Protecting your online identity - Managing your passwords

50 %
50 %
Information about Protecting your online identity - Managing your passwords

Published on February 14, 2014

Author: BunmiSowande



Your online identity is only as secure as your weakest password. Delivered in December 2013, this presentation discusses how passwords are used online, and the best way to protect yourself.

Protecting your online identity Managing your passwords 18th of December 2013

Securing your online identity Managing your passwords Agenda Bunmi Sowande Technical Specialist – F-Secure (UK) 07818 515 687 1. 2. 3. 4. 5. 6. Security in the news Recent password breaches What‟s the most popular password? How websites store your passwords Password Best Practice - (Mission Impossible?) Using a Password Manager – F-Secure Key

Awarded Best Protection “Out of all corporate endpoint protection products reviewed, FSecure Client Security offered by far the best protection.” Andreas Marx, CEO of AV-TEST Certified and Awarded by numerous 3rd parties!

Praised by Analysts The Forrester Wave™: Endpoint Security, Q1 2013 Forrester Research Inc. gave us the highest score among all vendors for our product roadmap and strategy. We received top ranking scores on our performance and satisfaction, in addition to our advanced antimalware technologies.

Comprehensive Protection Providing 360 protection from all threats Protection Service for Business Business Suite In-House IT Policy Manager Management as a Service Internet Gatekeeper Messaging Security Gateway PSB Portal Out-sourced IT Server Security Client Security Email and Server Security Mobile Security Linux Security AV for Workstations PSB Server Security PSB Email and Server Security PSB Workstation Security Protection Service for Email PSB Mobile Security

Karmina Senior Analyst Security in the news

Security in the News

Security in the News

Security in the News

Security in the News

Security in the News - Passwords

Security in the News - Passwords

Data Breaches in 2013 Adobe – 38 million accounts – October Evernote – 50 million passwords reset - March Twitter – 250,000 accounts – February Facebook – Email addresses and phone numbers for 6 million users – June

Other ’famous’ breaches LinkedIn – June 2012 – 6.5 million passwords Sony PlayStation Network – April 2011 – 77 million accounts

Adobe Hack – Analysis of data • 123456 – 1.9 million passwords • 123456789 – Around 450,000 passwords • “password” – 346,000 passwords • Poor encryption meant passwords were easy to determine • Password hints were stored in plain text

How do we pick our passwords? Poor passwords go right to the top !!

How do sites store your passwords • Plain Text Cupid Media – November 2013 – 30 Million passwords • • • • Basic Password Encryption Hashed Passwords – e.g. SHA-1 Salted Hashed Passwords Slow Hashes

How do sites store your passwords SHA1 Hash of a password 5baa61e4c9b93f3f0682250b6cf8331b7ee68fd8

Length is more important that complexity

Password – Best Practices Don‟t write down or share your passwords Don‟t use websites with poor security Use a strong password – length is better than complexity Always change your password after a breach Use a different password for every site If you are unsure of a website‟s security, use Oauth where available Use 2 factor Authentication where available

2 Factor Authentication Something you know + Something you have

2 Factor Authentication • • • • • • • • • • • • Google/Gmail - Text Message or Google Authenticator LinkedIn – Text Message Apple – Text Message or Find My iPhone Notification Facebook – Login Approvals – Text Message Twitter – Text Message Dropbox – Text Message or Google Authenticator Evernote – Google Authenticator Paypal - Text Message Steam - Email Microsoft Accounts – Text Message or Email Yahoo! – Text Message Wordpress – Google Authenticator

What is a strong password ?? • • • • 12 Characters Not a Dictionary Word No Personal Information Use Upper and lower case letters, numbers and symbols

F-Secure Key – Password Manager Built with Security in Mind Completely anonymous- even F-Secure cannot identify who you are/what is your data Multiple layers of protection – Data is „encrypted‟ securely. Works on PC‟s, Macs and Tablets

F-Secure Mobile Apps Best Protection for your Android Device Anti Theft Anti Malware Browsing Protection Parental Control Safe Contacts F-Secure Lokki Personal Location tracking for family and friends F-Secure App Permissions One app to reveal them all Displays the permissions for all the apps on your phone. For example, see apps that can cost you money or drain your battery

F-Secure Mobile Apps – Coming Soon Security in the Cloud Tracking Protection Virus Protection Browsing Protection Connection Protection Virtual Location Sign up for early access at Cloud Storage - It's your stuff. Not theirs. We believe in people‟s right to privacy. No spying. No backdoors. Access Everything, everywhere. Access your content from Facebook, Picasa Younited for Business – Collaborate and share Sign up for early access at

Questions ?? Next Webinar – January 15th 2014 (11am) Securing Virtual and Cloud Environments Register now at

Save the Date Securing Virtual and Cloud environments Wednesday 15 January @ 11:00-11:45 Why SMBs are outsourcing Security to Managed Service Providers Wednesday 12 February @ 11:00-11:45 It’s time for business to secure their mobile phones and tablets Wednesday 12 March @ 11:00-11:45

Add a comment

Related presentations

Presentación que realice en el Evento Nacional de Gobierno Abierto, realizado los ...

In this presentation we will describe our experience developing with a highly dyna...

Presentation to the LITA Forum 7th November 2014 Albuquerque, NM

Un recorrido por los cambios que nos generará el wearabletech en el futuro

Um paralelo entre as novidades & mercado em Wearable Computing e Tecnologias Assis...

Microsoft finally joins the smartwatch and fitness tracker game by introducing the...

Related pages

Teens Health - Protecting Your Online Identity and Reputation

... For Teens > Protecting Your Online Identity and ... your identity. Pick passwords that ... Your online identity and reputation are ...
Read more

Protecting your online safety, security and privacy - Skype

Protecting your online safety, security and privacy. ... Use a sentence as your password ... Learn more about managing your privacy settings.
Read more

Password Security, Protection, and Management - US-CERT

Password Security, Protection, ... managers are striving to provide secure online access to your passwords ... yourself from identity thieves. Before you ...
Read more

Protecting Your Online Passwords - River City Bank Rome, GA

Protecting Your Online Passwords. Bank Notes · Identity Theft. Thursday, ... Never share your passwords or PINs with anyone.
Read more

Online identity protection: 7 safety tips for managing ...

A proven way to end the struggle and take your career, business and life to the next level May 18, ... Does online personal branding really work? May 6, ...
Read more

Using Passwords | Information Systems & Technology

Passwords grant access to online IT ... and identity. The strength of your password is an ... > Protecting Your Identity > Using Passwords.
Read more

Managing and Protecting your Online Identity

... Home / Communications / Managing and Protecting your Online Identity. ... managing your online identity and protecting ... your passwords and ...
Read more

Managing your Passwords: Protection from Phishing ...

Managing your Passwords: Protection from ... that it guards your online identity and ... Password Manager protects your identity and is an added ...
Read more

Account Management: Managing your AOL Password - AOL Help

Help Main Account Management Account Management: Managing your AOL Password. Account ... access and is your secret identity for signing on to ...
Read more