SlideShare a Scribd company logo
1 of 22
Download to read offline
Keeping Your Personal Info Safe
  It’s All About Minimizing Risk
Welcome!



      Chris Schroeder, CISM,
      Lowe’s Companies, Inc.



      Ken Robey, CISSP

      Security in Focus, Inc.




           NPower Charlotte Region | Proprietary and Confidential | Not for Distribution   2
NPower Charlotte Region | Proprietary and Confidential | Not for Distribution   3
a




Learn how to protect your personal data wherever you go.




              NPower Charlotte Region | Proprietary and Confidential | Not for Distribution   4
Today’s Roadmap to Protecting Your Data


● Avoid “scammers”
● Learn wireless network basics
● Picking passwords
    Creation
    Protection

● Backing up your data
● Q&A


            NPower Charlotte Region | Proprietary and Confidential | Not for Distribution   5
6 Rules to Avoid Scammers

1. Don’t share personal info with anyone who calls you to ask for it.

2. Don’t share passwords.

3. Treat unexpected emails suspiciously.

4. Don’t respond to company emails requesting personal info.

5. Confirm the identity of anyone asking for personal info.

6. ALWAYS follow the correct procedure; don’t make exceptions.



                 NPower Charlotte Region | Proprietary and Confidential | Not for Distribution   6
Wireless Network Basics

                     4 Ways to Protect
                   Yourself from Network
                         Attackers       4
            1                                                              Enabling
      Renaming your                                                       password
       default SSID                                                       protection

                    2            3
             Preventing SSID   Using
              broadcasting   encryption



             NPower Charlotte Region | Proprietary and Confidential | Not for Distribution   7
1
                Wireless Network Basics
Renaming your
 default SSID



    • By default, the wireless access point’s SSID will typically
      be some form of a the manufacturer’s name example,
      Linksys wireless access points have SSIDs of “Linksys”.

    • Renaming the default SSID is the first step to hardening a
      wireless network from attacks.




                 NPower Charlotte Region | Proprietary and Confidential | Not for Distribution   8
2        Wireless Network Basics
Preventing SSID
 broadcasting



  ● Turn off SSID broadcasting on your wireless access point




                NPower Charlotte Region | Proprietary and Confidential | Not for Distribution   9
Wireless Network Basics
    3
  Using
encryption


   • Utilizing encryption ensures that someone cannot start a
     network analyzer and easily view all of the data you have
     transmitted to and/or received from the wireless access
     point.
   • Common wireless security specifications include, from
     weakest to strongest:
         • WEP (Bad)
         • WPA (Better)
         • WPA2 (Best)



              NPower Charlotte Region | Proprietary and Confidential | Not for Distribution   10
4                       Wireless Network Basics
 Enabling
password
protection


• By default, wireless access points do not require a
  password; the default to published admin password.
  Leaving your network open allows for unauthorized access.
• Secure your network by requiring a password and changing
  the default administrative password.

  **Password Hint**
     The longer and more complex the hard to crack.



              NPower Charlotte Region | Proprietary and Confidential | Not for Distribution   11
Creating and Protecting Passwords


Do Your                        ● While servers tend to have passwords
                                 on accounts, did you know that most
Passwords                                        workstations do not?


Pass the                                    ● We all believe our systems have
                                           passwords – have you ever checked
Test?                                                           every system?

                                              ● Do you have strong passwords?

                                                   ● Do you know what is a strong
                                                                     password?

            NPower Charlotte Region | Proprietary and Confidential | Not for Distribution   12
Passing the Password Test



      Length                                                Characters                Alpha
                The longer the                                                        Numeric
                better                                                                Casing
                                                                                      Special



   Example: Alpha, Numeric and Casing (16 Characters Long)
                    ‘Passw0rdPassw0rd’

47,672,401,706,823,533,450,263,330,816 (47 octillion combinations)

           53,493,822,905,617 53 trillion years to crack
                NPower Charlotte Region | Proprietary and Confidential | Not for Distribution   13
Password Protection

• Use a Password Safe to
  securely store your
  passwords
   •   LastPass.com
   •   Passwordsafe.sourceforge.net
   •   Keypass.info


• Do not use the same
  password on every
  site/system
   •   If one is compromised, so are
       the others



                    NPower Charlotte Region | Proprietary and Confidential | Not for Distribution   14
What is Your Backup Plan?


   Sooner or later, you                                             You MUST backup
    will lose your data                                                 your data


    Hard-drive will crash
                                                                      Back up regularly
    Computer gets stolen
                                                                       Back up on-site
    Building burns down
                                                                       Back up off-site
     Phone lost/stolen




             NPower Charlotte Region | Proprietary and Confidential | Not for Distribution   15
Backups




• Ensure the backups are encrypted
• Use a cloud based backup for off-site, $5.00/month




              NPower Charlotte Region | Proprietary and Confidential | Not for Distribution   16
Protecting Your Personal Data on the Street




            NPower Charlotte Region | Proprietary and Confidential | Not for Distribution   17
Protecting Your Personal Data


    What’s wrong with
       this ATM?




