SlideShare a Scribd company logo
1 of 22
Download to read offline
Keeping Your Personal Info Safe
  Itโ€™s All About Minimizing Risk
Welcome!



      Chris Schroeder, CISM,
      Loweโ€™s Companies, Inc.



      Ken Robey, CISSP

      Security in Focus, Inc.




           NPower Charlotte Region | Proprietary and Confidential | Not for Distribution   2
NPower Charlotte Region | Proprietary and Confidential | Not for Distribution   3
a




Learn how to protect your personal data wherever you go.




              NPower Charlotte Region | Proprietary and Confidential | Not for Distribution   4
Todayโ€™s Roadmap to Protecting Your Data


โ— Avoid โ€œscammersโ€
โ— Learn wireless network basics
โ— Picking passwords
   ๏ƒ˜ Creation
   ๏ƒ˜ Protection

โ— Backing up your data
โ— Q&A


            NPower Charlotte Region | Proprietary and Confidential | Not for Distribution   5
6 Rules to Avoid Scammers

1. Donโ€™t share personal info with anyone who calls you to ask for it.

2. Donโ€™t share passwords.

3. Treat unexpected emails suspiciously.

4. Donโ€™t respond to company emails requesting personal info.

5. Confirm the identity of anyone asking for personal info.

6. ALWAYS follow the correct procedure; donโ€™t make exceptions.



                 NPower Charlotte Region | Proprietary and Confidential | Not for Distribution   6
Wireless Network Basics

                     4 Ways to Protect
                   Yourself from Network
                         Attackers       4
            1                                                              Enabling
      Renaming your                                                       password
       default SSID                                                       protection

                    2            3
             Preventing SSID   Using
              broadcasting   encryption



             NPower Charlotte Region | Proprietary and Confidential | Not for Distribution   7
1
                Wireless Network Basics
Renaming your
 default SSID



    โ€ข By default, the wireless access pointโ€™s SSID will typically
      be some form of a the manufacturerโ€™s name example,
      Linksys wireless access points have SSIDs of โ€œLinksysโ€.

    โ€ข Renaming the default SSID is the first step to hardening a
      wireless network from attacks.




                 NPower Charlotte Region | Proprietary and Confidential | Not for Distribution   8
2        Wireless Network Basics
Preventing SSID
 broadcasting



  โ— Turn off SSID broadcasting on your wireless access point




                NPower Charlotte Region | Proprietary and Confidential | Not for Distribution   9
Wireless Network Basics
    3
  Using
encryption


   โ€ข Utilizing encryption ensures that someone cannot start a
     network analyzer and easily view all of the data you have
     transmitted to and/or received from the wireless access
     point.
   โ€ข Common wireless security specifications include, from
     weakest to strongest:
         โ€ข WEP (Bad)
         โ€ข WPA (Better)
         โ€ข WPA2 (Best)



              NPower Charlotte Region | Proprietary and Confidential | Not for Distribution   10
4                       Wireless Network Basics
 Enabling
password
protection


โ€ข By default, wireless access points do not require a
  password; the default to published admin password.
  Leaving your network open allows for unauthorized access.
โ€ข Secure your network by requiring a password and changing
  the default administrative password.

  **Password Hint**
     The longer and more complex the hard to crack.



              NPower Charlotte Region | Proprietary and Confidential | Not for Distribution   11
Creating and Protecting Passwords


Do Your                        โ— While servers tend to have passwords
                                 on accounts, did you know that most
Passwords                                        workstations do not?


Pass the                                    โ— We all believe our systems have
                                           passwords โ€“ have you ever checked
Test?                                                           every system?

                                              โ— Do you have strong passwords?

                                                   โ— Do you know what is a strong
                                                                     password?

