1 / 26

Surviving the Internet

Surviving the Internet. HUIT IT Security | June 6 2013. Agenda:. Introduction Surviving the Internet: I hate passwords Is social media evil? Device Security Going mobile Q & A. Breadcrumb. June 6 2013. Introduction. Citation. HUIT IT Security | Surviving the Internet. Breadcrumb.

rooseveltb
Download Presentation

Surviving the Internet

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Surviving the Internet HUIT ITSecurity | June 6 2013

  2. Agenda: • Introduction • Surviving the Internet: • I hate passwords • Is social media evil? • Device Security • Going mobile • Q & A

  3. Breadcrumb June 6 2013 Introduction Citation HUIT IT Security | Surviving the Internet

  4. Breadcrumb June 6 2013 Introduction • When we use the Internet safely and are aware of how to be good Internet citizens, we help to make the Internet safer for everyone. Each and every one of us has a part to play in securing our own corner of cyberspace, as well as every device, network, and account we use. • This session will identify simple measures that everyone can take to actively protect their digital identity when using the Internet Citation HUIT IT Security | Surviving the Internet

  5. Breadcrumb June 6 2013 The passwords we hate: • Recommend 10 characters. • Mix upper and lower case letters • Use a combination of numbers and symbols • Do not use real words, names, dates, phone numbers, sports teams, cars, addresses or personally identifiable information including anything listed in a social networking context • Unique: Separate passwords for different accounts Citation HUIT IT Security | Surviving the Internet

  6. Breadcrumb June 6 2013 Password Example #1: • Take a familiar phrase • Substitute numbers, symbols and capitalization • Whose woods these are I think I know • First pass: initials • WwtaItIk • Second pass: substitution • WwtR?1t1n0 Citation HUIT IT Security | Surviving the Internet

  7. Breadcrumb June 6 2013 Password Example #2: • Take a unique combination of words • Substitute numbers, symbols and capitalization • Peanut Text Sky • Substitute • Pnu7_teXt-5ky Citation HUIT IT Security | Surviving the Internet

  8. Breadcrumb June 6 2013 • Make Password management • easier Citation HUIT IT Security | Surviving the Internet

  9. Breadcrumb June 6 2013 • MultiFactor Citation HUIT IT Security | Surviving the Internet

  10. Breadcrumb June 6 2013 • Is Social Media Evil? Citation HUIT IT Security | Surviving the Internet

  11. Social Networking social networking |ˌsəʊʃlˈnetwɜːrkɪŋ| noun | the use of dedicated websites and applications to communicate informally with other users, or to find people with similar interests to oneself. Who are the big players? Facebook, Twitter, Tumblr, LinkedIn, Foursquare, Google+, Yelp Can you be secure and social? Can you/should you trust your social networking site? June 6 2013 HUIT IT Security | Surviving the Internet

  12. Social Networking Safeguards 2 factor authentication Don’t chain credentials Always use HTTPS Sanitize your information Data is forever Change your password Don’t follow email links June 6 2013 HUIT IT Security | Surviving the Internet

  13. Social Networking Safeguards Utilize security features Don’t post phone numbers* Don’t play games Treat chat as public information Be selective Do not post your location! June 6 2013 HUIT IT Security | Surviving the Internet

  14. Breadcrumb June 6 2013 • Why do I have to “tame” my computer? Citation HUIT IT Security | Surviving the Internet

  15. General Guidelines & Best Practices Password Policy Hard Drive Encryption Patch Management Anti-virus Updates Enable Firewall Backup June 6 2013 HUIT IT Security | Surviving the Internet

  16. Window Specifics BitLocker Drive Encryption Windows Updates Software Updates Backup and Restore Windows Defender Windows Firewall June 6 2013 HUIT IT Security | Surviving the Internet

  17. MAC OSX Specifics FileVault Software Update Time Machine iCloud Firewall June 6 2013 HUIT IT Security | Surviving the Internet

  18. Breadcrumb June 6 2013 • Going Mobile Citation HUIT IT Security | Surviving the Internet

  19. Breadcrumb June 6 2013 • Device protection Citation HUIT IT Security | Surviving the Internet

  20. Breadcrumb June 6 2013 • Sync and Backup Citation HUIT IT Security | Surviving the Internet

  21. Breadcrumb June 6 2013 • Safeguards Citation HUIT IT Security | Surviving the Internet

  22. Breadcrumb June 6 2013 • Should the device be lost or stolen: • http://ftc.gov/idtheft Citation HUIT IT Security | Surviving the Internet

  23. Breadcrumb June 6 2013 • If you are a victim of Identity Theft • http://ftc.gov/idtheft Citation HUIT IT Security | Surviving the Internet

  24. Breadcrumb June 6 2013 What you can do now: • Make a backup plan • Password protect your smartphone, tablet • When traveling, leave your data at home • Register any travel plans • Minimize use of Kiosks • Do not trust wifi. Use VPN • Immediately report any lost or stolen device • Be vigilant. Stay current and be aware • security.harvard.edu/awareness Citation HUIT IT Security | Surviving the Internet

  25. Breadcrumb June 6 2013 IT Security Contact Info • ithelp@harvard.edu • Helpdesk at x 57777 • security.harvard.edu/awareness Citation HUIT IT Security | Surviving the Internet

  26. Thank you. HUIT IT Security| Surviving the Internet June 6, 2013

More Related