SlideShare ist ein Scribd-Unternehmen logo
1 von 32
Creating a digital toolkit for
users
How to teach our users how to limit their digital footprint
and escape hackers.
Justin Denton
I’m a Technology Innovator, spent time developing new
Technologies at IBM which were deployed to millions of new IBM
machines between 2002 to 2011. I also was the Faculty Lead and
acting Dean for the School of Technology at Rasmussen College.
I’ve always focused on the continued implementation of
technology into my day to day work to drive efficiencies.
In my most recent endeavor I took on the role of a Director with
Collegis Education to run a division of the company that is focused
on supporting over 40 College’s and Universities’ online classroom
environments.
I’m currently focused on providing industry leading levels of
support to the Higher Education Industry as well as grooming
team members of the support center into high performing
technology professionals. My passions are new technologies,
education, business process development, and accelerating the
growth of individuals through custom tailored learning
technologies.
https://www.linkedin.com/in/justindenton1/
Masters: Keller Graduate – Communications & Network Management
Bachelors: Devry – Network & Telecommunications Management
Certifications: ITIL Foundations, MCDST, MCP, & Crystal Reports
What are we talking about?
• Ever wonder what you should or shouldn’t share on the internet? Do you
see users who are posting everything thing they possibly could on the
internet and wonder how to help educate them to protect themselves?
• All of this collective sharing, creates a data gold mine for hackers to do
their evil bidding. In this session we will talk about what to post on the
internet and what not too. We will also look into what hackers can use
from the information you’ve posted on the internet and how they can use
it to gain access to your and your users personal lives, accounts, credit
cards, and more. During this session, we’ll dive into building a strategy
plan to help limit and hopefully eliminate these references from your
digital footprint to help ensure you are more secure than you were when
you first started this session.
• By the end of this webinar, attendees will have a virtual toolkit and
strategies to help educate users on protecting themselves while online.
Agenda
• Social Media can be your worst enemy.
• What to share / not to share.
• What do hackers use this info for?
• How to protect yourself.
• How long does this stuff last after I delete it?
• Are there tools to make this easier?
Social media can be your worst
enemy.
Why should I worry about posting stuff?
• Hackers can use it against you.
• Criminals can find out when your not home.
• Your personal information makes you more identifiable.
What to share / not to share.
Top items not to share…
• Personally Identifiable Information
• Phone number
• Email address
• Relatives Names
• When you’re on vacation & where.
• Money & Bank Information
• Hints about passwords (ie Dogs Names, Mother’s Maiden Name, etc.)
• Your Daily Schedule.
Who do you really know online?
• Do you know who you are sharing too?
• I have 1000’s of friends on Facebook, I can’t tell you if I know them all.
• Would you share what your about to share with the public?
• Would you scream it out loud inside Walmart?
What do hackers use this info
for?
Hackers…
• Harvest the data you post online to use against you.
• Can use your posts to guess your passwords & account information.
• Use your personal info to “Social Engineer” methods to obtain
account information.
• Role Playing / Impersonation
• Digital Dumpster Diving
• Use the old forgotten posts
Criminals / Scammers…
• View your posts to know when you’re not home.
• Make yourself a bigger target.
• Victim of Social Engineering
• That can you hear my call?
• Don’t answer Yes.
• Are you the lady of the house?
• Do you pay the household bills?
• Are you the homeowner?
Criminals / Scammers..
• Answering “Yes” on calls you don’t know
• Typically end up signing up up for something
• Just Say “No”.
• Calls can and will be recorded.
How to protect yourself.
Protect yourself
• Limit your Social Foot Print
• Monitor your Friends
• Watch what you post
• Keep your Personally Identifiable Information private
• Check your Security Settings
• Facebook has public options that are enabled by default.
Protect yourself
• How private you are online is up to you. -
Manage it well
• Be aware of what you share and with whom
• Be sure to familiarize yourself with geolocation
and location sharing. Check your settings to
make sure you keep this information private.
• Use Strong passwords & Don’t use something
that people know
• Remove unwanted internet posts/content
• Periodically search your name
Erase yourself from the Internet
• Although its difficult to do you
may want to:
• Delete your accounts from Social
Media Sites.
• Remove yourself from Background
Check Sites
Sites that have your background info
Intelius.com Acxiom.com
MyLife.com ZabaSearch.com
Spoke.com BeenVerified.com
PeekYou.com USSearch.com
PeopleFinders.com WhitePages.com
Spokeo.com Radaris.com
How long does this stuff last after
I delete it?
Its difficult to disappear
• Online its hard to disappear
• Delete accounts may not always remove past posts on others feeds
• You posts may have been shared by others
• May cause programmatical broken link errors
• Cool-Off Period
• May reactivate your account automatically if you accidentally logon
Background info sites
• It only lasts as long as you don’t do anything that hits public record
again.
• If you get arrested, fight a public legal battle, get married, buy a new
home, etc.
• Then you’ll need to repeat the process for peace of mind.
Social media
• Typically its instant
• But some sites have data retention policies
• Wait months possibly a year before it falls out completely
• The Way Back Machine may keep your data forever
• WikiDumps lets you download entire Wikipedia database
• YouTube Downloaders allow you to download videos to your
computer.
Are there tools to make this
easier?
How to get off these sites?
• Want to figure out how to remove yourself from the background
search sites?
• Check out site from LawyerCT
• http://tinyurl.com/backgone
Speed it up
• Account Killer maintain massive database of sites—more than 500 in
all. App can provide direct links to each one's deletion page.
• Just Delete Me offers a similar service, as well as a handy Chrome
Extension that will light up whenever you're on a site that JDM
recognizes and will link you directly to the site's account deletion
page.
• Knowem, finds sites that you may have forgotten about entirely by
doing a username search on more that 500 popular social sites.
Speed it up
• Deseat.me – Internet site aimed at cleaning up your online presence.
• DeleteMe from Abine – Paid Service to continue monitoring and
deleting your online presence.
Get a Status Check
• Zabasearch: Zabasearch is mostly about finding addresses and phone
numbers. Make a quick search of yourself and see what it knows.
• Intelius: Intelius can perform background checks, hunt down criminal
records, email addresses, social networks, and more. You have to pay to get
your results, but you'll get a general idea of what's out there by simply
searching your name.
• Spokeo: Spokeo is essentially an address book and it can track you down
suprisingly well to reveal your gender, age, phone number, address,
relatives, marital status, and a whole lot more. Again, it costs a bit of
money to get your full results, but you can get a general idea of what you
need to snuff out.
• Pipl: Pipl aggregates all of the above searches, but it's worth looking at to
make sure no others have slipped through the cracks.
The checklist
1. Review your accounts, posts and Days of the Internet Past
2. Remove old unwanted content
3. Remove personally identifiable information
4. Use tools to speed up the process
5. Continue searching yourself
Get it? Got it? Good.

