internet security with jake labs by jake labs. press, joseph pisani the associated. "5 ways to...

9
Internet Security With Jake Labs By Jake Labs

Upload: leo-booth

Post on 27-Dec-2015

215 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Internet Security With Jake Labs By Jake Labs. Press, Joseph Pisani The Associated. "5 Ways to Protect Yourself from Data Breaches." USA Today. Gannett,

Internet Security With

Jake Labs

By Jake Labs

Page 2: Internet Security With Jake Labs By Jake Labs. Press, Joseph Pisani The Associated. "5 Ways to Protect Yourself from Data Breaches." USA Today. Gannett,

Press, Joseph Pisani The Associated. "5 Ways to Protect Yourself from Data Breaches." USA Today. Gannett, 21 Sept. 2014. Web. 29 Sept. 2014.

• Here are five ways to protect yourself:• 1. CONSIDER ANOTHER WAY TO PAY• Try newer ways to pay, such as PayPal or Apple Pay. "Any technology that avoids you having your credit card in your hand in a

store is safer," says Craig Young, security researcher for software maker Tripwire. Those services store your credit card information and it's not given to the retailer when you make a payment. Many big retailers, including Home Depot, accept PayPal at their stores, but many others don't. Apple Pay, which was only introduced this month, has even more limitations: It is available in just a small number of stores so far and only people with an iPhone 6 can use it.

• Stored-value cards or apps, such as the ones used at coffee chains Starbucks and Dunkin Donuts, are also a safer bet, says Gartner security analyst Avivah Litan. That's because they don't expose credit card information at the register.

• 2. SIGN IT, DON'T PIN IT• If you're planning on paying with a debit card, sign for your purchase instead of typing in your personal identification number at the

cash register. You can do this by asking the cashier to process the card as a credit card or select credit card on the display. Not entering you PIN into a keypad will help reduce the chances of a hacker stealing that number too, Young says. Crooks can do more damage with your PIN, possibly printing a copy of the card and taking money out of an ATM, he says. During Target's breach last year, the discount retailer said hackers gained access to customers' PINs. Home Depot, however, said there was no indication that PINs were compromised in the breach at its stores.

• 3. BEWARE OF EMAIL SCAMMERS• After big data breaches are exposed, and get a lot of media attention, scammers come out of the woodwork looking to steal

personal information. Some emails may mention Home Depot or offer free credit monitoring, but you should never click on the links. Many are for fake sites that try to steal bank information or passwords. "Avoid these entirely," Young says. If an email looks credible, go to Home Depot's site directly instead of clicking on links.

• 4. KEEP UP WITH STATEMENTS• Scan credit card statements every month for any unauthorized charges. And keep an eye out for smaller charges. Thieves will

charge smaller amounts to test to see if you notice and then charge a larger amount later, Litan says. They may also steal a small amount from millions of accounts, scoring a big payday, she says.

• And check your credit report for any accounts that crooks may have opened in your name. Credit reports are available for free, from each of the three national credit reporting agencies — Equifax, Experian and TransUnion — every 12 months from AnnualCreditReport.com. Home Depot is also offering free credit monitoring and identity protection services to customers. Customers can go to the company's website for more information or call them at 800-466-3337.

• 5. GO OLD SCHOOL• Use cash. When possible, the safest bet is to not swipe a card at all. Even if security gets stronger at stores, hackers are likely to

figure out a way around it. "It's always a cat and mouse game," Young says.

Page 3: Internet Security With Jake Labs By Jake Labs. Press, Joseph Pisani The Associated. "5 Ways to Protect Yourself from Data Breaches." USA Today. Gannett,

"The Impact of Internet of Things on Enterprise Security." The Privacy Post RSS. N.p., n.d. Web. 29 Sept. 2014.

• Data tracking: as phones ,tablets, or any other mobile device with sensors on them advance the risk of being tracked by companies also increases. They can monitor what you are doing (creepy) and do stuff you don’t like. Similarly, if a hacker takes control of any connected devices, they can gain access to a ton of personal information. The more information attackers have in their hands, the more powerful they become.

