SlideShare ist ein Scribd-Unternehmen logo
1 von 33
Ways to Address
Online Privacy and
Security
TechTalk for JCCC
Retirees Association
May 28, 2020
2-3 PM
CURRENT SCAMS
• COVID-19 catfishing
scams rebound amid
pandemic: stealing
photos of frontline
workers scammers lure
victims to give money to
fake charity
• COVID-19
contamination scam
plays off fears of
consumers: by text told
they know someone
with COVID-19, click a
link for further
information and action
• IRS stimulus check
scams ramp up: told IRS
needs their bank
account information in
order to deposit the
check
• COVID-19 grandparent
scams prey on seniors:
posing as grandchildren
who claim they are sick
and need money to pay
their hospital bills
https://www.idtheftcenter.org/current-scam-alerts/
COVID-19
(and other)
Charity Scams
• Research: Use watchdog groups such
as CharityWatch, CharityNavigator, and Wise Giving Alliance (Better
Business Bureau)
• Search the Web for charity name plus words such as "complaints,"
"review" or "scam"
• Warning signs: undue pressure, payment method (gift cards, wire
transfers, cash), bogus thank you emails, emails with attachments
• Guard personal data
• Donate direct, don’t respond to email
Source: us.norton.com/internetsecurity-crm-identitytheftprotection-
covid-19-charity-scams-9-tips-to-help-avoid-fakes.html
STOLEN DATA: Passwords, Credit card
numbers, Email addresses, Phone
numbers, Dates of birth, Security
questions
• Adobe (38 million)
• Adult Friend Finder
• Canva
• Dubsmash
• eBay (145 million)
• Equifax (143 million)
• Heartland Payment
Systems
• LinkedIn
• Marriott International
(500 million)
• My Fitness Pal
• MySpace
• NetEase
• Sina Weibo
• Yahoo (3 billion)
• Zynga
Check https://haveibeenpwned.com/
Your Best Defense
• Use strong, complex
passwords or pass
phrases
• Use two-factor
authentication for
important accounts
(Google, Apple,
financial, health)
• Don’t accept requests
from unknown
individuals
• Beware unexpected
links or attachments
• Download apps from
recognized safe sites
(App Store, Google
Play, Microsoft Store)
Healthy
Password
Checklist
Best 2020 Password vaults
• Zoho Vault
• Dashlane
• Keeper
• LastPass
• RoboForm
• 1Password
• Norton password manager
www.pcmag.com/picks/the-
best-password-managers
• Password Boss
• Sticky Password Bit Warden
• LogMeOnce
• mSecure
Safe Browsing - For Privacy’s
Sake: Incognito, Private &
InPrivate
• Mozilla FireFox’s Private Window = Ctrl-Shift-
P (Win) or Command-Shift-P (macOS). Or open
menu (upper right of Firefox, three short
horizontal lines) select New Private Window.
• Apple Safari’s Private Window = Command-
Shift-N (macOS) or select File > New Private
Window (Win).
• Google Chrome's incognito Window = Ctrl-
Shift-N (Win) or Command-Shift-N (macOS).
Or click menu (upper right –three vertical dots)
select New Incognito Window.
• Microsoft Edge’s InPrivate Window = Ctrl-Shift-
N (Win) or Command-Shift-N (macOS). Or click
menu (upper right, three dots arranged
horizontally) choose New InPrivate window.
www.computerworld.com/article/3356840/how-to-go-incognito-in-
chrome-firefox-safari-and-edge.html
DuckDuckGo: Browser or Add-on
DuckDuckGo
Browser or
Add-on
• Private Search
• No personal data
collected
• Blocks hidden trackers
• Site Encryption
• Browse as Usual
Clear
Browser
Cache and
Cookies
Open Chrome.
• At the top right, click
3 dot menu >
Settings.
• Under "Privacy and
security," click
“Clear browsing
data.”
• Select the
appropriate check
boxes for “Browsing
history,” “Cookies
and other site data.”
and “Cached images
and files.”
• Click “Clear data.”
Open Edge.
• At the top right,
click 3 dot menu >
Settings.
• Select “Privacy
and security.”
• Select “Clear
browsing data.”
• Use check boxes to
select the data you
want cleared.
• Click “Clear.”
On Facebook: Be
Safe, Be Proactive
• Think before you
share anything!
• Don't include birthday,
address, phone on
your profile
www.facebook.com/h
elp/101765758165199
4/
• Review and update
social media privacy
settings
www.facebook.com/h
elp/115450405225661
• Take a Facebook
Privacy Checkup
www.facebook.com/a
bout/basics/manage-
your-privacy/posts#16
Problem: Fake
Requests From
Spam Profiles
Clues to fake Facebook
friend requests
• Do you know
requestor or have
friends in common?
• Is request from an
unknown attractive
member of opposite
sex?
• Profile has limited
Facebook history or
timeline?
• Already Facebook
