judy taylour's digital privacy day 2014 presentation
TRANSCRIPT
LONG BEACH COMPUTER CLUB
January 9, 2014
What is Data Privacy Day (DPD)
2
• Data Privacy Day is January 28, 2014. • DPD encourages everyone to make
protecting privacy and data a greater priority.
• It is an International effort to empower and educate people to protect their privacy and control their digital footprint.
http://www.staysafeonline.org/data-privacy-day/
Data Privacy Day
3
• So much of our lives today is electronic data.
• From Social Security to credit card to our date of birth; they are all numbers that need to be kept private.
• These numbers exist on our computers and mobile devices.
Data Privacy Day
4
• And because they are all connected to the internet, those numbers are there as well. It's not just numbers, we have contracts, wills, financial agreements, family history, photos and videos that should be kept private as well.
• This is your digital footprint.
Data Privacy Day
5
• Today's presentation is designed to give you the knowledge about those power tools.
• Many of them are free or low cost and once you set them up, they become second nature.
Data Privacy Day
6
• If you don’t take advantage of them, you will be exposed to the people who want to steal your data.
• This could lead to identity theft and other headaches.
Operating Systems & Programs / Apps
7
• The operating system (OS) is the behind-the- scene genie that makes your device work it’s magic.
• OS X, Linux, iOS, Windows and Android are all operating systems.
• From time to time, they do need patching and updating to plug security holes.
Operating Systems & Programs / Apps
8
• Today’s OS’ are set by default to prompt you when an update is available.
• You should do the update within a few days.
• If you have an OS older than 5 years, you need to seriously think about some kind of upgrade.
Operating Systems & Programs / Apps
9
• Programs & Apps are your productivity tools – Web browsers – Games – Audio / visuals tools – Calendars – Address books and more
• Many of them will prompt when updates are available.
• Some will auto-update themselves or the OS will update them for you.
Operating Systems & Programs / Apps
10
• There are programs that can help you keep your programs up-to-date– FileHippo– Secunia– Ninite
• Don’t forget Microsoft’s monthly Tuesday updates
• They need to be installed
Be a Good Online Citizen
11
• Be empowered• Control your digital footprint by
– Taking good care of your personal data– Don’t share it online
• Don’t share other’s personal data– Bcc: is Confidential– Use for all e-mail addresses
• Educate others by letting them know to use Bcc:
Don’t Forward Questionable E-mails Check Them Out
12
• http://www.snopes.com/ – Definitive Internet reference source for urban
legends, folklore, myths, rumors, and misinformation
• http://www.hoax-slayer.com/– Debunking email hoaxes and exposing
Internet scams since 2003
• http://urbanlegends.about.com/
Don’t Forward Questionable E-mails Check Them Out
13
• http://www.thatsnonsense.com/
• http://bobsullivan.net/
Make Passwords Long, Strong & Unique
14
• Secure your devices• Smartphone, Tablet, Laptop or PC• Use passwords or passphrases
– Different for each account– Include numbers, symbols and letters –
capital & lowercase
• Passphrases = multiple words that create a phrase (longer / stronger than a password)
Make Passwords Long, Strong & Unique
15
• A list of childhood pets – more=stronger– NobleR!ngoBa!leyAlexT!gerPumpk!
nJohnnyGage9
• An uncommon sentence– !Can’tBelieveIIntroducedGrantToAlice9
• Use Microsoft’s Password Checker
Make Passwords Long, Strong & Unique
16
• Is your personal memory getting full?• A different password for each account
can drive you crazy• Use a Password program to remember all
of your passwords• https://www.dashlane.com/• https://www.passwordbox.com/• https://agilebits.com/onepassword
Make Passwords Long, Strong & Unique
17
• https://lastpass.com/• http://keepass.info/• http://roboform.com
Safer Online Banking
18
• It’s convenient• But comes with certain risks• Just like people being robbed at ATMs, or
having their cards cloned, online banking can be vulnerable
• Follow these tips and you can minimize risks to your finances and bank safely online
Safer Online Banking
19
• Create a strong password• You know the drill• Minimum of 8 characters – the longer the
better• DON’T use
– Your name, initials, date of birth or anything that pertains to your relatives
Safer Online Banking
20
• If your bank asks you to provide answers to security questions, the answers don’t need to be the real ones
• Thumper really doesn’t have to be the name of your first pet
Safer Online Banking
21
• Secure your computer and keep it up-to-date
• You’ve also heard this over and over again but are you doing it
• Have a good, reliable security program• Use Malwarebytes to double check your
program – www.malwarebytes.com• Keep your operating system and other
software up-to-date
Safer Online Banking
22
• Don’t click through on a link in an e-mail from your ‘bank’
• Banks won’t get in touch • Are you really expecting a shipment from UPS
or FedEx• Phishing is the name of the game – they want
your info and if you give it your money is gone!