            NPower Charlotte Region | Proprietary and Confidential | Not for Distribution   18
Protecting Your Personal Data



                                   A card reader is placed
                                      over the original!




            NPower Charlotte Region | Proprietary and Confidential | Not for Distribution   19
Protecting Your Personal Data


  Anything wrong here?




            NPower Charlotte Region | Proprietary and Confidential | Not for Distribution   20
Protecting Your Personal Data


                                      The pamphlet holder
                                         has a camera!




            NPower Charlotte Region | Proprietary and Confidential | Not for Distribution   21
Questions?




NPower Charlotte Region | Proprietary and Confidential | Not for Distribution   22

More Related Content

Similar to Personal Data Security

Web application security: Threats & Countermeasures
Web application security: Threats & CountermeasuresWeb application security: Threats & Countermeasures
Web application security: Threats & Countermeasures
Aung Thu Rha Hein
 
Howtohackwirelessinternetconnections 100105124156-phpapp01
Howtohackwirelessinternetconnections 100105124156-phpapp01Howtohackwirelessinternetconnections 100105124156-phpapp01
Howtohackwirelessinternetconnections 100105124156-phpapp01
Alf Tero
 

Similar to Personal Data Security (20)

eSecurity! Keeping your Business and Customers Safe
eSecurity! Keeping your Business and Customers SafeeSecurity! Keeping your Business and Customers Safe
eSecurity! Keeping your Business and Customers Safe
 
IT infrastructure security 101
IT infrastructure security 101IT infrastructure security 101
IT infrastructure security 101
 
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
 
CompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four ReviewCompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four Review
 
Unified Threat Management
Unified Threat ManagementUnified Threat Management
Unified Threat Management
 
Wireless v2
Wireless v2Wireless v2
Wireless v2
 
Web application security: Threats & Countermeasures
Web application security: Threats & CountermeasuresWeb application security: Threats & Countermeasures
Web application security: Threats & Countermeasures
 
Internet security lessons for IoT
Internet security lessons for IoTInternet security lessons for IoT
Internet security lessons for IoT
 
Myles firewalls
Myles firewallsMyles firewalls
Myles firewalls
 
WiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & DefenceWiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & Defence
 
Howtohackwirelessinternetconnections 100105124156-phpapp01
Howtohackwirelessinternetconnections 100105124156-phpapp01Howtohackwirelessinternetconnections 100105124156-phpapp01
Howtohackwirelessinternetconnections 100105124156-phpapp01
 
Dama - Protecting Sensitive Data on a Database
Dama - Protecting Sensitive Data on a DatabaseDama - Protecting Sensitive Data on a Database
Dama - Protecting Sensitive Data on a Database
 
Tingling wireless security
Tingling wireless securityTingling wireless security
Tingling wireless security
 
Kerberos
KerberosKerberos
Kerberos
 
WiFi Intrustion Detection from WireShark SharkFest
WiFi Intrustion Detection from WireShark SharkFestWiFi Intrustion Detection from WireShark SharkFest
WiFi Intrustion Detection from WireShark SharkFest
 
Airheads dallas 2011 wireless security
Airheads dallas 2011   wireless securityAirheads dallas 2011   wireless security
Airheads dallas 2011 wireless security
 
Save Your Network – Protecting Manufacturing Data from Deadly Breaches
Save Your Network – Protecting Manufacturing Data from Deadly BreachesSave Your Network – Protecting Manufacturing Data from Deadly Breaches
Save Your Network – Protecting Manufacturing Data from Deadly Breaches
 
Henrik Strøm - IPv6 from the attacker's perspective
Henrik Strøm - IPv6 from the attacker's perspectiveHenrik Strøm - IPv6 from the attacker's perspective
Henrik Strøm - IPv6 from the attacker's perspective
 
Hacktrikz - Introduction to Information Security & Ethical Hacking
Hacktrikz - Introduction to Information Security & Ethical HackingHacktrikz - Introduction to Information Security & Ethical Hacking
Hacktrikz - Introduction to Information Security & Ethical Hacking
 
The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?
 

