personal data security - part 2

28

Upload: curt-robbins

Post on 29-Jun-2015

592 views

Category:

Technology


0 download

DESCRIPTION

A continuation of the Personal Data Security slideshow, Part 2 digs deeper into backups, strong passwords, anti-malware protection, and centralized data. This includes cloud vs. local backups, full vs. incremental, and recommends cloud backup services. Also reviewed is Network Attached Storage, including RAID 1 and recommended models of NAS. Strong passwords are reviewed, including password vaulting and password generators. Cleanup only malware apps are suggested and phishing detection and prevention is covered in more detail.

TRANSCRIPT

Page 1: Personal Data Security - Part 2
Page 3: Personal Data Security - Part 2

Personal Data

Part 2

Security

Page 4: Personal Data Security - Part 2

NAS Review

In Personal Data Security, you learned that a NAS is centralized storage with multiple drives

— It achieves centralized data archival/access

— It involves data redundancy (which = security)

Upgradeable

—When a drive crashes, you can replace it

—Saves the expense of purchasing a new NAS

—Zero downtime of data access

Page 5: Personal Data Security - Part 2

Two Types of NAS

Fixed Disk — The least desirable, least flexible

— If one drive dies, the unit is toast

— Entry-level; one and two drive models available

Open Bay / Swappable Drives —When a drive dies, simply swap out for new

—No need to purchase a new NAS, only a new drive

—Models offer 2-8 bays; 4 bay recommended

—Some sold pre-populated and configured

Page 6: Personal Data Security - Part 2

RAID & RAID 1

Redundant Array of Independent Disks

Available only in multi-drive NAS units

Many different levels of RAID; do RAID 1

—RAID levels 2-6 are performance-oriented

RAID 1

—Employs data mirroring (onsite backup)

—Data mirroring = data written to multiple drives

—The more drives, the greater your security

Page 7: Personal Data Security - Part 2

Reputable NAS Models

Buffalo

—Low-cost leader for NAS units

—LinkStation 210: $120 for 2 TB

—LinkStation 220: $210 for 2 TB; $275 for 4 TB

Qnap

—Professional, rugged styling, higher prices

—TS-220: $210 for two-bay diskless model

—TS-220: $470 for two-bay 3 TB pre-populated

Page 8: Personal Data Security - Part 2

Reputable NAS Models

Seagate —Two models: NAS 2-Bay and NAS 4-Bay

—Both feature Seagate’s NAS-optimized drives

—NAS 2-Bay: Diskless, $175; 4 TB, $300; 6 TB, $390

—NAS 4-Bay: Diskless, $360; 4 TB, $600; 8 TB, $830

Synology —Enterprise-level quality; can get expensive

—America DiskStation 4-bay: Diskless, $400

—America DiskStation 4-bay: 12 TB, $1,200

Page 9: Personal Data Security - Part 2

Reputable NAS Models

Western Digital (WD) —Wide selection, consumer prices, good quality

—2-bay model, 2-20 TB, RAID 1 preconfigured

—2-bay: 2 TB, $250; 4 TB, $350; 8 TB, $500

—4-bay: 4 TB, $500; 8 TB, $700; 20 TB, $1,300

Wrapup —If you’re a business, look to Qnap or Synology

—If you’re a consumer, look to Buffalo, Seagate, WD

—Seek models prepopulated with drives and RAID 1

Page 10: Personal Data Security - Part 2

Disk Imaging vs. File & Folder

Disk Imaging (disk cloning) —Backup copy of complete drive and computer

—This means everything, including the operating system, hidden files (goes beyond personal data)

—Method to preserve a full computer, not just data

File & Folder Backup —More common and what is recommended

—Backs up specific files and folders, not the OS

—Way to preserve personal data, not a computer

Page 11: Personal Data Security - Part 2

Full vs. Incremental Backups

Full Backups —Must be performed the first time you backup

—Copies each and every file you specify

—Can take a long time (sometimes multiple days)

Incremental Backups —Copies only the files added or changed since

the last backup

—Much faster than a full backup

—Always run an incremental backup

Page 12: Personal Data Security - Part 2

Local vs. Cloud Backup

Local Backup

—Redundant physical copies, onsite or offsite

—Copies you make using a spare drive in a NAS or a USB 3.0 external hard drive

Cloud Backup

—Involves a service, like CrashPlan or Apple iCloud

—Upload files to “the cloud” (an internet server)

—Freemium pricing model; storage a consideration

Page 13: Personal Data Security - Part 2

Backup Services & Software

Cloud Backup Services

—Amazon Cloud Drive, Mozy, Backblaze, Carbonite, Microsoft OneDrive, Livedrive, Google Drive

—Can be very slow, especially during peak usage

Backup Software

—Apple Time Machine (Mac OS X only)

—Second Copy (Windows only)

—Windows 7 Backup and Restore

Page 14: Personal Data Security - Part 2

A Word about Offsite

Remember the 3-2-1 Backup Rule —Three copies of your data, with one offsite

Offsite = out of your neighborhood

Not truly secure until current backup is offsite

Why? Natural disasters and theft —If all of your backups reside in your home, how

likely is a fire, flood, or theft?

