260 likes | 286 Views
Surviving the Internet. HUIT IT Security | June 6 2013. Agenda:. Introduction Surviving the Internet: I hate passwords Is social media evil? Device Security Going mobile Q & A. Breadcrumb. June 6 2013. Introduction. Citation. HUIT IT Security | Surviving the Internet. Breadcrumb.
E N D
Surviving the Internet HUIT ITSecurity | June 6 2013
Agenda: • Introduction • Surviving the Internet: • I hate passwords • Is social media evil? • Device Security • Going mobile • Q & A
Breadcrumb June 6 2013 Introduction Citation HUIT IT Security | Surviving the Internet
Breadcrumb June 6 2013 Introduction • When we use the Internet safely and are aware of how to be good Internet citizens, we help to make the Internet safer for everyone. Each and every one of us has a part to play in securing our own corner of cyberspace, as well as every device, network, and account we use. • This session will identify simple measures that everyone can take to actively protect their digital identity when using the Internet Citation HUIT IT Security | Surviving the Internet
Breadcrumb June 6 2013 The passwords we hate: • Recommend 10 characters. • Mix upper and lower case letters • Use a combination of numbers and symbols • Do not use real words, names, dates, phone numbers, sports teams, cars, addresses or personally identifiable information including anything listed in a social networking context • Unique: Separate passwords for different accounts Citation HUIT IT Security | Surviving the Internet
Breadcrumb June 6 2013 Password Example #1: • Take a familiar phrase • Substitute numbers, symbols and capitalization • Whose woods these are I think I know • First pass: initials • WwtaItIk • Second pass: substitution • WwtR?1t1n0 Citation HUIT IT Security | Surviving the Internet
Breadcrumb June 6 2013 Password Example #2: • Take a unique combination of words • Substitute numbers, symbols and capitalization • Peanut Text Sky • Substitute • Pnu7_teXt-5ky Citation HUIT IT Security | Surviving the Internet
Breadcrumb June 6 2013 • Make Password management • easier Citation HUIT IT Security | Surviving the Internet
Breadcrumb June 6 2013 • MultiFactor Citation HUIT IT Security | Surviving the Internet
Breadcrumb June 6 2013 • Is Social Media Evil? Citation HUIT IT Security | Surviving the Internet
Social Networking social networking |ˌsəʊʃlˈnetwɜːrkɪŋ| noun | the use of dedicated websites and applications to communicate informally with other users, or to find people with similar interests to oneself. Who are the big players? Facebook, Twitter, Tumblr, LinkedIn, Foursquare, Google+, Yelp Can you be secure and social? Can you/should you trust your social networking site? June 6 2013 HUIT IT Security | Surviving the Internet
Social Networking Safeguards 2 factor authentication Don’t chain credentials Always use HTTPS Sanitize your information Data is forever Change your password Don’t follow email links June 6 2013 HUIT IT Security | Surviving the Internet
Social Networking Safeguards Utilize security features Don’t post phone numbers* Don’t play games Treat chat as public information Be selective Do not post your location! June 6 2013 HUIT IT Security | Surviving the Internet
Breadcrumb June 6 2013 • Why do I have to “tame” my computer? Citation HUIT IT Security | Surviving the Internet
General Guidelines & Best Practices Password Policy Hard Drive Encryption Patch Management Anti-virus Updates Enable Firewall Backup June 6 2013 HUIT IT Security | Surviving the Internet
Window Specifics BitLocker Drive Encryption Windows Updates Software Updates Backup and Restore Windows Defender Windows Firewall June 6 2013 HUIT IT Security | Surviving the Internet
MAC OSX Specifics FileVault Software Update Time Machine iCloud Firewall June 6 2013 HUIT IT Security | Surviving the Internet
Breadcrumb June 6 2013 • Going Mobile Citation HUIT IT Security | Surviving the Internet
Breadcrumb June 6 2013 • Device protection Citation HUIT IT Security | Surviving the Internet
Breadcrumb June 6 2013 • Sync and Backup Citation HUIT IT Security | Surviving the Internet
Breadcrumb June 6 2013 • Safeguards Citation HUIT IT Security | Surviving the Internet
Breadcrumb June 6 2013 • Should the device be lost or stolen: • http://ftc.gov/idtheft Citation HUIT IT Security | Surviving the Internet
Breadcrumb June 6 2013 • If you are a victim of Identity Theft • http://ftc.gov/idtheft Citation HUIT IT Security | Surviving the Internet
Breadcrumb June 6 2013 What you can do now: • Make a backup plan • Password protect your smartphone, tablet • When traveling, leave your data at home • Register any travel plans • Minimize use of Kiosks • Do not trust wifi. Use VPN • Immediately report any lost or stolen device • Be vigilant. Stay current and be aware • security.harvard.edu/awareness Citation HUIT IT Security | Surviving the Internet
Breadcrumb June 6 2013 IT Security Contact Info • ithelp@harvard.edu • Helpdesk at x 57777 • security.harvard.edu/awareness Citation HUIT IT Security | Surviving the Internet
Thank you. HUIT IT Security| Surviving the Internet June 6, 2013