SlideShare ist ein Scribd-Unternehmen logo
1 von 45
Downloaden Sie, um offline zu lesen
Copyright© 2018 Symantec Corp. - SYMANTEC PROPRIETARY - LIMITED USE ONLY 3
In partnership with
Identity Smarts
Foster a Secure Tomorrow(FAST)
by Symantec
Presented by Name, Title
4
What is Digital Safety?
What is Credit? Why Should I Care?
1
2
How Do I Make Myself Less Vulnerable?3
Who Can Assist Me?4
5
Educational Objectives
Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
6
What is Digital Safety?
Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
Device Internet Accounts
Digital Safety
7
Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
Device
Safety
And
Security
8
Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
Your Geo Location
GeoTagging: The process of adding
geographical location or labels to
photographs, videos, websites, SMS
messages, mobile applications, QR
Codes, or RSS feeds.
9
Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
GeoTagging
10
Copyright© 2019 SymantecCorporation.All rightsreserved. SymantecProprietary - Limited UseOnly
27 S. Mill Ave.
Tempe, AZ 85281
11
Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
Safety
• Disable services
• Use selectively
https://www.wikihow.com/Avoid-the-Potential-Risks-of-Geotagging
Risks
• Shared on social
media
• Permanent and
searchable
• Sold to third parties
• Criminal purposes
GeoTagging
12
Remember…
PRIVACY CONVENIENCE
Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
13
Exercise:
Geotagging Settings
Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
Start:Settings
iPhone
Start:Camera
Settings
Android
GeoTagging SettingsGeoTagging Settings
14
Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
GeoTagging Settings
iPhone
15
Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
iPhone Android
GeoTagging Settings
16
Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
iPhone Android
GeoTagging Settings
17
Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
Additional
Device
Safety Tips
• Use long phone lock code
• Set short lock period
• Patch early, patch often
• Be aware of permission settings
• Don’t jailbreak your device
18
Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
Internet
Safety
and
Security
19
Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
Best Practices for Safe Browsing
21
Public Wi-Fi
Use with caution
Only visit
websites that
don’t require a
username or
password
Examples:
Weather, news,
videos
Good Mobile Data
or Hotspot
Use if visiting
websites that
require
username and
password
Examples: Email,
social media,
bank/credit
Better Virtual Private
Network
(VPN)
Use a trusted
VPN to encrypt
all web traffic
Best
Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
Account
Safety
and
Security
22
Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
Account Takeovers
Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
Facebook headline: https://krebsonsecurity.com/2019/03/facebook-stored-hundreds-of-millions-of-user-passwords-in-plain-text-for-years/
IG Headline: https://www.zdnet.com/article/facebook-admits-to-storing-plaintext-passwords-for-millions-of-instagram-users/
Tampa Mayor: https://www.nbcnews.com/news/us-news/tampa-mayor-s-twitter-account-hacked-announces-airport-bomb-threat-n973976
• Extra step to login
• Available on most online accounts.
• https://twofactorauth.org
Security Tip:
Verbal Passwords
Authentication: Enable 2FA/MFA for Online Accounts
24
Prioritized accounts:
1. Email
2. Social Media
3. Bank/Credit Cards
4. Health
Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
Social Media
• Set up 2FA/MFA
• Check privacy settings
• Use different passwords for all accounts
• Know and manage your friends
• Remember: once posted, always posted
StaySafeOnline. “Social Networks.” www.staysafeonline.org/stay-safe-online/protect-your-personal-information/social-networks
25
Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
Surveys, Surveys, Surveys!
Stop Giving Away Details About Yourself
• What was your first job?
• What was your first car?
• What is your favorite food?
krebsonsecurity.com/2018/04/dont-give-away-historic-details-about-yourself/
26
Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
Watch Out For Fake Apps!
Look for:
• Who the developer is.
• The date it was introduced into the store.
• How many times it’s been downloaded.
Other tips:
• Only use the app storerelatedto your device.
• Review privacypolicy.
27
Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
What is Credit?
Why should I care?
28
Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
What does credit mean?
Your credit reportis like a report cardon how well you did on paying
everyone back. Every place that we borrowmoney from tells a credit
agency about how well we did on paying that money back.
BORROW PAY REPORT
29
Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
How do I check my credit report?
Order Your Annual Credit Report
www.annualcreditreport.com
Credit Bureaus
Equifax
Experian
TransUnion
30
Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
Copy right © 2017 Symantec Corp. All rights reserved.
Fraud Alert Credit LockCredit Freeze
What can I do to protect my credit?
31
Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
What if I’m a victim of identity theft?
Reportto the FederalTrade
Commission (FTC)
• Print and save
• https://www.identitytheft.gov
Contact the Police
• File a police report
• Bring completed FTC
complaint form
35
Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
How do I make myself
less vulnerable?
3636
Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
Direct Marketing Association
• www.dmachoice.org
• $2 processing fee, for a period of ten years
Unsolicited Credit and Insurance Offers
• 888-5-OPTOUT (888-567-8688)
• www.optoutprescreen.com
• No fee
Say “NO” to Junk Mail
37
Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
Ugh, Telemarketers
NationalDo Not Call Registry
888-382-1222
www.donotcall.gov
Report UnwantedCalls
https://complaints.donotcall.gov
Note: The law allowspolitical calls,callsfrom charitable organizations,informationcalls,callsabout debts you owe,
and phone surveys,as well as calls from companiesyou have done businesswith or gave permissionto call.
38
Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
The only passwordyou have to
remember is the one for the
passwordmanager.
Passwordmanager examples*
• 1Password
• Dashlane
• KeyPass
• LastPass
• Norton Password Manager
Use a Password Manager
39
*The inclusion of websitesor links doesnot imply endorsement or support of any companies,
materials, products, and/or providerslisted herein, and isnot an inclusive list. Alphabetical list.
Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
40
Who can assist me?
40
Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
National Organization for Victim Assistance (NOVA)
• 800-TRY-NOVA
• www.trynova.org
Identity Theft Resource Center (ITRC)
• 800-400-5530
• www.idtheftcenter.org
Federal Trade Commission (FTC)
• www.identitytheft.gov
National Resources
41
Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
LifeLock (a Symantec Company)What is LifeLock? How can it help me?
Has your identity been compromised? We are here to help!
• LifeLock restoration services at no charge
• Help determine if you have an active credit file with any of the
major credit bureaus
• Assist with placing fraud alerts
• Contact businesseswhere your information may have been
misused to request the fraudulent accounts be closed and
noted for the presence of identity theft
42
Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
LifeLock (a Symantec Company)
Protect your Windows PC, Mac, Android and iOS
devices with Norton.
NORTON SECURITY DELUXE*
• Defendsagainst viruses,spyware,malwareand
other onlinethreats
• Safeguardsyouronlinetransactions
What is Norton? How can it help me?
43
*Norton Security Deluxe offers 1 year protection for up to 5 devices
Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
Questions
44
Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
What is Digital Safety?
What is Credit? Why Should I Care?
1
2
How Do I Make Myself Less Vulnerable?3
Who Can Assist Me?4
45
Recap
Thank You!
46
Appendix
Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
Copy right © 2017 Symantec Corp. All rights reserved.
Check Your Data Breach Status
Check if your email has been part of a recent
data breach.
Have I Been Pwned?
https://haveibeenpwned.com
Firefox Monitor
https://monitor.firefox.com
*The inclusion of websites or links does not imply endorsement or support of any companies,
materials, products, services, and/or providers listed herein, and is not an inclusive list.
Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
Copy right © 2017 Symantec Corp. All rights reserved.
Beat Spam: Use Disposable Email
If you need to put in an email address to
get a coupon, shop one time on website,
etc., consider using a temporary email
address.
10 Minute Mail
https://10minutemail.com
*The inclusion of websites or links does not imply endorsement or support of any companies,
materials, products, services, and/or providers listed herein, and is not an inclusive list.
Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
Copy right © 2017 Symantec Corp. All rights reserved.
Learn About Bitcoin
Bitcoin is a digital currency used
around the world. This website
provides tutorials on the
innovativepayment network.
https://bitcoin.org
*The inclusion of websites or links does not imply endorsement or support of any companies,
materials, products, services, and/or providers listed herein, and is not an inclusive list.
Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
Copy right © 2017 Symantec Corp. All rights reserved.
USPS Informed Delivery Service
https://informeddelivery.usps.com
*The inclusion of websites or links does not imply endorsement or support of any companies,
materials, products, services, and/or providers listed herein, and is not an inclusive list.
Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly

Weitere ähnliche Inhalte

Was ist angesagt?

Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]
Kolluru N Rao
 
CyberSecurityCompliance-Aug2016-V10 (002) final
CyberSecurityCompliance-Aug2016-V10 (002) finalCyberSecurityCompliance-Aug2016-V10 (002) final
CyberSecurityCompliance-Aug2016-V10 (002) final
RobertPike
 

Was ist angesagt? (19)

Cybercrime - Stealing in the Connected Age
Cybercrime - Stealing in the Connected AgeCybercrime - Stealing in the Connected Age
Cybercrime - Stealing in the Connected Age
 
Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!
 
AI in Hacking
AI in HackingAI in Hacking
AI in Hacking
 
Protecting the identities of your website customers
Protecting the identities of your website customers Protecting the identities of your website customers
Protecting the identities of your website customers
 
sc_can0315_28373
sc_can0315_28373sc_can0315_28373
sc_can0315_28373
 
Software-Defined Security: The New School of Security Designed for DevOps
Software-Defined Security: The New School of Security Designed for DevOpsSoftware-Defined Security: The New School of Security Designed for DevOps
Software-Defined Security: The New School of Security Designed for DevOps
 
Cyber Liability Risk
Cyber Liability RiskCyber Liability Risk
Cyber Liability Risk
 
Top 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providersTop 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providers
 
Detecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2ConfDetecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2Conf
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]
 
PCM Vision 2019 Keynote: Gary Miglicco
PCM Vision 2019 Keynote: Gary MigliccoPCM Vision 2019 Keynote: Gary Miglicco
PCM Vision 2019 Keynote: Gary Miglicco
 
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
 
Information Security
Information SecurityInformation Security
Information Security
 
CyberSecurityCompliance-Aug2016-V10 (002) final
CyberSecurityCompliance-Aug2016-V10 (002) finalCyberSecurityCompliance-Aug2016-V10 (002) final
CyberSecurityCompliance-Aug2016-V10 (002) final
 
MYDIGIPASS.COM
MYDIGIPASS.COMMYDIGIPASS.COM
MYDIGIPASS.COM
 
2019 Identity Protection and Data Breaches Survey
2019 Identity Protection and Data Breaches Survey 2019 Identity Protection and Data Breaches Survey
2019 Identity Protection and Data Breaches Survey
 
Cyber Insurance - The Basics
Cyber Insurance - The Basics Cyber Insurance - The Basics
Cyber Insurance - The Basics
 
Beware of Scam Artists - Recognize Them Before They Get You!
Beware of Scam Artists - Recognize Them Before They Get You!Beware of Scam Artists - Recognize Them Before They Get You!
Beware of Scam Artists - Recognize Them Before They Get You!
 
Cybersecurity Compliance can Make or Break Your Business - DigiCert - Symantec
Cybersecurity Compliance can Make or Break Your Business - DigiCert - SymantecCybersecurity Compliance can Make or Break Your Business - DigiCert - Symantec
Cybersecurity Compliance can Make or Break Your Business - DigiCert - Symantec
 

Ähnlich wie Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secure Tomorrow (FAST)

symc_annual2000
symc_annual2000symc_annual2000
symc_annual2000
finance40
 

Ähnlich wie Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secure Tomorrow (FAST) (20)

Security and Privacy: What Nonprofits Need to Know
Security and Privacy: What Nonprofits Need to KnowSecurity and Privacy: What Nonprofits Need to Know
Security and Privacy: What Nonprofits Need to Know
 
What is a Bot and why you should care
What is a Bot and why you should careWhat is a Bot and why you should care
What is a Bot and why you should care
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Scrapping for Pennies: How to implement security without a budget
Scrapping for Pennies: How to implement security without a budgetScrapping for Pennies: How to implement security without a budget
Scrapping for Pennies: How to implement security without a budget
 
Fundamentals of Information Systems Security Chapter 2
Fundamentals of Information Systems Security Chapter 2 Fundamentals of Information Systems Security Chapter 2
Fundamentals of Information Systems Security Chapter 2
 
IBM Security - Successful digital transformation
IBM Security - Successful digital transformationIBM Security - Successful digital transformation
IBM Security - Successful digital transformation
 
Preventing P2P Fraud with Aite Group
Preventing P2P Fraud with Aite GroupPreventing P2P Fraud with Aite Group
Preventing P2P Fraud with Aite Group
 
info-sys-security.pptx
info-sys-security.pptxinfo-sys-security.pptx
info-sys-security.pptx
 
Cyber - it's all now a matter of time!
Cyber - it's all now a matter of time!Cyber - it's all now a matter of time!
Cyber - it's all now a matter of time!
 
Candidate Data Compliance - Are you prepared for the risks?
Candidate Data Compliance - Are you prepared for the risks?Candidate Data Compliance - Are you prepared for the risks?
Candidate Data Compliance - Are you prepared for the risks?
 
Find IT & Marketing’s Common Ground: Make Your Site Faster
Find IT & Marketing’s Common Ground: Make Your Site FasterFind IT & Marketing’s Common Ground: Make Your Site Faster
Find IT & Marketing’s Common Ground: Make Your Site Faster
 
AWS Startup Day Toronto - Sudip Chakrabarti- Building & Selling AI-Powered En...
AWS Startup Day Toronto - Sudip Chakrabarti- Building & Selling AI-Powered En...AWS Startup Day Toronto - Sudip Chakrabarti- Building & Selling AI-Powered En...
AWS Startup Day Toronto - Sudip Chakrabarti- Building & Selling AI-Powered En...
 
Coming to Tech's Mecca 2020
Coming to Tech's Mecca 2020Coming to Tech's Mecca 2020
Coming to Tech's Mecca 2020
 
A New Year’s Ransomware Resolution
A New Year’s Ransomware ResolutionA New Year’s Ransomware Resolution
A New Year’s Ransomware Resolution
 
2019 08-21 Automating Privacy Management
2019 08-21 Automating Privacy Management2019 08-21 Automating Privacy Management
2019 08-21 Automating Privacy Management
 
symc_annual2000
symc_annual2000symc_annual2000
symc_annual2000
 
AI : Animal Like Abilities in Applied AI, What can go wrong?
AI : Animal Like Abilities in Applied AI, What can go wrong?AI : Animal Like Abilities in Applied AI, What can go wrong?
AI : Animal Like Abilities in Applied AI, What can go wrong?
 
Delivering Imperatives of Modern Organizations Such As Cybersecurity and Open...
Delivering Imperatives of Modern Organizations Such As Cybersecurity and Open...Delivering Imperatives of Modern Organizations Such As Cybersecurity and Open...
Delivering Imperatives of Modern Organizations Such As Cybersecurity and Open...
 
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?Accounting for Cyber Risks - How much does Cyber actually cost the Industry?
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
 

Mehr von Symantec

Mehr von Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 
GDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators WantGDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators Want
 
Symantec Internet Security Threat Report (ISTR) 23 Webinar
Symantec Internet Security Threat Report (ISTR) 23 WebinarSymantec Internet Security Threat Report (ISTR) 23 Webinar
Symantec Internet Security Threat Report (ISTR) 23 Webinar
 

Kürzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secure Tomorrow (FAST)