            NPower Charlotte Region | Proprietary and Confidential | Not for Distribution   12
Passing the Password Test



      Length                                                Characters                Alpha
                The longer the                                                        Numeric
                better                                                                Casing
                                                                                      Special



   Example: Alpha, Numeric and Casing (16 Characters Long)
                    โ€˜Passw0rdPassw0rdโ€™

47,672,401,706,823,533,450,263,330,816 (47 octillion combinations)

           53,493,822,905,617 53 trillion years to crack
                NPower Charlotte Region | Proprietary and Confidential | Not for Distribution   13
Password Protection

โ€ข Use a Password Safe to
  securely store your
  passwords
   โ€ข   LastPass.com
   โ€ข   Passwordsafe.sourceforge.net
   โ€ข   Keypass.info


โ€ข Do not use the same
  password on every
  site/system
   โ€ข   If one is compromised, so are
       the others



                    NPower Charlotte Region | Proprietary and Confidential | Not for Distribution   14
What is Your Backup Plan?


   Sooner or later, you                                             You MUST backup
    will lose your data                                                 your data


    Hard-drive will crash
                                                                      Back up regularly
    Computer gets stolen
                                                                       Back up on-site
    Building burns down
                                                                       Back up off-site
     Phone lost/stolen




             NPower Charlotte Region | Proprietary and Confidential | Not for Distribution   15
Backups




โ€ข Ensure the backups are encrypted
โ€ข Use a cloud based backup for off-site, $5.00/month




              NPower Charlotte Region | Proprietary and Confidential | Not for Distribution   16
Protecting Your Personal Data on the Street




            NPower Charlotte Region | Proprietary and Confidential | Not for Distribution   17
Protecting Your Personal Data


    Whatโ€™s wrong with
       this ATM?




            NPower Charlotte Region | Proprietary and Confidential | Not for Distribution   18
Protecting Your Personal Data



                                   A card reader is placed
                                      over the original!




            NPower Charlotte Region | Proprietary and Confidential | Not for Distribution   19
Protecting Your Personal Data


  Anything wrong here?




            NPower Charlotte Region | Proprietary and Confidential | Not for Distribution   20
Protecting Your Personal Data


                                      The pamphlet holder
                                         has a camera!




            NPower Charlotte Region | Proprietary and Confidential | Not for Distribution   21
Questions?




NPower Charlotte Region | Proprietary and Confidential | Not for Distribution   22

More Related Content

Similar to Personal Data Security

IT infrastructure security 101
IT infrastructure security 101IT infrastructure security 101
IT infrastructure security 101
April Mardock CISSP
ย 
Web application security: Threats & Countermeasures
Web application security: Threats & CountermeasuresWeb application security: Threats & Countermeasures
Web application security: Threats & Countermeasures
Aung Thu Rha Hein
ย 
Myles firewalls
Myles firewallsMyles firewalls
Myles firewalls
Shmulik Avidan
ย 
Howtohackwirelessinternetconnections 100105124156-phpapp01
Howtohackwirelessinternetconnections 100105124156-phpapp01Howtohackwirelessinternetconnections 100105124156-phpapp01
Howtohackwirelessinternetconnections 100105124156-phpapp01
Alf Tero
ย 

Similar to Personal Data Security (20)

