SlideShare ist ein Scribd-Unternehmen logo
1 von 7
your library of you - socialsafe.net
How to stay safe
online
(eSecurity)
your library of you - socialsafe.net
Aim
• Just a starter today covering main points of eSecurity
– Privacy, Passwords, and Computer Security
• There are many layers of actions you can take
– Just like securing your home
• A simple door lock
• A 5 lever door lock
• Window locks
• Alarm system
• CCTV
• The internet offers huge advantages for everyone –
and simple precautions will keep you safe
your library of you - socialsafe.net
Digital
World
Self
Harm
Permanence
Ease of Search
Ethical Grey Unethical Illegal
Harm
Spectrum
Gossip
Public Interest
Privacy Invasion
List
Selling
Unsolicited
Calls
Mug
Targeting
Phone
Tapping
Libel
ID
Theft
Fraud
Assault
Physical
World
Privacy – know your settings
your library of you - socialsafe.net
Social networks & Online privacy
• Are you a person of interest?
– Maybe not to national media
– But always the answer is yes
• Current & future employers
• Friends and acquaintances
• Partners and ex partners
• Understand what is public, private or semi-private
– Twitter is public, but has private Direct messages
– Facebook defaults to public, but can by private
– Be careful what you reveal publically online
• Hard to pull back your personal reputation
• Understand & use Privacy settings
– Default to Friends only where possible
– Network defaults are rarely very private
– You can often (but not always) delete posts/photos
your library of you - socialsafe.net
Passwords
• Passwords are you main line of defence
– Hackers DO try and guess
– Your (ex)partner, “friends”, others may try too
• Fraping – “When a friend or family member
pretends to be you and uses your Facebook
account (for example) to post funny (or
supposedly funny) updates”
• Use safe passwords
– Relatively easy to get details about you
• So don’t use birthdates, names, schools, anything
personal
• Safe passwords can be hard to remember
– Tools to help such as 1Password
• Security questions to recover passwords
– Lie, but do so in a way you can remember
Strong password
Long (8+ characters)
Upper & lower case
Include numbers (0..9)
Include special chars
(@£$%^&*:;….)
Different from site to site
your library of you - socialsafe.net
• Think before you click
– But we all get caught at some
point
– Have computer security
program
• & enable firewall
– (Stops people entering by the
back door)
– Keep your computer system
and phone system up to date
with latest software - by default
keep updates on
Computer security - viruses,
spyware, malware
your library of you - socialsafe.net
Exercises
• What password(s) do you Use?
• Check your Facebook privacy settings
• Has you computer got Virus Protection/Frewall
– Is it up to date?

Weitere ähnliche Inhalte

Ähnlich wie E security

Lesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptxLesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptxJoy Dugayo
 
Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Hannah Jane del Castillo
 
Don't Get Hacked
Don't Get HackedDon't Get Hacked
Don't Get HackedYTH
 
Password protection
Password protectionPassword protection
Password protectionpost_it
 
An Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & AnywhereAn Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & AnywhereBlake Carver
 
Using Skype, Facebook, and email to communicate with family and friends
Using Skype, Facebook, and email to communicate with family and friendsUsing Skype, Facebook, and email to communicate with family and friends
Using Skype, Facebook, and email to communicate with family and friendsSocial Status
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self DefenseBarry Caplin
 
password.ppt
password.pptpassword.ppt
password.pptKaxa5
 
Computer / Internet Security
Computer / Internet SecurityComputer / Internet Security
Computer / Internet SecurityDavid Cirella
 
An Introduction To IT Security And Privacy In Libraries
 An Introduction To IT Security And Privacy In Libraries An Introduction To IT Security And Privacy In Libraries
An Introduction To IT Security And Privacy In LibrariesBlake Carver
 
Online reputation
Online reputationOnline reputation
Online reputationesl2m
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awarenessKaran Veer Singh
 

Ähnlich wie E security (20)

Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Lesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptxLesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptx
 
Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Threats
ThreatsThreats
Threats
 
Don't Get Hacked
Don't Get HackedDon't Get Hacked
Don't Get Hacked
 
Web2.0 Class Guidelines
Web2.0 Class Guidelines Web2.0 Class Guidelines
Web2.0 Class Guidelines
 
Password protection
Password protectionPassword protection
Password protection
 
An Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & AnywhereAn Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & Anywhere
 
Judy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 PresentationJudy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 Presentation
 
Tablets, Apps and Cybersecurity
Tablets, Apps and CybersecurityTablets, Apps and Cybersecurity
Tablets, Apps and Cybersecurity
 
Using Skype, Facebook, and email to communicate with family and friends
Using Skype, Facebook, and email to communicate with family and friendsUsing Skype, Facebook, and email to communicate with family and friends
Using Skype, Facebook, and email to communicate with family and friends
 
Web2.0 Class Safety Guidelines
Web2.0 Class Safety GuidelinesWeb2.0 Class Safety Guidelines
Web2.0 Class Safety Guidelines
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self Defense
 
password.ppt
password.pptpassword.ppt
password.ppt
 
Computer / Internet Security
Computer / Internet SecurityComputer / Internet Security
Computer / Internet Security
 
An Introduction To IT Security And Privacy In Libraries
 An Introduction To IT Security And Privacy In Libraries An Introduction To IT Security And Privacy In Libraries
An Introduction To IT Security And Privacy In Libraries
 
Online reputation
Online reputationOnline reputation
Online reputation
 
Carver IT Security for Librarians
Carver IT Security for LibrariansCarver IT Security for Librarians
Carver IT Security for Librarians
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 

Mehr von Sue Black

Mumsnet techmums social media share
Mumsnet techmums social media shareMumsnet techmums social media share
Mumsnet techmums social media shareSue Black
 
Techmums social media
Techmums social mediaTechmums social media
Techmums social mediaSue Black
 
From Bletchley Park to modern computing: the value of Twitter
From Bletchley Park to modern computing: the value of TwitterFrom Bletchley Park to modern computing: the value of Twitter
From Bletchley Park to modern computing: the value of TwitterSue Black
 
goto sue black computer weekly
goto sue black computer weeklygoto sue black computer weekly
goto sue black computer weeklySue Black
 
Newcastle july2012sueblack
Newcastle july2012sueblackNewcastle july2012sueblack
Newcastle july2012sueblackSue Black
 
Did twitter save bletchley park?
Did twitter save bletchley park? Did twitter save bletchley park?
Did twitter save bletchley park? Sue Black
 
Turingslegacy
TuringslegacyTuringslegacy
TuringslegacySue Black
 
Sueblack overtheair2011
Sueblack overtheair2011Sueblack overtheair2011
Sueblack overtheair2011Sue Black
 
Google Feb 2011 - My life as a geek
Google Feb 2011 - My life as a geekGoogle Feb 2011 - My life as a geek
Google Feb 2011 - My life as a geekSue Black
 
Bpark guardian feb2011
Bpark guardian feb2011Bpark guardian feb2011
Bpark guardian feb2011Sue Black
 
Areusocialorantisocial old
Areusocialorantisocial oldAreusocialorantisocial old
Areusocialorantisocial oldSue Black
 
Opentech2010 Slideshare
Opentech2010 SlideshareOpentech2010 Slideshare
Opentech2010 SlideshareSue Black
 
Web2se Black et al
Web2se Black et alWeb2se Black et al
Web2se Black et alSue Black
 

Mehr von Sue Black (14)

Mumsnet techmums social media share
Mumsnet techmums social media shareMumsnet techmums social media share
Mumsnet techmums social media share
 
Techmums social media
Techmums social mediaTechmums social media
Techmums social media
 
From Bletchley Park to modern computing: the value of Twitter
From Bletchley Park to modern computing: the value of TwitterFrom Bletchley Park to modern computing: the value of Twitter
From Bletchley Park to modern computing: the value of Twitter
 
goto sue black computer weekly
goto sue black computer weeklygoto sue black computer weekly
goto sue black computer weekly
 
Newcastle july2012sueblack
Newcastle july2012sueblackNewcastle july2012sueblack
Newcastle july2012sueblack
 
Turing2012
Turing2012Turing2012
Turing2012
 
Did twitter save bletchley park?
Did twitter save bletchley park? Did twitter save bletchley park?
Did twitter save bletchley park?
 
