SlideShare a Scribd company logo
TLS 1.2 Internet Security Protocol: What it Means & Why You Should Give a ¢®@ϸ
Written by . . .
Lawri Williamson,
Communications &
Brand Manager
Nugget Williamson
If we’re to believe Hollywood,
hackersare really good guys
who haven’t gotten a fair shake. . . .
. . . brooding,
misunderstood
saviors of the
universe . . .
. . . or all-American kids who just
want good grades without the hassle
of studying.
Unfortunately, it’s a little
more serious than that.
High-profile data breaches are
becoming increasingly common
According to
IBM, the average
consolidated cost
of a data breach
is now $3.8 million.
So, if hackers are the bad guys ― the
ones creating the nightmares . . .
. . . who are the good guys ― the ones
working to protect us?
The National Institute of Standards and
Technology (NIST) is the U.S. government
organization that sets the standards for
Internet security.
In 2014, the NIST advised
government entities to
upgrade to the latest
approved security
protocol . . .
TLS 1.2 Internet Security Protocol: What it Means & Why You Should Give a ¢®@ϸ
(This latest version of TLS was released
in August 2008, just in time for
Madonna’s 50th.
Coincidence?
Or well-timed gift from a
super-fan/developer?)
But the Internet
doesn’t have a big
“master switch,” so
every site owner
has to take care
of the upgrade
for themselves.
And, since site owners are people,
some are more quick to act on
information like this than others.
Companies that deal with a lot
of sensitive information have
been among the first to make
the switch.
If you haven’t upgraded your
browser, you’re going to have
trouble accessing those sites.
Pretend this is you:
If you’re still using IE6, and you want to update
your Facebook status . . .
Instead of ending up here
when you go to Facebook: You’ll end up here:
And you’ll look like this:
To Avoid This Problem:
Check to see what your
current browser
supports by going to
How’s My SSL
To Avoid This Problem:
If your browser doesn’t
support at least TLS 1.0,
you’ll need to upgrade
your browser, or change
to one that does
If You’re the Site Owner:
Go to the CASC SSL Configuration Checker.
Your site will receive a letter grade indicating
that it
 supports TLS 1.2 (that’s an A),
 only supports SSL 2 (that’s a big F), or
 falls somewhere in the middle.
Review
 Hackers = bad
 NIST = good
 NIST says to upgrade to TLS
with AES 256-bit encryption
 Do what NIST says
Review
For additional information, see the
full blog post on this topic at
AppointmentPlus.com
Learn About
Enterprise Scheduling Software
800.988.0061
Talk with one of our experts today!
800.988.0061
AppointmentPlus.com
©2015 StormSource, LLC, d.b.a. AppointmentPlus. All rights reserved. AppointmentPlus
and the AppointmentPlus logo are marks of StormSource, LLC.

More Related Content

PPTX
Staying Safe, Having Fun, And Cruising The ‘Net
PDF
10 most important cyber security tips for your users
PPTX
Online privacy
PPTX
20 thought provoking quotes from famous cybersecurity experts
PPTX
Mac Kenzi D. Group#3
PPTX
Computer SOS
PPT
Infosec 4 The Home
PPT
[PPT] Webinar on Cyber Safety Training for Young Students
Staying Safe, Having Fun, And Cruising The ‘Net
10 most important cyber security tips for your users
Online privacy
20 thought provoking quotes from famous cybersecurity experts
Mac Kenzi D. Group#3
Computer SOS
Infosec 4 The Home
[PPT] Webinar on Cyber Safety Training for Young Students

Viewers also liked (20)

