SlideShare une entreprise Scribd logo
1  sur  10
Holiday Gifts 
That Put Your Privacy at Risk 
© IDT911, LLC. All Rights Reserved — Confidential 0
Giving Someone 
Special a Tech Gadget 
for the Holidays? 
Make sure you don't give the gift of identity theft. 
Protect your information with these easy tips. 
© IDT911, LLC. All Rights Reserved — Confidential 1
iPhone 6 
Apple Pay and Find My iPhone Make Life Easier 
Apple Pay 
Lets you use your phone to pay for 
purchases. 
Find My iPhone 
Helps you locate your phone when 
it’s misplaced. 
TIP: Start by using only one credit card—never debit cards—to 
mitigate risk if there is an issue. Use two-factor authentication 
to keep your personal information secure online. 
© IDT911, LLC. All Rights Reserved — Confidential 2
With Nest, you get a smart 
thermostat that learns about your 
behavior for more efficient heating 
and cooling in your home. Hackers 
could get backdoor access to your 
home and personal information. 
Google’s Nest Thermostat 
Make Your Home Smart and Safe 
TIP: Never buy devices used because they may contain malware. 
Watch for upgrades that can offer stronger protection. Monitor 
performance to ensure it’s operating correctly. 
© IDT911, LLC. All Rights Reserved — Confidential 3
Jawbone UP 
Watch Your Health—and Your Privacy 
This fitness tracker stores and tracks 
a lot of sensitive information about 
you to help you make better health 
decisions. But trackers may not 
secure our data as well as we think 
because they’re vulnerable to 
information leakage via hacking and 
other methods. 
TIP: Read privacy policies to see if your data is for sale. Be 
cautious with social sharing features. Never share your 
location on social media. Use a screen lock to prevent 
unauthorized access to your device. 
© IDT911, LLC. All Rights Reserved — Confidential 4
Pebble Steel 
Keep Track of the Time, Calls, and Your Security 
Leave your phone and iPod at home 
with this multifunctional smartwatch 
that accepts phone calls and texts, 
and plays your favorite songs. 
TIP: Pebble Steel depends on Bluetooth to connect with your 
phone. Configure it to approve connection requests to avoid 
being “Bluejacked.” Turn off Bluetooth when you’re not using 
the device. 
© IDT911, LLC. All Rights Reserved — Confidential 5
August Smart Lock 
Lock in Security Best Practices 
Now you don’t have to juggle grocery 
bags to find your house keys. This 
smart home product uses your 
iPhone or Android to conveniently 
sense your approach and unlock 
your home’s front door. 
TIP: Installation immediately raises your risk profile. Don’t leave 
your phone in plain sight. Have a backup plan. And rely on 
smartphone security best practices such as using a screen 
lock or PIN. 
© IDT911, LLC. All Rights Reserved — Confidential 6
Apple’s new top-of-the-line device is 
fast, light, and powerful enough to be 
your main or secondary computer. 
Like any device, it’s also potentially 
vulnerable to malware and easily lost 
or stolen. 
iPad Air 2 
Ideal for Frequent Travelers 
TIP: Keep your tablet’s operating system and apps up-to-date. 
Enable encryption for your data, and consider encrypting calls 
and texts. Use only known, secure Wi-Fi networks. 
© IDT911, LLC. All Rights Reserved — Confidential 7
Kindle Voyage 
Don’t Trade Privacy for Convenience 
Voyage, the seventh generation of 
the Kindle devices, has been hailed 
a top e-reader device. But make sure 
you’re not letting companies track 
your reading and browsing habits. 
TIP: Set your tablet to require a password for access to keep 
unauthorized users out. Do the same for Wi-Fi. Regularly 
clear your cookies, cache, and browser history, too. 
© IDT911, LLC. All Rights Reserved — Confidential 8
9 
Scottsdale, AZ / Providence, RI / New York, NY / Montreal, Canada / Galway, Ireland 
© IDT911, LLC. All Rights Reserved — Confidential

