SlideShare une entreprise Scribd logo
1  sur  49
Practical Privacy & Security
for Marketing Professionals
Tris Hussey, Community Manager, eCrypt
Technologies
Most of us don’t take online
security seriously


 There are lot’s of other people out there
 It won’t (or isn’t likely to) happen to me
 How risky is it, really?
Cyber Crime Is Growing

 It’s where the money is
 Easy to get lots of information quickly
 Borderless and no geographic constraints
 Low cost of of entry
 Easy to learn
Tonight’s Take-aways


Safer browsing
Better passwords
Secure email
Keeping security top of mind for you and your clients
Terms
SSL
WPA, WPA2, WEP
AES128/AES256
Sidejacking
Packet sniffer
Brute force attack
Social engineering
Safer browsing

 Open WiFi is not safe
   Period.
 Firesheep only drew attention to existing flaws
 “Just browsing” can expose your Facebook & Twitter logins
 Assume that when on open WiFi you’re being snooped on.
Scary example time
This afternoon at a favourite coffee place...
While having my coffee...
While having my coffee...

 And working on this presentation
While having my coffee...

 And working on this presentation
 I captured some packets
While having my coffee...

 And working on this presentation
 I captured some packets
 Did some fleecing
While having my coffee...

 And working on this presentation
 I captured some packets
 Did some fleecing
 Got a few passwords
While having my coffee...

 And working on this presentation
 I captured some packets
 Did some fleecing
 Got a few passwords
 Wanna see?
Simple Solutions

 Don’t use unlocked WiFi if you can help it
 Set Facebook to always use SSL
 Force SSL/HTTPS connections to Facebook, Twitter, etc.
   Extensions for Chrome, Firefox, IE, and Safari
 Use your smartphone to connect to the Internet instead of
 WiFi
What about Hotspot VPNs?

I’ve had mixed results with free ones
  Bandwidth caps
  Poor performance
Not sure about paying for a VPN for casual use
For the geeky among us...
  Gina Tripani’s SSH proxy tunnel trick: http://tris.me/
  sshsocks
Facebook


Set Facebook to always
use SSL
  Under “My Account”
Facebook


Set Facebook to always
use SSL
  Under “My Account”
Check Facebook Privacy
Settings for changes
Foursquare & Location


 Who are your “friends” on these services?
 What should you share?
 When should you share it?
 Are we being careful enough?
What we share says a lot


 Sarah Palin’s Yahoo was hacked using publicly available
 information to guess her “secret questions”

 Who you are meeting with can reveal strategies
 It’s more than a tweet or a status update.
Passwords


Good passwords are essential to online security

A weak password jeopardizes an entire company
  Example: Twitter hack of 2010. One weak password let a
  someone get to much more sensitive passwords
Passwords
Don’t reuse passwords for multiple services
  Yes, it sucks to have to remember them
  A password manager like 1Password or LastPass makes it easier
Passwords should be:

  At least 8-10 characters long
  Use UpPer aNd loWer casE letTErs
  Us3 nuMb3rS
  U$3 $YmB0l$!
How to create a good
password


Think phrases, not words
Use substitutions
Use random passwords
Password example
Password example

Have pizza for dinner
Password example

Have pizza for dinner
havepizzafordinner
Password example

Have pizza for dinner
havepizzafordinner
H@v3p1zz@forDinn3r
Password example

Have pizza for dinner
havepizzafordinner
H@v3p1zz@forDinn3r
H@v3p1zz@4Dinn3r
Password example

Have pizza for dinner
havepizzafordinner
H@v3p1zz@forDinn3r
H@v3p1zz@4Dinn3r
H@v3p1zz@4Dinn3r!
Password example

Have pizza for dinner
havepizzafordinner
H@v3p1zz@forDinn3r
H@v3p1zz@4Dinn3r
H@v3p1zz@4Dinn3r!
H@v3p1zz@4Dinn3R!
How safe is that?