Weitere ähnliche Inhalte

Was ist angesagt?

Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshipjleverett
 
Advantages of Digital Identity
Advantages of Digital IdentityAdvantages of Digital Identity
Advantages of Digital IdentityDigital-identity
 
Internet safety update
Internet safety updateInternet safety update
Internet safety update14071828
 
06 12 13 LCAR Social Media Lunch And Learn
06 12 13 LCAR Social Media Lunch And Learn06 12 13 LCAR Social Media Lunch And Learn
06 12 13 LCAR Social Media Lunch And LearnJeff Geoghan
 
Mang2049 intro session 07112017
Mang2049 intro session 07112017Mang2049 intro session 07112017
Mang2049 intro session 07112017Lisa Harris
 
The Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and CriminalsThe Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and CriminalsCreepSquash
 
Pinterest tos presentation (final)
Pinterest tos presentation (final)Pinterest tos presentation (final)
Pinterest tos presentation (final)13323606
 
OVES Social Media Networking BrownBag
OVES Social Media Networking BrownBagOVES Social Media Networking BrownBag
OVES Social Media Networking BrownBagNapoleon Hardy
 
Social media user guide
Social media user guideSocial media user guide
Social media user guideWhitney Moore
 
Guideline about responsible use of social networks
Guideline about responsible use of social networksGuideline about responsible use of social networks
Guideline about responsible use of social networksprofesorjulioperez
 