Page 4: Internet Security With Jake Labs By Jake Labs. Press, Joseph Pisani The Associated. "5 Ways to Protect Yourself from Data Breaches." USA Today. Gannett,

The Impact of Internet of Things on Enterprise Security."

The Privacy Post RSS. N.p., n.d. Web. 29 Sept. 2014.• The collection and sharing of personal data with third parties:• Another risk with ioT is that consumer data can be accessed through 3rd

party vendors. Even if you agree to share your data explicitly with a company there could be a chance that your data could be merged with ioT data that the same company secure from a 3rd party. As a result, your data will be accessed by third parties, and used for advertising purposes.

Page 5: Internet Security With Jake Labs By Jake Labs. Press, Joseph Pisani The Associated. "5 Ways to Protect Yourself from Data Breaches." USA Today. Gannett,

The Impact of Internet of Things on Enterprise Security." The

Privacy Post RSS. N.p., n.d. Web. 29 Sept. 2014.• Lack of security controls: a wide verity of those devices will have very little

protection and more prone to cyber raids (attack). Some of the technologies that IT systems are accustomed with, like operating systems, firmware, and patches will not be available on these devices. ioT devices lack anti-malware and anti-virus protection, and don’t have IT teams to monitor and track security issues. In the results new attacks might evolve to compromise the individual device or gain access to the enterprise network.

Page 6: Internet Security With Jake Labs By Jake Labs. Press, Joseph Pisani The Associated. "5 Ways to Protect Yourself from Data Breaches." USA Today. Gannett,

The Impact of Internet of Things on Enterprise Security." The

Privacy Post RSS. N.p., n.d. Web. 29 Sept. 2014.• Security risks to the enterprise network: no matter what networks

segmentation strategy an enterprise might establish, security gaps are in there in ioT that allow ioT to intersect with enterprise network. These points of intersection will be highly vulnerable to attack.

Page 7: Internet Security With Jake Labs By Jake Labs. Press, Joseph Pisani The Associated. "5 Ways to Protect Yourself from Data Breaches." USA Today. Gannett,

Its not all that bad

• IoT has a lot of positive potential for businesses and there is no reason to hold back from moving in this direction. However the challenge is for consumer electronics corporations to provide smart, connected, and secure appliances that simplify the user’s life, while not compromising on the security of such devices.

Page 8: Internet Security With Jake Labs By Jake Labs. Press, Joseph Pisani The Associated. "5 Ways to Protect Yourself from Data Breaches." USA Today. Gannett,

Some examples of networks The 25 Most Powerful Enterprise Networking Companies."

Network World. N.p., n.d. Web. 30 Sept. 2014.

• SPIDER OAK BLUE• CISCO• IBM• AT&T• MICROSOFT• HP• DELL• INTEL• EMC• VERIZON• SYMANTEC• APPLE• MCAFEE• CITRIX• GOOGLE

Page 9: Internet Security With Jake Labs By Jake Labs. Press, Joseph Pisani The Associated. "5 Ways to Protect Yourself from Data Breaches." USA Today. Gannett,

Credit Cards/Debit Cards

• Credit/Debit cards don’t even get me started on those pieces of recyclable plastic terror things all they do is cause more bills and other problems you don’t want to have. Problems like if you drop it you have to spend like 5 years just trying to cancel it with your bank and god knows how long that takes. They also cause bills that you have to pay for more credit and stuff. Another thing they are easy to break, you bend them hard enough you will break them. Security on those things is dumb cause you drop it or something somebody can look at the card and say “sweet free money and much more”. So yeah these horror movie cards and a half are a terror so never use them. One more thing these things are a menace to society causing bankruptcy and more. They may buy stuff you need but just go with old school cold hard cash they don’t cause security issue and causes no bills just pays them. Also people with these horror shows have to monitor there accounts or cause if someone has your card and your to lazy to cancel it then you need to monitor your account or else someone might mess up your account so bad that you might go to jail cause who knows someone with your card may be a drug dealer or something illegal you never know unless someone or you are monitoring your account.