenagers and students
Ad

More from Mary Lou Roberts (11)

PPTX
Organic Vegetable Gardening
PPTX
Growing Berries and Small Fruits on Cape Cod
PDF
Birding With Henry Beston
PPT
Monitoring Cape Cod Bay
PPT
Wellfleet Harbor And Dermo
PPT
Wellfleet’S Other Salt Marshes
PPT
Science In The Cape Cod National Seashore
PPT
Wastewater on Cape Cod
PPT
Herring River Restoration Project
PPT
Management of Alewife
PPT
Investigation Of Common Eider Mortailty Events At Cape Cod Ellis, Courchesne...
Organic Vegetable Gardening
Growing Berries and Small Fruits on Cape Cod
Birding With Henry Beston
Monitoring Cape Cod Bay
Wellfleet Harbor And Dermo
Wellfleet’S Other Salt Marshes
Science In The Cape Cod National Seashore
Wastewater on Cape Cod
Herring River Restoration Project
Management of Alewife
Investigation Of Common Eider Mortailty Events At Cape Cod Ellis, Courchesne...

Recently uploaded (20)

PDF
Uniqaya Night Cream For All Skin Type With Natural Ingredients
PPTX
Skincare Solutions Tips to Keep Your Skin Hydrated & Glowing
PPTX
photography_basics_jdfjdbjdbjbfjdbj.pptx
PPTX
Term review 2023 Hirata TYPHOON.pptx review
PPTX
TLE 8 MANICURE.pptx 1-39U2-048012412048120182
DOC
AAMU毕业证学历认证,爱默生学院毕业证ps毕业证
PDF
The Top Life Coach in Haarlem is Life Coach Rudolfo.pdf
PDF
Home science Resource management project
PDF
What Is Intimate Partner Violence - Understanding the Crisis, Data and Solutions
PPTX
Social%20Dance%20(%20Cha%20Cha%20Dance).pptx.pptx
PPTX
PPT ARIEZ'S TOUR FINAL Pulogebang on.pptx
PPTX
Faridabad The City That’s Redefining Urban Living.pptx
PPTX
Lifestyle of Swami Chinmayananda ji Swami ji
PDF
Non-Fatal Strangulation in Domestic Violence
PPTX
Fashion Jewellery and Clothing Business.pptx
PPTX
Participation in physical education to promote fitness
PDF
Your Love Marriage Forecast: What the Stars Say
PDF
Global Business Today 10th Edition by Hill Test Bank.pdf
DOC
AU毕业证学历认证,阿拉巴马大学亨茨维尔分校毕业证成绩单图片
PDF
Intro to Culture, Society, and Politics.
Uniqaya Night Cream For All Skin Type With Natural Ingredients
Skincare Solutions Tips to Keep Your Skin Hydrated & Glowing
photography_basics_jdfjdbjdbjbfjdbj.pptx
Term review 2023 Hirata TYPHOON.pptx review
TLE 8 MANICURE.pptx 1-39U2-048012412048120182
AAMU毕业证学历认证,爱默生学院毕业证ps毕业证
The Top Life Coach in Haarlem is Life Coach Rudolfo.pdf
Home science Resource management project
What Is Intimate Partner Violence - Understanding the Crisis, Data and Solutions
Social%20Dance%20(%20Cha%20Cha%20Dance).pptx.pptx
PPT ARIEZ'S TOUR FINAL Pulogebang on.pptx
Faridabad The City That’s Redefining Urban Living.pptx
Lifestyle of Swami Chinmayananda ji Swami ji
Non-Fatal Strangulation in Domestic Violence
Fashion Jewellery and Clothing Business.pptx
Participation in physical education to promote fitness
Your Love Marriage Forecast: What the Stars Say
Global Business Today 10th Edition by Hill Test Bank.pdf
AU毕业证学历认证,阿拉巴马大学亨茨维尔分校毕业证成绩单图片
Intro to Culture, Society, and Politics.