Contenu connexe

En vedette

Social Media Tips Infographic, November, 2013
Social Media Tips Infographic, November, 2013Social Media Tips Infographic, November, 2013
Social Media Tips Infographic, November, 2013Leslie Drate
 
How can Warrants Help you Close a Deal?
How can Warrants Help you Close a Deal?How can Warrants Help you Close a Deal?
How can Warrants Help you Close a Deal?Trevor Crow
 
Enhancing Functionality on Epic OMS: New Features for OM Plus DM
Enhancing Functionality on Epic OMS: New Features for OM Plus DMEnhancing Functionality on Epic OMS: New Features for OM Plus DM
Enhancing Functionality on Epic OMS: New Features for OM Plus DMPlus Technologies
 
Ideal presentation rus
Ideal presentation rusIdeal presentation rus
Ideal presentation rusLuda Kruglich
 
Motivasi for students
Motivasi for studentsMotivasi for students
Motivasi for studentsNnoffie Khaa
 
Recipes OnDemand
Recipes OnDemandRecipes OnDemand
Recipes OnDemandsudderth1
 
Imagination with paper 'Filigree'
Imagination with paper 'Filigree'Imagination with paper 'Filigree'
Imagination with paper 'Filigree'Makala (D)
 
ομιλια για χρηση ουσιων
ομιλια για χρηση ουσιωνομιλια για χρηση ουσιων
ομιλια για χρηση ουσιωνYolanda Komianou
 
Bab 1 sejarah & kita
Bab 1 sejarah & kitaBab 1 sejarah & kita
Bab 1 sejarah & kitaNur Atizza
 
Turkey_Hospitality_Industry
Turkey_Hospitality_IndustryTurkey_Hospitality_Industry
Turkey_Hospitality_IndustryUday Kumar
 

En vedette (12)

Social Media Tips Infographic, November, 2013
Social Media Tips Infographic, November, 2013Social Media Tips Infographic, November, 2013
Social Media Tips Infographic, November, 2013
 
Menu SPA
Menu SPAMenu SPA
Menu SPA
 
How can Warrants Help you Close a Deal?
How can Warrants Help you Close a Deal?How can Warrants Help you Close a Deal?
How can Warrants Help you Close a Deal?
 
Enhancing Functionality on Epic OMS: New Features for OM Plus DM
Enhancing Functionality on Epic OMS: New Features for OM Plus DMEnhancing Functionality on Epic OMS: New Features for OM Plus DM
Enhancing Functionality on Epic OMS: New Features for OM Plus DM
 
Ideal presentation rus
Ideal presentation rusIdeal presentation rus
Ideal presentation rus
 
Motivasi for students
Motivasi for studentsMotivasi for students
Motivasi for students
 
Recipes OnDemand
Recipes OnDemandRecipes OnDemand
Recipes OnDemand
 
Imagination with paper 'Filigree'
Imagination with paper 'Filigree'Imagination with paper 'Filigree'
Imagination with paper 'Filigree'
 
ομιλια για χρηση ουσιων
ομιλια για χρηση ουσιωνομιλια για χρηση ουσιων
ομιλια για χρηση ουσιων
 
Qué son los neurotransmisores
Qué son los neurotransmisoresQué son los neurotransmisores
Qué son los neurotransmisores
 
Bab 1 sejarah & kita
Bab 1 sejarah & kitaBab 1 sejarah & kita
Bab 1 sejarah & kita
 
Turkey_Hospitality_Industry
Turkey_Hospitality_IndustryTurkey_Hospitality_Industry
Turkey_Hospitality_Industry
 

Plus de IDT911

5 Worst States for Identity Theft
5 Worst States for Identity Theft5 Worst States for Identity Theft
5 Worst States for Identity TheftIDT911
 
Top 10 Government Breaches of 2012
Top 10 Government Breaches of 2012Top 10 Government Breaches of 2012
Top 10 Government Breaches of 2012IDT911
 
