Category Archives: Privacy

  • 1

Digital Self Defense for Incoming Students at RIT Presentation

Category:Higher Education,Information Security,Infosec Communicator,Internet Safety,Presentations,Privacy,Risk,Social Networking Tags : 

We had a great time presenting to our 2800-person incoming class at the Rochester Institute of Technology. Here’s the YouTube video of the five presentations (Hannah Morgan, Dawn Soufleris, Nick Francesco, Jon Maurer, and Ben Woelk) aptly emcee’d by Chris Tarantino.

Click on the screenshot to watch the show!

Enhanced by Zemanta

  • 0

Save the date! Bulletproofing Your Career Online live webinar 8/2, 4-5 pm EDT

Category:Cyberstalking,Facebook,Information Security,Infosec Communicator,Internet Safety,Presentations,Privacy,Risk,Social Networking,STC,Summit,techcomm Tags : 

Hannah Morgan and I will be presenting Bulletproofing Your Career Online as an STC webinar on Thursday, 2 August | 4:00–5:00 PM EDT (GMT-4)

What are the 10 key steps to building and securing your online reputation? A security professional and a career sherpa provide their perspectives on how to create an online presence that enhances and promotes your career safely and effectively.

Register at https://www.stc.org/education/online-education/live-seminars/item/bulletproofing-your-career-online?category_id=53

Is it worth attending? Of course!

Here’s the feedback we received from our in-person presentation delivered at the STC Summit in May:

Ratings

Note: The evaluation scale ranged from 1 (poor) to 5 (excellent).
Overall Evaluations Received: 15
Content:  4.07
Delivery: 4.07
Value: 4.27
Overall rating: 4.14

Selected comments:

  • Ben was a good speaker with great knowledge about his topic. He and Hannah played well off each other, tackling related topics and bouncing off one another’s words.
  • Even if you think you’ve heard it all before, this presentation gave more insight and more information that was very beneficial
  • We could do have more of this type of thing. I think it’ll be a valuable (and increasingly so) job skill.
  • It was superb.
  • The delivery and content were a nice mixture of internet security and managing your online profile. The format worked well with the presenters taking turns. It made the session more lively.

  • 0

InformationWeek Mobile Edition – 9 Tips To Block Hotel Wi-Fi Malware

Category:Information Security,Infosec Communicator,Internet Safety,Privacy,Risk,Uncategorized Tags : 
Wi-Fi Signal logo

Wi-Fi Signal logo (Photo credit: Wikipedia)

We often take for granted (or don’t even think about) the security of hotel Wi-Fi as we travel. For most of us, the convenience outweighs the risk.

There are steps we can take to keep our computers and data safer. The folks at Information Week have published a nifty little article, “9 Tips To Block Hotel Wi-Fi Malware.” Although the article is primarily concerned with travel abroad, we should take precautions anytime we use public WiFi.

https://mobile.informationweek.com/80256/show/bb98402bac1b00a55fac7ba9aa41550e/

Enhanced by Zemanta

  • 1

  • 3

Top Ten Tips for Safe(r) Social Networking

Category:Information Security,Infosec Communicator,Internet Safety,Privacy,Social Networking,Uncategorized Tags : 

No lifeguard on dutyDid you know you’re a target every time you go online? Did you know that cyber criminals are targeting social networking sites? Do you know how to recognize a phishing attempt? Following these tips will help make your use of social networking sites safer. (Unfortunately, there’s no way to guarantee that you can use them safely.)

Tip #1: Use strong passwords/passphrases.

It’s important to use strong passwords because automated “cracking” programs can break weak passwords in minutes. At a minimum, you should use 8 characters (preferably 15 or more), mixing upper and lower case letters and numbers. Many websites also allow the use of longer passwords and special characters. Incorporating special characters into your password will make them more difficult to crack. You’ll also want to use different passwords on different accounts. Using a password safe such as LastPass will help you manage these passwords by generating strong passwords and then supplying them when needed.

Tip #2: Keep up to date.

Attackers take advantage of vulnerabilities in software to place malware on your computers. Keeping up to date with patches/updates helps thwart attackers from using “exploits” to attack known vulnerabilities. It’s important to keep both your Operating System (Windows, Mac OS, linux, etc.) and your applications (Microsoft Office, Adobe, QuickTime) patched.

Tip #3: Use security software.

It’s a good practice to follow the requirements of the RIT Desktop and Portable Computer Security Standard on personally-owned computers. Among other elements, the standard requires use of a firewall, antivirus, and anti-spyware programs. Many security suites contain all of the elements needed to protect your computer. (Your Internet Service Provider may also provide security software.)

Tip #4: Learn to recognize phishing attacks.

You’ve all seen phishing attacks. They’re typically emails that appear to come from a financial institution that ask you to verify information by providing your username and password. Never respond to these requests. Your financial institution should not need your password.

Tip #5: Think before you post.

Don’t post personal information (contact info, class schedule, residence, etc.) A talented hacker can see this, even if you’ve restricted your privacy settings! Don’t post potentially embarrassing or compromising photos. Be aware of what photos you’re being “tagged” in—don’t hesitate to ask others to remove photographs of you from their pages.

Tip #6: Remember who else is online.

Did you know that most employers “Google” prospective employees? Have you seen the stories of people’s homes being burglarized because they’ve posted their vacation plans online? Many people other than your friends use these sites.

Tip #7: Be wary of others.

You can’t really tell who’s using a social network account. If you use Facebook, you’ve certainly seen posts by your “friends” whose accounts have been compromised. Don’t feel like you have to accept every friend request, especially if you don’t know the person.

Tip #8: Search for your name.

Have you ever done a “vanity search?” Put your name in a search engine and see what it finds. Did you know that Google allows you to set up an Alert that will monitor when your name appears online? Setting this up with daily notifications will help you see where your name appears.

Tip #9: Guard your personal information.

Identity thieves can put together information you share to develop a profile to help them impersonate you. Be especially careful of Facebook applications. They may collect information that they sell to marketing companies or their databases could be compromised. Do they really need the information they’re requesting?

Tip #10: Use privacy settings.

Default settings in most social networks are set to sharing all information. Adjust the social network’s privacy settings to help protect your identity. Show “limited friends” a cut-down version of your profile. Choose the strongest privacy settings and then “open” them only if needed.

Enhanced by ZemantaAdd me to your circle on Google+

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 2,235 other subscribers

Categories

Support Introverted Leadership on Patreon

Blubrry affiliate banner