PDF
Advanced Recurring Contract Billing
PPTX
eLearning Development
PDF
White-paper : SaaS Application Development & Delivery using Alice
PDF
Stamplay 101
PPTX
Customized Scrum
PPSX
4 habilidades de un líder
PDF
The ABCs of Security Awareness and Training
PDF
Real Estate Projects - NetBiz
PPTX
Navantis & Microsoft "Find Your Silver Lining in the Cloud" Event Slidedeck
PDF
Production management software_to_the_rescue
PDF
The 411 on phone interviews
PPTX
Accolo - Turn your company into a hiring machine - 3-22-12 - John Younger
PDF
Accounts Payable Automation – Is it right for you?
PPTX
Neuroscience & Talent Development Webinar: How To Foster Organizational Trust...
PPT
Cloud Computing - What is it?
PDF
16th ALUMNI LEADERSHIP MASTERCLASS
ODP
How To Choose A Coffee Table
PPTX
Sharepoint - turn on or turn off?
Advanced Recurring Contract Billing
eLearning Development
White-paper : SaaS Application Development & Delivery using Alice
Stamplay 101
Customized Scrum
4 habilidades de un líder
The ABCs of Security Awareness and Training
Real Estate Projects - NetBiz
Navantis & Microsoft "Find Your Silver Lining in the Cloud" Event Slidedeck
Production management software_to_the_rescue
The 411 on phone interviews
Accolo - Turn your company into a hiring machine - 3-22-12 - John Younger
Accounts Payable Automation – Is it right for you?
Neuroscience & Talent Development Webinar: How To Foster Organizational Trust...
Cloud Computing - What is it?
16th ALUMNI LEADERSHIP MASTERCLASS
How To Choose A Coffee Table
Sharepoint - turn on or turn off?
Ad

Similar to TLS 1.2 Internet Security Protocol: What it Means & Why You Should Give a ¢®@ϸ (20)

PDF
Introduction to Information Security
PPTX
Why do women love chasing down bad guys?
PPT
Dmk bo2 k8_ccc
PDF
Webinar - How and Why Your Library Should Move to HTTPS 2018-07-17
PPTX
PPTX
Dmk sb2010 web_defense
PPTX
Cyber Security Seminar
PPTX
Confidence web
PPTX
Ledingkart Meetup #3: Security Basics for Developers
PDF
The SSL Problem and How to Deploy SHA2 Certificates
PPTX
Linux confau 2019: Web Security 2019
PPT
Corporate Presentations.ppt for Governan
PPT
College Presentations.ppt for the Govern
PPT
Secure by design and secure software development
PDF
Security Theatre - AmsterdamPHP
PDF
The 10 Secret Codes of Security
PPT
Security
PPTX
Alice in warningland: A Large Scale Study of Browser Security Warnings
PPTX
Red vs. Blue Why we’ve been getting it wrong for 25 years
PPT
Quant & Crypto Gold
Introduction to Information Security
Why do women love chasing down bad guys?
Dmk bo2 k8_ccc
Webinar - How and Why Your Library Should Move to HTTPS 2018-07-17
Dmk sb2010 web_defense
Cyber Security Seminar
Confidence web
Ledingkart Meetup #3: Security Basics for Developers
The SSL Problem and How to Deploy SHA2 Certificates
Linux confau 2019: Web Security 2019
Corporate Presentations.ppt for Governan
College Presentations.ppt for the Govern
Secure by design and secure software development
Security Theatre - AmsterdamPHP
The 10 Secret Codes of Security
Security
Alice in warningland: A Large Scale Study of Browser Security Warnings
Red vs. Blue Why we’ve been getting it wrong for 25 years
Quant & Crypto Gold
Ad

Recently uploaded (20)

