holiday gifts that put your privacy at risk
TRANSCRIPT
2© IDT911, LLC. All Rights Reserved — Confidential
Giving Someone Special a Tech Gadget for the Holidays? Make sure you don't give the gift of identity theft.
Protect your information with these easy tips.
3© IDT911, LLC. All Rights Reserved — Confidential
Apple Pay
Lets you use your phone to pay for
purchases.
Find My iPhone
Helps you locate your phone when
it’s misplaced.
Apple Pay and Find My iPhone Make Life Easier
iPhone 6
TIP: Start by using only one credit card—never debit cards—to
mitigate risk if there is an issue. Use two-factor authentication
to keep your personal information secure online.
4© IDT911, LLC. All Rights Reserved — Confidential
With Nest, you get a smart
thermostat that learns about your
behavior for more efficient heating
and cooling in your home. Hackers
could get backdoor access to your
home and personal information.
Make Your Home Smart and Safe
Google’s Nest Thermostat
TIP: Never buy devices used because they may contain malware.
Watch for upgrades that can offer stronger protection. Monitor
performance to ensure it’s operating correctly.
5© IDT911, LLC. All Rights Reserved — Confidential
This fitness tracker stores and tracks
a lot of sensitive information about
you to help you make better health
decisions. But trackers may not
secure our data as well as we think
because they’re vulnerable to
information leakage via hacking and
other methods.
Watch Your Health—and Your Privacy
Jawbone UP
TIP: Read privacy policies to see if your data is for sale. Be
cautious with social sharing features. Never share your
location on social media. Use a screen lock to prevent
unauthorized access to your device.
6© IDT911, LLC. All Rights Reserved — Confidential
Leave your phone and iPod at home
with this multifunctional smartwatch
that accepts phone calls and texts,
and plays your favorite songs.
Keep Track of the Time, Calls, and Your Security
Pebble Steel
TIP: Pebble Steel depends on Bluetooth to connect with your
phone. Configure it to approve connection requests to avoid
being “Bluejacked.” Turn off Bluetooth when you’re not using
the device.
7© IDT911, LLC. All Rights Reserved — Confidential
Now you don’t have to juggle
grocery bags to find your house
keys. This smart home product uses
your iPhone or Android to
conveniently sense your approach
and unlock your home’s front door.
Lock in Security Best Practices
August Smart Lock
TIP: Installation immediately raises your risk profile. Don’t leave
your phone in plain sight. Have a backup plan. And rely on
smartphone security best practices such as using a screen
lock or PIN.
8© IDT911, LLC. All Rights Reserved — Confidential
Apple’s new top-of-the-line device is
fast, light, and powerful enough to
be your main or secondary
computer. Like any device, it’s also
potentially vulnerable to malware
and easily lost or stolen.
Ideal for Frequent Travelers
iPad Air 2
TIP: Keep your tablet’s operating system and apps up-to-date.
Enable encryption for your data, and consider encrypting calls
and texts. Use only known, secure Wi-Fi networks.
9© IDT911, LLC. All Rights Reserved — Confidential
Voyage, the seventh generation of
the Kindle devices, has been hailed
a top e-reader device. But make
sure you’re not letting companies
track your reading and browsing
habits.
Don’t Trade Privacy for Convenience
Kindle Voyage
TIP: Set your tablet to require a password for access to keep
unauthorized users out. Do the same for Wi-Fi. Regularly
clear your cookies, cache, and browser history, too.