SlideShare a Scribd company logo
1 of 27
A BasicGuide toSafe
Surfing on the Internet
How to surf the internet safely and avoid the pitfalls and
traps of Data Brokers and IdentityThieves
Updated 03/16/2014
Advocate
Tips
 Your personal information is a commodity to
Data Brokers who collect , manage and sell your
information. Protect it!
 Before you try any suggestions in the following
slides. Be sure to back up your computer and set
your System Restore. Use what fits your needs.
Don’t add everything.
 If you find a program that you like, use the free
trial version before purchasing. Most companies
will not provide refunds.
 Check the internet for online reviews from
reputable companies. Be a smart shopper
 Use pseudonyms on the web for non- important
web activity. Be safe online!
Google
Voice
 This is one of the best ‘unknown’ tools available
free of charge.
 Use it as a alternate phone orVoice Mail phone
number when you don’t want to disclose your
cell or home number.
 Many other GoogleVoice services—such as
voicemail, free text messaging, call history,
conference calling, call screening, blocking of
unwanted calls, and voice transcription to text of
voicemail messages—are also available to users
resident in the US.
 GoogleVoice
Abbreviate
 If you need to user your real name, change it up.
 Use abbreviations instead of your full name,
example: John Jacob Jingleheimer Schmidt
would be ‘J Schmidt’ or ‘j_schmidt’.
 Using abbreviations makes it difficult to
determine your gender or locate you in public
records.
 The less about the ‘real’ you the better when
surfing the internet.
 Use variations of your name :
 Jon instead of John
 Marc instead of Mark
 Jan instead of Janet
Social
Media
 Create multiple Social Media Accounts using
different email addresses.
 Stay anonymous while surfing online.
 Use real information for business or financial
accounts, family. Everything else pseudonyms.
 Limit how much of your real ‘you’ is provided
online. If you use your real name, secure that site!
 Keep work and socializing website separate.
 Match them up. Example:
 Facebook +Twitter+ Email (pseudo name)
 Tumble + Pinterest + Email (pseudo name)
 LinkedIn +Twitter + Email (real name)
 Pandora +Yelp + Craigslist + Email (pseudo name)
 Financial Institution + Credit Card + Email (real
name)
Caricatures
 Companies like Facebook use real pictures of
members to sell to marketing companies for use
with products and advertisements.
 Using a Caricatures stops your real image from
being used without your consent.
 Using your pet is a good idea, using your child is
not.Again, it can be used for advertising.
 Look for free Caricatures programs on the
internet.
VPN
 AVirtual Private Network (VPN) extends a
private network across the Internet.
 It secures your computer's internet connection
to guarantee that all of the data you're sending
and receiving is encrypted and secured from
prying eyes.
 VPNs allow individuals to spoof their physical
location—the user's actual IP address is replaced
byVPN provider—allowing them to bypass
content filters.
 Use Public or HotelWi-Fi in Confidence
 Download and Upload P2P Files in Privacy
 CloakYourVOIP PhoneCalls
 Use Search EnginesWithout HavingYour
Searches Logged
OptOut
 The term opt-out refers to several methods by
which individuals can avoid receiving unsolicited
product or service information.
 This ability is usually associated with direct
marketing campaigns such as telemarketing or
e-mail marketing.
 Whenever the option is available, do it.
 If you are creating an online identity, you don’t
want to create a new one because spam and e-
marketing is flooding your account.
Anti-
Malware
/Spyware/
Firewall
 Malware is short for “malicious software." It
includes viruses and spyware that get installed
on your computer, phone, or mobile device
without your consent.
 These programs can cause your device to crash
and can be used to monitor and control your
online activity.
 Criminals use malware to steal personal
information, send spam, and commit fraud.
 It is imperative you have some type of protection
in addition to your computers installed program.
Anti-
Malware
/Spyware/
Firewall
Malwarebytes
Microsoft Essentials
AVG
CCleaner
Windows Firewall
MacOS X Firewall
Encryption
 Encryption is the last and strongest line of
defense against the myriad attacks your
computer experiences every day.
 Spam filters, Firewalls, Privacy Settings,
Passwords andAnti-virus programs all offer
defensive measures against broad based
attacks, but none of these offer any defense
against targeted data theft.
Encryption
Kruptos 2
Professional
TrueCrypt
Secure
Browser
 Protect your connection, secure URLs begin with
https:// instead of http://.
 HTTP stands for HypertextTransfer Protocol
 HTTPS stands for HypertextTransfer Protocol
Secure
 Only download files or software from sites that
have been rated/verified by trusted sources.
 Keep your Browser settings updated.
 Use anonymous privacy setting, if available.
 A good secure Browser encrypts your passwords
or your phone number or anything personal you
enter online.
Secure
Browser
Mozilla Firefox
Internet Explorer
GoogleChrome
Opera
Safari
Secure
WebSearch
Engines
 In general,Web search engines work by sending
out a software system or spider to collect as
many documents as possible.
 Every time you use a regular search engine, your
search data is recorded.
 Major search engines capture your IP address
and use tracking cookies to make a record of
your search terms, the time of your visit, and the
links you choose - then they store that
information in a giant database.
 This information is a ‘Gold Mine’ for marketers,
data broker and identity thieves.
 Use Search Engines that contain non-tracking
features
Secure
WebSearch
Engines
 IXQuick
 DuckDuckGo
 Ask.com
 Blekko
Back(it)Up
 Backing up is simply making an electronic copy
of files and storing that copy in a safe place.
 If you back up your files regularly, you can
retrieve some, if not all, of your information if
something happens to the originals on your
computer.
 Use either external hard disk, CDs, DVDs, or
other storage medium for your backup copies.
 Upload data to an Internet-based file storage
service (cloud).
 Do not store your backup on your computer!
Back(it)Up
Financial
Information
Digital photos
Digital music
Programs
downloaded from
theWeb
Important email
messages
Email address book
Operating System
 Dropbox
 Google Drive
 iCloud
Passwords
 Never use the same password for all accounts.
 Use different passwords and add something
about the site to separate it from the others.
Facebook, use fcbk!101010 etc.
 It may be easier to remember is you use
Passphrases.
 Exchange letters for characters, example:
identity (!d@nT!Ty).
 Use: !=i, @=a,$=s etc.
 Don’t forget to underscore_
 Have a few extra ready as backup.You never
know when you’ll need to replace one. Be
prepared!
Protect
Your
Identity
 Do not give out your full name, address, or
phone number to anyone online that you don't
trust or know in person.
 Pseudonymity: the use of a pseudonym
 Unless it’s a business relationship, financial or an
important account.Go Pseudo!
 Anonymity: a person whose name is unknown or
withheld
 Some websites will use address verification tools
to verify your identity. Unless you need to use
your real name. Skip it!
 Check your social media privacy settings
 Use strong Security Questions, if required.
Wi-Fi
 Using a public wireless network?Turn off file
sharing and network discovery.
 UseWPA (WPA-Personal) orWPA2 (Wi-Fi Protected
Access version 2).
 Don’t use WEP, it’s weak.
 Avoid Automatically Connecting toWi-Fi Hotspots.
 Observation ofTCP flags to uncover various types
of network scans.
 UseTwo-Factor Authentication
 Use Encryption !
 Avoid piggybacking.
 Change your Network’s SSID name. Don’t keep the
default name.
Email
Accounts
 A good rule is to have multiple email
accounts:
 One for friends
 One for websites that require
email addresses
 One for your job, personal clients,
bank correspondence, etc.
 Having a backup email service is a
great idea. Have it ready but not
used until needed.
Email
Accounts
 Gmail
 Inbox
 Live
 AOL
 Mail.com
 Hushmail
 GMX
 Yahoo
Resources
 Gizmo'sTechTips
 Download Security Center
 Get Safe Online
 OnGuard Online
Disclosure
 Company names mentioned herein are the
property of, and may be trademarks of, their
respective owners and are for educational purposes
only.
This document is not an endorsement of any of the
products mentioned. It is suggested that consumers
conduct their own due diligence before uploading
or purchasing any products mentioned.
I have not received any payment or compensation
for mentioning any products in this document.
I do not imply one product is better than another
or by not mentioning a certain product imply it is
substandard.
Data
Brokers in
the News
 The Data Brokers: Selling your personal
information 03/09/2014
 http://www.cbsnews.com/news/the-data-
brokers-selling-your-personal-information/
CompiledanddesignedbyMarkFullbright,CertifiedIdentity
TheftRiskManagementSpecialist™(CITRMS)asafreeservice
forconsumerstoprotectthemselvesonlineandreducetheir
exposuretoidentitytheftandfromonlinewebsitesthatgather
andsell personalinformation.
StaySafe,StaySecure

