SlideShare a Scribd company logo
1 of 10
Holiday Gifts 
That Put Your Privacy at Risk 
© IDT911, LLC. All Rights Reserved — Confidential 0
Giving Someone 
Special a Tech Gadget 
for the Holidays? 
Make sure you don't give the gift of identity theft. 
Protect your information with these easy tips. 
© IDT911, LLC. All Rights Reserved — Confidential 1
iPhone 6 
Apple Pay and Find My iPhone Make Life Easier 
Apple Pay 
Lets you use your phone to pay for 
purchases. 
Find My iPhone 
Helps you locate your phone when 
it’s misplaced. 
TIP: Start by using only one credit card—never debit cards—to 
mitigate risk if there is an issue. Use two-factor authentication 
to keep your personal information secure online. 
© IDT911, LLC. All Rights Reserved — Confidential 2
With Nest, you get a smart 
thermostat that learns about your 
behavior for more efficient heating 
and cooling in your home. Hackers 
could get backdoor access to your 
home and personal information. 
Google’s Nest Thermostat 
Make Your Home Smart and Safe 
TIP: Never buy devices used because they may contain malware. 
Watch for upgrades that can offer stronger protection. Monitor 
performance to ensure it’s operating correctly. 
© IDT911, LLC. All Rights Reserved — Confidential 3
Jawbone UP 
Watch Your Health—and Your Privacy 
This fitness tracker stores and tracks 
a lot of sensitive information about 
you to help you make better health 
decisions. But trackers may not 
secure our data as well as we think 
because they’re vulnerable to 
information leakage via hacking and 
other methods. 
TIP: Read privacy policies to see if your data is for sale. Be 
cautious with social sharing features. Never share your 
location on social media. Use a screen lock to prevent 
unauthorized access to your device. 
© IDT911, LLC. All Rights Reserved — Confidential 4
Pebble Steel 
Keep Track of the Time, Calls, and Your Security 
Leave your phone and iPod at home 
with this multifunctional smartwatch 
that accepts phone calls and texts, 
and plays your favorite songs. 
TIP: Pebble Steel depends on Bluetooth to connect with your 
phone. Configure it to approve connection requests to avoid 
being “Bluejacked.” Turn off Bluetooth when you’re not using 
the device. 
© IDT911, LLC. All Rights Reserved — Confidential 5
August Smart Lock 
Lock in Security Best Practices 
Now you don’t have to juggle grocery 
bags to find your house keys. This 
smart home product uses your 
iPhone or Android to conveniently 
sense your approach and unlock 
your home’s front door. 
TIP: Installation immediately raises your risk profile. Don’t leave 
your phone in plain sight. Have a backup plan. And rely on 
smartphone security best practices such as using a screen 
lock or PIN. 
© IDT911, LLC. All Rights Reserved — Confidential 6
Apple’s new top-of-the-line device is 
fast, light, and powerful enough to be 
your main or secondary computer. 
Like any device, it’s also potentially 
vulnerable to malware and easily lost 
or stolen. 
iPad Air 2 
Ideal for Frequent Travelers 
TIP: Keep your tablet’s operating system and apps up-to-date. 
Enable encryption for your data, and consider encrypting calls 
and texts. Use only known, secure Wi-Fi networks. 
© IDT911, LLC. All Rights Reserved — Confidential 7
Kindle Voyage 
Don’t Trade Privacy for Convenience 
Voyage, the seventh generation of 
the Kindle devices, has been hailed 
a top e-reader device. But make sure 
you’re not letting companies track 
your reading and browsing habits. 
TIP: Set your tablet to require a password for access to keep 
unauthorized users out. Do the same for Wi-Fi. Regularly 
clear your cookies, cache, and browser history, too. 
© IDT911, LLC. All Rights Reserved — Confidential 8
9 
Scottsdale, AZ / Providence, RI / New York, NY / Montreal, Canada / Galway, Ireland 
© IDT911, LLC. All Rights Reserved — Confidential

More Related Content

Viewers also liked

Ideal presentation rus
Ideal presentation rusIdeal presentation rus
Ideal presentation rus
Luda Kruglich
 
Motivasi for students
Motivasi for studentsMotivasi for students
Motivasi for students
Nnoffie Khaa
 
ομιλια για χρηση ουσιων
ομιλια για χρηση ουσιωνομιλια για χρηση ουσιων
ομιλια για χρηση ουσιων
Yolanda Komianou
 
Turkey_Hospitality_Industry
Turkey_Hospitality_IndustryTurkey_Hospitality_Industry
Turkey_Hospitality_Industry
Uday Kumar
 

Viewers also liked (12)

Social Media Tips Infographic, November, 2013
Social Media Tips Infographic, November, 2013Social Media Tips Infographic, November, 2013
Social Media Tips Infographic, November, 2013
 
Menu SPA
Menu SPAMenu SPA
Menu SPA
 
How can Warrants Help you Close a Deal?
How can Warrants Help you Close a Deal?How can Warrants Help you Close a Deal?
How can Warrants Help you Close a Deal?
 