Anatomy of a Phishing Email
Anatomy of a Phishing EmailAnatomy of a Phishing Email
Anatomy of a Phishing EmailIDT911
 
LinkedIn Breach: How to Make Your Passwords Stronger
LinkedIn Breach: How to Make Your Passwords StrongerLinkedIn Breach: How to Make Your Passwords Stronger
LinkedIn Breach: How to Make Your Passwords StrongerIDT911
 
Turn Your LeakedIn Account Back Into a LinkedIn One
Turn Your LeakedIn Account Back Into a LinkedIn OneTurn Your LeakedIn Account Back Into a LinkedIn One
Turn Your LeakedIn Account Back Into a LinkedIn OneIDT911
 
Anatomy of a Craigslist Scam
Anatomy of a Craigslist ScamAnatomy of a Craigslist Scam
Anatomy of a Craigslist ScamIDT911
 
How to Fight Shoddy Background Checks
How to Fight Shoddy Background ChecksHow to Fight Shoddy Background Checks
How to Fight Shoddy Background ChecksIDT911
 
How to Fight Shoddy Background Checks
How to Fight Shoddy Background ChecksHow to Fight Shoddy Background Checks
How to Fight Shoddy Background ChecksIDT911
 
How to Fight Shoddy Background Checks
How to Fight Shoddy Background ChecksHow to Fight Shoddy Background Checks
How to Fight Shoddy Background ChecksIDT911
 
When Data Loss Is An Inside Job
When Data Loss Is An Inside JobWhen Data Loss Is An Inside Job
When Data Loss Is An Inside JobIDT911
 
5 Worst States for Identity Theft
5 Worst States for Identity Theft5 Worst States for Identity Theft
5 Worst States for Identity TheftIDT911
 
Top 10 Security Trends of 2012
Top 10 Security Trends of 2012Top 10 Security Trends of 2012
Top 10 Security Trends of 2012IDT911
 

Plus de IDT911 (12)

5 Worst States for Identity Theft
5 Worst States for Identity Theft5 Worst States for Identity Theft
5 Worst States for Identity Theft
 
Top 10 Government Breaches of 2012
Top 10 Government Breaches of 2012Top 10 Government Breaches of 2012
Top 10 Government Breaches of 2012
 
Anatomy of a Phishing Email
Anatomy of a Phishing EmailAnatomy of a Phishing Email
Anatomy of a Phishing Email
 
LinkedIn Breach: How to Make Your Passwords Stronger
LinkedIn Breach: How to Make Your Passwords StrongerLinkedIn Breach: How to Make Your Passwords Stronger
LinkedIn Breach: How to Make Your Passwords Stronger
 
Turn Your LeakedIn Account Back Into a LinkedIn One
Turn Your LeakedIn Account Back Into a LinkedIn OneTurn Your LeakedIn Account Back Into a LinkedIn One
Turn Your LeakedIn Account Back Into a LinkedIn One
 
Anatomy of a Craigslist Scam
Anatomy of a Craigslist ScamAnatomy of a Craigslist Scam
Anatomy of a Craigslist Scam
 
How to Fight Shoddy Background Checks
How to Fight Shoddy Background ChecksHow to Fight Shoddy Background Checks
How to Fight Shoddy Background Checks
 
How to Fight Shoddy Background Checks
How to Fight Shoddy Background ChecksHow to Fight Shoddy Background Checks
How to Fight Shoddy Background Checks
 
How to Fight Shoddy Background Checks
How to Fight Shoddy Background ChecksHow to Fight Shoddy Background Checks
How to Fight Shoddy Background Checks
 
When Data Loss Is An Inside Job
When Data Loss Is An Inside JobWhen Data Loss Is An Inside Job
When Data Loss Is An Inside Job
 
5 Worst States for Identity Theft
5 Worst States for Identity Theft5 Worst States for Identity Theft
5 Worst States for Identity Theft
 
