Judy Taylour's Digital Privacy Day 2014 Presentation

57
LONG BEACH COMPUTER CLUB January 9, 2014

Transcript of Judy Taylour's Digital Privacy Day 2014 Presentation

Page 1: Judy Taylour's Digital Privacy Day 2014 Presentation

LONG BEACH COMPUTER CLUB

January 9, 2014

Page 2: Judy Taylour's Digital Privacy Day 2014 Presentation

What is Data Privacy Day (DPD)

2

• Data Privacy Day is January 28, 2014. • DPD encourages everyone to make

protecting privacy and data a greater priority.

• It is an International effort to empower and educate people to protect their privacy and control their digital footprint.

http://www.staysafeonline.org/data-privacy-day/

Page 3: Judy Taylour's Digital Privacy Day 2014 Presentation

Data Privacy Day

3

• So much of our lives today is electronic data.

• From Social Security to credit card to our date of birth; they are all numbers that need to be kept private.

• These numbers exist on our computers and mobile devices.

Page 4: Judy Taylour's Digital Privacy Day 2014 Presentation

Data Privacy Day

4

• And because they are all connected to the internet, those numbers are there as well. It's not just numbers, we have contracts, wills, financial agreements, family history, photos and videos that should be kept private as well.

• This is your digital footprint.

Page 5: Judy Taylour's Digital Privacy Day 2014 Presentation

Data Privacy Day

5

• Today's presentation is designed to give you the knowledge about those power tools.

• Many of them are free or low cost and once you set them up, they become second nature.

Page 6: Judy Taylour's Digital Privacy Day 2014 Presentation

Data Privacy Day

6

• If you don’t take advantage of them, you will be exposed to the people who want to steal your data.

• This could lead to identity theft and other headaches.

Page 7: Judy Taylour's Digital Privacy Day 2014 Presentation

Operating Systems & Programs / Apps

7

• The operating system (OS) is the behind-the- scene genie that makes your device work it’s magic.

• OS X, Linux, iOS, Windows and Android are all operating systems.

• From time to time, they do need patching and updating to plug security holes.

Page 8: Judy Taylour's Digital Privacy Day 2014 Presentation

Operating Systems & Programs / Apps

8

• Today’s OS’ are set by default to prompt you when an update is available.

• You should do the update within a few days.

• If you have an OS older than 5 years, you need to seriously think about some kind of upgrade.

Page 9: Judy Taylour's Digital Privacy Day 2014 Presentation

Operating Systems & Programs / Apps

9

• Programs & Apps are your productivity tools – Web browsers – Games – Audio / visuals tools – Calendars – Address books and more

• Many of them will prompt when updates are available.

• Some will auto-update themselves or the OS will update them for you.

Page 10: Judy Taylour's Digital Privacy Day 2014 Presentation

Operating Systems & Programs / Apps

10

• There are programs that can help you keep your programs up-to-date– FileHippo– Secunia– Ninite

• Don’t forget Microsoft’s monthly Tuesday updates

• They need to be installed

Page 11: Judy Taylour's Digital Privacy Day 2014 Presentation

Be a Good Online Citizen

11

• Be empowered• Control your digital footprint by

– Taking good care of your personal data– Don’t share it online

• Don’t share other’s personal data– Bcc: is Confidential– Use for all e-mail addresses

• Educate others by letting them know to use Bcc:

Page 12: Judy Taylour's Digital Privacy Day 2014 Presentation

Don’t Forward Questionable E-mails Check Them Out

12

• http://www.snopes.com/ – Definitive Internet reference source for urban

legends, folklore, myths, rumors, and misinformation

• http://www.hoax-slayer.com/– Debunking email hoaxes and exposing

Internet scams since 2003

• http://urbanlegends.about.com/

Page 13: Judy Taylour's Digital Privacy Day 2014 Presentation

Don’t Forward Questionable E-mails Check Them Out

13

• http://www.thatsnonsense.com/

• http://bobsullivan.net/

Page 14: Judy Taylour's Digital Privacy Day 2014 Presentation

Make Passwords Long, Strong & Unique

14

• Secure your devices• Smartphone, Tablet, Laptop or PC• Use passwords or passphrases