Digital footprint presentation
Digital footprint presentationDigital footprint presentation
Digital footprint presentationsahrdebeck52
 
Your e image presentation
Your e image presentationYour e image presentation
Your e image presentationlahill16
 
Social Networking: An overview for all ages
Social Networking: An overview for all agesSocial Networking: An overview for all ages
Social Networking: An overview for all agesTim Keneipp
 
Mobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech MogulMobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech MogulAndrew Schwabe
 

Was ist angesagt? (17)

Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Advantages of Digital Identity
Advantages of Digital IdentityAdvantages of Digital Identity
Advantages of Digital Identity
 
Digital Tattoo SLC 2010 Slideshow
Digital Tattoo SLC 2010 SlideshowDigital Tattoo SLC 2010 Slideshow
Digital Tattoo SLC 2010 Slideshow
 
Digital Footprint
Digital Footprint  Digital Footprint
Digital Footprint
 
Internet safety update
Internet safety updateInternet safety update
Internet safety update
 
06 12 13 LCAR Social Media Lunch And Learn
06 12 13 LCAR Social Media Lunch And Learn06 12 13 LCAR Social Media Lunch And Learn
06 12 13 LCAR Social Media Lunch And Learn
 
Mang2049 intro session 07112017
Mang2049 intro session 07112017Mang2049 intro session 07112017
Mang2049 intro session 07112017
 
The Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and CriminalsThe Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and Criminals
 
Pinterest tos presentation (final)
Pinterest tos presentation (final)Pinterest tos presentation (final)
Pinterest tos presentation (final)
 
OVES Social Media Networking BrownBag
OVES Social Media Networking BrownBagOVES Social Media Networking BrownBag
OVES Social Media Networking BrownBag
 
Social media user guide
Social media user guideSocial media user guide
Social media user guide
 
Guideline about responsible use of social networks
Guideline about responsible use of social networksGuideline about responsible use of social networks
Guideline about responsible use of social networks
 
Digital footprint presentation
Digital footprint presentationDigital footprint presentation
Digital footprint presentation
 
Your e image presentation
Your e image presentationYour e image presentation
Your e image presentation
 
Social Networking: An overview for all ages
Social Networking: An overview for all agesSocial Networking: An overview for all ages
Social Networking: An overview for all ages
 
Social media
Social mediaSocial media
Social media
 
Mobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech MogulMobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech Mogul
 

Ähnlich wie Creating a digital toolkit for users: How to teach our users how to limit their digital footprint and escape hackers.

Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awarenessKaran Veer Singh
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayanehaz
 
Cybersecurity additional activities
Cybersecurity additional activitiesCybersecurity additional activities
Cybersecurity additional activitiesYumonomics
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupBrian Pichman
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Securing & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxSecuring & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxBrian Pichman
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxKevinRiley83
 
A HillyBilly's Guide to Staying Anonymous Online - SecureWV
A HillyBilly's Guide to Staying Anonymous Online - SecureWVA HillyBilly's Guide to Staying Anonymous Online - SecureWV
A HillyBilly's Guide to Staying Anonymous Online - SecureWVAdam Compton
 
8th grade presentation for slideshare
8th grade presentation for slideshare8th grade presentation for slideshare
8th grade presentation for slideshareMarian Merritt
 
[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop SlidesNathanielCarlson2
 
Digital Identity
Digital IdentityDigital Identity
Digital IdentityAaron Wong
 
Pod camp boston 2011 locking up yourself online
Pod camp boston 2011 locking up yourself onlinePod camp boston 2011 locking up yourself online
Pod camp boston 2011 locking up yourself onlineLane Sutton
 
Corp Web Risks and Concerns
Corp Web Risks and ConcernsCorp Web Risks and Concerns
Corp Web Risks and ConcernsPINT Inc
 
Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012curlistl
 
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleCybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleBrian Pichman
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024Brian Pichman
 

Ähnlich wie Creating a digital toolkit for users: How to teach our users how to limit their digital footprint and escape hackers. (20)

Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Cybersecurity additional activities
Cybersecurity additional activitiesCybersecurity additional activities
Cybersecurity additional activities
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library Setup
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Securing & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxSecuring & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptx
 
