1 / 17

Cloudy with a chance of Identity Theft Why a good password is very often your best defense

Cloudy with a chance of Identity Theft Why a good password is very often your best defense. HUIT IT Security | October 2 2012. Agenda:. Introduction Why are we here? Passwords Safeguards Identity Theft What to do now Q & A. Breadcrumb. Oct 2 2012. Introduction. Citation.

starb
Download Presentation

Cloudy with a chance of Identity Theft Why a good password is very often your best defense

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cloudy with a chance of Identity TheftWhy a good password is very often your best defense HUIT ITSecurity | October 2 2012

  2. Agenda: • Introduction • Why are we here? • Passwords • Safeguards • Identity Theft • What to do now • Q & A

  3. Breadcrumb Oct 2 2012 Introduction Citation HUIT IT Security | Cloudy with a chance of Identity Theft

  4. Breadcrumb Oct 2 2012 Introduction • This October, HUIT IT Security is conducting a series of informational sessions on “Surviving the Internet”. The efforts are part of the National Cyber Security Awareness Month (NCSAM). • Each session will take the form of a 30 minute presentation which will be recorded. Please raise your hand at any time to ask a question. The remainder of each session is an open floor e.g. for questions you do not want recorded! Citation HUIT IT Security | Cloudy with a chance of Identity Theft

  5. Breadcrumb Oct 2 2012 Introduction • The Cambridge sessions: MD119: 1-2pm • Oct 2: Cloudy with a chance of Identity Theft • Oct 9: Is it ever not Social? • Oct 16: Taming Lions, Tigers… and Windows • Oct 23: Have device, will travel • Oct 31: By user demand • Use the survey and feedback tool: http://hvrd.me/RMk15l Citation HUIT IT Security | Cloudy with a chance of Identity Theft

  6. Breadcrumb Oct 2 2012 Introduction • The Longwood sessions: • Oct 4: HMS: TMEC 227: 10-11am • Cloudy with a chance of Identity Theft • Is it ever not Social? • Oct 10: HSPH: Kresge G-1: 12-1pm • Is it ever not Social? • Have device, will travel • Oct 17: HMS: TMEC 227: 2-3pm • Taming Lions, Tigers… and Windows • Have device, will travel Citation HUIT IT Security | Cloudy with a chance of Identity Theft

  7. Breadcrumb Oct 2 2012 Introduction • Open office hours are 9-12 every Friday through October in 1414 Mass Ave, 3rd Flr. • To reserve a timeslot or if you have any questions about a presentation, please email ithelp@harvard.edu or call x57777 • The same contact information to report a security incident….. Citation HUIT IT Security | Cloudy with a chance of Identity Theft

  8. Breadcrumb Oct 2 2012 • Why are we here? Citation HUIT IT Security | Cloudy with a chance of Identity Theft

  9. Breadcrumb Oct 2 2012 Good passwords: • Minimum of 8 characters. • Mix upper and lower case letters • Use a combination of numbers and symbols • Do not use real words, names, dates, phone numbers, sports teams, cars, addresses or personally identifiable information including anything listed in a social networking context • Unique: Separate passwords for different accounts Citation HUIT IT Security | Cloudy with a chance of Identity Theft

  10. Breadcrumb Oct 2 2012 Example #1: • Take a familiar phrase • Substitute numbers, symbols and capitalization • Whose woods these are I think I know • First pass: initials • WwtaItIk • Second pass: substitution • WwtR?1t1n0 Citation HUIT IT Security | Cloudy with a chance of Identity Theft

  11. Breadcrumb Oct 2 2012 Example #2: • Take a unique combination of words • Substitute numbers, symbols and capitalization • Peanut Text Sky • Substitute • Pnu7_teXt-5ky Citation HUIT IT Security | Cloudy with a chance of Identity Theft

  12. Breadcrumb Oct 2 2012 • Multi-Factor Citation HUIT IT Security | Cloudy with a chance of Identity Theft

  13. Breadcrumb Oct 2 2012 • Safeguards Citation HUIT IT Security | Cloudy with a chance of Identity Theft

  14. Breadcrumb Oct 2 2012 • If you are a victim of Identity Theft • http://ftc.gov/idtheft Citation HUIT IT Security | Cloudy with a chance of Identity Theft

  15. Breadcrumb Oct 2 2012 What you can do now: • Pick good passwords • Use unique passwords for your accounts • Password protect your mobile device • Use good security reset questions • Check your credit report • Be aware Citation HUIT IT Security | Cloudy with a chance of Identity Theft

  16. Breadcrumb Oct 2 2012 IT Security Contact Info • ithelp@harvard.edu • Helpdesk at x 57777 • Use the survey and feedback tool: http://hvrd.me/RMk15l • These slides will be on security.harvard.edu • These slides and the video will be on http://security.harvard.edu Citation HUIT IT Security | Cloudy with a chance of Identity Theft

  17. Thank you. Esmond Kane | Cloudy with a chance of Identity Theft October 2, 2012

More Related