  • 1. Copyright© 2018 Symantec Corp. - SYMANTEC PROPRIETARY - LIMITED USE ONLY 3 In partnership with
  • 2. Identity Smarts Foster a Secure Tomorrow(FAST) by Symantec Presented by Name, Title 4
  • 3. What is Digital Safety? What is Credit? Why Should I Care? 1 2 How Do I Make Myself Less Vulnerable?3 Who Can Assist Me?4 5 Educational Objectives Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
  • 4. 6 What is Digital Safety? Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
  • 5. Device Internet Accounts Digital Safety 7 Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
  • 6. Device Safety And Security 8 Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
  • 7. Your Geo Location GeoTagging: The process of adding geographical location or labels to photographs, videos, websites, SMS messages, mobile applications, QR Codes, or RSS feeds. 9 Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
  • 8. GeoTagging 10 Copyright© 2019 SymantecCorporation.All rightsreserved. SymantecProprietary - Limited UseOnly
  • 9. 27 S. Mill Ave. Tempe, AZ 85281 11 Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
  • 10. Safety • Disable services • Use selectively https://www.wikihow.com/Avoid-the-Potential-Risks-of-Geotagging Risks • Shared on social media • Permanent and searchable • Sold to third parties • Criminal purposes GeoTagging 12 Remember… PRIVACY CONVENIENCE Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
  • 11. 13 Exercise: Geotagging Settings Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
  • 12. Start:Settings iPhone Start:Camera Settings Android GeoTagging SettingsGeoTagging Settings 14 Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
  • 13. GeoTagging Settings iPhone 15 Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
  • 14. iPhone Android GeoTagging Settings 16 Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
  • 15. iPhone Android GeoTagging Settings 17 Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
  • 16. Additional Device Safety Tips • Use long phone lock code • Set short lock period • Patch early, patch often • Be aware of permission settings • Don’t jailbreak your device 18 Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
  • 17. Internet Safety and Security 19 Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
  • 18. Best Practices for Safe Browsing 21 Public Wi-Fi Use with caution Only visit websites that don’t require a username or password Examples: Weather, news, videos Good Mobile Data or Hotspot Use if visiting websites that require username and password Examples: Email, social media, bank/credit Better Virtual Private Network (VPN) Use a trusted VPN to encrypt all web traffic Best Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
  • 19. Account Safety and Security 22 Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
  • 20. Account Takeovers Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly Facebook headline: https://krebsonsecurity.com/2019/03/facebook-stored-hundreds-of-millions-of-user-passwords-in-plain-text-for-years/ IG Headline: https://www.zdnet.com/article/facebook-admits-to-storing-plaintext-passwords-for-millions-of-instagram-users/ Tampa Mayor: https://www.nbcnews.com/news/us-news/tampa-mayor-s-twitter-account-hacked-announces-airport-bomb-threat-n973976
  • 21. • Extra step to login • Available on most online accounts. • https://twofactorauth.org Security Tip: Verbal Passwords Authentication: Enable 2FA/MFA for Online Accounts 24 Prioritized accounts: 1. Email 2. Social Media 3. Bank/Credit Cards 4. Health Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
  • 22. Social Media • Set up 2FA/MFA • Check privacy settings • Use different passwords for all accounts • Know and manage your friends • Remember: once posted, always posted StaySafeOnline. “Social Networks.” www.staysafeonline.org/stay-safe-online/protect-your-personal-information/social-networks 25 Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
  • 23. Surveys, Surveys, Surveys! Stop Giving Away Details About Yourself • What was your first job? • What was your first car? • What is your favorite food? krebsonsecurity.com/2018/04/dont-give-away-historic-details-about-yourself/ 26 Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
  • 24. Watch Out For Fake Apps! Look for: • Who the developer is. • The date it was introduced into the store. • How many times it’s been downloaded. Other tips: • Only use the app storerelatedto your device. • Review privacypolicy. 27 Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
  • 25. What is Credit? Why should I care? 28 Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
  • 26. What does credit mean? Your credit reportis like a report cardon how well you did on paying everyone back. Every place that we borrowmoney from tells a credit agency about how well we did on paying that money back. BORROW PAY REPORT 29 Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
  • 27. How do I check my credit report? Order Your Annual Credit Report www.annualcreditreport.com Credit Bureaus Equifax Experian TransUnion 30 Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