More Related Content

What's hot

Privacy Online
Privacy OnlinePrivacy Online
Privacy OnlineJohn Curry
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is DangerousGihan Dias
 
[Albanyinfragard] infra gard albany members alliance april security tips news...
[Albanyinfragard] infra gard albany members alliance april security tips news...[Albanyinfragard] infra gard albany members alliance april security tips news...
[Albanyinfragard] infra gard albany members alliance april security tips news...Liberteks
 
online spying tools
online spying toolsonline spying tools
online spying toolsDeepa Jacob
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security riskK. A. M Lutfullah
 
CDSE Cybsecurity Awareness Posters
CDSE Cybsecurity Awareness PostersCDSE Cybsecurity Awareness Posters
CDSE Cybsecurity Awareness PostersNetLockSmith
 
Technology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreTechnology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreWilliam Mann
 
Cyber security tips in Banking in Nepal
Cyber security tips in Banking in NepalCyber security tips in Banking in Nepal
Cyber security tips in Banking in NepalResham Acharya
 
31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month OcotoberQuick Heal Technologies Ltd.
 
Lessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! HackLessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! HackImperva
 
100812 internet security2.0
100812 internet security2.0100812 internet security2.0
100812 internet security2.0dkp205
 
Online safety 101
Online safety 101Online safety 101
Online safety 101Greg Bold
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02amiinaaa
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awarenessMichel Bitter
 
Malware from the Consumer Jungle
Malware from the Consumer JungleMalware from the Consumer Jungle
Malware from the Consumer JungleJason S
 

What's hot (20)

Privacy Online
Privacy OnlinePrivacy Online
Privacy Online
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is Dangerous
 
[Albanyinfragard] infra gard albany members alliance april security tips news...
[Albanyinfragard] infra gard albany members alliance april security tips news...[Albanyinfragard] infra gard albany members alliance april security tips news...
[Albanyinfragard] infra gard albany members alliance april security tips news...
 
Online spying tools
Online spying toolsOnline spying tools
Online spying tools
 
online spying tools
online spying toolsonline spying tools
online spying tools
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
 
CDSE Cybsecurity Awareness Posters
CDSE Cybsecurity Awareness PostersCDSE Cybsecurity Awareness Posters
CDSE Cybsecurity Awareness Posters
 
Technology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreTechnology Training - Security, Passwords & More
Technology Training - Security, Passwords & More
 
Cyber security tips in Banking in Nepal
Cyber security tips in Banking in NepalCyber security tips in Banking in Nepal
Cyber security tips in Banking in Nepal
 
Users guide
Users guideUsers guide
Users guide
 
31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober
 
Lessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! HackLessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! Hack
 
100812 internet security2.0
100812 internet security2.0100812 internet security2.0
100812 internet security2.0
 
Online safety 101
Online safety 101Online safety 101
Online safety 101
 
Presentation for class
Presentation for classPresentation for class
Presentation for class
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
 
Emp tech las-week-2
Emp tech las-week-2Emp tech las-week-2
Emp tech las-week-2
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 
Malware from the Consumer Jungle
Malware from the Consumer JungleMalware from the Consumer Jungle
Malware from the Consumer Jungle
 

Viewers also liked

ixsol-efektivni-obed-2016-praha-jan-tomasik-vFinal
ixsol-efektivni-obed-2016-praha-jan-tomasik-vFinalixsol-efektivni-obed-2016-praha-jan-tomasik-vFinal
ixsol-efektivni-obed-2016-praha-jan-tomasik-vFinalJán Tomašik
 
