SlideShare a Scribd company logo
1 of 17
Download to read offline
Information Security for Nomads
Sébastien Arbogast - 2023
How to take good care of your stuff?
Horror stories?
What if…?
Your laptop stopped working
Your laptop got stolen
Your phone got left behind
Your email (or socials) got hacked
Safety Protocol
• Passwords
• Data protection
• Internet connection
• Gear
• Financials
• Borders
• Best practices
Passwords
• Check this out!
• Use a password manager: 1password, Dashlane,
LastPass
• Synchronize it across all your devices
• Generate unique passwords for everything
• Change passwords for your critical accounts
• Email accounts
• Social accounts
• Accounts with your credit card on them
• Progressively all the others
• Enable 2FA, but not with SMS (Google
Authenticator or Yubikey)
https://haveibeenpwned.com/
Data protection
• Full remote backup: Backblaze, or at the very least Dropbox or Google Drive
• Encrypt your hard drive
• MacOS: enable Filevault
• Windows:
• make sure BitLocker is enabled
• CipherShed or VeraCrypt
Internet connection
• Antivirus if you are on Windows (Defender might not be enough)
• Avira
• Kaspersky
• Bitdefender
• Keep your OS up-to-date
• Use a VPN everywhere you don't trust
• ExpressVPN
• NordVPN
• ProtonVPN
• Sometimes VPNs are blocked (we see you Starbucks)
Gear
• Laptop recovery:
• iCloud (mac)
• HiddenApp
• Prey
• Use a webcam cover
• Lock your devices systematically
• Biometric is best
• At least 6-digit PIN
• You need a PIN, really
• AirTags are awesome!
• Theft-proof backpack
Financials
• Neobanks are the best
• Revolut
• N26
• Wise
• Never give you credit card details
over the phone, or at least use a virtual one
• Crypto-currencies
• Use a hardware wallet: Ledger Nano X or Trezor
• Or at least a software wallet: Exodus or Coinbase Wallet
• But DO NOT keep your crypto on online marketplaces
Borders
• Do not share your socials with customs
• Lock your phone with your PIN before crossing the border (disable
biometrics)
• Avoid giving away your IMEI
Best practices
• Generate unique random passwords
• Store everything sensitive in your password manager
• Never open attachments you don't trust
• Never answer emails that ask for your info
• Avoid writing your credit card details in an email or on paper (rentals)
• If you have to give a password, change it afterwards
• Always use a VPN on public wi
fi
s
• Check if some of your accounts have been compromised: https://haveibeenpwned.com/
• Beware of social engineering
• Beware of random USB keys
• Don't share pictures of your boarding passes
https://bit.ly/
informationsecurityfornomads

More Related Content

Similar to Digital Hygiene for Nomads

Information Security Awareness With Shawn Changes
Information Security Awareness With Shawn ChangesInformation Security Awareness With Shawn Changes
Information Security Awareness With Shawn ChangesMichael Dessecker
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self DefenseBarry Caplin
 
11 Commandments of Cyber Security for the Home
11 Commandments of Cyber Security for the Home11 Commandments of Cyber Security for the Home
11 Commandments of Cyber Security for the Homezaimorkai
 
Protecting Bitcoin and cryptocurrency Keys
Protecting Bitcoin and cryptocurrency KeysProtecting Bitcoin and cryptocurrency Keys
Protecting Bitcoin and cryptocurrency Keysdimitrist
 
How To Secure Your Cryptocurrency In 2020
How To Secure Your Cryptocurrency In 2020How To Secure Your Cryptocurrency In 2020
How To Secure Your Cryptocurrency In 2020Christian Sales
 
Don't Forget Your (Virtual) Keys: Creating and Using Strong Passwords
Don't Forget Your (Virtual) Keys: Creating and Using Strong PasswordsDon't Forget Your (Virtual) Keys: Creating and Using Strong Passwords
Don't Forget Your (Virtual) Keys: Creating and Using Strong Passwordsrmortiz66
 
EEAS - Cultivate your data protection
EEAS - Cultivate your data protectionEEAS - Cultivate your data protection
EEAS - Cultivate your data protectionTommy Vandepitte
 
Living With Passwords: Personal Password Management
Living With Passwords: Personal Password ManagementLiving With Passwords: Personal Password Management
Living With Passwords: Personal Password ManagementNuno Loureiro
 
Anti Whaling Hardening Up Your Net Presence
Anti   Whaling   Hardening Up Your Net PresenceAnti   Whaling   Hardening Up Your Net Presence
Anti Whaling Hardening Up Your Net PresenceEngineers Australia
 
Anti Whaling Hardening Up Your Net Presence
Anti   Whaling   Hardening Up Your Net PresenceAnti   Whaling   Hardening Up Your Net Presence
Anti Whaling Hardening Up Your Net Presencegueste0b5fe
 
