Wednesday, July 26, 2017

Data Privacy and Security



66 Ways to Protect Your Privacy Right Now
Do one, some, or all. Each one will make a difference.

http://www.consumerreports.org/privacy/66-ways-to-protect-your-privacy-right-now/

1. Check Your Data Breach Status
3. Use 10-Minute Mail
16. Use a Password Manager
32. Use a VPN
49. Embrace Encryption
55. Add HTTPS Everywhere
65. Make Google Forget You


US Army Cyber Crime Investigation Unit
Cybercrime Prevention Flyers

http://www.cid.army.mil/cciu-advisories.html

Cyber Crime Prevention Flyers provide recommendations to strengthen your cyber security posture and prevent computer crime before it occurs.

  • Online Scams - Soldiers are being targeted by cyber criminals intent on extorting money from them
  • Non-consensual Pornography - Distribution of sexually explicit images may violate existing Federal laws or the Uniform Code of Military Justice
  • Cyber Sextortion - Stay safe looking for love online
  • Protect Your Personal Email Account - Your email could be compromised
  • IRS Phone Scams - Avoid tax telephone scams 
  • Motor Vehicle Exploits - Auto hacking, it's not a myth
  • Online Misconduct: Awareness and Reporting - Improper behavior online
  • Don't scan your CAC! - DO NOT download or use anyapplication designed to read your CAC
  • Extortion scams - Data breaches and your personally identifiable information
  • USAJOBS warning - USAJOBS warns users of email phishing scam
  • Home Computer Security Tips - Safe computing practices for the home
  • Social Networking Safety Tips - Configuring Facebook, Twitter, LinkedIn, and Google+ for a more secure social networking experience
  • Twitter Safety Tips - Configuring Twitter for a more secure social networking experience
  • LinkedIn Safety Tips Configuring LinkedIn for a more secure social networking experience
  • Google+ Safety Tips - Configuring Google+ for a more secure social networking experience
  • Facebook Safety Tips - Configuring Facebook for a more secure social networking experience
  • Apple Mobile Device Ransom Scam - Apple Mobile Device Ransom Scam
  • Cybercriminals Target USAA Members - Fake customer incentives
  • Held for Ransom Part II - Ransomware


Best Practices for Keeping Your Home Network Secure (Updated)
https://www.iad.gov/iad/library/ia-guidance/security-tips/best-practices-for-keeping-your-home-network-secure-updated.cfm


SANS - Securing The Human - Security Awareness Newsletter

OUCH! is the world's leading, free security awareness newsletter designed for everyone. Published every month and in multiple languages, each edition is carefully researched and developed by the SANS Securing The Human team, SANS instructors and members of the community. Each issue focuses on and explains a specific topic and actionable steps people can take to protect themselves, their family and their organization. OUCH! is distributed under the Creative Commons BY-NC-ND 4.0 license. You are free to distribute OUCH! as part of your security awareness program or share OUCH! with your family, friends and coworkers. The only limitation is you cannot modify nor sell OUCH!. All translations are done by community volunteers. As such, at times some languages may not be available.

https://securingthehuman.sans.org/resources/newsletters/ouch/2017#2017

  • July 2017 Gaming Online Safely & Securely 
  • June 2017 Lessons From WannaCry 
  • May 2017 Securing Today's Online Kids 
  • April 2017 Passphrases 
  • March 2017 Securely Using Mobile Apps 
  • February 2017 Staying Secure on the Road 
  • January 2017 Social Engineering 
  • December 2016 Securely Disposing of Your Mobile Device 
  • November 2016 Using The Cloud Securely 
  • October 2016 Four Steps to Staying Secure 
  • September 2016 Email Do's and Don'ts 
  • August 2016 Ransomware 
  • July 2016 CEO Fraud 
  • June 2016 Encryption 
  • May 2016 Internet of Things (IoT) 
  • April 2016 I'm Hacked, Now What? 
  • March 2016 What Is Malware? 
  • February 2016 Securing Your Home Network 
  • January 2016 Securing Your New Tablet 
  • December 2015 Phishing 
  • November 2015 Shopping Online Securely 
  • October 2015 Password Managers 
  • September 2015 Two-Step Verification 
  • August 2015 Backup & Recovery 
  • July 2015 Social Media 
  • June 2015 Educating Kids on Cyber Safety 
  • May 2015 Securing the Cyber Generation Gap 
  • April 2015 Passphrases 
  • March 2015 Gaming Online Safely & Securely 
  • February 2015 Staying Secure on the Road 
  • January 2015 Securely Using Mobile Apps 


The Complete Privacy & Security Desk Reference: Volume I: Digital

This textbook, at nearly 500 pages, will explain how to become digitally invisible. You will make all of your communications private, data encrypted, internet connections anonymous, computers hardened, identity guarded, purchases secret, accounts secured, devices locked, and home address hidden. You will remove all personal information from public view and will reclaim your right to privacy. You will no longer give away your intimate details and you will take yourself out of 'the system'. You will use covert aliases and misinformation to eliminate current and future threats toward your privacy & security. When taken to the extreme, you will be impossible to compromise.





No comments:

Post a Comment

Note: Only a member of this blog may post a comment.