Personal Cyber Security

Personal Cyber Security
Pte Sykes

Prelims

Objectives

Introduction

What is being collected?

What is being collected?

Well, pretty much everything you do with your digital devices.
Most significantly Third-Party Cookies and Full Location Records.

Why does this data collection matter?

Hacks are happening all the time

Check out real-time attack map, showing live hacks on companies and government organisations at: http://map.norsecorp.com

Chances are that you've already been hacked

You've probably already been hacked.
Check what details have been leaked, at: https://haveibeenpwned.com/

Passwords

Passwords

Password Security Basics

  • Use a different passphrase for each account
  • Ensure that each passphrase is strong
    • Ideally 12+ characters
    • Including numbers, symbols, upper and lowercase letters
    • Don't include dictionary words, names or places
    • Replacing o for 0, i for 1, or just adding an ! to the end doesn't help much
  • Try to change all important passwords at least once a year

Password Managers

A password manager is a tool that securely stores and autofills your login information.

That means you only ever need to remember one password, and can easily use different, very complex passwords for each site. Most password managers come with a Windows, OS X, Android, iOS and Windows Phone app, as well as a browser extension.
LastPass Screenshot
Password managers are widely agreed to be the best approach for storing & auto-filling secure information.
Check how long it'd take to crack one of your passwords: https://howsecureismypassword.net/

2-Factor Authentication

2 Factor Authentication
Two-factor authentication (also known as 2FA) is a type (subset) of multi-factor authentication. It is a method of confirming users' claimed identities by using a combination of two different factors: 1) something they know, 2) something they have, or 3) something they are.
2FA

Software Updates

Software Updates
Software Updates: How to stay secure
  • Always install the latest operating system (Windows, OSX, Android and iOS) updates, when prompted to. Don’t ignore or postpone them
  • Keep all apps and software on both your PC and phone up to date
  • Ensure your antivirus definitions are kept update, or turn on autoupdate
  • Update your router firmware

Encryption & Backup

Encryption and Backup

Safe Browsing

Safe Browsing

VPN

Find a reputable VPN provider, to use on any public, shared, or potentially insecure networks

Complicated lookin VPN diagram
Nice and simple VPN diagram

The importance of HTTPS

Be wary when installing new browser extensions

Use Incognito when on a public or shared device

Consider using a privacy browser

Social Media

Social Media

Smart Phones

Smart Phones

Encrypt your Phone

Protect your phone with a longer PIN or password

Don't grant apps permissions they don't need

Turn off connectivity features your not using

Remote Erase Stolen Devices

Think before you Click

Think before you Click

Don't Plug in Unknown Flash Drives

Double-check who an email is from, before replying or clicking anything

Don't open attachments from unknown senders

Double check domain names

Shopping Online

Shopping

Questions

The End