Cyber & IT Supervisory Forum - Additional Resources
TLP:GREEN
6.4.1
Personal Information: Key Assets ....................................................................................... 25
6.4.2
Types Of Key Assets ............................................................................................................ 25
6.4.3
Preventative Measures: "Key Assets" ................................................................................. 25
7 Digital Hygiene .................................................................................................................................... 26 Securing Your Web Browser ....................................................................................................... 27 HTTP Versus HTTPS ..................................................................................................................... 27 Tracking Cookies ......................................................................................................................... 27 Preventing Websites From Storing Cookies................................................................................ 27 Clearing The Web Browser Cache............................................................................................... 27 Phishing Resources ..................................................................................................................... 28 7.6.1 Securing Your Personal Email Address................................................................................ 28 7.6.2 Checking URLs in Emails...................................................................................................... 28 Browser Fingerprinting ............................................................................................................... 29 7.7.2 Web Browser Extensions and Add-Ons .............................................................................. 30 7.7.3 Browser Extensions and Privacy ......................................................................................... 30 7.7.4 Mobile Two-Factor Authentication..................................................................................... 31 FCC Smartphone Security Checker.............................................................................................. 31 8 Online Behavioral Advertising............................................................................................................. 31 Browser Privacy Controls ............................................................................................................ 32 Online Behavioral Advertising Services....................................................................................... 32 9 The Digital Exhaust Ecosystem............................................................................................................ 33 Primary Data Brokers .................................................................................................................. 33 YourDigitalRights.org .................................................................................................................. 33 DataBrokersWatch.org................................................................................................................ 34 People Search Sites ..................................................................................................................... 34 People Search Sites Opt Out List................................................................................................. 35 Removing PII On Web Search Engines ........................................................................................ 35 9.6.1 URL Removal Of PII From Google Search............................................................................ 35 9.6.2 Google Requirements To Remove PII ................................................................................. 35 9.6.3 Google Requirements To Remove Doxing Content ............................................................ 36 9.6.4 Request To Remove Select Personal Info From Google Search.......................................... 36 9.6.5 What Happens After You Submit The Removal Request? .................................................. 36 9.6.6 Removal Of Outdated Google Content ............................................................................... 36
TLP:GREEN
Made with FlippingBook Annual report maker