Be Cyber Smart! (DLH 10/25/2019)
Be Cyber Smart! (DLH 10/25/2019)Be Cyber Smart! (DLH 10/25/2019)
Be Cyber Smart! (DLH 10/25/2019)David Herrington
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptxCharithraaAR
 
“Secure Password Managers” and “Military-Grade Encryption” on Smartphones:...
“Secure Password Managers” and   “Military-Grade Encryption” on  Smartphones:...“Secure Password Managers” and   “Military-Grade Encryption” on  Smartphones:...
“Secure Password Managers” and “Military-Grade Encryption” on Smartphones:...Positive Hack Days
 
Mr. Andrey Belenko - secure password managers and military-grade encryption o...
Mr. Andrey Belenko - secure password managers and military-grade encryption o...Mr. Andrey Belenko - secure password managers and military-grade encryption o...
Mr. Andrey Belenko - secure password managers and military-grade encryption o...nooralmousa
 
Computer / Internet Security
Computer / Internet SecurityComputer / Internet Security
Computer / Internet SecurityDavid Cirella
 
Protecting cryptocurrency keys
Protecting cryptocurrency keysProtecting cryptocurrency keys
Protecting cryptocurrency keysdimitrist
 
Man vs Internet - Current challenges and future tendencies of establishing tr...
Man vs Internet - Current challenges and future tendencies of establishing tr...Man vs Internet - Current challenges and future tendencies of establishing tr...
Man vs Internet - Current challenges and future tendencies of establishing tr...Luis Grangeia
 

Similar to Digital Hygiene for Nomads (20)

Personal security
Personal securityPersonal security
Personal security
 
Information Security Awareness With Shawn Changes
Information Security Awareness With Shawn ChangesInformation Security Awareness With Shawn Changes
Information Security Awareness With Shawn Changes
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self Defense
 
11 Commandments of Cyber Security for the Home
11 Commandments of Cyber Security for the Home11 Commandments of Cyber Security for the Home
11 Commandments of Cyber Security for the Home
 
Protecting Bitcoin and cryptocurrency Keys
Protecting Bitcoin and cryptocurrency KeysProtecting Bitcoin and cryptocurrency Keys
Protecting Bitcoin and cryptocurrency Keys
 
How To Secure Your Cryptocurrency In 2020
How To Secure Your Cryptocurrency In 2020How To Secure Your Cryptocurrency In 2020
How To Secure Your Cryptocurrency In 2020
 
Don't Forget Your (Virtual) Keys: Creating and Using Strong Passwords
Don't Forget Your (Virtual) Keys: Creating and Using Strong PasswordsDon't Forget Your (Virtual) Keys: Creating and Using Strong Passwords
Don't Forget Your (Virtual) Keys: Creating and Using Strong Passwords
 
EEAS - Cultivate your data protection
EEAS - Cultivate your data protectionEEAS - Cultivate your data protection
EEAS - Cultivate your data protection
 
Living With Passwords: Personal Password Management
Living With Passwords: Personal Password ManagementLiving With Passwords: Personal Password Management
Living With Passwords: Personal Password Management
 
Anti Whaling Hardening Up Your Net Presence
Anti   Whaling   Hardening Up Your Net PresenceAnti   Whaling   Hardening Up Your Net Presence
Anti Whaling Hardening Up Your Net Presence
 
Anti Whaling Hardening Up Your Net Presence
Anti   Whaling   Hardening Up Your Net PresenceAnti   Whaling   Hardening Up Your Net Presence
Anti Whaling Hardening Up Your Net Presence
 
Making Secure Choices
Making Secure ChoicesMaking Secure Choices
Making Secure Choices
 
Be Cyber Smart! (DLH 10/25/2019)
Be Cyber Smart! (DLH 10/25/2019)Be Cyber Smart! (DLH 10/25/2019)
Be Cyber Smart! (DLH 10/25/2019)
 
Internet security
Internet securityInternet security
Internet security
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
“Secure Password Managers” and “Military-Grade Encryption” on Smartphones:...
“Secure Password Managers” and   “Military-Grade Encryption” on  Smartphones:...“Secure Password Managers” and   “Military-Grade Encryption” on  Smartphones:...
“Secure Password Managers” and “Military-Grade Encryption” on Smartphones:...
 
Mr. Andrey Belenko - secure password managers and military-grade encryption o...
Mr. Andrey Belenko - secure password managers and military-grade encryption o...Mr. Andrey Belenko - secure password managers and military-grade encryption o...
Mr. Andrey Belenko - secure password managers and military-grade encryption o...
 