friends?
Suspect a Fake
Facebook Request?
• Check with your
friend. New
account?
• Check account for
activity. When
established?
• Process to report
face Facebook friend
request:
https://www.socme
dsean.com/answere
d-how-do-i-report-a-
fake-facebook-
friend-request/
Problem: Risks in
Social Sharing
• Facebook, Instagram, and
Snapchat can reveal your
location
• Posting while traveling (Do you
want folks to know your house
or apartment is empty?)
• Photo metadata can identify
your location
Note: sites like metapicz.com,
whereisthepicture.com and
www.pic2map.com can identify
map locations unless geo-tagging
is turned off on the
camera/smartphone.
Pic2Map Example
• Displays photo image, camera used, date, address, city, country,
satellite image and standard map of location
Problem: Profile Hacking
• Cracking social
media user account
passwords: most
common way to
hack one’s profile
• Solution: Use
complex and
frequently changed
passwords
• Beware of Facebook
Chat (Messenger)
messages even
from people you
know
Profile
Hacking
Apps and websites can be
used to create fake
Facebook chats online
In Case You’re Hacked:
Symptoms
• Your device slows down
• You’re using far more data with ISP
than expected
• Videos suddenly buffer, web pages
take longer to load
• Programs and apps keep crashing
• Your device (computer, mobile
device, phone) suddenly reboots
• Unexplained online activity
In Case You’re
Hacked: Solutions
• Run your antivirus
software
• Install any Operating
System upgrades
• Check Task Manager
(Windows) or
Activity Manager
(Mac) – unknown
apps
• Check ISP data
usage for unusual
spikes
• Reboot system see if
problem persists
• Constantly check
your accounts for
unauthorized
activity
Check For Unusual
Activity:
• Unauthorized
financial
transactions
• Credit card charges
or purchases you
didn’t make
• Movies on Netflix
you didn’t stream
• Songs on Spotify or
Pandora you didn’t
play
• Unrecognized
Facebook activity
Think Your Account Is
Hacked?
• Change your passwords, even for old
accounts that may use a common password
• Stop using the hacked
password…everywhere!
• Monitor statements (credit cards and
financial institutions) for charges you don’t
recognize.
• Alert financial institutions that you’ve been
hacked, if you find any evidence.
• Use distinctive passwords, especially for
accounts with personal, health and
financial data.
• Use a cross-platform password manager to
store passwords. Some apps generate
complex passwords for you.
Your Facebook
Account Hacked?
• Check out
m.facebook.com/help/20330589
3040179/
• Explore link to Step by step guide
m.facebook.com/help/13067254
09382822
• If someone tried to change email
associated with a Facebook
account, Facebook sends a
message to the previous email
account with a special link. You
can click the link to reverse the
email change and secure your
account.
Google Account
Hacked?
Report suspicious mail to
Google
productforums.google.co
m/forum/#!msg/gmail/RI
yIm0v-
xnA/py_QQyH4BwAJ
Problem: Malicious Links
and Attachments
• Email with fake embedded email
addresses or links
• Email with unsolicited images or video
attached
• If you receive unexpected email or text
attachment (photo, video, link), always
check with sender to verify
Innocent eMail or Text: “How are you?”
Don’t volunteer personal details
unless you know who you are
communicating with.
Check the real address
Resources
10 Worst Social Media Hacks
https://www.infosecurity-
magazine.com/blogs/top-10-worst-
social-media-cyber/
18 Biggest Data Breaches of 20th
Century
https://www.csoonline.com/article/213
0877/the-biggest-data-breaches-of-the-
21st-century.html
Has Your Phone Been Hacked?
https://www.usatoday.com/story/tech/
columnist/komando/2018/05/04/has-
your-computer-phone-been-hacked-
heres-how-tell/559136002/
Privacy/Security Risks of Social Media
https://www.rswebsols.com/tutorials/in
ternet/privacy-security-risks-social-
media
Resources
How do I spot and Report a Fake
Facebook Friend Request?
https://www.socmedsean.com/ans
wered-how-do-i-report-a-fake-
facebook-friend-request/
Find Location from Photo
https://www.guidingtech.com/find
-location-from-photo/
How to Spot a Fake Friend Request
https://www.lifewire.com/how-to-
spot-a-fake-friend-request-
2487747
Assembled by Jonathan
Bacon for the Johnson
County Community
College Retirees
Association, March 2019,
updated May 2020
Questions or Comments?

