SlideShare ist ein Scribd-Unternehmen logo
1 von 49
Practical Privacy & Security
for Marketing Professionals
Tris Hussey, Community Manager, eCrypt
Technologies
Most of us don’t take online
security seriously


 There are lot’s of other people out there
 It won’t (or isn’t likely to) happen to me
 How risky is it, really?
Cyber Crime Is Growing

 It’s where the money is
 Easy to get lots of information quickly
 Borderless and no geographic constraints
 Low cost of of entry
 Easy to learn
Tonight’s Take-aways


Safer browsing
Better passwords
Secure email
Keeping security top of mind for you and your clients
Terms
SSL
WPA, WPA2, WEP
AES128/AES256
Sidejacking
Packet sniffer
Brute force attack
Social engineering
Safer browsing

 Open WiFi is not safe
   Period.
 Firesheep only drew attention to existing flaws
 “Just browsing” can expose your Facebook & Twitter logins
 Assume that when on open WiFi you’re being snooped on.
Scary example time
This afternoon at a favourite coffee place...
While having my coffee...
While having my coffee...

 And working on this presentation
While having my coffee...

 And working on this presentation
 I captured some packets
While having my coffee...

 And working on this presentation
 I captured some packets
 Did some fleecing
While having my coffee...

 And working on this presentation
 I captured some packets
 Did some fleecing
 Got a few passwords
While having my coffee...

 And working on this presentation
 I captured some packets
 Did some fleecing
 Got a few passwords
 Wanna see?
Simple Solutions

 Don’t use unlocked WiFi if you can help it
 Set Facebook to always use SSL
 Force SSL/HTTPS connections to Facebook, Twitter, etc.
   Extensions for Chrome, Firefox, IE, and Safari
 Use your smartphone to connect to the Internet instead of
 WiFi
What about Hotspot VPNs?

I’ve had mixed results with free ones
  Bandwidth caps
  Poor performance
Not sure about paying for a VPN for casual use
For the geeky among us...
  Gina Tripani’s SSH proxy tunnel trick: http://tris.me/
  sshsocks
Facebook


Set Facebook to always
use SSL
  Under “My Account”
Facebook


Set Facebook to always
use SSL
  Under “My Account”
Check Facebook Privacy
Settings for changes
Foursquare & Location


 Who are your “friends” on these services?
 What should you share?
 When should you share it?
 Are we being careful enough?
What we share says a lot


 Sarah Palin’s Yahoo was hacked using publicly available
 information to guess her “secret questions”

 Who you are meeting with can reveal strategies
 It’s more than a tweet or a status update.
Passwords


Good passwords are essential to online security

A weak password jeopardizes an entire company
  Example: Twitter hack of 2010. One weak password let a
  someone get to much more sensitive passwords
Passwords
Don’t reuse passwords for multiple services
  Yes, it sucks to have to remember them
  A password manager like 1Password or LastPass makes it easier
Passwords should be:

  At least 8-10 characters long
  Use UpPer aNd loWer casE letTErs
  Us3 nuMb3rS
  U$3 $YmB0l$!
How to create a good
password


Think phrases, not words
Use substitutions
Use random passwords
Password example
Password example

Have pizza for dinner
Password example

Have pizza for dinner
havepizzafordinner
Password example

Have pizza for dinner
havepizzafordinner
H@v3p1zz@forDinn3r
Password example

Have pizza for dinner
havepizzafordinner
H@v3p1zz@forDinn3r
H@v3p1zz@4Dinn3r
Password example

Have pizza for dinner
havepizzafordinner
H@v3p1zz@forDinn3r
H@v3p1zz@4Dinn3r
H@v3p1zz@4Dinn3r!
Password example

Have pizza for dinner
havepizzafordinner
H@v3p1zz@forDinn3r
H@v3p1zz@4Dinn3r
H@v3p1zz@4Dinn3r!
H@v3p1zz@4Dinn3R!
How safe is that?