Reo expo presentation_6-14-2011 vers1 6.11.11
Reo expo presentation_6-14-2011 vers1 6.11.11Reo expo presentation_6-14-2011 vers1 6.11.11
Reo expo presentation_6-14-2011 vers1 6.11.11
 
Internet security
Internet securityInternet security
Internet security
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 
A HillyBilly's Guide to Staying Anonymous Online - SecureWV
A HillyBilly's Guide to Staying Anonymous Online - SecureWVA HillyBilly's Guide to Staying Anonymous Online - SecureWV
A HillyBilly's Guide to Staying Anonymous Online - SecureWV
 
8th grade presentation for slideshare
8th grade presentation for slideshare8th grade presentation for slideshare
8th grade presentation for slideshare
 
[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides
 
Digital Identity
Digital IdentityDigital Identity
Digital Identity
 
Pod camp boston 2011 locking up yourself online
Pod camp boston 2011 locking up yourself onlinePod camp boston 2011 locking up yourself online
Pod camp boston 2011 locking up yourself online
 
Corp Web Risks and Concerns
Corp Web Risks and ConcernsCorp Web Risks and Concerns
Corp Web Risks and Concerns
 
Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012
 
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleCybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
 
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024
 

Mehr von Justin Denton

Introduction to Bitcoin and Crypto-currency
Introduction to Bitcoin and Crypto-currency Introduction to Bitcoin and Crypto-currency
Introduction to Bitcoin and Crypto-currency Justin Denton
 
Enhancing the User Experience with ​Smart Technologies
Enhancing the User Experience with ​Smart TechnologiesEnhancing the User Experience with ​Smart Technologies
Enhancing the User Experience with ​Smart TechnologiesJustin Denton
 
Start of the new year by getting organized : Managing your life through the w...
Start of the new year by getting organized : Managing your life through the w...Start of the new year by getting organized : Managing your life through the w...
Start of the new year by getting organized : Managing your life through the w...Justin Denton
 
Leveraging Cloud Based Technology to Increase Productivity
Leveraging Cloud Based Technology to Increase ProductivityLeveraging Cloud Based Technology to Increase Productivity
Leveraging Cloud Based Technology to Increase ProductivityJustin Denton
 
How to Insert your Library into the mobile sharing economy
How to Insert your Library into the mobile sharing economyHow to Insert your Library into the mobile sharing economy
How to Insert your Library into the mobile sharing economyJustin Denton
 
Leveraging Cloud Based Technologies for Increased Team Productivity
Leveraging Cloud Based Technologies for Increased Team ProductivityLeveraging Cloud Based Technologies for Increased Team Productivity
Leveraging Cloud Based Technologies for Increased Team ProductivityJustin Denton
 
Automating with the Internet of Things
Automating with the Internet of ThingsAutomating with the Internet of Things
Automating with the Internet of ThingsJustin Denton
 
Beyond the Brick and Mortar - NEFLIN 2016 - Hot Topics User Experience Confer...
Beyond the Brick and Mortar - NEFLIN 2016 - Hot Topics User Experience Confer...Beyond the Brick and Mortar - NEFLIN 2016 - Hot Topics User Experience Confer...
Beyond the Brick and Mortar - NEFLIN 2016 - Hot Topics User Experience Confer...Justin Denton
 

Mehr von Justin Denton (10)

Introduction to Bitcoin and Crypto-currency
Introduction to Bitcoin and Crypto-currency Introduction to Bitcoin and Crypto-currency
Introduction to Bitcoin and Crypto-currency
 
Enhancing the User Experience with ​Smart Technologies
Enhancing the User Experience with ​Smart TechnologiesEnhancing the User Experience with ​Smart Technologies
Enhancing the User Experience with ​Smart Technologies
 
Start of the new year by getting organized : Managing your life through the w...
Start of the new year by getting organized : Managing your life through the w...Start of the new year by getting organized : Managing your life through the w...
Start of the new year by getting organized : Managing your life through the w...
 