Weitere ähnliche Inhalte

Ähnlich wie Online Discussion: Ways to Address Online Privacy and Security

Cybersecurity additional activities
Cybersecurity additional activitiesCybersecurity additional activities
Cybersecurity additional activitiesYumonomics
 
10 online privacy module samedit1
10 online privacy  module samedit110 online privacy  module samedit1
10 online privacy module samedit1Rozell Sneede
 
Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Justin Denton
 
Pod camp boston 2011 locking up yourself online
Pod camp boston 2011 locking up yourself onlinePod camp boston 2011 locking up yourself online
Pod camp boston 2011 locking up yourself onlineLane Sutton
 
Spam & Phishing
Spam & PhishingSpam & Phishing
Spam & PhishingGrittyCC
 
PROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACYPROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACYDoubleXDS
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024Brian Pichman
 
Protecting Personal Privacy
Protecting Personal PrivacyProtecting Personal Privacy
Protecting Personal PrivacyDoubleXDS
 
Digital marketing prepared by sandykat
Digital marketing prepared by sandykatDigital marketing prepared by sandykat
Digital marketing prepared by sandykatsandykat
 
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleCybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleBrian Pichman
 
Digital privacy
Digital privacyDigital privacy
Digital privacyAnna Adel
 
Man vs Internet - Current challenges and future tendencies of establishing tr...
Man vs Internet - Current challenges and future tendencies of establishing tr...Man vs Internet - Current challenges and future tendencies of establishing tr...
Man vs Internet - Current challenges and future tendencies of establishing tr...Luis Grangeia
 

Ähnlich wie Online Discussion: Ways to Address Online Privacy and Security (20)

Social Media Risks
Social Media RisksSocial Media Risks
Social Media Risks
 
Cybersecurity additional activities
Cybersecurity additional activitiesCybersecurity additional activities
Cybersecurity additional activities
 
10 online privacy module samedit1
10 online privacy  module samedit110 online privacy  module samedit1
10 online privacy module samedit1
 
10 online privacy module samedit1
10 online privacy  module samedit110 online privacy  module samedit1
10 online privacy module samedit1
 
Shopping and banking online
Shopping and banking onlineShopping and banking online
Shopping and banking online
 
Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...
 
DoD Social Media Guide
DoD Social Media GuideDoD Social Media Guide
DoD Social Media Guide
 
Pod camp boston 2011 locking up yourself online
Pod camp boston 2011 locking up yourself onlinePod camp boston 2011 locking up yourself online
Pod camp boston 2011 locking up yourself online
 
Spam & Phishing
Spam & PhishingSpam & Phishing
Spam & Phishing
 
Social Media Safety
Social Media SafetySocial Media Safety
Social Media Safety
 
PROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACYPROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACY
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024
 
Chapter-5.pptx
Chapter-5.pptxChapter-5.pptx
Chapter-5.pptx
 
Protecting Personal Privacy
Protecting Personal PrivacyProtecting Personal Privacy
Protecting Personal Privacy
 
Digital marketing prepared by sandykat
Digital marketing prepared by sandykatDigital marketing prepared by sandykat
Digital marketing prepared by sandykat
 
Guide to facebook security
Guide to facebook securityGuide to facebook security
Guide to facebook security
 
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleCybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
 
Payment fraud
Payment fraudPayment fraud
Payment fraud
 
Digital privacy
Digital privacyDigital privacy
Digital privacy
 
Man vs Internet - Current challenges and future tendencies of establishing tr...
Man vs Internet - Current challenges and future tendencies of establishing tr...Man vs Internet - Current challenges and future tendencies of establishing tr...
Man vs Internet - Current challenges and future tendencies of establishing tr...
 