eSecurity! Keeping your Business and Customers Safe
eSecurity! Keeping your Business and Customers SafeeSecurity! Keeping your Business and Customers Safe
eSecurity! Keeping your Business and Customers Safe
ย 
IT infrastructure security 101
IT infrastructure security 101IT infrastructure security 101
IT infrastructure security 101
ย 
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
ย 
CompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four ReviewCompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four Review
ย 
Unified Threat Management
Unified Threat ManagementUnified Threat Management
Unified Threat Management
ย 
Wireless v2
Wireless v2Wireless v2
Wireless v2
ย 
Web application security: Threats & Countermeasures
Web application security: Threats & CountermeasuresWeb application security: Threats & Countermeasures
Web application security: Threats & Countermeasures
ย 
Internet security lessons for IoT
Internet security lessons for IoTInternet security lessons for IoT
Internet security lessons for IoT
ย 
Myles firewalls
Myles firewallsMyles firewalls
Myles firewalls
ย 
WiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & DefenceWiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & Defence
ย 
Howtohackwirelessinternetconnections 100105124156-phpapp01
Howtohackwirelessinternetconnections 100105124156-phpapp01Howtohackwirelessinternetconnections 100105124156-phpapp01
Howtohackwirelessinternetconnections 100105124156-phpapp01
ย 
Dama - Protecting Sensitive Data on a Database
Dama - Protecting Sensitive Data on a DatabaseDama - Protecting Sensitive Data on a Database
Dama - Protecting Sensitive Data on a Database
ย 
Tingling wireless security
Tingling wireless securityTingling wireless security
Tingling wireless security
ย 
Kerberos
KerberosKerberos
Kerberos
ย 
WiFi Intrustion Detection from WireShark SharkFest
WiFi Intrustion Detection from WireShark SharkFestWiFi Intrustion Detection from WireShark SharkFest
WiFi Intrustion Detection from WireShark SharkFest
ย 
Airheads dallas 2011 wireless security
Airheads dallas 2011   wireless securityAirheads dallas 2011   wireless security
Airheads dallas 2011 wireless security
ย 
Save Your Network โ€“ Protecting Manufacturing Data from Deadly Breaches
Save Your Network โ€“ Protecting Manufacturing Data from Deadly BreachesSave Your Network โ€“ Protecting Manufacturing Data from Deadly Breaches
Save Your Network โ€“ Protecting Manufacturing Data from Deadly Breaches
ย 
Henrik Strรธm - IPv6 from the attacker's perspective
Henrik Strรธm - IPv6 from the attacker's perspectiveHenrik Strรธm - IPv6 from the attacker's perspective
Henrik Strรธm - IPv6 from the attacker's perspective
ย 
Hacktrikz - Introduction to Information Security & Ethical Hacking
Hacktrikz - Introduction to Information Security & Ethical HackingHacktrikz - Introduction to Information Security & Ethical Hacking
Hacktrikz - Introduction to Information Security & Ethical Hacking
ย 
The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?
ย 

Recently uploaded

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
ย 

Recently uploaded (20)

PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
ย 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
ย 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
ย 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
ย 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
ย 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
ย 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
ย 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
ย 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
ย 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
ย 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
ย 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
ย 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
ย 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
ย 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
ย 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
ย 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
ย 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
ย 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
ย 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
ย 

