holiday gifts that put your privacy at risk

10
1 IDT911, LLC. All Rights Reserved — Confidential Holiday Gifts That Put Your Privacy at Risk

Upload: idt911

Post on 08-Aug-2015

712 views

Category:

Technology


0 download

TRANSCRIPT

1© IDT911, LLC. All Rights Reserved — Confidential

Holiday Gifts

That Put Your Privacy at Risk

2© IDT911, LLC. All Rights Reserved — Confidential

Giving Someone Special a Tech Gadget for the Holidays? Make sure you don't give the gift of identity theft.

Protect your information with these easy tips.

3© IDT911, LLC. All Rights Reserved — Confidential

Apple Pay

Lets you use your phone to pay for

purchases.

Find My iPhone

Helps you locate your phone when

it’s misplaced.

Apple Pay and Find My iPhone Make Life Easier

iPhone 6

TIP: Start by using only one credit card—never debit cards—to

mitigate risk if there is an issue. Use two-factor authentication

to keep your personal information secure online.

4© IDT911, LLC. All Rights Reserved — Confidential

With Nest, you get a smart

thermostat that learns about your

behavior for more efficient heating

and cooling in your home. Hackers

could get backdoor access to your

home and personal information.

Make Your Home Smart and Safe

Google’s Nest Thermostat

TIP: Never buy devices used because they may contain malware.

Watch for upgrades that can offer stronger protection. Monitor

performance to ensure it’s operating correctly.

5© IDT911, LLC. All Rights Reserved — Confidential

This fitness tracker stores and tracks

a lot of sensitive information about

you to help you make better health

decisions. But trackers may not

secure our data as well as we think

because they’re vulnerable to

information leakage via hacking and

other methods.

Watch Your Health—and Your Privacy

Jawbone UP

TIP: Read privacy policies to see if your data is for sale. Be

cautious with social sharing features. Never share your

location on social media. Use a screen lock to prevent

unauthorized access to your device.

6© IDT911, LLC. All Rights Reserved — Confidential

Leave your phone and iPod at home

with this multifunctional smartwatch

that accepts phone calls and texts,

and plays your favorite songs.

Keep Track of the Time, Calls, and Your Security

Pebble Steel

TIP: Pebble Steel depends on Bluetooth to connect with your

phone. Configure it to approve connection requests to avoid

being “Bluejacked.” Turn off Bluetooth when you’re not using

the device.

7© IDT911, LLC. All Rights Reserved — Confidential

Now you don’t have to juggle

grocery bags to find your house

keys. This smart home product uses

your iPhone or Android to

conveniently sense your approach

and unlock your home’s front door.

Lock in Security Best Practices

August Smart Lock

TIP: Installation immediately raises your risk profile. Don’t leave

your phone in plain sight. Have a backup plan. And rely on

smartphone security best practices such as using a screen

lock or PIN.

8© IDT911, LLC. All Rights Reserved — Confidential

Apple’s new top-of-the-line device is

fast, light, and powerful enough to

be your main or secondary

computer. Like any device, it’s also

potentially vulnerable to malware

and easily lost or stolen.

Ideal for Frequent Travelers

iPad Air 2

TIP: Keep your tablet’s operating system and apps up-to-date.

Enable encryption for your data, and consider encrypting calls

and texts. Use only known, secure Wi-Fi networks.

9© IDT911, LLC. All Rights Reserved — Confidential

Voyage, the seventh generation of

the Kindle devices, has been hailed

a top e-reader device. But make

sure you’re not letting companies

track your reading and browsing

habits.

Don’t Trade Privacy for Convenience

Kindle Voyage

TIP: Set your tablet to require a password for access to keep

unauthorized users out. Do the same for Wi-Fi. Regularly

clear your cookies, cache, and browser history, too.

10

Scottsdale, AZ / Providence, RI / New York, NY / Montreal, Canada / Galway, Ireland

© IDT911, LLC. All Rights Reserved — Confidential