Mehr von Jonathan Bacon

Chapter 5 Jeremiah: Plucking Up and Planting
Chapter 5 Jeremiah: Plucking Up and PlantingChapter 5 Jeremiah: Plucking Up and Planting
Chapter 5 Jeremiah: Plucking Up and PlantingJonathan Bacon
 
The Naked Truth About Retirement 2021 Edition
The Naked Truth About Retirement 2021 EditionThe Naked Truth About Retirement 2021 Edition
The Naked Truth About Retirement 2021 EditionJonathan Bacon
 
Johnson County Community College Fall 2020 General Meeting
Johnson County Community College Fall 2020 General MeetingJohnson County Community College Fall 2020 General Meeting
Johnson County Community College Fall 2020 General MeetingJonathan Bacon
 
Walking, Hiking, Cycling Trails of Johnson County
Walking, Hiking, Cycling Trails of Johnson CountyWalking, Hiking, Cycling Trails of Johnson County
Walking, Hiking, Cycling Trails of Johnson CountyJonathan Bacon
 
The Naked Truth About Retirement - 2020 Edition
The Naked Truth About  Retirement - 2020 EditionThe Naked Truth About  Retirement - 2020 Edition
The Naked Truth About Retirement - 2020 EditionJonathan Bacon
 
Mobile Photo Editing with Snapseed
Mobile Photo Editing with SnapseedMobile Photo Editing with Snapseed
Mobile Photo Editing with SnapseedJonathan Bacon
 
Fake News and Mainstream Media Bias
Fake News and Mainstream Media BiasFake News and Mainstream Media Bias
Fake News and Mainstream Media BiasJonathan Bacon
 
400+ Channels & Nothing to Watch
400+ Channels & Nothing to Watch400+ Channels & Nothing to Watch
400+ Channels & Nothing to WatchJonathan Bacon
 
iPhone Tips for Everyday Users
iPhone Tips for Everyday Users iPhone Tips for Everyday Users
iPhone Tips for Everyday Users Jonathan Bacon
 
Notes Included: Naked Truth About Retirement 2019
Notes Included: Naked Truth About Retirement 2019Notes Included: Naked Truth About Retirement 2019
Notes Included: Naked Truth About Retirement 2019Jonathan Bacon
 
Naked Truth About Retirement 2019
Naked Truth About Retirement 2019Naked Truth About Retirement 2019
Naked Truth About Retirement 2019Jonathan Bacon
 
The Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and PrivacyThe Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and PrivacyJonathan Bacon
 
Notes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and PrivacyNotes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and PrivacyJonathan Bacon
 
Exploring Travel Apps and Tools
Exploring Travel Apps and Tools Exploring Travel Apps and Tools
Exploring Travel Apps and Tools Jonathan Bacon
 
Athanasius of Alexandria
Athanasius of AlexandriaAthanasius of Alexandria
Athanasius of AlexandriaJonathan Bacon
 
Exploring Do-It-Yourself and Installed Home Security Systems
Exploring Do-It-Yourself and Installed Home Security SystemsExploring Do-It-Yourself and Installed Home Security Systems
Exploring Do-It-Yourself and Installed Home Security SystemsJonathan Bacon
 
Rapid-fire Ed Tech Forums #1 & #2: 7 Presenters Offer 7 Slides in 7 Minutes
Rapid-fire Ed Tech Forums #1 & #2: 7 Presenters Offer 7 Slides in 7 Minutes Rapid-fire Ed Tech Forums #1 & #2: 7 Presenters Offer 7 Slides in 7 Minutes
Rapid-fire Ed Tech Forums #1 & #2: 7 Presenters Offer 7 Slides in 7 Minutes Jonathan Bacon
 
Quick Guide to Google Photos
Quick Guide to Google PhotosQuick Guide to Google Photos
Quick Guide to Google PhotosJonathan Bacon
 
Cutting the Cable and Reducing Your Media Costs
Cutting the Cable and Reducing Your Media CostsCutting the Cable and Reducing Your Media Costs
Cutting the Cable and Reducing Your Media CostsJonathan Bacon
 
