DOJ CYBER RISK REPORT 2015 BREACHES & THE CYBER LANDSCAPE CYBER SECURITY? HUH?
BREACHES & THE CYBER LANDSCAPE
OPM/ANTHEM BREACH
HACKED DATA-WHAT’S IT WORTH?
BREACH STATISTICS
STATE OF MONTANA – CYBER STATS
TOP INFECTION VECTORS 1.BROWSERS 2.
TOP VULNERABILITIES 1.INTERNET EXPLORER 2.ADOBE (FLASH, READER & ACROBAT) 3.JAVA 4.MICROSOFT OFFICE (WORD & EXCEL) 5.FIREFOX
1. APPLY SECURITY PATCHES 2. CHANGE PASSWORDS REGULARLY 3. BE CAREFUL WHERE YOU SURF 4. MONITOR YOUR SYSTEMS 5. USE ANTI-VIRUS & ANTI-MALWARE SOFTWARE 6. REPORT SECURITY INCIDENTS YOU CAN FIGHT BACK!! DAWN TEMPLE MT DEPT. OF JUSTICE – INFORMATION SECURITY OFFICER
CONTACT INFO Dawn Temple Agency Information Security Officer MT Dept. of Justice | Information Technology Service Division Call: Cell: Chat: Stop by: Follow:
TECHNOLOGY USE POLICY CHANGES Personal Use Allowing staff the ability for very limited personal use (as defined below) of the internet, and DOJ IT during breaks and during travel is at the discretion of the supervisor or contract manager. It is not a right but a privilege that may be revoked or modified by a supervisor or manager at any time. This will not be done on State equipment from home during off hours – use your personal computer. At all times, potential public perception must be considered, and personal use of DOJ IT resources will not impact any business activity such as a user’s work time or State internet bandwidth. The following items are examples intended as guidance and are not all inclusive. Users should consult their supervisor or manager when activities may be questionable or unclear.