Enhancing Functionality on Epic OMS: New Features for OM Plus DM
Enhancing Functionality on Epic OMS: New Features for OM Plus DMEnhancing Functionality on Epic OMS: New Features for OM Plus DM
Enhancing Functionality on Epic OMS: New Features for OM Plus DM
 
Ideal presentation rus
Ideal presentation rusIdeal presentation rus
Ideal presentation rus
 
Motivasi for students
Motivasi for studentsMotivasi for students
Motivasi for students
 
Recipes OnDemand
Recipes OnDemandRecipes OnDemand
Recipes OnDemand
 
Imagination with paper 'Filigree'
Imagination with paper 'Filigree'Imagination with paper 'Filigree'
Imagination with paper 'Filigree'
 
ομιλια για χρηση ουσιων
ομιλια για χρηση ουσιωνομιλια για χρηση ουσιων
ομιλια για χρηση ουσιων
 
Qué son los neurotransmisores
Qué son los neurotransmisoresQué son los neurotransmisores
Qué son los neurotransmisores
 
Bab 1 sejarah & kita
Bab 1 sejarah & kitaBab 1 sejarah & kita
Bab 1 sejarah & kita
 
Turkey_Hospitality_Industry
Turkey_Hospitality_IndustryTurkey_Hospitality_Industry
Turkey_Hospitality_Industry
 

More from IDT911

5 Worst States for Identity Theft
5 Worst States for Identity Theft5 Worst States for Identity Theft
5 Worst States for Identity Theft
IDT911
 
Top 10 Government Breaches of 2012
Top 10 Government Breaches of 2012Top 10 Government Breaches of 2012
Top 10 Government Breaches of 2012
IDT911
 
Anatomy of a Phishing Email
Anatomy of a Phishing EmailAnatomy of a Phishing Email
Anatomy of a Phishing Email
IDT911
 
LinkedIn Breach: How to Make Your Passwords Stronger
LinkedIn Breach: How to Make Your Passwords StrongerLinkedIn Breach: How to Make Your Passwords Stronger
LinkedIn Breach: How to Make Your Passwords Stronger
IDT911
 
Turn Your LeakedIn Account Back Into a LinkedIn One
Turn Your LeakedIn Account Back Into a LinkedIn OneTurn Your LeakedIn Account Back Into a LinkedIn One
Turn Your LeakedIn Account Back Into a LinkedIn One
IDT911
 
Anatomy of a Craigslist Scam
Anatomy of a Craigslist ScamAnatomy of a Craigslist Scam
Anatomy of a Craigslist Scam
IDT911
 
How to Fight Shoddy Background Checks
How to Fight Shoddy Background ChecksHow to Fight Shoddy Background Checks
How to Fight Shoddy Background Checks
IDT911
 
How to Fight Shoddy Background Checks
How to Fight Shoddy Background ChecksHow to Fight Shoddy Background Checks
How to Fight Shoddy Background Checks
IDT911
 
How to Fight Shoddy Background Checks
How to Fight Shoddy Background ChecksHow to Fight Shoddy Background Checks
How to Fight Shoddy Background Checks
IDT911
 
When Data Loss Is An Inside Job
When Data Loss Is An Inside JobWhen Data Loss Is An Inside Job
When Data Loss Is An Inside Job
IDT911
 
5 Worst States for Identity Theft
5 Worst States for Identity Theft5 Worst States for Identity Theft
5 Worst States for Identity Theft
IDT911
 
Top 10 Security Trends of 2012
Top 10 Security Trends of 2012Top 10 Security Trends of 2012
Top 10 Security Trends of 2012
IDT911
 

More from IDT911 (12)

5 Worst States for Identity Theft
5 Worst States for Identity Theft5 Worst States for Identity Theft
5 Worst States for Identity Theft
 
Top 10 Government Breaches of 2012
Top 10 Government Breaches of 2012Top 10 Government Breaches of 2012
Top 10 Government Breaches of 2012
 
Anatomy of a Phishing Email
Anatomy of a Phishing EmailAnatomy of a Phishing Email
Anatomy of a Phishing Email
 
LinkedIn Breach: How to Make Your Passwords Stronger
LinkedIn Breach: How to Make Your Passwords StrongerLinkedIn Breach: How to Make Your Passwords Stronger
LinkedIn Breach: How to Make Your Passwords Stronger
 
Turn Your LeakedIn Account Back Into a LinkedIn One
Turn Your LeakedIn Account Back Into a LinkedIn OneTurn Your LeakedIn Account Back Into a LinkedIn One
Turn Your LeakedIn Account Back Into a LinkedIn One
 