Leveraging Cloud Based Technology to Increase Productivity
Leveraging Cloud Based Technology to Increase ProductivityLeveraging Cloud Based Technology to Increase Productivity
Leveraging Cloud Based Technology to Increase Productivity
 
Mesh Networks
Mesh NetworksMesh Networks
Mesh Networks
 
How to Insert your Library into the mobile sharing economy
How to Insert your Library into the mobile sharing economyHow to Insert your Library into the mobile sharing economy
How to Insert your Library into the mobile sharing economy
 
Leveraging Cloud Based Technologies for Increased Team Productivity
Leveraging Cloud Based Technologies for Increased Team ProductivityLeveraging Cloud Based Technologies for Increased Team Productivity
Leveraging Cloud Based Technologies for Increased Team Productivity
 
Automating with the Internet of Things
Automating with the Internet of ThingsAutomating with the Internet of Things
Automating with the Internet of Things
 
HTTPS
HTTPSHTTPS
HTTPS
 
Beyond the Brick and Mortar - NEFLIN 2016 - Hot Topics User Experience Confer...
Beyond the Brick and Mortar - NEFLIN 2016 - Hot Topics User Experience Confer...Beyond the Brick and Mortar - NEFLIN 2016 - Hot Topics User Experience Confer...
Beyond the Brick and Mortar - NEFLIN 2016 - Hot Topics User Experience Confer...
 

Kürzlich hochgeladen

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 

Kürzlich hochgeladen (20)

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

Creating a digital toolkit for users: How to teach our users how to limit their digital footprint and escape hackers.

