Cybersecurity Best Practices - Think Smart · within the mobile app however some may differ. Most...

Post on 10-Jun-2020

0 views 0 download

Transcript of Cybersecurity Best Practices - Think Smart · within the mobile app however some may differ. Most...

Cybersecurity Best Practices

Presenter:

Simon RagonaDirector, Data ForensicsT&M Protection Resources, LLCTechnology Risk

Cybersecurity Best Practices

Review settings frequently as they change often

Cybersecurity Best Practices:

Facebook

Review settings frequently as they change often

Login AlertsNotifications if your account is logged into

Login ApprovalsUnknown browsers require a security code to login

Recognized DevicesLists trusted browsers and apps

Who can see my stuff?

Who can contact me?

Who can look me up?Do you want search engines outside of Facebook to link to your profile?

Who can add things to my timeline?

Who can see things on my timeline?

How can I manage tags people add and tagging suggestions?

BlockingBlock users or content

NotificationsGet alerts when there is activity on your account

FollowersWho can see your Timeline content

AppsReview to identify apps you’ve

logged into using Facebook

AdsSettings that allow you to block

advertisements

https://www.facebook.com/invite_history.phpDELETE ALL! (Contacts you’ve uploaded to Facebook)

https://www.facebook.com/mobile/messenger/contacts/DELETE ALL! (Contacts you’ve uploaded from Messenger)

https://www.facebook.com/help/838237596230667DISABLE! (Messenger settings for syncing contacts)

Important Links

Facebook Settings to Review

Security• Login Alerts, Login Approvals,

Recognized Devices

Privacy• Who can see my stuff?• Who can contact me?• Who can look me up?

Blocking

Notifications

Followers

Apps

Ads

Timeline and Tagging• Who can add things to my timeline?• Who can see things on my timeline?• How can I manage tags people add

and tagging suggestions?

Most settings via web are available within the mobile

app however some may differ

Most settings via web are available within the mobile

app however some may differ

Code GeneratorTwo-factor

authentication

LocationDisable via your phone’s

settings menu

LocationDisable via your phone’s

settings menu

Nearby FriendsUses your phone’s GPS to

show you where your friends are and show your

friends where YOU are!

Place TipsUses your phone’s GPS to

give you information about places you visit!

Location HistoryAllows Facebook to log

everywhere you go!

Facebook MessengerSettings are different

from Facebook website and mobile app

Facebook MessengerSettings are different

from Facebook website and mobile app

Facebook Messenger

Disable “Sync Contacts”Similar to other social media

platforms, this is how Facebook makes friend suggestions

Facebook App & Messenger Settings to Review

Location• Nearby Friends

• Place Tips• Location History

Messenger• Disable “Sync

Contacts”

App

Code Generator

Cybersecurity Best Practices

Review settings frequently as they change often

Cybersecurity Best Practices:

Linkedin

Review settings frequently as they change often

Confirm “Where you’re signed in”

Confirm “Third party apps”

Review Public Profile settings

Determine which“Profile viewing options”

are appropriate

Suggests you as a connection based on email address or phone number

Shares data with third parties

Two-step verificationAlways a good idea!

Be smart about what information needs to

be in your profile

Linkedin Settings to Review

Basics• Where you’re signed in

Third Parties• Confirm “Third Party Apps”

Profile Privacy• Public profile settings

• Profile viewing options

Data Privacy and Advertising• Suggesting

connections• Sharing data with

third parties

Security• Two-step verification

Most settings via web are

available within the mobile app

3 Important settings to review

1. Sync contacts

3 Important settings to review

1. Sync contacts2. Sync calendar

3 Important settings to review

1. Sync contacts2. Sync calendar3. Using public data to

improve your profile

Be careful you don’t accidentally sync your contacts when you first open the app!

Cybersecurity Best Practices

Cybersecurity Best Practices:

Other Social Media

Ensure you are running the latest version

Latest App Releases

Social Media Investigations

Use an independent computer system, virtual machine, or USB Apply latest security updates and enable anti-virus

Use a separate Internet connection, if possible i.e. VZW prepaid MiFi

Connect through a VPN i.e. Private Internet Access, TotalVPN, Hide My Ass

Create and maintain separate accounts Dedicated email accounts Established social media accounts

Utilize browser add-ons for enhanced capabilities

Overview of T&M’s Technology Risk Division

Cyber Incident

Response

Incident Response Readiness Assessment

DataForensics

Recovery and Examination of Formatted Hard Drives

Recovery of Text Messages and Other Communications

InformationSecurity

Voice over IP (VoIP) Security Assurance

Secure Mobile Computing

Security Training Programs (awareness, executive and

corporate governance)

ComplianceTechnologyConsulting

T&M Technology Risk Competitive Advantage

T&M Technology Risk Competitive Advantage

Custom-fitting solutions

T&M Technology Risk Competitive Advantage

Custom-fitting solutions

Proprietary technology

T&M Technology Risk Competitive Advantage

Custom-fitting solutions

Proprietary technology

Consultative, hands-on approach

T&M Technology Risk Competitive Advantage

Custom-fitting solutions

Proprietary technology

Consultative, hands-on approach

Unparalleled category expertise

Q&A

SRagona@tmprotection.com908.534.1501 TMProtection.com

Contact Info

https://www.facebook.com/tandmprotection

Social Info

https://twitter.com/tmprotection https://www.linkedin.com/company/836419