Anatomy of a Craigslist Scam
Anatomy of a Craigslist ScamAnatomy of a Craigslist Scam
Anatomy of a Craigslist Scam
 
How to Fight Shoddy Background Checks
How to Fight Shoddy Background ChecksHow to Fight Shoddy Background Checks
How to Fight Shoddy Background Checks
 
How to Fight Shoddy Background Checks
How to Fight Shoddy Background ChecksHow to Fight Shoddy Background Checks
How to Fight Shoddy Background Checks
 
How to Fight Shoddy Background Checks
How to Fight Shoddy Background ChecksHow to Fight Shoddy Background Checks
How to Fight Shoddy Background Checks
 
When Data Loss Is An Inside Job
When Data Loss Is An Inside JobWhen Data Loss Is An Inside Job
When Data Loss Is An Inside Job
 
5 Worst States for Identity Theft
5 Worst States for Identity Theft5 Worst States for Identity Theft
5 Worst States for Identity Theft
 
Top 10 Security Trends of 2012
Top 10 Security Trends of 2012Top 10 Security Trends of 2012
Top 10 Security Trends of 2012
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

Holiday Gifts That Put Your Privacy at Risk

  • 1. Holiday Gifts That Put Your Privacy at Risk © IDT911, LLC. All Rights Reserved — Confidential 0
  • 2. Giving Someone Special a Tech Gadget for the Holidays? Make sure you don't give the gift of identity theft. Protect your information with these easy tips. © IDT911, LLC. All Rights Reserved — Confidential 1
  • 3. iPhone 6 Apple Pay and Find My iPhone Make Life Easier Apple Pay Lets you use your phone to pay for purchases. Find My iPhone Helps you locate your phone when it’s misplaced. TIP: Start by using only one credit card—never debit cards—to mitigate risk if there is an issue. Use two-factor authentication to keep your personal information secure online. © IDT911, LLC. All Rights Reserved — Confidential 2
  • 4. With Nest, you get a smart thermostat that learns about your behavior for more efficient heating and cooling in your home. Hackers could get backdoor access to your home and personal information. Google’s Nest Thermostat Make Your Home Smart and Safe TIP: Never buy devices used because they may contain malware. Watch for upgrades that can offer stronger protection. Monitor performance to ensure it’s operating correctly. © IDT911, LLC. All Rights Reserved — Confidential 3
  • 5. Jawbone UP Watch Your Health—and Your Privacy This fitness tracker stores and tracks a lot of sensitive information about you to help you make better health decisions. But trackers may not secure our data as well as we think because they’re vulnerable to information leakage via hacking and other methods. TIP: Read privacy policies to see if your data is for sale. Be cautious with social sharing features. Never share your location on social media. Use a screen lock to prevent unauthorized access to your device. © IDT911, LLC. All Rights Reserved — Confidential 4
  • 6. Pebble Steel Keep Track of the Time, Calls, and Your Security Leave your phone and iPod at home with this multifunctional smartwatch that accepts phone calls and texts, and plays your favorite songs. TIP: Pebble Steel depends on Bluetooth to connect with your phone. Configure it to approve connection requests to avoid being “Bluejacked.” Turn off Bluetooth when you’re not using the device. © IDT911, LLC. All Rights Reserved — Confidential 5
  • 7. August Smart Lock Lock in Security Best Practices Now you don’t have to juggle grocery bags to find your house keys. This smart home product uses your iPhone or Android to conveniently sense your approach and unlock your home’s front door. TIP: Installation immediately raises your risk profile. Don’t leave your phone in plain sight. Have a backup plan. And rely on smartphone security best practices such as using a screen lock or PIN. © IDT911, LLC. All Rights Reserved — Confidential 6
  • 8. Apple’s new top-of-the-line device is fast, light, and powerful enough to be your main or secondary computer. Like any device, it’s also potentially vulnerable to malware and easily lost or stolen. iPad Air 2 Ideal for Frequent Travelers TIP: Keep your tablet’s operating system and apps up-to-date. Enable encryption for your data, and consider encrypting calls and texts. Use only known, secure Wi-Fi networks. © IDT911, LLC. All Rights Reserved — Confidential 7
  • 9. Kindle Voyage Don’t Trade Privacy for Convenience Voyage, the seventh generation of the Kindle devices, has been hailed a top e-reader device. But make sure you’re not letting companies track your reading and browsing habits. TIP: Set your tablet to require a password for access to keep unauthorized users out. Do the same for Wi-Fi. Regularly clear your cookies, cache, and browser history, too. © IDT911, LLC. All Rights Reserved — Confidential 8
  • 10. 9 Scottsdale, AZ / Providence, RI / New York, NY / Montreal, Canada / Galway, Ireland © IDT911, LLC. All Rights Reserved — Confidential