—How about other natural disasters, like tornadoes, hurricanes, and typhoons?

Page 15: Personal Data Security - Part 2

Password Review

Generally speaking, longer is better

“Strong” passwords have common traits:

— Complex (mix of letters, numbers, and symbols)

— Random (no personal details or patterns)

— Unique (no patterns or repeats from others)

Must have diff password for each account

Must update all passwords every six months

Must tell no one; as in no one

Page 16: Personal Data Security - Part 2

Passwords: How?

Unique passwords on each account and updates every six months seems impossible —Nearly no one actually does this

—This means you and most others are vulnerable

Must employ password vaulting & generators — Vaulting app = memorize only a single password

— Vaulting app stores all of your strong passwords or long passphrases in a single place

— Password generators great for random & unique

Page 17: Personal Data Security - Part 2

Password Generators

Web sites, applications, or mobile apps

—Web sites are risky; not recommended

—Mobile app in your smartphone is best route

Reputable password generators

— Norton Identity Safe Password Generator

— random.org

— Strong Password Generator

— PC Tools Password Generator

Page 18: Personal Data Security - Part 2

Password Vaulting Apps

Practice of storing many passwords behind a single, very strong “master password” — Sometimes called password managers

— Because same password on multiple accounts is a serious security vulnerability

Reputable password vaulting apps — LastPass (free or premium accounts)

— Password Genie ($15/year for desktop; mobile apps)

— Dashlane (free and $30/year versions)

— RoboForm ($10/year, includes auto form filling)

Page 19: Personal Data Security - Part 2

Password Strength

Complicated math behind calculating resiliency

— You already know the basic rules: longer is better, should be random, complex, and unique

Howsecureismypassword.net

— Helpful tool for testing password strength

— Don’t use one of your actual passwords

— Submit passwords similar to one of yours

— Great tool for educating yourself

— Compare short, simple passwords with long, complex

Page 20: Personal Data Security - Part 2

Malware / Virus Review

Use caution with freeware/shareware

—Freeware often carries adware, spyware, and other forms of malware

Either avoid freeware or do your homework

— Download only from reputable sources (like CNET’s download.com)

— Even Oracle’s Java software tries to install adware

— Carefully read the install screens of freeware install wizards (most schemes are opt-out)

Page 21: Personal Data Security - Part 2

Cleanup Only Anti-Virus

When the poop hits the fan, what to do?

—If your virus definitions become out-of-date (because your anti-virus subscription expired)

—If you really screw up and have no anti-virus software on a particular computer

Malwarebytes Anti-Malware 2.0

— $30 on Amazon, with lifetime subscription

— Won PC Magazine’s 2014 Editor’s Choice award

Page 22: Personal Data Security - Part 2

More About Phishing

Phishing = fraudulent attempt to get your account info, including password and SS #

Most phishing attempts masquerade as eBay, PayPal, or your bank

Best way to avoid being a phishing victim: Don’t click the link in the email lure

To learn more, visit onguardonline.gov

—Forward phishing email to [email protected]

Page 23: Personal Data Security - Part 2

Advice about Malware

Remember, when it comes to viruses and malware, the best medicine is prevention

Always run anti-virus software on every computer in your home

—Single unprotected PC on your home network could act as a gateway for hacking or infection of all other computers and connected devices

Keep anti-virus subscription current

Page 24: Personal Data Security - Part 2

These slides are derived from the Amazon Kindle book

Understanding

Personal Data Security

by Curt Robbins

Page 25: Personal Data Security - Part 2

Other Books by Curt Robbins

Home Theater for the Internet Age

Understanding Cutting the Cord

Understanding Digital Music

Understanding Home Theater

Page 26: Personal Data Security - Part 2

About Curt Robbins

Blog: Middle Class Tech

Flipboard magazine: Middle Class Tech

Twitter: @CurtRobbins

Page 28: Personal Data Security - Part 2