 According to howsecureismypassword.net
 It would take 9 quadrillion years for a desktop PC to crack it.
Standard email is insecure

 It’s the electronic equivalent of mailing a postcard
 Yes, many services secure your connection with SSL
   But the messages are stored in plain text
 IT has access to the servers
   And your messages
Encrypting email hasn’t been
easy
 PGP is no fun to use
 BES isn’t as secure as you think

   Once email leaves your BES it’s plain text again

   BIS? Nothing.
 Commercial solutions are expensive

 Getting people to use email encryption is like asking bloggers
 to turn down freebies
Why it’s essential

 More and more sensitive business is done over email
   Contracts
   Strategic plans
   Marketing tactics
   Private conversations
   Financial information
When was the last time...



 You mailed a contract on a postcard?

 Had a bill that didn’t come in an envelope?
When was the last time...


 You emailed a contract to someone?
 You emailed financial information to your accountant?
 You discussed strategies with clients over email?
eCrypt.me is a solution for
secure email


 Easy, web-based secure, encrypted email
 Free during the beta. Sign up at https://www.eCrypt.me/
eCrypt.me
eCrypt.me
eCrypt.me
eCrypt.me
eCrypt.me



  https://www.eCrypt.me/
Privacy, Security, & Your
Clients

 What information are you asking users to provide?

   Do you really need their birthday?

   Gender?
 How are you storing that information?
   There are rules you know
Storing data


 What is stored in the clear on your laptop?
 Should you encrypt everything?
 It’s all about control.
Whole disk encryption

 If I told you, I’d have to kill you
 Forget your password
   And you’re hooped

 Try encrypted partitions for some files:

   Knox (commercial - Mac)
   TrueCrypt (open source)
Don’t forget backups!
 Part of security is disaster recovery
 Options
   TimeMachine
   Carbonite
   Mozy
   Crashplan (my fav)
   Dropbox (my Dept of Redundancy Bureau)
Questions?

Thank you!
Contact info:
  tris@ecryptinc.com
  Twitter: trishussey and ecrypt
  http://yourprivacyisourbusiness.com/

Contenu connexe

Dernier

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 

Dernier (20)

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 

En vedette

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

En vedette (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Practical Privacy and Security

