Upload
others
View
1
Download
0
Embed Size (px)
Citation preview
Cybersecurity Best Practices
Presenter:
Simon RagonaDirector, Data ForensicsT&M Protection Resources, LLCTechnology Risk
Cybersecurity Best Practices
Review settings frequently as they change often
Cybersecurity Best Practices:
Review settings frequently as they change often
Login AlertsNotifications if your account is logged into
Login ApprovalsUnknown browsers require a security code to login
Recognized DevicesLists trusted browsers and apps
Who can see my stuff?
Who can contact me?
Who can look me up?Do you want search engines outside of Facebook to link to your profile?
Who can add things to my timeline?
Who can see things on my timeline?
How can I manage tags people add and tagging suggestions?
BlockingBlock users or content
NotificationsGet alerts when there is activity on your account
FollowersWho can see your Timeline content
AppsReview to identify apps you’ve
logged into using Facebook
AdsSettings that allow you to block
advertisements
https://www.facebook.com/invite_history.phpDELETE ALL! (Contacts you’ve uploaded to Facebook)
https://www.facebook.com/mobile/messenger/contacts/DELETE ALL! (Contacts you’ve uploaded from Messenger)
https://www.facebook.com/help/838237596230667DISABLE! (Messenger settings for syncing contacts)
Important Links
Facebook Settings to Review
Security• Login Alerts, Login Approvals,
Recognized Devices
Privacy• Who can see my stuff?• Who can contact me?• Who can look me up?
Blocking
Notifications
Followers
Apps
Ads
Timeline and Tagging• Who can add things to my timeline?• Who can see things on my timeline?• How can I manage tags people add
and tagging suggestions?
Most settings via web are available within the mobile
app however some may differ
Most settings via web are available within the mobile
app however some may differ
Code GeneratorTwo-factor
authentication
LocationDisable via your phone’s
settings menu
LocationDisable via your phone’s
settings menu
Nearby FriendsUses your phone’s GPS to
show you where your friends are and show your
friends where YOU are!
Place TipsUses your phone’s GPS to
give you information about places you visit!
Location HistoryAllows Facebook to log
everywhere you go!
Facebook MessengerSettings are different
from Facebook website and mobile app
Facebook MessengerSettings are different
from Facebook website and mobile app
Facebook Messenger
Disable “Sync Contacts”Similar to other social media
platforms, this is how Facebook makes friend suggestions
Facebook App & Messenger Settings to Review
Location• Nearby Friends
• Place Tips• Location History
Messenger• Disable “Sync
Contacts”
App
Code Generator
Cybersecurity Best Practices
Review settings frequently as they change often
Cybersecurity Best Practices:
Review settings frequently as they change often
Confirm “Where you’re signed in”
Confirm “Third party apps”
Review Public Profile settings
Determine which“Profile viewing options”
are appropriate
Suggests you as a connection based on email address or phone number
Shares data with third parties
Two-step verificationAlways a good idea!
Be smart about what information needs to
be in your profile
Linkedin Settings to Review
Basics• Where you’re signed in
Third Parties• Confirm “Third Party Apps”
Profile Privacy• Public profile settings
• Profile viewing options
Data Privacy and Advertising• Suggesting
connections• Sharing data with
third parties
Security• Two-step verification
Most settings via web are
available within the mobile app
3 Important settings to review
1. Sync contacts
3 Important settings to review
1. Sync contacts2. Sync calendar
3 Important settings to review
1. Sync contacts2. Sync calendar3. Using public data to
improve your profile
Be careful you don’t accidentally sync your contacts when you first open the app!
Cybersecurity Best Practices
Cybersecurity Best Practices:
Other Social Media
Ensure you are running the latest version
Latest App Releases
Social Media Investigations
Use an independent computer system, virtual machine, or USB Apply latest security updates and enable anti-virus
Use a separate Internet connection, if possible i.e. VZW prepaid MiFi
Connect through a VPN i.e. Private Internet Access, TotalVPN, Hide My Ass
Create and maintain separate accounts Dedicated email accounts Established social media accounts
Utilize browser add-ons for enhanced capabilities
Overview of T&M’s Technology Risk Division
Cyber Incident
Response
Incident Response Readiness Assessment
DataForensics
Recovery and Examination of Formatted Hard Drives
Recovery of Text Messages and Other Communications
InformationSecurity
Voice over IP (VoIP) Security Assurance
Secure Mobile Computing
Security Training Programs (awareness, executive and
corporate governance)
ComplianceTechnologyConsulting
T&M Technology Risk Competitive Advantage
T&M Technology Risk Competitive Advantage
Custom-fitting solutions
T&M Technology Risk Competitive Advantage
Custom-fitting solutions
Proprietary technology
T&M Technology Risk Competitive Advantage
Custom-fitting solutions
Proprietary technology
Consultative, hands-on approach
T&M Technology Risk Competitive Advantage
Custom-fitting solutions
Proprietary technology
Consultative, hands-on approach
Unparalleled category expertise
Q&A
https://www.facebook.com/tandmprotection
Social Info
https://twitter.com/tmprotection https://www.linkedin.com/company/836419