Computer / Internet Security
Computer / Internet SecurityComputer / Internet Security
Computer / Internet Security
 
Protecting cryptocurrency keys
Protecting cryptocurrency keysProtecting cryptocurrency keys
Protecting cryptocurrency keys
 
Man vs Internet - Current challenges and future tendencies of establishing tr...
Man vs Internet - Current challenges and future tendencies of establishing tr...Man vs Internet - Current challenges and future tendencies of establishing tr...
Man vs Internet - Current challenges and future tendencies of establishing tr...
 

More from Sebastien Arbogast (17)

Feedback
FeedbackFeedback
Feedback
 
Intro to NLP
Intro to NLPIntro to NLP
Intro to NLP
 
How Chains Will Set Us Free v2
How Chains Will Set Us Free v2How Chains Will Set Us Free v2
How Chains Will Set Us Free v2
 
The Power of Gamification
The Power of GamificationThe Power of Gamification
The Power of Gamification
 
Pitch 101
Pitch 101Pitch 101
Pitch 101
 
Ethereum
EthereumEthereum
Ethereum
 
Bitcoin 101
Bitcoin 101Bitcoin 101
Bitcoin 101
 
Le progrès exponentiel
Le progrès exponentielLe progrès exponentiel
Le progrès exponentiel
 
Ethereum for visionary dummies
Ethereum for visionary dummiesEthereum for visionary dummies
Ethereum for visionary dummies
 
Pourquoi la blockchain?
Pourquoi la blockchain?Pourquoi la blockchain?
Pourquoi la blockchain?
 
Lean Startup for Developers - Devoxx Poland
Lean Startup for Developers - Devoxx PolandLean Startup for Developers - Devoxx Poland
Lean Startup for Developers - Devoxx Poland
 
Lean startup for developers conference
Lean startup for developers conferenceLean startup for developers conference
Lean startup for developers conference
 
Lean Startup for Developers University
Lean Startup for Developers UniversityLean Startup for Developers University
Lean Startup for Developers University
 
Apps on your Wrist
Apps on your WristApps on your Wrist
Apps on your Wrist
 
La vie de développeur
La vie de développeurLa vie de développeur
La vie de développeur
 
Lean startup for MBA students
Lean startup for MBA studentsLean startup for MBA students
Lean startup for MBA students
 
Lean startup for developers
Lean startup for developersLean startup for developers
Lean startup for developers
 

Recently uploaded

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

Digital Hygiene for Nomads

  • 1. Information Security for Nomads Sébastien Arbogast - 2023 How to take good care of your stuff?
  • 6. Your phone got left behind
  • 7. Your email (or socials) got hacked
  • 8. Safety Protocol • Passwords • Data protection • Internet connection • Gear • Financials • Borders • Best practices
  • 9. Passwords • Check this out! • Use a password manager: 1password, Dashlane, LastPass • Synchronize it across all your devices • Generate unique passwords for everything • Change passwords for your critical accounts • Email accounts • Social accounts • Accounts with your credit card on them • Progressively all the others • Enable 2FA, but not with SMS (Google Authenticator or Yubikey)
  • 11. Data protection • Full remote backup: Backblaze, or at the very least Dropbox or Google Drive • Encrypt your hard drive • MacOS: enable Filevault • Windows: • make sure BitLocker is enabled • CipherShed or VeraCrypt
  • 12. Internet connection • Antivirus if you are on Windows (Defender might not be enough) • Avira • Kaspersky • Bitdefender • Keep your OS up-to-date • Use a VPN everywhere you don't trust • ExpressVPN • NordVPN • ProtonVPN • Sometimes VPNs are blocked (we see you Starbucks)
  • 13. Gear • Laptop recovery: • iCloud (mac) • HiddenApp • Prey • Use a webcam cover • Lock your devices systematically • Biometric is best • At least 6-digit PIN • You need a PIN, really • AirTags are awesome! • Theft-proof backpack
  • 14. Financials • Neobanks are the best • Revolut • N26 • Wise • Never give you credit card details over the phone, or at least use a virtual one • Crypto-currencies • Use a hardware wallet: Ledger Nano X or Trezor • Or at least a software wallet: Exodus or Coinbase Wallet • But DO NOT keep your crypto on online marketplaces
  • 15. Borders • Do not share your socials with customs • Lock your phone with your PIN before crossing the border (disable biometrics) • Avoid giving away your IMEI
  • 16. Best practices • Generate unique random passwords • Store everything sensitive in your password manager • Never open attachments you don't trust • Never answer emails that ask for your info • Avoid writing your credit card details in an email or on paper (rentals) • If you have to give a password, change it afterwards • Always use a VPN on public wi fi s • Check if some of your accounts have been compromised: https://haveibeenpwned.com/ • Beware of social engineering • Beware of random USB keys • Don't share pictures of your boarding passes