  • 1. Practical Privacy & Security for Marketing Professionals Tris Hussey, Community Manager, eCrypt Technologies
  • 2. Most of us don’t take online security seriously There are lot’s of other people out there It won’t (or isn’t likely to) happen to me How risky is it, really?
  • 3. Cyber Crime Is Growing It’s where the money is Easy to get lots of information quickly Borderless and no geographic constraints Low cost of of entry Easy to learn
  • 4. Tonight’s Take-aways Safer browsing Better passwords Secure email Keeping security top of mind for you and your clients
  • 5. Terms SSL WPA, WPA2, WEP AES128/AES256 Sidejacking Packet sniffer Brute force attack Social engineering
  • 6. Safer browsing Open WiFi is not safe Period. Firesheep only drew attention to existing flaws “Just browsing” can expose your Facebook & Twitter logins Assume that when on open WiFi you’re being snooped on.
  • 7. Scary example time This afternoon at a favourite coffee place...
  • 8. While having my coffee...
  • 9. While having my coffee... And working on this presentation
  • 10. While having my coffee... And working on this presentation I captured some packets
  • 11. While having my coffee... And working on this presentation I captured some packets Did some fleecing
  • 12. While having my coffee... And working on this presentation I captured some packets Did some fleecing Got a few passwords
  • 13. While having my coffee... And working on this presentation I captured some packets Did some fleecing Got a few passwords Wanna see?
  • 14.
  • 15.
  • 16.
  • 17. Simple Solutions Don’t use unlocked WiFi if you can help it Set Facebook to always use SSL Force SSL/HTTPS connections to Facebook, Twitter, etc. Extensions for Chrome, Firefox, IE, and Safari Use your smartphone to connect to the Internet instead of WiFi
  • 18. What about Hotspot VPNs? I’ve had mixed results with free ones Bandwidth caps Poor performance Not sure about paying for a VPN for casual use For the geeky among us... Gina Tripani’s SSH proxy tunnel trick: http://tris.me/ sshsocks
  • 19. Facebook Set Facebook to always use SSL Under “My Account”
  • 20. Facebook Set Facebook to always use SSL Under “My Account” Check Facebook Privacy Settings for changes
  • 21. Foursquare & Location Who are your “friends” on these services? What should you share? When should you share it? Are we being careful enough?
  • 22. What we share says a lot Sarah Palin’s Yahoo was hacked using publicly available information to guess her “secret questions” Who you are meeting with can reveal strategies It’s more than a tweet or a status update.
  • 23. Passwords Good passwords are essential to online security A weak password jeopardizes an entire company Example: Twitter hack of 2010. One weak password let a someone get to much more sensitive passwords
  • 24. Passwords Don’t reuse passwords for multiple services Yes, it sucks to have to remember them A password manager like 1Password or LastPass makes it easier Passwords should be: At least 8-10 characters long Use UpPer aNd loWer casE letTErs Us3 nuMb3rS U$3 $YmB0l$!
  • 25. How to create a good password Think phrases, not words Use substitutions Use random passwords
  • 28. Password example Have pizza for dinner havepizzafordinner
  • 29. Password example Have pizza for dinner havepizzafordinner H@v3p1zz@forDinn3r
  • 30. Password example Have pizza for dinner havepizzafordinner H@v3p1zz@forDinn3r H@v3p1zz@4Dinn3r
  • 31. Password example Have pizza for dinner havepizzafordinner H@v3p1zz@forDinn3r H@v3p1zz@4Dinn3r H@v3p1zz@4Dinn3r!
  • 32. Password example Have pizza for dinner havepizzafordinner H@v3p1zz@forDinn3r H@v3p1zz@4Dinn3r H@v3p1zz@4Dinn3r! H@v3p1zz@4Dinn3R!
  • 33. How safe is that? According to howsecureismypassword.net It would take 9 quadrillion years for a desktop PC to crack it.
  • 34. Standard email is insecure It’s the electronic equivalent of mailing a postcard Yes, many services secure your connection with SSL But the messages are stored in plain text IT has access to the servers And your messages
  • 35. Encrypting email hasn’t been easy PGP is no fun to use BES isn’t as secure as you think Once email leaves your BES it’s plain text again BIS? Nothing. Commercial solutions are expensive Getting people to use email encryption is like asking bloggers to turn down freebies
  • 36. Why it’s essential More and more sensitive business is done over email Contracts Strategic plans Marketing tactics Private conversations Financial information
  • 37. When was the last time... You mailed a contract on a postcard? Had a bill that didn’t come in an envelope?
  • 38. When was the last time... You emailed a contract to someone? You emailed financial information to your accountant? You discussed strategies with clients over email?
  • 39. eCrypt.me is a solution for secure email Easy, web-based secure, encrypted email Free during the beta. Sign up at https://www.eCrypt.me/
  • 45. Privacy, Security, & Your Clients What information are you asking users to provide? Do you really need their birthday? Gender? How are you storing that information? There are rules you know
  • 46. Storing data What is stored in the clear on your laptop? Should you encrypt everything? It’s all about control.
  • 47. Whole disk encryption If I told you, I’d have to kill you Forget your password And you’re hooped Try encrypted partitions for some files: Knox (commercial - Mac) TrueCrypt (open source)
  • 48. Don’t forget backups! Part of security is disaster recovery Options TimeMachine Carbonite Mozy Crashplan (my fav) Dropbox (my Dept of Redundancy Bureau)
  • 49. Questions? Thank you! Contact info: tris@ecryptinc.com Twitter: trishussey and ecrypt http://yourprivacyisourbusiness.com/

Notes de l'éditeur

  1. \n
  2. \n
  3. \n
  4. \n
  5. \n
  6. \n
  7. \n
  8. \n
  9. \n
  10. \n
  11. \n
  12. \n
  13. \n
  14. \n
  15. \n
  16. \n
  17. \n
  18. \n
  19. \n
  20. \n
  21. \n
  22. \n
  23. \n
  24. \n
  25. \n
  26. \n
  27. \n
  28. \n
  29. \n
  30. \n
  31. \n
  32. \n
  33. \n
  34. \n
  35. \n
  36. \n
  37. \n
  38. \n
  39. \n
  40. \n
  41. \n
  42. \n
  43. \n
  44. \n
  45. \n
  46. \n
  47. \n