Turingslegacy
TuringslegacyTuringslegacy
Turingslegacy
 
Sueblack overtheair2011
Sueblack overtheair2011Sueblack overtheair2011
Sueblack overtheair2011
 
Google Feb 2011 - My life as a geek
Google Feb 2011 - My life as a geekGoogle Feb 2011 - My life as a geek
Google Feb 2011 - My life as a geek
 
Bpark guardian feb2011
Bpark guardian feb2011Bpark guardian feb2011
Bpark guardian feb2011
 
Areusocialorantisocial old
Areusocialorantisocial oldAreusocialorantisocial old
Areusocialorantisocial old
 
Opentech2010 Slideshare
Opentech2010 SlideshareOpentech2010 Slideshare
Opentech2010 Slideshare
 
Web2se Black et al
Web2se Black et alWeb2se Black et al
Web2se Black et al
 

Kürzlich hochgeladen

Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 

Kürzlich hochgeladen (20)

Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 

E security

  • 1. your library of you - socialsafe.net How to stay safe online (eSecurity)
  • 2. your library of you - socialsafe.net Aim • Just a starter today covering main points of eSecurity – Privacy, Passwords, and Computer Security • There are many layers of actions you can take – Just like securing your home • A simple door lock • A 5 lever door lock • Window locks • Alarm system • CCTV • The internet offers huge advantages for everyone – and simple precautions will keep you safe
  • 3. your library of you - socialsafe.net Digital World Self Harm Permanence Ease of Search Ethical Grey Unethical Illegal Harm Spectrum Gossip Public Interest Privacy Invasion List Selling Unsolicited Calls Mug Targeting Phone Tapping Libel ID Theft Fraud Assault Physical World Privacy – know your settings
  • 4. your library of you - socialsafe.net Social networks & Online privacy • Are you a person of interest? – Maybe not to national media – But always the answer is yes • Current & future employers • Friends and acquaintances • Partners and ex partners • Understand what is public, private or semi-private – Twitter is public, but has private Direct messages – Facebook defaults to public, but can by private – Be careful what you reveal publically online • Hard to pull back your personal reputation • Understand & use Privacy settings – Default to Friends only where possible – Network defaults are rarely very private – You can often (but not always) delete posts/photos
  • 5. your library of you - socialsafe.net Passwords • Passwords are you main line of defence – Hackers DO try and guess – Your (ex)partner, “friends”, others may try too • Fraping – “When a friend or family member pretends to be you and uses your Facebook account (for example) to post funny (or supposedly funny) updates” • Use safe passwords – Relatively easy to get details about you • So don’t use birthdates, names, schools, anything personal • Safe passwords can be hard to remember – Tools to help such as 1Password • Security questions to recover passwords – Lie, but do so in a way you can remember Strong password Long (8+ characters) Upper & lower case Include numbers (0..9) Include special chars (@£$%^&*:;….) Different from site to site
  • 6. your library of you - socialsafe.net • Think before you click – But we all get caught at some point – Have computer security program • & enable firewall – (Stops people entering by the back door) – Keep your computer system and phone system up to date with latest software - by default keep updates on Computer security - viruses, spyware, malware
  • 7. your library of you - socialsafe.net Exercises • What password(s) do you Use? • Check your Facebook privacy settings • Has you computer got Virus Protection/Frewall – Is it up to date?