Skip to content

Instantly share code, notes, and snippets.

@Keboo
Last active September 1, 2024 06:46
Show Gist options
  • Save Keboo/5c3151abc1e0a0f59d31bd93b75b38b9 to your computer and use it in GitHub Desktop.
Save Keboo/5c3151abc1e0a0f59d31bd93b75b38b9 to your computer and use it in GitHub Desktop.
Security Resources

Internet Safety

Kevin Bost

Security and Privacy

  1. Privacy: Refers to how your information is used and controlled. It is often related to security but just because something is not private does not mean it is not secure.
  2. Security: Refers to how refers to your information is protected. It is important to keep sensitive information secure.
  3. Information that should be private
    • Financial information (Credit card number, account numbers, bank names, financial status)
    • Personal information (Social security number, family member names, driver’s license number, birth place)
    • Insurance information
    • Subscriptions, services, utilities

What to do if you are a victim

Review steps on https://www.identitytheft.gov/Steps

  1. Contact the companies where the fraud occurred. Ask for a fraud department and explain that someone stole your identity.
  2. Ask to have accounts closed, or frozen.
  3. Change all access information (passwords, pin numbers, etc)
  4. Put a fraud alert with the credit bureaus
  5. Monitor your credit report (you can do it weekly)
  6. Report the theft to the FTC
  7. Optionally: File with local police department

Calls and Text Messages

  1. The person who initiated the call must prove who they are to the person that they called.
  2. Do not trust caller ID as proof of identity
  3. Politely ask to call them back and return the call to a number that you verify, not one they provide
  4. Government agencies will rarely call or text
  5. Banks/Financial institution will never call you and ask for personal information. When you call them, they may ask you to provide them information.
  6. Microsoft and Apple will never proactively reach out to you to provide unsolicited technical support
  7. Never provide private information to any recipient you cannot verify
  8. Never forward information to any recipient you cannot verify
  9. Never allow anyone you do not trust to access your devices.
  10. Be very wary of anyone trying to get you to install AnyDesk, TeamViewer, RemotePC, Zoho Assist

Web Sites

  1. Never call a number you see in a popup message
  2. Look for https, and the lock symbol in the website address. Verify the connection is trustworthy.
  3. Identify the domain of the URL.

Email

  1. Be skeptical of attachments, images, and links; when in doubt either confirm with the sender, or delete it.
  2. Instead of clicking on links, access the site directly through saved bookmarks to validate information.
  3. For legitimate businesses, use the unsubscribe link if you no longer wish to hear from them.
  4. Mark emails as spam. Be extra cautious about things that were already flagged as spam.
  5. Identify the domain of the sender.

Devices

  1. Always install updates as soon as possible
  2. Anti-virus
  3. Wi-fi
    • Avoid using any wireless networks that do not require a password
    • When using a network with a password, consider who else might be using that same network.
  4. Turn on two-factor (2FA) wherever possible. Two factor means to login you will need something you know (typically a password), and something you have (typically an authenticator app or phone number that can receive texts)
  5. Set a pin number or password on your mobile device. Consider using biometrics (fingerprint or face identification) as a simpler way to login.
  6. Use a password manager with a secure password
  7. Remove un-used software
  8. Remove un-needed browser extensions

Summary

  1. Be skeptical of any communication that you did not initiate
  2. Do not give out sensitive information to anyone without confirming who they are
  3. Practice good password hygiene
  4. Keep your devices secured

Good password hygiene

  1. Do not use the same password for multiple things
  2. Do not use common password (abc123, Admin, password, etc)
  3. Longer is better than more complex; consider using a sentence or phrase.
  4. Consider using a password manager
  5. Use Single Sign-On when possible
  6. Avoid recovery question that can be easily guessed or discovered
  7. Check your password at https://haveibeenpwned.com/Passwords to make sure it has not been compromised.

Additional Resources

CISA Cybersecurity Awareness Program

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment