I mentioned on a blog post that I was pulling together some slides and handouts on how we all should be protecting our information security devices, networks and systems. I’m posting the handouts here just to share the resource with others. Comments are always welcome and I’ll likely post additional resources on this page going forward.
Protecting Information Security (removed).
Some other great resources:
- What to do if your iPhone is Lost or Stolen.
- Your phone’s biggest vulnerability is your fingerprint
- 12 Hints To Help Protect Your Online Identity From Cyber Criminals
- 7 Password Experts on How to Lockdown Your Online Security
- Got privacy? If you use Twitter or a smartphone, maybe not so much
- How to set up two-factor authentication for Gmail.
The Turn IT Off post might be important to consider too.