– Different for each account– Include numbers, symbols and letters –

capital & lowercase

• Passphrases = multiple words that create a phrase (longer / stronger than a password)

Page 15: Judy Taylour's Digital Privacy Day 2014 Presentation

Make Passwords Long, Strong & Unique

15

• A list of childhood pets – more=stronger– NobleR!ngoBa!leyAlexT!gerPumpk!

nJohnnyGage9

• An uncommon sentence– !Can’tBelieveIIntroducedGrantToAlice9

• Use Microsoft’s Password Checker

Page 16: Judy Taylour's Digital Privacy Day 2014 Presentation

Make Passwords Long, Strong & Unique

16

• Is your personal memory getting full?• A different password for each account

can drive you crazy• Use a Password program to remember all

of your passwords• https://www.dashlane.com/• https://www.passwordbox.com/• https://agilebits.com/onepassword

Page 17: Judy Taylour's Digital Privacy Day 2014 Presentation

Make Passwords Long, Strong & Unique

17

• https://lastpass.com/• http://keepass.info/• http://roboform.com

Page 18: Judy Taylour's Digital Privacy Day 2014 Presentation

Safer Online Banking

18

• It’s convenient• But comes with certain risks• Just like people being robbed at ATMs, or

having their cards cloned, online banking can be vulnerable

• Follow these tips and you can minimize risks to your finances and bank safely online

Page 19: Judy Taylour's Digital Privacy Day 2014 Presentation

Safer Online Banking

19

• Create a strong password• You know the drill• Minimum of 8 characters – the longer the

better• DON’T use

– Your name, initials, date of birth or anything that pertains to your relatives

Page 20: Judy Taylour's Digital Privacy Day 2014 Presentation

Safer Online Banking

20

• If your bank asks you to provide answers to security questions, the answers don’t need to be the real ones

• Thumper really doesn’t have to be the name of your first pet

Page 21: Judy Taylour's Digital Privacy Day 2014 Presentation

Safer Online Banking

21

• Secure your computer and keep it up-to-date

• You’ve also heard this over and over again but are you doing it

• Have a good, reliable security program• Use Malwarebytes to double check your

program – www.malwarebytes.com• Keep your operating system and other

software up-to-date

Page 22: Judy Taylour's Digital Privacy Day 2014 Presentation

Safer Online Banking

22

• Don’t click through on a link in an e-mail from your ‘bank’

• Banks won’t get in touch • Are you really expecting a shipment from UPS

or FedEx• Phishing is the name of the game – they want

your info and if you give it your money is gone!

• Starbucks, McDonalds, etc. Wi-Fi• Banks won’t call you on the phone and ask for

info, either

Page 23: Judy Taylour's Digital Privacy Day 2014 Presentation

Safer Online Banking

23

• Don’t access your bank account(s) via hotel, S

• Always log out of your online banking session• Always look for the "lock" icon and https:// to

be sure you have a safe connection.

• Do you have private browsing set up on your browser or smart phone?

• Set your browser to clear its cache when you shut down your computer

Page 24: Judy Taylour's Digital Privacy Day 2014 Presentation

Safer Online Banking

24

Internet Explorer

Chrome

Page 25: Judy Taylour's Digital Privacy Day 2014 Presentation

Safer Online Banking

25

Internet Explorer Chrome

Page 26: Judy Taylour's Digital Privacy Day 2014 Presentation

Safer Online Banking

26

• Set up account notifications (if available)– Does a withdrawal match or exceed a

specified amount– Is your account balance below a certain

point– Alerts could give quick notice of

suspicious activity on your account– Monitor your accounts regularly– Don’t wait a whole month to discover a

discrepancy

Page 27: Judy Taylour's Digital Privacy Day 2014 Presentation

Safer Online Banking

27

• NEVER use your debit card online• Have a credit card with a low limit OR• Have bank set up a virtual card for you to

use for online purchases• Set up two-factor authentication• It’s one of the best things you can do to

make sure your accounts don't get hacked

Page 28: Judy Taylour's Digital Privacy Day 2014 Presentation

Safer Online Banking

28

Do you want to receive your access code via:

Page 29: Judy Taylour's Digital Privacy Day 2014 Presentation

Cover Your Tracks

29

• Searching with Google?– Click on a link and your search term is usually

sent to that site, along with computer & browser info

– Can uniquely identify you– 3rd party ads – they can build a profile on you– That’s why those ads can follow you– Your profile can be sold– Google keeps your searches– Can be legally requested– Google can be hacked

Page 30: Judy Taylour's Digital Privacy Day 2014 Presentation

Cover Your Tracks

30

• Browse with DuckDuckGo• Doesn’t send your searches to other sites• Or store any personal information at all

Page 31: Judy Taylour's Digital Privacy Day 2014 Presentation

Cover Your Tracks

31

• Browse with Ixquick • It Protects Your Privacy!• Does NOT collect or share ANY personal

information!– Nada. Zilch. Nothing.

• World's most powerful search engine employing the most advanced metasearch technology

• Comprehensive …. Accurate

Page 32: Judy Taylour's Digital Privacy Day 2014 Presentation

Cover Your Tracks

32

• Browse with blekko • Delivers high quality, curated results and

organizing content into categories– Curated = cherry picks the best content that

is important and relevant to share

• Sophisticated search technology powers suite of products – Web search engine– Mobile app– Social news platform

Page 33: Judy Taylour's Digital Privacy Day 2014 Presentation

Cover Your Tracks

33

• Use DoNotTrackMe by Abine• Blocks companies from tracking

your browsing and helpsprotect your personal info online

• PC – Tablet – Smart Phone– Access DoNotTrackMe or any

browser or device to manage your privacy anywhere

www.abine.com

Page 34: Judy Taylour's Digital Privacy Day 2014 Presentation

Cover Your Tracks

34

• Also by Abine• MaskMe

– Keeps you private as you browse and shop the web

– Creates and manages secure passwords

• DeleteMe – Removes your public profile, contact and

personal info, and photos of you from leading data sites

Page 35: Judy Taylour's Digital Privacy Day 2014 Presentation

Block Those Pesky Ads

35

• AdBlock Plus• Surf the web without annoying ads!• Blocks banners, pop-ups and video ads -

even on Facebook and YouTube • Protects your online privacy

www.adblockplus.org

Page 36: Judy Taylour's Digital Privacy Day 2014 Presentation

Block Those Pesky Ads

36

Page 37: Judy Taylour's Digital Privacy Day 2014 Presentation

Block Those Pesky Ads with Abine

37

Page 38: Judy Taylour's Digital Privacy Day 2014 Presentation

Mobile Devices

38

• What information does your smartphone have about you?

• Smartphones store and transmit a wide range of personal data which third parties can access–including contact lists, pictures, browsing history, certain identifying information and stored location data.

• Secure your phone with a long, strong and unique password, security software and other privacy features.

Page 39: Judy Taylour's Digital Privacy Day 2014 Presentation

Do You Keep a Clean Device?

39

• Smartphones can be vulnerable to viruses and malware that can compromise personal information.

• Protect your phone with security software and by updating operating systems and apps.

• Avast.com • Norton.com

Page 40: Judy Taylour's Digital Privacy Day 2014 Presentation

Think Before You Text

40

• We’ve heard this before about e-mail• Keep in mind how the message might be

read before you send it. • Be aware that texts can be forwarded.

Page 41: Judy Taylour's Digital Privacy Day 2014 Presentation

Are You Respecting Others’ Privacy?

41

• Make sure you have someone’s permission before taking pictures or videos of them with your phone.

• What you do online has the potential to affect everyone – at home, at work and around the world.

• Practicing good online habits benefits the global digital community.

Page 42: Judy Taylour's Digital Privacy Day 2014 Presentation

Think Before You App

42

• Own your online presence - It’s ok to limit how and with whom you share information.

• Before downloading a mobile app, understand what information (your location, access to social networks, etc.) the app accesses to function

• Many applications do not need geo-location enabled in order to provide the service.

• Opt-out of the location service feature on your phone.

Page 43: Judy Taylour's Digital Privacy Day 2014 Presentation

Are You Savvy About Wi-Fi Hotspots?

43

• Limit the type of business you conduct on your smartphone or tablet via Wi-Fi hotspots and adjust the security settings on your device to limit who can access your machine.