 According to howsecureismypassword.net
 It would take 9 quadrillion years for a desktop PC to crack it.
Standard email is insecure

 It’s the electronic equivalent of mailing a postcard
 Yes, many services secure your connection with SSL
   But the messages are stored in plain text
 IT has access to the servers
   And your messages
Encrypting email hasn’t been
easy
 PGP is no fun to use
 BES isn’t as secure as you think

   Once email leaves your BES it’s plain text again

   BIS? Nothing.
 Commercial solutions are expensive

 Getting people to use email encryption is like asking bloggers
 to turn down freebies
Why it’s essential

 More and more sensitive business is done over email
   Contracts
   Strategic plans
   Marketing tactics
   Private conversations
   Financial information
When was the last time...



 You mailed a contract on a postcard?

 Had a bill that didn’t come in an envelope?
When was the last time...


 You emailed a contract to someone?
 You emailed financial information to your accountant?
 You discussed strategies with clients over email?
eCrypt.me is a solution for
secure email


 Easy, web-based secure, encrypted email
 Free during the beta. Sign up at https://www.eCrypt.me/
eCrypt.me
eCrypt.me
eCrypt.me
eCrypt.me
eCrypt.me



  https://www.eCrypt.me/
Privacy, Security, & Your
Clients

 What information are you asking users to provide?

   Do you really need their birthday?

   Gender?
 How are you storing that information?
   There are rules you know
Storing data


 What is stored in the clear on your laptop?
 Should you encrypt everything?
 It’s all about control.
Whole disk encryption

 If I told you, I’d have to kill you
 Forget your password
   And you’re hooped

 Try encrypted partitions for some files:

   Knox (commercial - Mac)
   TrueCrypt (open source)
Don’t forget backups!
 Part of security is disaster recovery
 Options
   TimeMachine
   Carbonite
   Mozy
   Crashplan (my fav)
   Dropbox (my Dept of Redundancy Bureau)
Questions?

Thank you!
Contact info:
  tris@ecryptinc.com
  Twitter: trishussey and ecrypt
  http://yourprivacyisourbusiness.com/

Weitere ähnliche Inhalte

Kürzlich hochgeladen

A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 

Kürzlich hochgeladen (20)

A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 

Empfohlen

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

Empfohlen (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Practical Privacy and Security

  • 1. Practical Privacy & Security for Marketing Professionals Tris Hussey, Community Manager, eCrypt Technologies
  • 2. Most of us don’t take online security seriously There are lot’s of other people out there It won’t (or isn’t likely to) happen to me How risky is it, really?
  • 3. Cyber Crime Is Growing It’s where the money is Easy to get lots of information quickly Borderless and no geographic constraints Low cost of of entry Easy to learn
  • 4. Tonight’s Take-aways Safer browsing Better passwords Secure email Keeping security top of mind for you and your clients
  • 5. Terms SSL WPA, WPA2, WEP AES128/AES256 Sidejacking Packet sniffer Brute force attack Social engineering
  • 6. Safer browsing Open WiFi is not safe Period. Firesheep only drew attention to existing flaws “Just browsing” can expose your Facebook & Twitter logins Assume that when on open WiFi you’re being snooped on.
  • 7. Scary example time This afternoon at a favourite coffee place...
  • 8. While having my coffee...
  • 9. While having my coffee... And working on this presentation
  • 10. While having my coffee... And working on this presentation I captured some packets
  • 11. While having my coffee... And working on this presentation I captured some packets Did some fleecing
  • 12. While having my coffee... And working on this presentation I captured some packets Did some fleecing Got a few passwords
  • 13. While having my coffee... And working on this presentation I captured some packets Did some fleecing Got a few passwords Wanna see?
  • 14.
  • 15.
  • 16.
  • 17. Simple Solutions Don’t use unlocked WiFi if you can help it Set Facebook to always use SSL Force SSL/HTTPS connections to Facebook, Twitter, etc. Extensions for Chrome, Firefox, IE, and Safari Use your smartphone to connect to the Internet instead of WiFi
  • 18. What about Hotspot VPNs? I’ve had mixed results with free ones Bandwidth caps Poor performance Not sure about paying for a VPN for casual use For the geeky among us... Gina Tripani’s SSH proxy tunnel trick: http://tris.me/ sshsocks
  • 19. Facebook Set Facebook to always use SSL Under “My Account”
  • 20. Facebook Set Facebook to always use SSL Under “My Account” Check Facebook Privacy Settings for changes
  • 21. Foursquare & Location Who are your “friends” on these services? What should you share? When should you share it? Are we being careful enough?
  • 22. What we share says a lot Sarah Palin’s Yahoo was hacked using publicly available information to guess her “secret questions” Who you are meeting with can reveal strategies It’s more than a tweet or a status update.
  • 23. Passwords Good passwords are essential to online security A weak password jeopardizes an entire company Example: Twitter hack of 2010. One weak password let a someone get to much more sensitive passwords
  • 24. Passwords Don’t reuse passwords for multiple services Yes, it sucks to have to remember them A password manager like 1Password or LastPass makes it easier Passwords should be: At least 8-10 characters long Use UpPer aNd loWer casE letTErs Us3 nuMb3rS U$3 $YmB0l$!
  • 25. How to create a good password Think phrases, not words Use substitutions Use random passwords
  • 28. Password example Have pizza for dinner havepizzafordinner
  • 29. Password example Have pizza for dinner havepizzafordinner H@v3p1zz@forDinn3r
  • 30. Password example Have pizza for dinner havepizzafordinner H@v3p1zz@forDinn3r H@v3p1zz@4Dinn3r
  • 31. Password example Have pizza for dinner havepizzafordinner H@v3p1zz@forDinn3r H@v3p1zz@4Dinn3r H@v3p1zz@4Dinn3r!
  • 32. Password example Have pizza for dinner havepizzafordinner H@v3p1zz@forDinn3r H@v3p1zz@4Dinn3r H@v3p1zz@4Dinn3r! H@v3p1zz@4Dinn3R!
  • 33. How safe is that? According to howsecureismypassword.net It would take 9 quadrillion years for a desktop PC to crack it.
  • 34. Standard email is insecure It’s the electronic equivalent of mailing a postcard Yes, many services secure your connection with SSL But the messages are stored in plain text IT has access to the servers And your messages
  • 35. Encrypting email hasn’t been easy PGP is no fun to use BES isn’t as secure as you think Once email leaves your BES it’s plain text again BIS? Nothing. Commercial solutions are expensive Getting people to use email encryption is like asking bloggers to turn down freebies
  • 36. Why it’s essential More and more sensitive business is done over email Contracts Strategic plans Marketing tactics Private conversations Financial information
  • 37. When was the last time... You mailed a contract on a postcard? Had a bill that didn’t come in an envelope?
  • 38. When was the last time... You emailed a contract to someone? You emailed financial information to your accountant? You discussed strategies with clients over email?
  • 39. eCrypt.me is a solution for secure email Easy, web-based secure, encrypted email Free during the beta. Sign up at https://www.eCrypt.me/
  • 45. Privacy, Security, & Your Clients What information are you asking users to provide? Do you really need their birthday? Gender? How are you storing that information? There are rules you know
  • 46. Storing data What is stored in the clear on your laptop? Should you encrypt everything? It’s all about control.
  • 47. Whole disk encryption If I told you, I’d have to kill you Forget your password And you’re hooped Try encrypted partitions for some files: Knox (commercial - Mac) TrueCrypt (open source)
  • 48. Don’t forget backups! Part of security is disaster recovery Options TimeMachine Carbonite Mozy Crashplan (my fav) Dropbox (my Dept of Redundancy Bureau)
  • 49. Questions? Thank you! Contact info: tris@ecryptinc.com Twitter: trishussey and ecrypt http://yourprivacyisourbusiness.com/

Hinweis der Redaktion

  1. \n
  2. \n
  3. \n
  4. \n
  5. \n
  6. \n
  7. \n
  8. \n
  9. \n
  10. \n
  11. \n
  12. \n
  13. \n
  14. \n
  15. \n
  16. \n
  17. \n
  18. \n
  19. \n
  20. \n
  21. \n
  22. \n
  23. \n
  24. \n
  25. \n
  26. \n
  27. \n
  28. \n
  29. \n
  30. \n
  31. \n
  32. \n
  33. \n
  34. \n
  35. \n
  36. \n
  37. \n
  38. \n
  39. \n
  40. \n
  41. \n
  42. \n
  43. \n
  44. \n
  45. \n
  46. \n
  47. \n