Privacy: Protecting Personal Information
Privacy: Protecting Personal InformationPrivacy: Protecting Personal Information
Privacy: Protecting Personal InformationJonathan Bacon
 

Mehr von Jonathan Bacon (20)

Chapter 5 Jeremiah: Plucking Up and Planting
Chapter 5 Jeremiah: Plucking Up and PlantingChapter 5 Jeremiah: Plucking Up and Planting
Chapter 5 Jeremiah: Plucking Up and Planting
 
The Naked Truth About Retirement 2021 Edition
The Naked Truth About Retirement 2021 EditionThe Naked Truth About Retirement 2021 Edition
The Naked Truth About Retirement 2021 Edition
 
Johnson County Community College Fall 2020 General Meeting
Johnson County Community College Fall 2020 General MeetingJohnson County Community College Fall 2020 General Meeting
Johnson County Community College Fall 2020 General Meeting
 
Walking, Hiking, Cycling Trails of Johnson County
Walking, Hiking, Cycling Trails of Johnson CountyWalking, Hiking, Cycling Trails of Johnson County
Walking, Hiking, Cycling Trails of Johnson County
 
The Naked Truth About Retirement - 2020 Edition
The Naked Truth About  Retirement - 2020 EditionThe Naked Truth About  Retirement - 2020 Edition
The Naked Truth About Retirement - 2020 Edition
 
Mobile Photo Editing with Snapseed
Mobile Photo Editing with SnapseedMobile Photo Editing with Snapseed
Mobile Photo Editing with Snapseed
 
Fake News and Mainstream Media Bias
Fake News and Mainstream Media BiasFake News and Mainstream Media Bias
Fake News and Mainstream Media Bias
 
400+ Channels & Nothing to Watch
400+ Channels & Nothing to Watch400+ Channels & Nothing to Watch
400+ Channels & Nothing to Watch
 
iPhone Tips for Everyday Users
iPhone Tips for Everyday Users iPhone Tips for Everyday Users
iPhone Tips for Everyday Users
 
Notes Included: Naked Truth About Retirement 2019
Notes Included: Naked Truth About Retirement 2019Notes Included: Naked Truth About Retirement 2019
Notes Included: Naked Truth About Retirement 2019
 
Naked Truth About Retirement 2019
Naked Truth About Retirement 2019Naked Truth About Retirement 2019
Naked Truth About Retirement 2019
 
The Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and PrivacyThe Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and Privacy
 
Notes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and PrivacyNotes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and Privacy
 
Exploring Travel Apps and Tools
Exploring Travel Apps and Tools Exploring Travel Apps and Tools
Exploring Travel Apps and Tools
 
Athanasius of Alexandria
Athanasius of AlexandriaAthanasius of Alexandria
Athanasius of Alexandria
 
Exploring Do-It-Yourself and Installed Home Security Systems
Exploring Do-It-Yourself and Installed Home Security SystemsExploring Do-It-Yourself and Installed Home Security Systems
Exploring Do-It-Yourself and Installed Home Security Systems
 
Rapid-fire Ed Tech Forums #1 & #2: 7 Presenters Offer 7 Slides in 7 Minutes
Rapid-fire Ed Tech Forums #1 & #2: 7 Presenters Offer 7 Slides in 7 Minutes Rapid-fire Ed Tech Forums #1 & #2: 7 Presenters Offer 7 Slides in 7 Minutes
Rapid-fire Ed Tech Forums #1 & #2: 7 Presenters Offer 7 Slides in 7 Minutes
 
Quick Guide to Google Photos
Quick Guide to Google PhotosQuick Guide to Google Photos
Quick Guide to Google Photos
 
Cutting the Cable and Reducing Your Media Costs
Cutting the Cable and Reducing Your Media CostsCutting the Cable and Reducing Your Media Costs
Cutting the Cable and Reducing Your Media Costs
 
Privacy: Protecting Personal Information
Privacy: Protecting Personal InformationPrivacy: Protecting Personal Information
Privacy: Protecting Personal Information
 

Kürzlich hochgeladen

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Kürzlich hochgeladen (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Online Discussion: Ways to Address Online Privacy and Security