CoDiS - All in one Monitoring Platform for Hydrogenerators
CoDiS - All in one Monitoring Platform for HydrogeneratorsCoDiS - All in one Monitoring Platform for Hydrogenerators
CoDiS - All in one Monitoring Platform for HydrogeneratorsOzren Oreskovic
 
condensed 1 sheet B-V04
condensed 1 sheet B-V04condensed 1 sheet B-V04
condensed 1 sheet B-V04Chelsea Lopez
 
Portfolio-Linn Behrendt-Medtronic Academia
Portfolio-Linn Behrendt-Medtronic AcademiaPortfolio-Linn Behrendt-Medtronic Academia
Portfolio-Linn Behrendt-Medtronic AcademiaLinn Behrendt
 
Tata motors workshop
Tata motors workshopTata motors workshop
Tata motors workshopDaniel Sujit
 
IBM BC2016- IBM - Talent Management - How to use data and analytics to take y...
IBM BC2016- IBM - Talent Management - How to use data and analytics to take y...IBM BC2016- IBM - Talent Management - How to use data and analytics to take y...
IBM BC2016- IBM - Talent Management - How to use data and analytics to take y...IBM Sverige
 
Petrobras - Corporate Governance Analysis
Petrobras - Corporate Governance AnalysisPetrobras - Corporate Governance Analysis
Petrobras - Corporate Governance AnalysisRobert Au
 
Dutch media landscape 2013 Q4 update by Starcom
Dutch media landscape 2013 Q4 update by StarcomDutch media landscape 2013 Q4 update by Starcom
Dutch media landscape 2013 Q4 update by StarcomstarcomNL
 
Henri lloyd Creative Pitch
Henri lloyd Creative PitchHenri lloyd Creative Pitch
Henri lloyd Creative PitchRachael McGowan
 
IBM BC2016 - (SAS) SAS förenklar jobbet i luften
IBM BC2016 - (SAS) SAS förenklar jobbet i luftenIBM BC2016 - (SAS) SAS förenklar jobbet i luften
IBM BC2016 - (SAS) SAS förenklar jobbet i luftenIBM Sverige
 
Electrolux marketing excellence
Electrolux marketing excellenceElectrolux marketing excellence
Electrolux marketing excellenceShruti Sinha
 
Introduction to condition based maintenance
Introduction to condition based maintenanceIntroduction to condition based maintenance
Introduction to condition based maintenanceASQ Reliability Division
 
Ethical dilemmas at worplace
Ethical dilemmas at worplaceEthical dilemmas at worplace
Ethical dilemmas at worplaceSALAR ALI MEMON
 
Energizer - pitch brief
Energizer - pitch briefEnergizer - pitch brief
Energizer - pitch briefCubeyou Inc
 
Nike Distribution system
Nike Distribution systemNike Distribution system
Nike Distribution systemRachael McGowan
 

Viewers also liked (17)

ixsol-efektivni-obed-2016-praha-jan-tomasik-vFinal
ixsol-efektivni-obed-2016-praha-jan-tomasik-vFinalixsol-efektivni-obed-2016-praha-jan-tomasik-vFinal
ixsol-efektivni-obed-2016-praha-jan-tomasik-vFinal
 
CoDiS - All in one Monitoring Platform for Hydrogenerators
CoDiS - All in one Monitoring Platform for HydrogeneratorsCoDiS - All in one Monitoring Platform for Hydrogenerators
CoDiS - All in one Monitoring Platform for Hydrogenerators
 
condensed 1 sheet B-V04
condensed 1 sheet B-V04condensed 1 sheet B-V04
condensed 1 sheet B-V04
 
Portfolio-Linn Behrendt-Medtronic Academia
Portfolio-Linn Behrendt-Medtronic AcademiaPortfolio-Linn Behrendt-Medtronic Academia
Portfolio-Linn Behrendt-Medtronic Academia
 
project- presentation
project- presentationproject- presentation
project- presentation
 
Tata motors workshop
Tata motors workshopTata motors workshop
Tata motors workshop
 
IBM BC2016- IBM - Talent Management - How to use data and analytics to take y...
IBM BC2016- IBM - Talent Management - How to use data and analytics to take y...IBM BC2016- IBM - Talent Management - How to use data and analytics to take y...
IBM BC2016- IBM - Talent Management - How to use data and analytics to take y...
 
