Data Protection at Home
Data Protection at Home
26|27 2|2
Legal information The content of this document is protected by copyright. No part of it may be reproduced, made available to the general public or used in any other way without the prior written consent of Deutsche Telekom AG. This applies in particular to reproduction on all types of data media, e.g. CD-ROM or DVD-ROM, as well as to rendition in electronic databases or online services. This guide has been compiled with great care and attention. Nonetheless, Deutsche Telekom AG accepts no responsibility for the correctness, completeness or topicality of the information it contains. This applies likewise to the content of websites that are linked through this document. On no account does Deutsche Telekom AG accept liability for direct or indirect damage such as loss of data occurring in connection with the pursuit of actions recommended in this document.
Introduction
4|5
Introduction.
With this guide we want to draw attention to the fact that data protection is more than just installing a functional anti-virus program on a computer. We are living in the age of digitalization we are performing our private banking transactions online, making purchases over the Internet and increasingly maintaining our social contacts on the web. User behavior has also changed the face of crime. Spying on access data or hacking private WLAN connections are the modern equivalents of stealing purses and breaking and entering. Everyone knows how to secure their house and purses in just a few steps. We need to develop the same routine when using the Internet. By observing the following tips you can protect yourself against Internet crime and prevent misuse. Should you have any questions on the topic of data protection in general or at Telekom, you can send an e-mail to [email protected]. Yours sincerely, Claus-Dieter Ulmer
2004
2005
2006
2007
2008
Password mining
2004 - 2008 Experiences of German internet users 2009 Source: BITKOM/Forse (2009), Basis: internet users from the age of 14 and up
BITKOM estimated a loss of 11 Million Euro for the users of Online Banking in Germany. This is one of many facts when talking about cyber crime.
6|7
and keyboard lock is activated with the screen saver five minutes after the last user entry. On a private PC, the activation time is of course freely selectable. The lock can also be activated immediately if required. In a Windows operating system this is done by pressing the keys Ctrl + Alt + Delete and then selecting the option Lock computer.
Configure your wireless accesses on the devices you use. This too will make it difficult for third parties to gain access (see WLAN security).
Data backup.
To be on the safe side, you should regularly make a back-up copy of important data in particular, for example on CD-ROM/DVD or on an external hard drive.
8|9
10|11
Please think carefully what consequences it has when your password ends up with the wrong people decide afterwards how safe you want to create your password.
Online banking, reading e-mails or writing a contribution in an anglers forum anyone using Web 2.0 will sooner or later always reach a point at which they are asked for a login name and password. The login name generally does not cause any problems. However, by having about the fifth password its difficult to stay on top of things. Even more so, because a secure password is unfortunately the opposite of a memorable one. So, how do I create a secure password that I can remember? Here you can learn how to exasperate hackers and protect your data. sentence we replace the l with a 2 and add a ! at the end. Our secure password then becomes W2lepws! This password comprises 8 characters. This is the lower limit recommended by experts for a secure password. As a rule, the longer and more complex the password the better. The reason for this is that hackers use programs to systematically try out all the possible password combinations. With each additional character, the number of possible passwords and thus the necessary runs that this type of computer program would need to crack your password therefore also increases.
Therefore think twice before you choose a password: Is it protecting personal or business-related information (e.g., e-mails, contacts, etc.)? Can financial transactions be performed if access is gained (such as access to online banking or online auction houses)? Have you saved important data like your credit card number or bank details on the corresponding access? If the answer to these questions is yes then you should definitely choose a password which is secure as possible. If not, it may be that a less secure password is adequate. Even in this case you should of course make sure that you do not make things too easy for any hackers.
WLAN security
12|13
WLAN security.
More and more people are using wireless networks (Wireless Local Area Networks or WLAN) at home or on public PCs to access the Internet.
They are practical because they mean that you can access the Internet from anywhere. However, they also pose security risks. In general it can be said that any wireless connection offers less security than a network connection via a cable. With the wireless connection, the data is transmitted to the recipient by radio and can be intercepted. The personal effort in creating a secure personal environment is not only important for protecting yourself against attacks, but avoiding negligence minimizes liability. A private WLAN should be protected by the usage of passwords. If a third party gains unauthorized access to the non-secured WLAN and performs illegal activities, depending on the country legislation, you as the owner of the WLAN, may be forced by an injured party to cease and desist and to reimburse any associated costs of legal proceedings. It is therefore important that you encrypt your data so that your private e-mails, user names and passwords do not fall into the wrong hands. You can find important information on how to configure the security parameters of the router in its user manual.
