Personal Internet Security Basics
By Dan Ficker
No matter if you're a developer, designer, manager or a business owner, you're a person. And these days, being a person on the Internet can be a minefield. Phishing attacks are trying to steal your information and some of your passwords have been published on the internet. But you have to work on the Internet--living off the grid is not an option.
In this session, I will go over some common attacks that you should be aware of. Also, I will highlight some simple, practical ways to protect yourself while browsing the Internet for fun or work. No doubt, some in the room will say, "This is too hard to be secure," and others will say, "This speaker is not paranoid enough." Security is a continuum, and this is meant to be a point for you, the attendee, to evaluate your personal security practices and think about improving them.
Learning Objectives & Outcomes:
* Is Your Browsing Secure?
* Is Your Communication Secure?
* Backing Up Data
* Examples of Phishing
* Examples of Impersonation
* Two-Factor Authentication
* Password Managers
* Trust No One vs. Cloud Services
https://2018.tcdrupal.org/session/personal-internet-security-basics
No matter if you're a developer, designer, manager or a business owner, you're a person. And these days, being a person on the Internet can be a minefield. Phishing attacks are trying to steal your information and some of your passwords have been published on the internet. But you have to work on the Internet--living off the grid is not an option.
In this session, I will go over some common attacks that you should be aware of. Also, I will highlight some simple, practical ways to protect yourself while browsing the Internet for fun or work. No doubt, some in the room will say, "This is too hard to be secure," and others will say, "This speaker is not paranoid enough." Security is a continuum, and this is meant to be a point for you, the attendee, to evaluate your personal security practices and think about improving them.
Learning Objectives & Outcomes:
* Is Your Browsing Secure?
* Is Your Communication Secure?
* Backing Up Data
* Examples of Phishing
* Examples of Impersonation
* Two-Factor Authentication
* Password Managers
* Trust No One vs. Cloud Services
https://2018.tcdrupal.org/session/personal-internet-security-basics