Petrobras - Corporate Governance Analysis
Petrobras - Corporate Governance AnalysisPetrobras - Corporate Governance Analysis
Petrobras - Corporate Governance Analysis
 
Dutch media landscape 2013 Q4 update by Starcom
Dutch media landscape 2013 Q4 update by StarcomDutch media landscape 2013 Q4 update by Starcom
Dutch media landscape 2013 Q4 update by Starcom
 
Henri lloyd Creative Pitch
Henri lloyd Creative PitchHenri lloyd Creative Pitch
Henri lloyd Creative Pitch
 
IBM BC2016 - (SAS) SAS förenklar jobbet i luften
IBM BC2016 - (SAS) SAS förenklar jobbet i luftenIBM BC2016 - (SAS) SAS förenklar jobbet i luften
IBM BC2016 - (SAS) SAS förenklar jobbet i luften
 
Electrolux marketing excellence
Electrolux marketing excellenceElectrolux marketing excellence
Electrolux marketing excellence
 
Introduction to condition based maintenance
Introduction to condition based maintenanceIntroduction to condition based maintenance
Introduction to condition based maintenance
 
Protection and Switchgear
Protection and SwitchgearProtection and Switchgear
Protection and Switchgear
 
Ethical dilemmas at worplace
Ethical dilemmas at worplaceEthical dilemmas at worplace
Ethical dilemmas at worplace
 
Energizer - pitch brief
Energizer - pitch briefEnergizer - pitch brief
Energizer - pitch brief
 
Nike Distribution system
Nike Distribution systemNike Distribution system
Nike Distribution system
 

Similar to A Basic Guide to Safe Surfing on the Internet

Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014B2BPlanner Ltd.
 
How to protect your digital footprint
How to protect your digital footprintHow to protect your digital footprint
How to protect your digital footprintCybermaterial
 
Private Data and Prying Eyes
Private Data and Prying EyesPrivate Data and Prying Eyes
Private Data and Prying EyesEllie Sherven
 
Protecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyProtecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyAEGILITY
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101mateenzero
 
Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businessesB2BPlanner Ltd.
 
Notes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and PrivacyNotes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and PrivacyJonathan Bacon
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppWeSecureApp
 
Cyber Security School Workshop
Cyber Security School WorkshopCyber Security School Workshop
Cyber Security School WorkshopRahul Nayan
 
Cyber privacy and password protection
Cyber privacy and password protectionCyber privacy and password protection
Cyber privacy and password protectionsajeena81
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptxCharithraaAR
 
Document safer online for nonprofits guide
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guideNguyen Xuan Quang
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security TipsInfusionsoft
 
5 a module online privacy
5 a module online privacy5 a module online privacy
5 a module online privacyRozell Sneede
 
CYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptxCYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptxTapan Khilar
 

Similar to A Basic Guide to Safe Surfing on the Internet (20)

Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
 
How to protect your digital footprint
How to protect your digital footprintHow to protect your digital footprint
How to protect your digital footprint
 
Private Data and Prying Eyes
Private Data and Prying EyesPrivate Data and Prying Eyes
Private Data and Prying Eyes
 
Safe Computing
Safe ComputingSafe Computing
Safe Computing
 
Protecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyProtecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World Safety
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businesses
 
Notes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and PrivacyNotes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and Privacy
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Cyber Security School Workshop
Cyber Security School WorkshopCyber Security School Workshop
Cyber Security School Workshop
 
Cyber security macau
Cyber security macau Cyber security macau
Cyber security macau
 
Cyber privacy and password protection
Cyber privacy and password protectionCyber privacy and password protection
Cyber privacy and password protection
 
Protect
ProtectProtect
Protect
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Document safer online for nonprofits guide
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guide
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security Tips
 
Internet safety
Internet safetyInternet safety
Internet safety
 
5 a module online privacy
5 a module online privacy5 a module online privacy
5 a module online privacy
 
CYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptxCYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptx
 

More from - Mark - Fullbright

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019- Mark - Fullbright
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019- Mark - Fullbright
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019- Mark - Fullbright
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...- Mark - Fullbright
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 - Mark - Fullbright
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft- Mark - Fullbright
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017- Mark - Fullbright
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business- Mark - Fullbright
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business- Mark - Fullbright
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016- Mark - Fullbright
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015- Mark - Fullbright
 