• Starbucks, McDonalds, etc. Wi-Fi• Banks won’t call you on the phone and ask for
info, either
Safer Online Banking
23
• Don’t access your bank account(s) via hotel, S
• Always log out of your online banking session• Always look for the "lock" icon and https:// to
be sure you have a safe connection.
• Do you have private browsing set up on your browser or smart phone?
• Set your browser to clear its cache when you shut down your computer
Safer Online Banking
24
Internet Explorer
Chrome
Safer Online Banking
25
Internet Explorer Chrome
Safer Online Banking
26
• Set up account notifications (if available)– Does a withdrawal match or exceed a
specified amount– Is your account balance below a certain
point– Alerts could give quick notice of
suspicious activity on your account– Monitor your accounts regularly– Don’t wait a whole month to discover a
discrepancy
Safer Online Banking
27
• NEVER use your debit card online• Have a credit card with a low limit OR• Have bank set up a virtual card for you to
use for online purchases• Set up two-factor authentication• It’s one of the best things you can do to
make sure your accounts don't get hacked
Safer Online Banking
28
Do you want to receive your access code via:
Cover Your Tracks
29
• Searching with Google?– Click on a link and your search term is usually
sent to that site, along with computer & browser info
– Can uniquely identify you– 3rd party ads – they can build a profile on you– That’s why those ads can follow you– Your profile can be sold– Google keeps your searches– Can be legally requested– Google can be hacked
Cover Your Tracks
30
• Browse with DuckDuckGo• Doesn’t send your searches to other sites• Or store any personal information at all
Cover Your Tracks
31
• Browse with Ixquick • It Protects Your Privacy!• Does NOT collect or share ANY personal
information!– Nada. Zilch. Nothing.
• World's most powerful search engine employing the most advanced metasearch technology
• Comprehensive …. Accurate
Cover Your Tracks
32
• Browse with blekko • Delivers high quality, curated results and
organizing content into categories– Curated = cherry picks the best content that
is important and relevant to share
• Sophisticated search technology powers suite of products – Web search engine– Mobile app– Social news platform
Cover Your Tracks
33
• Use DoNotTrackMe by Abine• Blocks companies from tracking
your browsing and helpsprotect your personal info online
• PC – Tablet – Smart Phone– Access DoNotTrackMe or any
browser or device to manage your privacy anywhere
www.abine.com
Cover Your Tracks
34
• Also by Abine• MaskMe
– Keeps you private as you browse and shop the web
– Creates and manages secure passwords
• DeleteMe – Removes your public profile, contact and
personal info, and photos of you from leading data sites
Block Those Pesky Ads
35
• AdBlock Plus• Surf the web without annoying ads!• Blocks banners, pop-ups and video ads -
even on Facebook and YouTube • Protects your online privacy
www.adblockplus.org
Block Those Pesky Ads
36
Block Those Pesky Ads with Abine
37
Mobile Devices
38
• What information does your smartphone have about you?
• Smartphones store and transmit a wide range of personal data which third parties can access–including contact lists, pictures, browsing history, certain identifying information and stored location data.
• Secure your phone with a long, strong and unique password, security software and other privacy features.
Do You Keep a Clean Device?
39
• Smartphones can be vulnerable to viruses and malware that can compromise personal information.
• Protect your phone with security software and by updating operating systems and apps.