  • 28. Copy right © 2017 Symantec Corp. All rights reserved. Fraud Alert Credit LockCredit Freeze What can I do to protect my credit? 31 Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
  • 29. What if I’m a victim of identity theft? Reportto the FederalTrade Commission (FTC) • Print and save • https://www.identitytheft.gov Contact the Police • File a police report • Bring completed FTC complaint form 35 Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
  • 30. How do I make myself less vulnerable? 3636 Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
  • 31. Direct Marketing Association • www.dmachoice.org • $2 processing fee, for a period of ten years Unsolicited Credit and Insurance Offers • 888-5-OPTOUT (888-567-8688) • www.optoutprescreen.com • No fee Say “NO” to Junk Mail 37 Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
  • 32. Ugh, Telemarketers NationalDo Not Call Registry 888-382-1222 www.donotcall.gov Report UnwantedCalls https://complaints.donotcall.gov Note: The law allowspolitical calls,callsfrom charitable organizations,informationcalls,callsabout debts you owe, and phone surveys,as well as calls from companiesyou have done businesswith or gave permissionto call. 38 Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
  • 33. The only passwordyou have to remember is the one for the passwordmanager. Passwordmanager examples* • 1Password • Dashlane • KeyPass • LastPass • Norton Password Manager Use a Password Manager 39 *The inclusion of websitesor links doesnot imply endorsement or support of any companies, materials, products, and/or providerslisted herein, and isnot an inclusive list. Alphabetical list. Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
  • 34. 40 Who can assist me? 40 Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
  • 35. National Organization for Victim Assistance (NOVA) • 800-TRY-NOVA • www.trynova.org Identity Theft Resource Center (ITRC) • 800-400-5530 • www.idtheftcenter.org Federal Trade Commission (FTC) • www.identitytheft.gov National Resources 41 Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
  • 36. LifeLock (a Symantec Company)What is LifeLock? How can it help me? Has your identity been compromised? We are here to help! • LifeLock restoration services at no charge • Help determine if you have an active credit file with any of the major credit bureaus • Assist with placing fraud alerts • Contact businesseswhere your information may have been misused to request the fraudulent accounts be closed and noted for the presence of identity theft 42 Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
  • 37. LifeLock (a Symantec Company) Protect your Windows PC, Mac, Android and iOS devices with Norton. NORTON SECURITY DELUXE* • Defendsagainst viruses,spyware,malwareand other onlinethreats • Safeguardsyouronlinetransactions What is Norton? How can it help me? 43 *Norton Security Deluxe offers 1 year protection for up to 5 devices Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
  • 38. Questions 44 Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
  • 39. What is Digital Safety? What is Credit? Why Should I Care? 1 2 How Do I Make Myself Less Vulnerable?3 Who Can Assist Me?4 45 Recap
  • 41. Appendix Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
  • 42. Copy right © 2017 Symantec Corp. All rights reserved. Check Your Data Breach Status Check if your email has been part of a recent data breach. Have I Been Pwned? https://haveibeenpwned.com Firefox Monitor https://monitor.firefox.com *The inclusion of websites or links does not imply endorsement or support of any companies, materials, products, services, and/or providers listed herein, and is not an inclusive list. Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
  • 43. Copy right © 2017 Symantec Corp. All rights reserved. Beat Spam: Use Disposable Email If you need to put in an email address to get a coupon, shop one time on website, etc., consider using a temporary email address. 10 Minute Mail https://10minutemail.com *The inclusion of websites or links does not imply endorsement or support of any companies, materials, products, services, and/or providers listed herein, and is not an inclusive list. Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
  • 44. Copy right © 2017 Symantec Corp. All rights reserved. Learn About Bitcoin Bitcoin is a digital currency used around the world. This website provides tutorials on the innovativepayment network. https://bitcoin.org *The inclusion of websites or links does not imply endorsement or support of any companies, materials, products, services, and/or providers listed herein, and is not an inclusive list. Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly
  • 45. Copy right © 2017 Symantec Corp. All rights reserved. USPS Informed Delivery Service https://informeddelivery.usps.com *The inclusion of websites or links does not imply endorsement or support of any companies, materials, products, services, and/or providers listed herein, and is not an inclusive list. Copyright© 2019 SymantecCorporation.All rights reserved. SymantecProprietary - Limited UseOnly