Upload
sabrina-patterson
View
215
Download
0
Embed Size (px)
Citation preview
Protecting Your Identity
© 2014 Project Lead The Way, Inc.Computer Science and Software Engineering
• More than 50% of employers now use social media to screen candidates
Why Protect Your Public Persona
Why Protect Your Private Data• Identity theft: Predators borrow
money in your name• Malware uses your personal data to
attack your friends• Most identity theft from 18-29 year
olds
• Malware steals your data and makes your devices slow or non-functioning
• Criminals attack others from your devices
• More than 30% of devices are compromised, but most attacks can be prevented with simple measures
Why Protect Devices and Software
• Assume digital data are "forever"• Assume digital data are public
How to Protect Your Privacy
• Don’t reveal personal information• Don't share name and address• Be skeptical• Review and adjust privacy settings
when creating an account• Beware default settings• Remember posts are permanent and
public
Safety on Social Sites
• Use strong passwords: mix cases, numbers, and symbolsuse many characters, not just
words• Use different passwords on different
systems• Memorable doesn't have to be easy
to guess. E.g., use mnemonic passphrases:
Nd!2singsonGs (No doubt! to sing songs)
Good Passwords
• Never send or use password "in the clear," i.e., unencrypted
• Don't share passwords• Don't store passwords in the
browser• Look away when someone types a
password
Respect Passwords
• Read your bank statement• Check your credit report annually
annualcreditreport.com but beware spoofs of that address
Monitor for Identity Theft
• Use credit card rather than debit card
• Use a secondary email for public use
Safe Shopping