Recently uploaded

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Recently uploaded (20)

SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 

Personal Data Security

  • 1. Keeping Your Personal Info Safe It’s All About Minimizing Risk
  • 2. Welcome! Chris Schroeder, CISM, Lowe’s Companies, Inc. Ken Robey, CISSP Security in Focus, Inc. NPower Charlotte Region | Proprietary and Confidential | Not for Distribution 2
  • 3. NPower Charlotte Region | Proprietary and Confidential | Not for Distribution 3
  • 4. a Learn how to protect your personal data wherever you go. NPower Charlotte Region | Proprietary and Confidential | Not for Distribution 4
  • 5. Today’s Roadmap to Protecting Your Data ● Avoid “scammers” ● Learn wireless network basics ● Picking passwords  Creation  Protection ● Backing up your data ● Q&A NPower Charlotte Region | Proprietary and Confidential | Not for Distribution 5
  • 6. 6 Rules to Avoid Scammers 1. Don’t share personal info with anyone who calls you to ask for it. 2. Don’t share passwords. 3. Treat unexpected emails suspiciously. 4. Don’t respond to company emails requesting personal info. 5. Confirm the identity of anyone asking for personal info. 6. ALWAYS follow the correct procedure; don’t make exceptions. NPower Charlotte Region | Proprietary and Confidential | Not for Distribution 6
  • 7. Wireless Network Basics 4 Ways to Protect Yourself from Network Attackers 4 1 Enabling Renaming your password default SSID protection 2 3 Preventing SSID Using broadcasting encryption NPower Charlotte Region | Proprietary and Confidential | Not for Distribution 7
  • 8. 1 Wireless Network Basics Renaming your default SSID • By default, the wireless access point’s SSID will typically be some form of a the manufacturer’s name example, Linksys wireless access points have SSIDs of “Linksys”. • Renaming the default SSID is the first step to hardening a wireless network from attacks. NPower Charlotte Region | Proprietary and Confidential | Not for Distribution 8
  • 9. 2 Wireless Network Basics Preventing SSID broadcasting ● Turn off SSID broadcasting on your wireless access point NPower Charlotte Region | Proprietary and Confidential | Not for Distribution 9
  • 10. Wireless Network Basics 3 Using encryption • Utilizing encryption ensures that someone cannot start a network analyzer and easily view all of the data you have transmitted to and/or received from the wireless access point. • Common wireless security specifications include, from weakest to strongest: • WEP (Bad) • WPA (Better) • WPA2 (Best) NPower Charlotte Region | Proprietary and Confidential | Not for Distribution 10
  • 11. 4 Wireless Network Basics Enabling password protection • By default, wireless access points do not require a password; the default to published admin password. Leaving your network open allows for unauthorized access. • Secure your network by requiring a password and changing the default administrative password. **Password Hint** The longer and more complex the hard to crack. NPower Charlotte Region | Proprietary and Confidential | Not for Distribution 11
  • 12. Creating and Protecting Passwords Do Your ● While servers tend to have passwords on accounts, did you know that most Passwords workstations do not? Pass the ● We all believe our systems have passwords – have you ever checked Test? every system? ● Do you have strong passwords? ● Do you know what is a strong password? NPower Charlotte Region | Proprietary and Confidential | Not for Distribution 12
  • 13. Passing the Password Test Length Characters Alpha The longer the Numeric better Casing Special Example: Alpha, Numeric and Casing (16 Characters Long) ‘Passw0rdPassw0rd’ 47,672,401,706,823,533,450,263,330,816 (47 octillion combinations) 53,493,822,905,617 53 trillion years to crack NPower Charlotte Region | Proprietary and Confidential | Not for Distribution 13
  • 14. Password Protection • Use a Password Safe to securely store your passwords • LastPass.com • Passwordsafe.sourceforge.net • Keypass.info • Do not use the same password on every site/system • If one is compromised, so are the others NPower Charlotte Region | Proprietary and Confidential | Not for Distribution 14
  • 15. What is Your Backup Plan? Sooner or later, you You MUST backup will lose your data your data Hard-drive will crash Back up regularly Computer gets stolen Back up on-site Building burns down Back up off-site Phone lost/stolen NPower Charlotte Region | Proprietary and Confidential | Not for Distribution 15
  • 16. Backups • Ensure the backups are encrypted • Use a cloud based backup for off-site, $5.00/month NPower Charlotte Region | Proprietary and Confidential | Not for Distribution 16
  • 17. Protecting Your Personal Data on the Street NPower Charlotte Region | Proprietary and Confidential | Not for Distribution 17
  • 18. Protecting Your Personal Data What’s wrong with this ATM? NPower Charlotte Region | Proprietary and Confidential | Not for Distribution 18
  • 19. Protecting Your Personal Data A card reader is placed over the original! NPower Charlotte Region | Proprietary and Confidential | Not for Distribution 19
  • 20. Protecting Your Personal Data Anything wrong here? NPower Charlotte Region | Proprietary and Confidential | Not for Distribution 20
  • 21. Protecting Your Personal Data The pamphlet holder has a camera! NPower Charlotte Region | Proprietary and Confidential | Not for Distribution 21
  • 22. Questions? NPower Charlotte Region | Proprietary and Confidential | Not for Distribution 22