Protecting Yourself From Data and Identity Theft

  • 1. Identity Theft Protecting Your Personal Data Eastham Public Library March 2018
  • 2. “Identity Theft Is Becoming the Third Certainty in Life. It’s Prevalent, It’s Getting Worse.” Adam K. Levin Former Director, New Jersey Office of Consumer Affairs At Some Point In Our Lives Most Of Us Will Experience It To Some Degree.
  • 3. WHAT MAKES UP YOUR IDENTITY? IT’S YOUR PERSONALLY IDENTIFYING INFORMATION • Name, Address • Date of Birth • Email Address • Passport Number • Biometrics • Facial Recognition, Fingerprints, Retina Scanning, Voice Recognition • SOCIAL SECURITY NUMBER Think For A Moment About All The Places This PDI May Be Stored!
  • 4. There Are Many Things We Can Do To Protect Ourselves. Some Are Easy, Others Are More Complicated. We Should Do The Easy Things Diligently. We Should Consider Which of the Complicated Things Are Necessary For Our Lifestyle.
  • 5. We Should Each Have In Place A System of Data Protection That Fits Our Lifestyle.
  • 6. BOTH OFFLINE AND ONLINE ACTIONS CAN RESULT IN IDENTITY THEFT OR DIRECT THEFT OF YOUR MONEY DETECTIVE SERGEANT ADAM BOHANNON WILL FOCUS ON SCAMS THAT ATTEMPT TO STEAL FROM YOU DIRECTLY ON APRIL 10 THIS PRESENTATION WILL FOCUS ON ONLINE CAPTURE AND USE AND OF YOUR PERSONAL DATA WHICH CAN LEAD TO ANNOYANCE AND THEFT OF YOUR IDENTITY
  • 7. WHAT WE’RE GOING TO DISCUSS TODAY • Protecting Your Data From Tracking, Abuse and Theft • Techniques And Tools For Protection In A Connected World • A Few ‘Roberts Rules’ For Protecting Yourself, Your Devices
  • 8. The Word ‘Online’ Chosen To Include Internet, Mobile And Other Connected Devices All Of This Applies to Both Internet And Mobile • Most Of Your Account Settings Carry Over To Mobile • Mobile Less Likely To Have Viruses and Malware • Sadly, That Is Beginning To Change
  • 9. WARNING SIGNS OF A VIRUS ON A MOBILE DEVICE • Unwarranted Increase In Data Use • Apps Crashing • Pop-Up Ads Appearing Frequently • App You Are Not Aware of Downloading (Don’t Open!) • Significant Drop in Battery Life You May Have To Format Your Phone Ask Your Mobile Provider For Help!
  • 10. !! MOST IMPORTANT-KEEP SETTINGS UPDATED !! ALSO • Turn On 2-Factor Authentication • Enable Passcode In Case Phone Lost Or Stolen (Each Sign-in) • Both Protect Your Phone Number • Don’t Download Unknown Apps • Don’t Click On Unknown Links
  • 11. PROTECTING THE DATA THAT’S ALREADY OUT THERE Businesses Health Care Providers, Financial Services Firms Government Educational Institutions Charitable Organizations
  • 12. According to Privacy Rights Clearinghouse 10,062,681,966 Accounts were Compromised in 2017 2017 • Equifax • Recent info says tax and driver’s license numbers as well as email • Verizon • Columbia Falls, Montana • Indiana Medicaid, PA Women’s Health Center, Washington St. U Prior • Yahoo (2013; Revealed 2016) • Uber (2016) • eBay (2014) • Target (2013)
  • 15. READ PRIVACY POLICIES • On Websites • When Mailed • Financial Services, Health Care • Pay Attention to Privacy Notices
  • 16. If You Set Up Accounts-- With Retailers for Example— Don’t Save Your Credit Card Number.
  • 17. PREVENTING ADVERTISERS AND OTHERS FROM TRACKING YOU
  • 18. HOW IMPORTANT TO PREVENT EMAIL TRACKING? • DO Protect Your Email Account • 2 Step Verification (Every Sign In) • 2 Factor Authentication (When Account Changes Made) • Should You Protect Your Email Content? • Never Send Sensitive Information By Email • Account Numbers, Passwords, etc. • Then Don’t Worry About Encryption
  • 19. PROTECTING YOURSELF WHILE BROWSING THE WEB • There Are A Number Of Browser Extensions That Block Ads • Some Are Open Source And Free • All Work Differently/Work On Various Browsers • Google Chrome Has A New Blocker • Adblock Plus, Disconnect, Ublock Origin, Ghostery • Protecting Against ISP Selling Web Use Data—Explained On Privacy Policy • HTTPS Everywhere • Use a VPN • Adjust DNS—Fairly Technical • Will ISP Block Your Service If You Use Any Of These?
  • 20. PROTECTING YOURSELF FROM UNWANTED PHONE CALLS NOT ONLY ANNOYING, THEY ARE OFTEN SCAMMING • Stopping Robo Calls on Your Land Line • Sign Up For The Do Not Call Registry (FCC) • Nomorobo • Stopping Robo Calls on Your Smart Phone • Most Carriers Offer An App To Block Robo Calls
  • 21. PROTECTING YOUR DATA ON THE WEB A Virtual Public Network Is A Secure Private Network Built On Public Infrastructure (The Web). It Encrypts The Data Traveling Over The Network And Adds Other Security Measures. Use A Highly Rated One. Most Have Free Trials, Even Free Plans, For Low Volume Users.
  • 22. ROBERTS’ RULES FOR FINDING A GOOD VPN— OR ANY OTHER INTERNET TOOL • Search “The Best” • Consider Adding The Current Year To Your Search Term • Read The Reviews • In 2018 Don’t Consider Reviews Written Before 2017 • Choose The Tool That Best Meets Your Needs And Lifestyle • Download The Tool • Follow Instructions • Carefully Examine The Settings
  • 24. There Is Also The Tor Browser It Uses Technology That Significantly Slows Your Browsing
  • 25. PREVENTING THEFT OF YOUR DATA
  • 26. THE IMPORTANCE OF STRONG PASSWORDS CANNOT BE OVERSTATED • Never Reuse Passwords • Passwords Should Be Long, Strong and Complex • Don’t Use Obvious Terms—Address, Birthday, Children, Pets, etc. • Be Careful Where You Store Them • Use Multi-Factor Authentication Whenever Possible TOO MUCH TROUBLE, RIGHT???
  • 27. THERE IS AN ANSWER— AN EFFECTIVE PASSWORD MANAGER!
  • 28. A PASSWORD MANAGER HAS SEVERAL FUNCTIONS • Secure Way To Keep Track Of All Your Passwords • Can Build Strong Passwords For All Your Accounts • Can Automatically Sign You Into Many Accounts • Can Store Credit Card Info, Making Purchasing Online (Too?) Easy • 1Password Can Now Determine If Your Password Has Been pwned (defeated) • Again, Choose Carefully (Roberts’ Rules)
  • 30. SECURITY PROGRAM ESSENTIAL • Virus Protection • Firewall • Other Features • Parental Controls; Gaming Protection; Protect Email Against Spam, Spyware, Phishing • Most ISPs Offer Free Security Program • If You Choose Your Own, Use A Paid Program
  • 31. MOST DATA THEFT IS RESULT OF SOME TYPE OF MALWARE • “All The Bad Stuff” • Viruses And More • Good Security Program Will Get Most • A Good Anti-Malware Package Will Catch A Few More • There Are Free Versions FOR SERIOUS PROBLEMS, HAVE YOUR COMPUTER PROFESSIONALLY CLEANED.
  • 33. WHAT ABOUT THIRD-PARTY IDENTITY PROTECTION SERVICES?
  • 34. PROTECTING YOURSELF IN A CONNECTED WORLD
  • 35. Anything Connected To The Internet Is Capable of Collecting And Transmitting Data. The Questions Are ‘What Data,’ ‘What Uses?’ If It’s Free, There’s A High Probability the App/Tool is Collecting Data. This Also Applies To Advertising Supported Sites. Anything Data Stored, By Any Service, Is Susceptible To Hacking.
  • 36. ITEMS IN YOUR HOME THAT COLLECT DATA THE QUESTION IS—DO THEY STORE IT, SELL IT?
  • 37. HOW TO PROTECT YOUR ‘SMART HOME’ SYSTEM • ALWAYS Change The Default Password Of Any New Device • Update All Security Settings on Devices, Even New Ones • Be Thoughtful About The Maker Of The Product • Be Wary Of Public Wi-Fi • Study The Settings Of Your Device--Can Do, Can’t Do • Put Connected Devices on Separate Network From Computer, Phone
  • 38. Dojo By BullGuard Monitors A Home System
  • 39. • Should Be Approved By One Of FTC-Approved Watchdogs • Search Online, Especially News • Read Privacy Policy Carefully • If Third Parties Involved In Data Handling, Research Them • Connect Toys Only To Secure Wi-Fi • If It Uses Bluetooth, That Should Require PINs, Passwords • Data Transmission To Wi-Fi Should Be Encrypted • If It Can Receive Updates, Security Patches, Keep Them Updated How Old Should Children Be To Have A Toy With Such Capabilities?
  • 40. • Devices Can Not Only Listen To You, The TV, But Potentially All Conversations Within Range • Use Voice Recognition • Use A PIN With The Purchasing Function • Recordings Are Sent To Storage; Listen And Then Delete Them • Don’t Connect Speaker To Home Security - Smart Door Locks, etc. • Don’t Store Sensitive Info – Bank Account, Credit Card, etc. • Mute It When Leaving For Long Period Of Time
  • 41. SOME MORE OF ROBERTS’ RULES FOR LIVING SAFELY IN A CONNECTED WORLD
  • 42. THE ESSENTIALS • First, Think Carefully About How Connected You Want To Be • Then Think About Who You Want To Share With • Think About How Devices Can Make Your Life Safer, More Convenient, More Enjoyable • Add The Security Features That Fit Your Life NEVER MAKE TWO CHANGES TO YOUR SYSTEM AT ONCE! MAKE A CHANGE, WAIT A COUPLE OF WEEKS TO BE SURE IT’S WORKING, THEN MAKE ANOTHER CHANGE.
  • 43. THEN THINK ABOUT ADD-ONS • Be Careful About Devices That Say They’ll Solve All Problems • Don’t Believe Promises Unless They Are Backed In Writing • Do You Know And Trust The Company? • Don’t Throw Money At Unnecessary Solutions • Do Your Own Homework – Especially Before Hiring Someone Don’t Be Afraid To Call In Professional Help When Needed!
  • 44. THANK YOU! AND NOW FOR QUESTIONS!

Editor's Notes

  • #11: The SIM card/port scam
  • #13: http://www.information-age.com/10-biggest-hacks-rocked-business-world-2017-123469857/ http://www.healthcareitnews.com/slideshow/biggest-healthcare-breaches-2017-so-far?page=22
  • #29: https://arstechnica.com/information-technology/2018/02/new-tool-safely-checks-your-passwords-against-a-half-billion-pwned-passwords/
  • #32: Kaspersky
  • #38: Roomba w wifi 9 mo and up
  • #39: Smart TV can listen to conversations, but can turn that off