More from - Mark - Fullbright (20)

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
 
Police, Protesters, Press, 2020
Police, Protesters, Press, 2020Police, Protesters, Press, 2020
Police, Protesters, Press, 2020
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)
 
FCPA Guidance 2020
FCPA Guidance 2020FCPA Guidance 2020
FCPA Guidance 2020
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
 
2018 IC3 Report
2018 IC3 Report2018 IC3 Report
2018 IC3 Report
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
 
Credit Score Explainer
Credit Score ExplainerCredit Score Explainer
Credit Score Explainer
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015
 

Recently uploaded

Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 

Recently uploaded (20)

Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 

A Basic Guide to Safe Surfing on the Internet

  • 1. A BasicGuide toSafe Surfing on the Internet How to surf the internet safely and avoid the pitfalls and traps of Data Brokers and IdentityThieves Updated 03/16/2014
  • 2. Advocate Tips  Your personal information is a commodity to Data Brokers who collect , manage and sell your information. Protect it!  Before you try any suggestions in the following slides. Be sure to back up your computer and set your System Restore. Use what fits your needs. Don’t add everything.  If you find a program that you like, use the free trial version before purchasing. Most companies will not provide refunds.  Check the internet for online reviews from reputable companies. Be a smart shopper  Use pseudonyms on the web for non- important web activity. Be safe online!
  • 3. Google Voice  This is one of the best ‘unknown’ tools available free of charge.  Use it as a alternate phone orVoice Mail phone number when you don’t want to disclose your cell or home number.  Many other GoogleVoice services—such as voicemail, free text messaging, call history, conference calling, call screening, blocking of unwanted calls, and voice transcription to text of voicemail messages—are also available to users resident in the US.  GoogleVoice
  • 4. Abbreviate  If you need to user your real name, change it up.  Use abbreviations instead of your full name, example: John Jacob Jingleheimer Schmidt would be ‘J Schmidt’ or ‘j_schmidt’.  Using abbreviations makes it difficult to determine your gender or locate you in public records.  The less about the ‘real’ you the better when surfing the internet.  Use variations of your name :  Jon instead of John  Marc instead of Mark  Jan instead of Janet
  • 5. Social Media  Create multiple Social Media Accounts using different email addresses.  Stay anonymous while surfing online.  Use real information for business or financial accounts, family. Everything else pseudonyms.  Limit how much of your real ‘you’ is provided online. If you use your real name, secure that site!  Keep work and socializing website separate.  Match them up. Example:  Facebook +Twitter+ Email (pseudo name)  Tumble + Pinterest + Email (pseudo name)  LinkedIn +Twitter + Email (real name)  Pandora +Yelp + Craigslist + Email (pseudo name)  Financial Institution + Credit Card + Email (real name)
  • 6. Caricatures  Companies like Facebook use real pictures of members to sell to marketing companies for use with products and advertisements.  Using a Caricatures stops your real image from being used without your consent.  Using your pet is a good idea, using your child is not.Again, it can be used for advertising.  Look for free Caricatures programs on the internet.
  • 7. VPN  AVirtual Private Network (VPN) extends a private network across the Internet.  It secures your computer's internet connection to guarantee that all of the data you're sending and receiving is encrypted and secured from prying eyes.  VPNs allow individuals to spoof their physical location—the user's actual IP address is replaced byVPN provider—allowing them to bypass content filters.  Use Public or HotelWi-Fi in Confidence  Download and Upload P2P Files in Privacy  CloakYourVOIP PhoneCalls  Use Search EnginesWithout HavingYour Searches Logged
  • 8. OptOut  The term opt-out refers to several methods by which individuals can avoid receiving unsolicited product or service information.  This ability is usually associated with direct marketing campaigns such as telemarketing or e-mail marketing.  Whenever the option is available, do it.  If you are creating an online identity, you don’t want to create a new one because spam and e- marketing is flooding your account.
  • 9. Anti- Malware /Spyware/ Firewall  Malware is short for “malicious software." It includes viruses and spyware that get installed on your computer, phone, or mobile device without your consent.  These programs can cause your device to crash and can be used to monitor and control your online activity.  Criminals use malware to steal personal information, send spam, and commit fraud.  It is imperative you have some type of protection in addition to your computers installed program.