  • 1. Creating a digital toolkit for users How to teach our users how to limit their digital footprint and escape hackers.
  • 2. Justin Denton I’m a Technology Innovator, spent time developing new Technologies at IBM which were deployed to millions of new IBM machines between 2002 to 2011. I also was the Faculty Lead and acting Dean for the School of Technology at Rasmussen College. I’ve always focused on the continued implementation of technology into my day to day work to drive efficiencies. In my most recent endeavor I took on the role of a Director with Collegis Education to run a division of the company that is focused on supporting over 40 College’s and Universities’ online classroom environments. I’m currently focused on providing industry leading levels of support to the Higher Education Industry as well as grooming team members of the support center into high performing technology professionals. My passions are new technologies, education, business process development, and accelerating the growth of individuals through custom tailored learning technologies. https://www.linkedin.com/in/justindenton1/ Masters: Keller Graduate – Communications & Network Management Bachelors: Devry – Network & Telecommunications Management Certifications: ITIL Foundations, MCDST, MCP, & Crystal Reports
  • 3. What are we talking about? • Ever wonder what you should or shouldn’t share on the internet? Do you see users who are posting everything thing they possibly could on the internet and wonder how to help educate them to protect themselves? • All of this collective sharing, creates a data gold mine for hackers to do their evil bidding. In this session we will talk about what to post on the internet and what not too. We will also look into what hackers can use from the information you’ve posted on the internet and how they can use it to gain access to your and your users personal lives, accounts, credit cards, and more. During this session, we’ll dive into building a strategy plan to help limit and hopefully eliminate these references from your digital footprint to help ensure you are more secure than you were when you first started this session. • By the end of this webinar, attendees will have a virtual toolkit and strategies to help educate users on protecting themselves while online.
  • 4. Agenda • Social Media can be your worst enemy. • What to share / not to share. • What do hackers use this info for? • How to protect yourself. • How long does this stuff last after I delete it? • Are there tools to make this easier?
  • 5. Social media can be your worst enemy.
  • 6.
  • 7. Why should I worry about posting stuff? • Hackers can use it against you. • Criminals can find out when your not home. • Your personal information makes you more identifiable.
  • 8.
  • 9.
  • 10. What to share / not to share.
  • 11. Top items not to share… • Personally Identifiable Information • Phone number • Email address • Relatives Names • When you’re on vacation & where. • Money & Bank Information • Hints about passwords (ie Dogs Names, Mother’s Maiden Name, etc.) • Your Daily Schedule.
  • 12. Who do you really know online? • Do you know who you are sharing too? • I have 1000’s of friends on Facebook, I can’t tell you if I know them all. • Would you share what your about to share with the public? • Would you scream it out loud inside Walmart?
  • 13. What do hackers use this info for?
  • 14. Hackers… • Harvest the data you post online to use against you. • Can use your posts to guess your passwords & account information. • Use your personal info to “Social Engineer” methods to obtain account information. • Role Playing / Impersonation • Digital Dumpster Diving • Use the old forgotten posts
  • 15. Criminals / Scammers… • View your posts to know when you’re not home. • Make yourself a bigger target. • Victim of Social Engineering • That can you hear my call? • Don’t answer Yes. • Are you the lady of the house? • Do you pay the household bills? • Are you the homeowner?
  • 16. Criminals / Scammers.. • Answering “Yes” on calls you don’t know • Typically end up signing up up for something • Just Say “No”. • Calls can and will be recorded.
  • 17. How to protect yourself.
  • 18. Protect yourself • Limit your Social Foot Print • Monitor your Friends • Watch what you post • Keep your Personally Identifiable Information private • Check your Security Settings • Facebook has public options that are enabled by default.
  • 19. Protect yourself • How private you are online is up to you. - Manage it well • Be aware of what you share and with whom • Be sure to familiarize yourself with geolocation and location sharing. Check your settings to make sure you keep this information private. • Use Strong passwords & Don’t use something that people know • Remove unwanted internet posts/content • Periodically search your name
  • 20. Erase yourself from the Internet • Although its difficult to do you may want to: • Delete your accounts from Social Media Sites. • Remove yourself from Background Check Sites
  • 21. Sites that have your background info Intelius.com Acxiom.com MyLife.com ZabaSearch.com Spoke.com BeenVerified.com PeekYou.com USSearch.com PeopleFinders.com WhitePages.com Spokeo.com Radaris.com
  • 22. How long does this stuff last after I delete it?
  • 23. Its difficult to disappear • Online its hard to disappear • Delete accounts may not always remove past posts on others feeds • You posts may have been shared by others • May cause programmatical broken link errors • Cool-Off Period • May reactivate your account automatically if you accidentally logon
  • 24. Background info sites • It only lasts as long as you don’t do anything that hits public record again. • If you get arrested, fight a public legal battle, get married, buy a new home, etc. • Then you’ll need to repeat the process for peace of mind.
  • 25. Social media • Typically its instant • But some sites have data retention policies • Wait months possibly a year before it falls out completely • The Way Back Machine may keep your data forever • WikiDumps lets you download entire Wikipedia database • YouTube Downloaders allow you to download videos to your computer.
  • 26. Are there tools to make this easier?
  • 27. How to get off these sites? • Want to figure out how to remove yourself from the background search sites? • Check out site from LawyerCT • http://tinyurl.com/backgone
  • 28. Speed it up • Account Killer maintain massive database of sites—more than 500 in all. App can provide direct links to each one's deletion page. • Just Delete Me offers a similar service, as well as a handy Chrome Extension that will light up whenever you're on a site that JDM recognizes and will link you directly to the site's account deletion page. • Knowem, finds sites that you may have forgotten about entirely by doing a username search on more that 500 popular social sites.
  • 29. Speed it up • Deseat.me – Internet site aimed at cleaning up your online presence. • DeleteMe from Abine – Paid Service to continue monitoring and deleting your online presence.
  • 30. Get a Status Check • Zabasearch: Zabasearch is mostly about finding addresses and phone numbers. Make a quick search of yourself and see what it knows. • Intelius: Intelius can perform background checks, hunt down criminal records, email addresses, social networks, and more. You have to pay to get your results, but you'll get a general idea of what's out there by simply searching your name. • Spokeo: Spokeo is essentially an address book and it can track you down suprisingly well to reveal your gender, age, phone number, address, relatives, marital status, and a whole lot more. Again, it costs a bit of money to get your full results, but you can get a general idea of what you need to snuff out. • Pipl: Pipl aggregates all of the above searches, but it's worth looking at to make sure no others have slipped through the cracks.
  • 31. The checklist 1. Review your accounts, posts and Days of the Internet Past 2. Remove old unwanted content 3. Remove personally identifiable information 4. Use tools to speed up the process 5. Continue searching yourself
  • 32. Get it? Got it? Good.

Hinweis der Redaktion

  1. Accept friends that you know