• Avast.com • Norton.com
Think Before You Text
40
• We’ve heard this before about e-mail• Keep in mind how the message might be
read before you send it. • Be aware that texts can be forwarded.
Are You Respecting Others’ Privacy?
41
• Make sure you have someone’s permission before taking pictures or videos of them with your phone.
• What you do online has the potential to affect everyone – at home, at work and around the world.
• Practicing good online habits benefits the global digital community.
Think Before You App
42
• Own your online presence - It’s ok to limit how and with whom you share information.
• Before downloading a mobile app, understand what information (your location, access to social networks, etc.) the app accesses to function
• Many applications do not need geo-location enabled in order to provide the service.
• Opt-out of the location service feature on your phone.
Are You Savvy About Wi-Fi Hotspots?
43
• Limit the type of business you conduct on your smartphone or tablet via Wi-Fi hotspots and adjust the security settings on your device to limit who can access your machine.
• Wi-Fi hotspots are convenient but can leave you vulnerable to intrusion.
Back-it Up
44
• Store digital copies of your valuable work, music, photos and other information on an external hard drive or online cloud.
Voice Over Internet Protocol (VoIP)
45
• BEWARE!• Skype, Vonage, ooma, magicJack….• SPIT (Spam over Internet Telephony)
– Fast, cheap and invasive way for telemarketing messages to reach you
• Spoofing– Attacker pretends to be a trusted
VoIP caller, such as your bank
Voice Over Internet Protocol (VoIP)
46
• ID Theft– Cyber criminals gather bits of information
collected from your conversations
• Eavesdropping– Hackers steal VoIP features like voicemail to
get information about the user
• Vishing attacks (voice phishing) – Gain access to your personal and financial
information in identity theft schemes
Voice Over Internet Protocol (VoIP)
47
• Data sniffing – Hackers identify, modify, store and play back
your conversations
• Compromising your confidentiality– Is your phone call private and secure
• VoIP risks and safety issues continue to grow as more and more people rely on this service to make phone calls.
• Always be aware of the information you're sharing and that others may be listening in.
Social Networking
48
• Only post what you would be comfortable hanging on your front door….Abby Stokes
• DON’T share:– Phone numbers– Home address– Full date of birth– Date of graduation– Travel plans– Email address– Compromising photos
Social Networking
49
• Personal information you share online could give cyber criminals enough to piece together your email address and password, mother’s maiden name --- all that personal info we’re not supposed to share
• Don’t rely on “recommended” settings or default settings.
• Learn about the controls available and make your own decisions.
Social Networking
50
• Set the privacy and security settings to your personal comfort level for information sharing
• It's okay to limit with whom you share your information
• When you update your status with your whereabouts on a regular basis, you could tip someone off to your routine– Possible real-life threats like robberies,
break-ins or stalking
Social Networking
51
• Geotags can expose where you live, when you're traveling and even what car you drive – Could make you a target for robbery
• Most smartphones and digital cameras have a function that automatically geotags all your photos unless you turn it off
• Do you really want everyone to know the location of your newest grandchild?
Social Networking
52
• If you are in someone’s home or at their event, get their OK before sharing their private space with your social media friends
• It’s a MUST to ask them first if you plan to geotag anything
Social Networking
53
• Don’t forget that long, strong and unique password
Ransomware
54
• Two common types….• Lockscreen ransomware: displays an
image that prevents you from accessing your computer– FBI Ransomeware
• Encryption ransomware: encrypts files on your system's hard drive, preventing you from opening them– Cryptolocker
Ransomeware
55
• The terms ransomware and scareware are often used interchangeably.
• Both are schemes that attempt to make you provide a payment for something you don't want and is probably useless.
• Having a recent backup of your data, and taking your computer to a technician if it becomes affected, can mitigate the damage of such schemes.
Ransomeware
56
• Two common types….• Lockscreen ransomware: displays an
image that prevents you from accessing your computer– FBI Ransomeware
• Encryption ransomware: encrypts fileson your system's hard drive, preventing you fromopening them– Cryptolocker
Questions?