  • 11. Encryption  Encryption is the last and strongest line of defense against the myriad attacks your computer experiences every day.  Spam filters, Firewalls, Privacy Settings, Passwords andAnti-virus programs all offer defensive measures against broad based attacks, but none of these offer any defense against targeted data theft.
  • 13. Secure Browser  Protect your connection, secure URLs begin with https:// instead of http://.  HTTP stands for HypertextTransfer Protocol  HTTPS stands for HypertextTransfer Protocol Secure  Only download files or software from sites that have been rated/verified by trusted sources.  Keep your Browser settings updated.  Use anonymous privacy setting, if available.  A good secure Browser encrypts your passwords or your phone number or anything personal you enter online.
  • 15. Secure WebSearch Engines  In general,Web search engines work by sending out a software system or spider to collect as many documents as possible.  Every time you use a regular search engine, your search data is recorded.  Major search engines capture your IP address and use tracking cookies to make a record of your search terms, the time of your visit, and the links you choose - then they store that information in a giant database.  This information is a ‘Gold Mine’ for marketers, data broker and identity thieves.  Use Search Engines that contain non-tracking features
  • 17. Back(it)Up  Backing up is simply making an electronic copy of files and storing that copy in a safe place.  If you back up your files regularly, you can retrieve some, if not all, of your information if something happens to the originals on your computer.  Use either external hard disk, CDs, DVDs, or other storage medium for your backup copies.  Upload data to an Internet-based file storage service (cloud).  Do not store your backup on your computer!
  • 18. Back(it)Up Financial Information Digital photos Digital music Programs downloaded from theWeb Important email messages Email address book Operating System  Dropbox  Google Drive  iCloud
  • 19. Passwords  Never use the same password for all accounts.  Use different passwords and add something about the site to separate it from the others. Facebook, use fcbk!101010 etc.  It may be easier to remember is you use Passphrases.  Exchange letters for characters, example: identity (!d@nT!Ty).  Use: !=i, @=a,$=s etc.  Don’t forget to underscore_  Have a few extra ready as backup.You never know when you’ll need to replace one. Be prepared!
  • 20. Protect Your Identity  Do not give out your full name, address, or phone number to anyone online that you don't trust or know in person.  Pseudonymity: the use of a pseudonym  Unless it’s a business relationship, financial or an important account.Go Pseudo!  Anonymity: a person whose name is unknown or withheld  Some websites will use address verification tools to verify your identity. Unless you need to use your real name. Skip it!  Check your social media privacy settings  Use strong Security Questions, if required.
  • 21. Wi-Fi  Using a public wireless network?Turn off file sharing and network discovery.  UseWPA (WPA-Personal) orWPA2 (Wi-Fi Protected Access version 2).  Don’t use WEP, it’s weak.  Avoid Automatically Connecting toWi-Fi Hotspots.  Observation ofTCP flags to uncover various types of network scans.  UseTwo-Factor Authentication  Use Encryption !  Avoid piggybacking.  Change your Network’s SSID name. Don’t keep the default name.
  • 22. Email Accounts  A good rule is to have multiple email accounts:  One for friends  One for websites that require email addresses  One for your job, personal clients, bank correspondence, etc.  Having a backup email service is a great idea. Have it ready but not used until needed.
  • 23. Email Accounts  Gmail  Inbox  Live  AOL  Mail.com  Hushmail  GMX  Yahoo
  • 24. Resources  Gizmo'sTechTips  Download Security Center  Get Safe Online  OnGuard Online
  • 25. Disclosure  Company names mentioned herein are the property of, and may be trademarks of, their respective owners and are for educational purposes only. This document is not an endorsement of any of the products mentioned. It is suggested that consumers conduct their own due diligence before uploading or purchasing any products mentioned. I have not received any payment or compensation for mentioning any products in this document. I do not imply one product is better than another or by not mentioning a certain product imply it is substandard.
  • 26. Data Brokers in the News  The Data Brokers: Selling your personal information 03/09/2014  http://www.cbsnews.com/news/the-data- brokers-selling-your-personal-information/