Top 10 Security Trends of 2012
Top 10 Security Trends of 2012Top 10 Security Trends of 2012
Top 10 Security Trends of 2012
 

Dernier

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 

Dernier (20)

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 

Holiday Gifts That Put Your Privacy at Risk

  • 1. Holiday Gifts That Put Your Privacy at Risk © IDT911, LLC. All Rights Reserved — Confidential 0
  • 2. Giving Someone Special a Tech Gadget for the Holidays? Make sure you don't give the gift of identity theft. Protect your information with these easy tips. © IDT911, LLC. All Rights Reserved — Confidential 1
  • 3. iPhone 6 Apple Pay and Find My iPhone Make Life Easier Apple Pay Lets you use your phone to pay for purchases. Find My iPhone Helps you locate your phone when it’s misplaced. TIP: Start by using only one credit card—never debit cards—to mitigate risk if there is an issue. Use two-factor authentication to keep your personal information secure online. © IDT911, LLC. All Rights Reserved — Confidential 2
  • 4. With Nest, you get a smart thermostat that learns about your behavior for more efficient heating and cooling in your home. Hackers could get backdoor access to your home and personal information. Google’s Nest Thermostat Make Your Home Smart and Safe TIP: Never buy devices used because they may contain malware. Watch for upgrades that can offer stronger protection. Monitor performance to ensure it’s operating correctly. © IDT911, LLC. All Rights Reserved — Confidential 3
  • 5. Jawbone UP Watch Your Health—and Your Privacy This fitness tracker stores and tracks a lot of sensitive information about you to help you make better health decisions. But trackers may not secure our data as well as we think because they’re vulnerable to information leakage via hacking and other methods. TIP: Read privacy policies to see if your data is for sale. Be cautious with social sharing features. Never share your location on social media. Use a screen lock to prevent unauthorized access to your device. © IDT911, LLC. All Rights Reserved — Confidential 4
  • 6. Pebble Steel Keep Track of the Time, Calls, and Your Security Leave your phone and iPod at home with this multifunctional smartwatch that accepts phone calls and texts, and plays your favorite songs. TIP: Pebble Steel depends on Bluetooth to connect with your phone. Configure it to approve connection requests to avoid being “Bluejacked.” Turn off Bluetooth when you’re not using the device. © IDT911, LLC. All Rights Reserved — Confidential 5
  • 7. August Smart Lock Lock in Security Best Practices Now you don’t have to juggle grocery bags to find your house keys. This smart home product uses your iPhone or Android to conveniently sense your approach and unlock your home’s front door. TIP: Installation immediately raises your risk profile. Don’t leave your phone in plain sight. Have a backup plan. And rely on smartphone security best practices such as using a screen lock or PIN. © IDT911, LLC. All Rights Reserved — Confidential 6
  • 8. Apple’s new top-of-the-line device is fast, light, and powerful enough to be your main or secondary computer. Like any device, it’s also potentially vulnerable to malware and easily lost or stolen. iPad Air 2 Ideal for Frequent Travelers TIP: Keep your tablet’s operating system and apps up-to-date. Enable encryption for your data, and consider encrypting calls and texts. Use only known, secure Wi-Fi networks. © IDT911, LLC. All Rights Reserved — Confidential 7
  • 9. Kindle Voyage Don’t Trade Privacy for Convenience Voyage, the seventh generation of the Kindle devices, has been hailed a top e-reader device. But make sure you’re not letting companies track your reading and browsing habits. TIP: Set your tablet to require a password for access to keep unauthorized users out. Do the same for Wi-Fi. Regularly clear your cookies, cache, and browser history, too. © IDT911, LLC. All Rights Reserved — Confidential 8
  • 10. 9 Scottsdale, AZ / Providence, RI / New York, NY / Montreal, Canada / Galway, Ireland © IDT911, LLC. All Rights Reserved — Confidential