WLAN security
14|15
You can protect your home against data theft by following these points:
Secure your WLAN router.
This is the most important precautionary measure since the WLAN router establishes the connection between your computer and your Internet access. Before you start operating your WLAN you should change a few basic settings: First you need to manually change the SSID, which refers to the network name, and give it a personal name. Here it is best to select an imaginary name which does not allow it to be traced back to you personally or your Internet provider. To increase security you should prevent the SSID from being displayed so that the name of your router cannot be found on the network. Since you know the name of your router you will of course be able to find it.
Especially when using publicly accessible Hot Spots you should consider the following recommendations to protect your data in the best way.
Security Information of the Federal Office for Information Security
The Federal Office for Information Security recommends having no wireless installation of all settings on your WLAN router but via cable.
Set up encryption.
An additional protection measure is to encrypt your WLAN. In most WLAN systems this is done via WPA2-PSK PSK (PreShared Key), i.e., the previously agreed key. Here a key (password) is needed to access the network when a connection is established. It is important that you select a secure password here. You will find more information about creating passwords under Creating a secure password.
16|17
18|19
As convenient as online banking from home may be, it poses risks due to the processing of sensitive data. Data such as P IN and T AN numbers, which enable access to an account, repeatly fall into the hands of fraudsters due to carelessness. This very often happens due to phishing attacks, which have high potential for risks and damage. Phishing is a combination of the terms password and fishing and refers to attempting to acquire passwords as IN and T AN numbers. Through well as P fake e-mails and websites asking the customer to give his or her account details along with passwords, criminals can access sensitive data. In most cases a link takes the user to the fake website of banks and other companies which look very similar to the original. Pay attention to the following points so that you can protect yourself against these attacks:
to your bank it is best to check once again directly and make sure. Your bank will never ask you to provide con IN and T AN fidential data such as a P within an e-mail. Neither will your bank ever ask you for sensitive data over the phone. If you are unsure, call the number of your bank you are familiar with directly and confirm. Phishing e-mails are in many cases written in poor language. For languages with special characters in many cases it becomes obvious. For example, in German, umlauts such as , , are missing. This is because these messages are translated from other languages quickly and simply by computer programs. But often, even emails written in English, disclose spelling or grammar mistakes. The most secure thing to do is to never go to a website via an e-mail link. Always call up the site directly from your browser. Make sure the address of the site is written correctly.
If it is a secure connection, the abbreviation https:// is displayed in the browsers address bar. This encryption procedure prevents data from being read or manipulated during the time you are working on it. In rare cases this can also be faked. To be on the safe side, always enter the address of your bank yourself in the address bar of your browser and do not follow a link. On the login page your bank will never ask AN codes. If this is the case, please for T contact your bank immediately.
Banking transactions should only be performed from your own private PC or a mobile device in private. Make sure that you log out at the end of the session and empty the c ache on your PC. It is also important that you always use current anti-virus software and perform security updates to close any security gaps. Check your account transactions regularly. Contact your bank immediately if you see anything suspicious or if any discrepancies arise. If you notice anything suspicious or unusual, block your access to online banking. You can do this by instructing your bank over the phone or directly via the relevant function in the online banking window. If something seems to be unusual or suspicious, block your access to your online bank account. You can either do this via a phone call to your bank or directly online via the respective window on your online banking website.
