Holiday Gifts That Put Your Privacy at Risk
- 1. Holiday Gifts
That Put Your Privacy at Risk
© IDT911, LLC. All Rights Reserved — Confidential 0
- 2. Giving Someone
Special a Tech Gadget
for the Holidays?
Make sure you don't give the gift of identity theft.
Protect your information with these easy tips.
© IDT911, LLC. All Rights Reserved — Confidential 1
- 3. iPhone 6
Apple Pay and Find My iPhone Make Life Easier
Apple Pay
Lets you use your phone to pay for
purchases.
Find My iPhone
Helps you locate your phone when
it’s misplaced.
TIP: Start by using only one credit card—never debit cards—to
mitigate risk if there is an issue. Use two-factor authentication
to keep your personal information secure online.
© IDT911, LLC. All Rights Reserved — Confidential 2
- 4. With Nest, you get a smart
thermostat that learns about your
behavior for more efficient heating
and cooling in your home. Hackers
could get backdoor access to your
home and personal information.
Google’s Nest Thermostat
Make Your Home Smart and Safe
TIP: Never buy devices used because they may contain malware.
Watch for upgrades that can offer stronger protection. Monitor
performance to ensure it’s operating correctly.
© IDT911, LLC. All Rights Reserved — Confidential 3
- 5. Jawbone UP
Watch Your Health—and Your Privacy
This fitness tracker stores and tracks
a lot of sensitive information about
you to help you make better health
decisions. But trackers may not
secure our data as well as we think
because they’re vulnerable to
information leakage via hacking and
other methods.
TIP: Read privacy policies to see if your data is for sale. Be
cautious with social sharing features. Never share your
location on social media. Use a screen lock to prevent
unauthorized access to your device.
© IDT911, LLC. All Rights Reserved — Confidential 4
- 6. Pebble Steel
Keep Track of the Time, Calls, and Your Security
Leave your phone and iPod at home
with this multifunctional smartwatch
that accepts phone calls and texts,
and plays your favorite songs.
TIP: Pebble Steel depends on Bluetooth to connect with your
phone. Configure it to approve connection requests to avoid
being “Bluejacked.” Turn off Bluetooth when you’re not using
the device.
© IDT911, LLC. All Rights Reserved — Confidential 5
- 7. August Smart Lock
Lock in Security Best Practices
Now you don’t have to juggle grocery
bags to find your house keys. This
smart home product uses your
iPhone or Android to conveniently
sense your approach and unlock
your home’s front door.
TIP: Installation immediately raises your risk profile. Don’t leave
your phone in plain sight. Have a backup plan. And rely on
smartphone security best practices such as using a screen
lock or PIN.
© IDT911, LLC. All Rights Reserved — Confidential 6
- 8. Apple’s new top-of-the-line device is
fast, light, and powerful enough to be
your main or secondary computer.
Like any device, it’s also potentially
vulnerable to malware and easily lost
or stolen.
iPad Air 2
Ideal for Frequent Travelers
TIP: Keep your tablet’s operating system and apps up-to-date.
Enable encryption for your data, and consider encrypting calls
and texts. Use only known, secure Wi-Fi networks.
© IDT911, LLC. All Rights Reserved — Confidential 7
- 9. Kindle Voyage
Don’t Trade Privacy for Convenience
Voyage, the seventh generation of
the Kindle devices, has been hailed
a top e-reader device. But make sure
you’re not letting companies track
your reading and browsing habits.
TIP: Set your tablet to require a password for access to keep
unauthorized users out. Do the same for Wi-Fi. Regularly
clear your cookies, cache, and browser history, too.
© IDT911, LLC. All Rights Reserved — Confidential 8
- 10. 9
Scottsdale, AZ / Providence, RI / New York, NY / Montreal, Canada / Galway, Ireland
© IDT911, LLC. All Rights Reserved — Confidential