• Wi-Fi hotspots are convenient but can leave you vulnerable to intrusion.

Page 44: Judy Taylour's Digital Privacy Day 2014 Presentation

Back-it Up

44

• Store digital copies of your valuable work, music, photos and other information on an external hard drive or online cloud.

Page 45: Judy Taylour's Digital Privacy Day 2014 Presentation

Voice Over Internet Protocol (VoIP)

45

• BEWARE!• Skype, Vonage, ooma, magicJack….• SPIT (Spam over Internet Telephony)

– Fast, cheap and invasive way for telemarketing messages to reach you

• Spoofing– Attacker pretends to be a trusted

VoIP caller, such as your bank

Page 46: Judy Taylour's Digital Privacy Day 2014 Presentation

Voice Over Internet Protocol (VoIP)

46

• ID Theft– Cyber criminals gather bits of information

collected from your conversations

• Eavesdropping– Hackers steal VoIP features like voicemail to

get information about the user

• Vishing attacks (voice phishing) – Gain access to your personal and financial

information in identity theft schemes

Page 47: Judy Taylour's Digital Privacy Day 2014 Presentation

Voice Over Internet Protocol (VoIP)

47

• Data sniffing – Hackers identify, modify, store and play back

your conversations

• Compromising your confidentiality– Is your phone call private and secure

• VoIP risks and safety issues continue to grow as more and more people rely on this service to make phone calls.

• Always be aware of the information you're sharing and that others may be listening in.

Page 48: Judy Taylour's Digital Privacy Day 2014 Presentation

Social Networking

48

• Only post what you would be comfortable hanging on your front door….Abby Stokes

• DON’T share:– Phone numbers– Home address– Full date of birth– Date of graduation– Travel plans– Email address– Compromising photos

Page 49: Judy Taylour's Digital Privacy Day 2014 Presentation

Social Networking

49

• Personal information you share online could give cyber criminals enough to piece together your email address and password, mother’s maiden name --- all that personal info we’re not supposed to share

• Don’t rely on “recommended” settings or default settings.

• Learn about the controls available and make your own decisions.

Page 50: Judy Taylour's Digital Privacy Day 2014 Presentation

Social Networking

50

• Set the privacy and security settings to your personal comfort level for information sharing

• It's okay to limit with whom you share your information

• When you update your status with your whereabouts on a regular basis, you could tip someone off to your routine– Possible real-life threats like robberies,

break-ins or stalking

Page 51: Judy Taylour's Digital Privacy Day 2014 Presentation

Social Networking

51

• Geotags can expose where you live, when you're traveling and even what car you drive – Could make you a target for robbery

• Most smartphones and digital cameras have a function that automatically geotags all your photos unless you turn it off

• Do you really want everyone to know the location of your newest grandchild?

Page 52: Judy Taylour's Digital Privacy Day 2014 Presentation

Social Networking

52

• If you are in someone’s home or at their event, get their OK before sharing their private space with your social media friends

• It’s a MUST to ask them first if you plan to geotag anything

Page 53: Judy Taylour's Digital Privacy Day 2014 Presentation

Social Networking

53

• Don’t forget that long, strong and unique password

Page 54: Judy Taylour's Digital Privacy Day 2014 Presentation

Ransomware

54

• Two common types….• Lockscreen ransomware: displays an

image that prevents you from accessing your computer– FBI Ransomeware

• Encryption ransomware: encrypts files on your system's hard drive, preventing you from opening them– Cryptolocker

Page 55: Judy Taylour's Digital Privacy Day 2014 Presentation

Ransomeware

55

• The terms ransomware and scareware are often used interchangeably.

• Both are schemes that attempt to make you provide a payment for something you don't want and is probably useless.

• Having a recent backup of your data, and taking your computer to a technician if it becomes affected, can mitigate the damage of such schemes.

Page 56: Judy Taylour's Digital Privacy Day 2014 Presentation

Ransomeware

56

• Two common types….• Lockscreen ransomware: displays an

image that prevents you from accessing your computer– FBI Ransomeware

• Encryption ransomware: encrypts fileson your system's hard drive, preventing you fromopening them– Cryptolocker

Page 57: Judy Taylour's Digital Privacy Day 2014 Presentation

Questions?