  • 1. Ways to Address Online Privacy and Security TechTalk for JCCC Retirees Association May 28, 2020 2-3 PM
  • 2. CURRENT SCAMS • COVID-19 catfishing scams rebound amid pandemic: stealing photos of frontline workers scammers lure victims to give money to fake charity • COVID-19 contamination scam plays off fears of consumers: by text told they know someone with COVID-19, click a link for further information and action • IRS stimulus check scams ramp up: told IRS needs their bank account information in order to deposit the check • COVID-19 grandparent scams prey on seniors: posing as grandchildren who claim they are sick and need money to pay their hospital bills https://www.idtheftcenter.org/current-scam-alerts/
  • 3. COVID-19 (and other) Charity Scams • Research: Use watchdog groups such as CharityWatch, CharityNavigator, and Wise Giving Alliance (Better Business Bureau) • Search the Web for charity name plus words such as "complaints," "review" or "scam" • Warning signs: undue pressure, payment method (gift cards, wire transfers, cash), bogus thank you emails, emails with attachments • Guard personal data • Donate direct, don’t respond to email Source: us.norton.com/internetsecurity-crm-identitytheftprotection- covid-19-charity-scams-9-tips-to-help-avoid-fakes.html
  • 4. STOLEN DATA: Passwords, Credit card numbers, Email addresses, Phone numbers, Dates of birth, Security questions • Adobe (38 million) • Adult Friend Finder • Canva • Dubsmash • eBay (145 million) • Equifax (143 million) • Heartland Payment Systems • LinkedIn • Marriott International (500 million) • My Fitness Pal • MySpace • NetEase • Sina Weibo • Yahoo (3 billion) • Zynga Check https://haveibeenpwned.com/
  • 5.
  • 6. Your Best Defense • Use strong, complex passwords or pass phrases • Use two-factor authentication for important accounts (Google, Apple, financial, health) • Don’t accept requests from unknown individuals • Beware unexpected links or attachments • Download apps from recognized safe sites (App Store, Google Play, Microsoft Store)
  • 8. Best 2020 Password vaults • Zoho Vault • Dashlane • Keeper • LastPass • RoboForm • 1Password • Norton password manager www.pcmag.com/picks/the- best-password-managers • Password Boss • Sticky Password Bit Warden • LogMeOnce • mSecure
  • 9. Safe Browsing - For Privacy’s Sake: Incognito, Private & InPrivate • Mozilla FireFox’s Private Window = Ctrl-Shift- P (Win) or Command-Shift-P (macOS). Or open menu (upper right of Firefox, three short horizontal lines) select New Private Window. • Apple Safari’s Private Window = Command- Shift-N (macOS) or select File > New Private Window (Win). • Google Chrome's incognito Window = Ctrl- Shift-N (Win) or Command-Shift-N (macOS). Or click menu (upper right –three vertical dots) select New Incognito Window. • Microsoft Edge’s InPrivate Window = Ctrl-Shift- N (Win) or Command-Shift-N (macOS). Or click menu (upper right, three dots arranged horizontally) choose New InPrivate window. www.computerworld.com/article/3356840/how-to-go-incognito-in- chrome-firefox-safari-and-edge.html
  • 10.
  • 11.
  • 13. DuckDuckGo Browser or Add-on • Private Search • No personal data collected • Blocks hidden trackers • Site Encryption • Browse as Usual
  • 14. Clear Browser Cache and Cookies Open Chrome. • At the top right, click 3 dot menu > Settings. • Under "Privacy and security," click “Clear browsing data.” • Select the appropriate check boxes for “Browsing history,” “Cookies and other site data.” and “Cached images and files.” • Click “Clear data.” Open Edge. • At the top right, click 3 dot menu > Settings. • Select “Privacy and security.” • Select “Clear browsing data.” • Use check boxes to select the data you want cleared. • Click “Clear.”
  • 15. On Facebook: Be Safe, Be Proactive • Think before you share anything! • Don't include birthday, address, phone on your profile www.facebook.com/h elp/101765758165199 4/ • Review and update social media privacy settings www.facebook.com/h elp/115450405225661 • Take a Facebook Privacy Checkup www.facebook.com/a bout/basics/manage- your-privacy/posts#16
  • 16. Problem: Fake Requests From Spam Profiles Clues to fake Facebook friend requests • Do you know requestor or have friends in common? • Is request from an unknown attractive member of opposite sex? • Profile has limited Facebook history or timeline? • Already Facebook friends?
