SlideShare une entreprise Scribd logo
1  sur  9
“He who knows not and knows not
    that he knows not, is a fool…”
    - Persian Proverb




LESSONS FROM BEING
HACKED
         TheMullingsGroup.com
Lessons From Being Hacked
2




    I got hacked via my ping.fm account

    The hacker was on the east coast




       © 2012 The Mullings Group. http://TheMullingsGroup.com
Lessons From Being Hacked
3


    I had to…

     Delete 2 ping.fm accounts
     Delete countless posts on

      Facebook, Twitter, Plaxo and LinkedIn




    © 2012 The Mullings Group. http://TheMullingsGroup.com
Lessons From Being Hacked
4




    Lesson: Keep close tabs on how your
    online accounts are linked together.




    © 2012 The Mullings Group. http://TheMullingsGroup.com
Lessons From Being Hacked
5




    Lesson: Delete any unused online accounts.
    First delete your information from within the
    account and then delete the account.




    © 2012 The Mullings Group. http://TheMullingsGroup.com
Lessons From Being Hacked
6




    Lesson: Delete any unused email addresses -
    especially the free ones. Only do this if you
    are sure that no account is linked to the email
    address or that no sensitive information will
    be sent to it.



    © 2012 The Mullings Group. http://TheMullingsGroup.com
Lessons From Being Hacked
7




    Lesson: Do not use one password for all your
    online accounts! Fortunately the hack was
    limited because I did not. I now have a
    premium subscription to LastPass.com.




    © 2012 The Mullings Group. http://TheMullingsGroup.com
Invite Us to Teach for You
8


    Call us at 617-299-6871 or email us at
    workshops@themullingsgroup.com to have us
    come teach a workshop for you.




    © 2012 Keno R. Mullings. http://TheMullingsGroup.com
Contact Info
9


       Connect:         http://www.linkedin.com/in/kmullings
       Follow:          http://twitter.com/KenoMullings
       Consult:         http://TheMullingsGroup.com
       Learn:           http://TheMullingsUniversity.org
       Discover:        http://StrategicLifePlanSystem.com
       Call:            (617) 299-6871




    © 2012 Keno R. Mullings. http://TheMullingsGroup.com

Contenu connexe

Similaire à Internet security - Lessons from being hacked.

media safety .pptx
media safety .pptxmedia safety .pptx
media safety .pptxGAmarioarei
 
CRM 101: Session 1: Business Anti-Social- Why the Boss Doesn't Use SugarCRM
CRM 101: Session 1: Business Anti-Social- Why the Boss Doesn't Use SugarCRMCRM 101: Session 1: Business Anti-Social- Why the Boss Doesn't Use SugarCRM
CRM 101: Session 1: Business Anti-Social- Why the Boss Doesn't Use SugarCRMSugarCRM
 
Social Media Guidelines
Social Media GuidelinesSocial Media Guidelines
Social Media GuidelinesVanessa Dennen
 
Internet Safety for Kids and Parents
Internet Safety for Kids and Parents Internet Safety for Kids and Parents
Internet Safety for Kids and Parents Rajesh Soundararajan
 
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul StyrvokyNTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul StyrvokyNorth Texas Chapter of the ISSA
 
How to Sign up for LinkedIn Learning
How to Sign up for LinkedIn LearningHow to Sign up for LinkedIn Learning
How to Sign up for LinkedIn LearningMark Kor
 
10 Worst practices for intranets
10 Worst practices for intranets10 Worst practices for intranets
10 Worst practices for intranetsSam Marshall
 
5 Biggest Marketing Opportunities for Advisors in 2022
5 Biggest Marketing Opportunities for Advisors in 20225 Biggest Marketing Opportunities for Advisors in 2022
5 Biggest Marketing Opportunities for Advisors in 2022Samantha Russell
 

Similaire à Internet security - Lessons from being hacked. (10)

media safety .pptx
media safety .pptxmedia safety .pptx
media safety .pptx
 
CRM 101: Session 1: Business Anti-Social- Why the Boss Doesn't Use SugarCRM
CRM 101: Session 1: Business Anti-Social- Why the Boss Doesn't Use SugarCRMCRM 101: Session 1: Business Anti-Social- Why the Boss Doesn't Use SugarCRM
CRM 101: Session 1: Business Anti-Social- Why the Boss Doesn't Use SugarCRM
 
Social Media Guidelines
Social Media GuidelinesSocial Media Guidelines
Social Media Guidelines
 
Internet Safety for Kids and Parents
Internet Safety for Kids and Parents Internet Safety for Kids and Parents
Internet Safety for Kids and Parents
 
Successful with social media: inspiration session for sales
Successful with social media: inspiration session for sales Successful with social media: inspiration session for sales
Successful with social media: inspiration session for sales
 
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul StyrvokyNTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
 
How to Sign up for LinkedIn Learning
How to Sign up for LinkedIn LearningHow to Sign up for LinkedIn Learning
How to Sign up for LinkedIn Learning
 
10 Worst practices for intranets
10 Worst practices for intranets10 Worst practices for intranets
10 Worst practices for intranets
 
5 Biggest Marketing Opportunities for Advisors in 2022
5 Biggest Marketing Opportunities for Advisors in 20225 Biggest Marketing Opportunities for Advisors in 2022
5 Biggest Marketing Opportunities for Advisors in 2022
 
Internet Safety!!
Internet Safety!!Internet Safety!!
Internet Safety!!
 

Dernier

Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 

Dernier (20)

Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 

Internet security - Lessons from being hacked.

  • 1. “He who knows not and knows not that he knows not, is a fool…” - Persian Proverb LESSONS FROM BEING HACKED TheMullingsGroup.com
  • 2. Lessons From Being Hacked 2 I got hacked via my ping.fm account The hacker was on the east coast © 2012 The Mullings Group. http://TheMullingsGroup.com
  • 3. Lessons From Being Hacked 3 I had to…  Delete 2 ping.fm accounts  Delete countless posts on Facebook, Twitter, Plaxo and LinkedIn © 2012 The Mullings Group. http://TheMullingsGroup.com
  • 4. Lessons From Being Hacked 4 Lesson: Keep close tabs on how your online accounts are linked together. © 2012 The Mullings Group. http://TheMullingsGroup.com
  • 5. Lessons From Being Hacked 5 Lesson: Delete any unused online accounts. First delete your information from within the account and then delete the account. © 2012 The Mullings Group. http://TheMullingsGroup.com
  • 6. Lessons From Being Hacked 6 Lesson: Delete any unused email addresses - especially the free ones. Only do this if you are sure that no account is linked to the email address or that no sensitive information will be sent to it. © 2012 The Mullings Group. http://TheMullingsGroup.com
  • 7. Lessons From Being Hacked 7 Lesson: Do not use one password for all your online accounts! Fortunately the hack was limited because I did not. I now have a premium subscription to LastPass.com. © 2012 The Mullings Group. http://TheMullingsGroup.com
  • 8. Invite Us to Teach for You 8 Call us at 617-299-6871 or email us at workshops@themullingsgroup.com to have us come teach a workshop for you. © 2012 Keno R. Mullings. http://TheMullingsGroup.com
  • 9. Contact Info 9  Connect: http://www.linkedin.com/in/kmullings  Follow: http://twitter.com/KenoMullings  Consult: http://TheMullingsGroup.com  Learn: http://TheMullingsUniversity.org  Discover: http://StrategicLifePlanSystem.com  Call: (617) 299-6871 © 2012 Keno R. Mullings. http://TheMullingsGroup.com