20|21
22|23
These days everyone can send and receive you to use your real name. But if you do want information around the world and thus memto use your own name, use only the initial of bers of social networks such as Xing, Facebook, your surname. MySpace, etc. naturally disclose private data. Contrary to what is often incorrectly assumed, You can restrict access to your own profile the Internet is not a legal vacuum. However, not using the settings. It is most secure to only everyone complies with the applicable data allow friends to have access. protection provisions, to the provision on the right to ones own image or to copyright laws. Profile pictures. This poses privacy risks which many users are Even if it seems normal amongst young not aware of. For this reason it is important network users to show a picture on the Interto comply with certain practices in social net, using photos and images which are too networks. revealing violates privacy protection reguFirst of all, read the General Terms and lations. For this reason you should carefully Conditions and data protection notices of consider which photos you display on the the platform operators thoroughly. These Internet. Photos in beachwear or underwear generally tell you how the operators deal are generally taboo. Most people would not with your personal data. publicize their private life to people they dont know in their day-to-day lives, would they? Always think about what you really want to Creating your own profile. reveal about yourself online. First and foremost, where possible do not disclose any personal data such as e-mail Photo albums. addresses, telephone numbers, Messenger The function of uploading photos to online data, photos etc. This is because anyone photo albums is popular and frequently who gives away a large amount of informaused. To not take any risks here either, you tion about themselves is making it easy for should make sure that only immediate other people to send them phishing messafriends have access to these albums. ges or unwanted advertising, for example. In chats and discussion forums, instead of your own name you can also pick a nick name, even if the operator of this site asks As a rule you should only upload photos to which you also have rights.
Photos which you have uploaded to the ache Internet often remain saved in the c for a long time, even if you have deleted the images or the entire photo album.
Since every friend can see the data released for friends, you should always give careful consideration to who you accept as a friend.
Privacy.
You should know about and use where necessary all the settings provided by a social network for protecting your privacy. If you want to protect your privacy on various social networks you can consult the website www.klicksafe.de.
Adding friends.
We often receive a friend request from somebody we do not know. Before you accept the invitation or send it to anybody else you should check thoroughly who this person is. Personal data should only be made acces sible to genuine friends. Since you would not want to be shown in disadvantageous images or read private comments about yourself on the message boards of these sites, you should also respect the privacy of friends and relatives and only place images of them on the Internet after consultation.
24|25
There are however ways to rule out any concerns. Make your child aware of how to use the Internet correctly:
Discover the Internet together so that your child learns how to use it correctly from the start. You should also regularly ask him or her about his or her recent experiences on the Internet and/or take a look at the screen if your child is sitting at the PC. Look for trustworthy web sites regarding child protection and find out together with your child which sites children can surf without having to worry about being confronted with unsuitable content. The Deutsche Telekom, for example, is promoting in Germany child-friendly offers on the Internet and creating a secure area to surf the Internet with the search engine www.fragfinn.de.
lives or meeting places. Even when creating an e-mail address or a name for chat rooms your child should only use nicknames. Discuss the risks of meeting people. Your child should only meet people they have got to know via the Internet after consulting you. Children cannot tell whether this person has good intentions. Discuss the extent to which content is truthful with your children. Encourage your child to have good netiquette, i.e., to behave appropriately. This is particularly important if you child contacts friends on the Internet. Use filter programs so that your child only has restricted access to the Internet and only visits sites appropriate for their age. You can find further comprehensive information on internet security on the website www.klicksafe.de. Under the mandate of the European Comssion this website wants to bring forward the media competency related to the usage of the internet.
Agree on rules for Internet usage and find out about protective devices associated with this. There are special filters which can be installed on the computer and which automatically block pornographic sites as well as those which glorify violence or are associated to political extremists. Your child should never pass on personal data no details about age, where he or she
26|27
Remind that your data is highly sensitive, Always protect your data,
e-mail accounts and Internet accesses with a password where possible. It is important to select a combination of letters and digits that no-one except you can know.
(user names and passwords) in an easily accessible place and do not store them on your PC.
Reveal as little as possible about yourself on the Internet. Think twice before disclosing data such as e-mail addresses and phone numbers or uploading photos. Check what sites your children visit on
the Internet and educate them about the possible dangers.
intervals.
Legal information The content of this document is protected by copyright. No part of it may be reproduced, made available to the general public or used in any other way without the prior written consent of Deutsche Telekom AG. This applies in particular to reproduction on all types of data media, e.g. CD-ROM or DVD-ROM, as well as to rendition in electronic databases or online services. This guide has been compiled with great care and attention. Nonetheless, Deutsche Telekom AG accepts no responsibility for the correctness, completeness or topicality of the information it contains. This applies likewise to the content of websites that are linked through this document. On no account does Deutsche Telekom AG accept liability for direct or indirect damage such as loss of data occurring in connection with the pursuit of actions recommended in this document.
Be sure to back up your data at regular Always keep your virus protection
software up to date.
Published by Deutsche Telekom AG Corporate Communications/Group Privacy Friedrich-Ebert-Allee 140 53113 Bonn www.telekom.com/datenschutz Contact [email protected]