  • 17. Suspect a Fake Facebook Request? • Check with your friend. New account? • Check account for activity. When established? • Process to report face Facebook friend request: https://www.socme dsean.com/answere d-how-do-i-report-a- fake-facebook- friend-request/
  • 18. Problem: Risks in Social Sharing • Facebook, Instagram, and Snapchat can reveal your location • Posting while traveling (Do you want folks to know your house or apartment is empty?) • Photo metadata can identify your location Note: sites like metapicz.com, whereisthepicture.com and www.pic2map.com can identify map locations unless geo-tagging is turned off on the camera/smartphone.
  • 19. Pic2Map Example • Displays photo image, camera used, date, address, city, country, satellite image and standard map of location
  • 20. Problem: Profile Hacking • Cracking social media user account passwords: most common way to hack one’s profile • Solution: Use complex and frequently changed passwords • Beware of Facebook Chat (Messenger) messages even from people you know
  • 21. Profile Hacking Apps and websites can be used to create fake Facebook chats online
  • 22. In Case You’re Hacked: Symptoms • Your device slows down • You’re using far more data with ISP than expected • Videos suddenly buffer, web pages take longer to load • Programs and apps keep crashing • Your device (computer, mobile device, phone) suddenly reboots • Unexplained online activity
  • 23. In Case You’re Hacked: Solutions • Run your antivirus software • Install any Operating System upgrades • Check Task Manager (Windows) or Activity Manager (Mac) – unknown apps • Check ISP data usage for unusual spikes • Reboot system see if problem persists • Constantly check your accounts for unauthorized activity
  • 24. Check For Unusual Activity: • Unauthorized financial transactions • Credit card charges or purchases you didn’t make • Movies on Netflix you didn’t stream • Songs on Spotify or Pandora you didn’t play • Unrecognized Facebook activity
  • 25. Think Your Account Is Hacked? • Change your passwords, even for old accounts that may use a common password • Stop using the hacked password…everywhere! • Monitor statements (credit cards and financial institutions) for charges you don’t recognize. • Alert financial institutions that you’ve been hacked, if you find any evidence. • Use distinctive passwords, especially for accounts with personal, health and financial data. • Use a cross-platform password manager to store passwords. Some apps generate complex passwords for you.
  • 26. Your Facebook Account Hacked? • Check out m.facebook.com/help/20330589 3040179/ • Explore link to Step by step guide m.facebook.com/help/13067254 09382822 • If someone tried to change email associated with a Facebook account, Facebook sends a message to the previous email account with a special link. You can click the link to reverse the email change and secure your account.
  • 27. Google Account Hacked? Report suspicious mail to Google productforums.google.co m/forum/#!msg/gmail/RI yIm0v- xnA/py_QQyH4BwAJ
  • 28. Problem: Malicious Links and Attachments • Email with fake embedded email addresses or links • Email with unsolicited images or video attached • If you receive unexpected email or text attachment (photo, video, link), always check with sender to verify
  • 29. Innocent eMail or Text: “How are you?” Don’t volunteer personal details unless you know who you are communicating with.
  • 30. Check the real address
  • 31. Resources 10 Worst Social Media Hacks https://www.infosecurity- magazine.com/blogs/top-10-worst- social-media-cyber/ 18 Biggest Data Breaches of 20th Century https://www.csoonline.com/article/213 0877/the-biggest-data-breaches-of-the- 21st-century.html Has Your Phone Been Hacked? https://www.usatoday.com/story/tech/ columnist/komando/2018/05/04/has- your-computer-phone-been-hacked- heres-how-tell/559136002/ Privacy/Security Risks of Social Media https://www.rswebsols.com/tutorials/in ternet/privacy-security-risks-social- media
  • 32. Resources How do I spot and Report a Fake Facebook Friend Request? https://www.socmedsean.com/ans wered-how-do-i-report-a-fake- facebook-friend-request/ Find Location from Photo https://www.guidingtech.com/find -location-from-photo/ How to Spot a Fake Friend Request https://www.lifewire.com/how-to- spot-a-fake-friend-request- 2487747 Assembled by Jonathan Bacon for the Johnson County Community College Retirees Association, March 2019, updated May 2020