Presented by: Brendan Walsh Manager, Security and Access Management

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
SECURITY AND SOCIAL ENGINEERING US Department of Commerce Office of Security Updated 09/26/11 Security is Everyone's Responsibility – See Something, Say.
Information Security Confidential Two-Factor Authentication Solution Overview Shawn Fulton January 15th, 2015.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Information Security Phishing Update CTC
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
ESCCO Data Security Training David Dixon September 2014.
Scams & Schemes Common Sense Media.
IT security By Tilly Gerlack.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
Phishing Dennis Schmidt, CISSP Director, Office of Information Systems HIPAA Security Officer UNC School of Medicine UNC School of Medicine.
A Matter of Your Personal Security Phishing Revised 11/30/15.
Protecting Your Assets By Preventing Identity Theft 1.
Internet safety. Dangers of a poor password How people guess your password Your partner, child, or pet's name, possibly followed by a 0 or 1 The last.
Do you know who you’re dealing with? Social Engineering: Minimise the risk of becoming a victim.
Tuesday March 15, 2016 Session 19-D Technology Forum David Finkelstein, CIO RiverSpring Health.
Take the Quiz and find out more!
Important Information Provided by Information Technology Center
Technical Implementation: Security Risks
Protecting Your Assets By Preventing Identity Theft
Media education: from passive consumers to active creators
Digital Security Identity theft Copyright Laws Plagiarism, and More.
PCI-DSS Security Awareness
Done by… Hanoof Al-Khaldi Information Assurance
PHISHING Hi, The comms team asked if I could refresh everyone about Phishing after a fairly successful phishing circulated last week that led to.
Phishing Don’t take the bait! Dave Beauvais Andrew Sloan
CYBER SECURITY PANDEMIC
Learn how to protect yourself against common attacks
Information Security.
Lesson 3 Safe Computing.
Report Phishing Forward phishing s to
Phishing is a form of social engineering that attempts to steal sensitive information.
Protect Your Computer Against Harmful Attacks!
Staying Austin College
Cybersecurity Awareness
Unfortunately, any small business could face the risk of a data breach or cyber attack. Regardless of how big or small your business is, if your data,
Practice Safe Computing
Information Technology Services Education and Awareness Team
Robert Leonard Information Security Manager Hamilton
Technology Services Multi-Factor Authentication gsw
Scams and Schemes.
Personal IT Security Cyber Security – Basic Steps
Jeff loses his identity!
Network Security Best Practices
smartmail & smartportal: Introducing Two-Factor Authentication
Report Phishing Forward phishing s to
Report Phishing Forward phishing s to
Protecting Yourself from Fraud including Identity Theft
HOW DO I KEEP MY COMPUTER SAFE?
Security Hardening through Awareness August 2018
Qiyu chen, Xiaomin Dong, Chenhui Lai, Xinteng Chen, Vittorio DiPentino
Setting up a Gmail Account & Safety Kamlesh Singh Bisht IT Specialist.
Information Technology Services Education and Awareness Team
What is Phishing? Pronounced “Fishing”
Phishing 101.
Report Phishing Forward phishing s to
Communicating in the IT Industry
Student user guide for getting started with Microsoft
Why Cyber Security is important to SME? Useful Tips on how you protect and secure your business. By Ronald Soh from Win-Pro Consultancy Pte Ltd
Cybersecurity Simplified: Phishing
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

Presented by: Brendan Walsh Manager, Security and Access Management Cyber Security Presented by: Brendan Walsh Manager, Security and Access Management BAS Forum – 10/11/2017

Agenda for this presentation Importance of protecting your digital identity Recent and in-progress security improvements Ways to avoid compromise Recognizing and reporting security issues

Why is protecting your digital identity important? Your FlashLine username and password are your keys to everything Kent State (which makes them prime targets) W-2 Direct Deposit Dependent information Grades and student information Plus access to other university information General Ledger Payroll Data Financial Accounts HIPAA, FERPA, GLBA, PCI, etc.

Recent actions to secure our environment Restricting of access to email addresses from public phone directory Tweaking email parameters to improve spam/phish/junk mail routing Secure VPN with Multi-Factor authentication for super-users Improved efficiency in detecting and securing compromised accounts

Additional efforts we have underway Authentication enhancements Multi-factor authentication for everyone Adaptive access controls based on risk Network firewall enhancements Security awareness training and communications

You are the last line of defense! BUT… All of the best security controls can only go so far You are the last line of defense!

Security attacks you may face Phishing Vishing (Voice/phone Phishing) Credential Stuffing (Reuse of stolen passwords)

How to recognize and avoid getting phished – Email messages Five things to watch for: Message sounds threatening or conveys a sense of urgency E.g. Account will be disabled Message sounds official but comes from an unofficial address Message has a generic greeting or signature Link in message does not match landing site E.g. Link to Dropbox goes to “weebly.com” Request seems “out of the norm” E.g. CFO asks you to send copies of all W-2s

How to recognize and avoid getting phished – Email examples

How to recognize and avoid getting phished – Email example Example of a Phishing Email Attempts to steal usernames and passwords by tricking the recipient Do not click on links in suspicious email Forward suspicious email to: Phish@kent.edu

How to recognize and avoid getting phished – Message links Be wary of any link that goes to a login prompt Don’t login until you check the address Don’t login unless you see a padlock

Check the link before logging in! Kupa.bg/wp/wp-includes… is not Login.kent.edu Notice the missing:

Here’s the real one:

How to recognize and avoid getting “vished” – Voice phishing Caller claims to be a vendor, but does not have tangible details Caller will not provide call-back number Caller sounds threatening Intent is to trick or fraud the call receiver

Common Vishing Examples Microsoft Support Informs you that they detected a virus on your computer IRS Agent Informs you of a pending lawsuit Printing/Copier or Office Supply Vendors Asks you to confirm the printer serial number to invoice you for toner or other supplies

How to avoid being susceptible to “credential stuffing” – Password reuse Reuse of passwords across different sites A breach of your password from one site will put all other accounts at risk Consider a password manager for personal accounts Check your email addresses and accounts using the site: haveibeenpwned.com “Have I Been P-owned”

A quick review Never share your passwords with anyone Be on alert for phishing email Exercise caution when you receive pushy calls Question any request that seems out of the norm Never reuse passwords for multiple sites Forward suspicious email to: Phish@kent.edu

Additional information available: SecureIT.kent.edu Phishing email archive, training materials, and identity protection information Security Roadshow Invite security staff to speak at a staff event or team meeting Contact us at Security@kent.edu or x2-5566

Q&A Brendan Walsh Manager, Security and Access Management bmwalsh@kent.edu 330-672-5566