PDF
The New Creative Director: How AI Tools for Social Media Content Creation Are...
PPT
tcp ip networks nd ip layering assotred slides
PPTX
Introuction about WHO-FIC in ICD-10.pptx
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PDF
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
PDF
Cloud-Scale Log Monitoring _ Datadog.pdf
PPTX
presentation_pfe-universite-molay-seltan.pptx
PPTX
PptxGenJS_Demo_Chart_20250317130215833.pptx
PPTX
artificialintelligenceai1-copy-210604123353.pptx
PPTX
international classification of diseases ICD-10 review PPT.pptx
PPTX
Power Point - Lesson 3_2.pptx grad school presentation
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PDF
Introduction to the IoT system, how the IoT system works
PPTX
Slides PPTX World Game (s) Eco Economic Epochs.pptx
PDF
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
PDF
An introduction to the IFRS (ISSB) Stndards.pdf
PDF
WebRTC in SignalWire - troubleshooting media negotiation
PPTX
SAP Ariba Sourcing PPT for learning material
PPTX
Module 1 - Cyber Law and Ethics 101.pptx
PDF
Smart Home Technology for Health Monitoring (www.kiu.ac.ug)
The New Creative Director: How AI Tools for Social Media Content Creation Are...
tcp ip networks nd ip layering assotred slides
Introuction about WHO-FIC in ICD-10.pptx
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
Cloud-Scale Log Monitoring _ Datadog.pdf
presentation_pfe-universite-molay-seltan.pptx
PptxGenJS_Demo_Chart_20250317130215833.pptx
artificialintelligenceai1-copy-210604123353.pptx
international classification of diseases ICD-10 review PPT.pptx
Power Point - Lesson 3_2.pptx grad school presentation
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
Introduction to the IoT system, how the IoT system works
Slides PPTX World Game (s) Eco Economic Epochs.pptx
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
An introduction to the IFRS (ISSB) Stndards.pdf
WebRTC in SignalWire - troubleshooting media negotiation
SAP Ariba Sourcing PPT for learning material
Module 1 - Cyber Law and Ethics 101.pptx
Smart Home Technology for Health Monitoring (www.kiu.ac.ug)

TLS 1.2 Internet Security Protocol: What it Means & Why You Should Give a ¢®@ϸ

  • 2. Written by . . . Lawri Williamson, Communications & Brand Manager Nugget Williamson
  • 3. If we’re to believe Hollywood, hackersare really good guys who haven’t gotten a fair shake. . . .
  • 4. . . . brooding, misunderstood saviors of the universe . . .
  • 5. . . . or all-American kids who just want good grades without the hassle of studying.
  • 6. Unfortunately, it’s a little more serious than that.
  • 7. High-profile data breaches are becoming increasingly common
  • 8. According to IBM, the average consolidated cost of a data breach is now $3.8 million.
  • 9. So, if hackers are the bad guys ― the ones creating the nightmares . . .
  • 10. . . . who are the good guys ― the ones working to protect us?
  • 11. The National Institute of Standards and Technology (NIST) is the U.S. government organization that sets the standards for Internet security.
  • 12. In 2014, the NIST advised government entities to upgrade to the latest approved security protocol . . .
  • 14. (This latest version of TLS was released in August 2008, just in time for Madonna’s 50th. Coincidence? Or well-timed gift from a super-fan/developer?)
  • 15. But the Internet doesn’t have a big “master switch,” so every site owner has to take care of the upgrade for themselves.
  • 16. And, since site owners are people, some are more quick to act on information like this than others.
  • 17. Companies that deal with a lot of sensitive information have been among the first to make the switch.
  • 18. If you haven’t upgraded your browser, you’re going to have trouble accessing those sites. Pretend this is you: If you’re still using IE6, and you want to update your Facebook status . . .
  • 19. Instead of ending up here when you go to Facebook: You’ll end up here: And you’ll look like this:
  • 20. To Avoid This Problem: Check to see what your current browser supports by going to How’s My SSL
  • 21. To Avoid This Problem: If your browser doesn’t support at least TLS 1.0, you’ll need to upgrade your browser, or change to one that does
  • 22. If You’re the Site Owner: Go to the CASC SSL Configuration Checker. Your site will receive a letter grade indicating that it  supports TLS 1.2 (that’s an A),  only supports SSL 2 (that’s a big F), or  falls somewhere in the middle.
  • 23. Review  Hackers = bad  NIST = good  NIST says to upgrade to TLS with AES 256-bit encryption  Do what NIST says
  • 24. Review For additional information, see the full blog post on this topic at AppointmentPlus.com
  • 25. Learn About Enterprise Scheduling Software 800.988.0061 Talk with one of our experts today!
  • 26. 800.988.0061 AppointmentPlus.com ©2015 StormSource, LLC, d.b.a. AppointmentPlus. All rights reserved. AppointmentPlus and the AppointmentPlus logo are marks of StormSource, LLC.