Personal Data Security

  • 1. Keeping Your Personal Info Safe Itโ€™s All About Minimizing Risk
  • 2. Welcome! Chris Schroeder, CISM, Loweโ€™s Companies, Inc. Ken Robey, CISSP Security in Focus, Inc. NPower Charlotte Region | Proprietary and Confidential | Not for Distribution 2
  • 3. NPower Charlotte Region | Proprietary and Confidential | Not for Distribution 3
  • 4. a Learn how to protect your personal data wherever you go. NPower Charlotte Region | Proprietary and Confidential | Not for Distribution 4
  • 5. Todayโ€™s Roadmap to Protecting Your Data โ— Avoid โ€œscammersโ€ โ— Learn wireless network basics โ— Picking passwords ๏ƒ˜ Creation ๏ƒ˜ Protection โ— Backing up your data โ— Q&A NPower Charlotte Region | Proprietary and Confidential | Not for Distribution 5
  • 6. 6 Rules to Avoid Scammers 1. Donโ€™t share personal info with anyone who calls you to ask for it. 2. Donโ€™t share passwords. 3. Treat unexpected emails suspiciously. 4. Donโ€™t respond to company emails requesting personal info. 5. Confirm the identity of anyone asking for personal info. 6. ALWAYS follow the correct procedure; donโ€™t make exceptions. NPower Charlotte Region | Proprietary and Confidential | Not for Distribution 6
  • 7. Wireless Network Basics 4 Ways to Protect Yourself from Network Attackers 4 1 Enabling Renaming your password default SSID protection 2 3 Preventing SSID Using broadcasting encryption NPower Charlotte Region | Proprietary and Confidential | Not for Distribution 7
  • 8. 1 Wireless Network Basics Renaming your default SSID โ€ข By default, the wireless access pointโ€™s SSID will typically be some form of a the manufacturerโ€™s name example, Linksys wireless access points have SSIDs of โ€œLinksysโ€. โ€ข Renaming the default SSID is the first step to hardening a wireless network from attacks. NPower Charlotte Region | Proprietary and Confidential | Not for Distribution 8
  • 9. 2 Wireless Network Basics Preventing SSID broadcasting โ— Turn off SSID broadcasting on your wireless access point NPower Charlotte Region | Proprietary and Confidential | Not for Distribution 9
  • 10. Wireless Network Basics 3 Using encryption โ€ข Utilizing encryption ensures that someone cannot start a network analyzer and easily view all of the data you have transmitted to and/or received from the wireless access point. โ€ข Common wireless security specifications include, from weakest to strongest: โ€ข WEP (Bad) โ€ข WPA (Better) โ€ข WPA2 (Best) NPower Charlotte Region | Proprietary and Confidential | Not for Distribution 10
  • 11. 4 Wireless Network Basics Enabling password protection โ€ข By default, wireless access points do not require a password; the default to published admin password. Leaving your network open allows for unauthorized access. โ€ข Secure your network by requiring a password and changing the default administrative password. **Password Hint** The longer and more complex the hard to crack. NPower Charlotte Region | Proprietary and Confidential | Not for Distribution 11
  • 12. Creating and Protecting Passwords Do Your โ— While servers tend to have passwords on accounts, did you know that most Passwords workstations do not? Pass the โ— We all believe our systems have passwords โ€“ have you ever checked Test? every system? โ— Do you have strong passwords? โ— Do you know what is a strong password? NPower Charlotte Region | Proprietary and Confidential | Not for Distribution 12
  • 13. Passing the Password Test Length Characters Alpha The longer the Numeric better Casing Special Example: Alpha, Numeric and Casing (16 Characters Long) โ€˜Passw0rdPassw0rdโ€™ 47,672,401,706,823,533,450,263,330,816 (47 octillion combinations) 53,493,822,905,617 53 trillion years to crack NPower Charlotte Region | Proprietary and Confidential | Not for Distribution 13
  • 14. Password Protection โ€ข Use a Password Safe to securely store your passwords โ€ข LastPass.com โ€ข Passwordsafe.sourceforge.net โ€ข Keypass.info โ€ข Do not use the same password on every site/system โ€ข If one is compromised, so are the others NPower Charlotte Region | Proprietary and Confidential | Not for Distribution 14
  • 15. What is Your Backup Plan? Sooner or later, you You MUST backup will lose your data your data Hard-drive will crash Back up regularly Computer gets stolen Back up on-site Building burns down Back up off-site Phone lost/stolen NPower Charlotte Region | Proprietary and Confidential | Not for Distribution 15
  • 16. Backups โ€ข Ensure the backups are encrypted โ€ข Use a cloud based backup for off-site, $5.00/month NPower Charlotte Region | Proprietary and Confidential | Not for Distribution 16
  • 17. Protecting Your Personal Data on the Street NPower Charlotte Region | Proprietary and Confidential | Not for Distribution 17
  • 18. Protecting Your Personal Data Whatโ€™s wrong with this ATM? NPower Charlotte Region | Proprietary and Confidential | Not for Distribution 18
  • 19. Protecting Your Personal Data A card reader is placed over the original! NPower Charlotte Region | Proprietary and Confidential | Not for Distribution 19
  • 20. Protecting Your Personal Data Anything wrong here? NPower Charlotte Region | Proprietary and Confidential | Not for Distribution 20
  • 21. Protecting Your Personal Data The pamphlet holder has a camera! NPower Charlotte Region | Proprietary and Confidential | Not for Distribution 21
  • 22. Questions? NPower Charlotte Region | Proprietary and Confidential | Not for Distribution 22