Cybersecurity Awareness

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

Chapter 7 Securing your Wireless Network (WIFI). Synopsis What is a wireless home network? What damage can a wireless network snoop do? Who are the snoopers?
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
Threats to I.T Internet security By Cameron Mundy.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Staying Safe Online Keep your Information Secure.
Online Safety and Awareness. Introductions We are students at UNM We are taking an Information Security course this semester. It is our mission to teach.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
What is Spam? d min.
What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point.
Threats to IT security Jordan pilcher. phishing Phishing is when companies or people from other people who think they can get away with scamming you for.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
INTRODUCTION & QUESTIONS.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
David Wigley HCC Security Architect Security Trends for 2016.
CURRENT STATUS OF CYBERCRIME  Security is the fastest growing service in IT  Cyber Crime Costs $750 Billion annually  70% of threats arrive via .
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
Allison Gladkowski.  About privacy and why it matters  Spyware and spam vocabulary and examples  Identity theft  Unapproved access  Today's big issues.
September 19, 2016 Steve Konecny CFE, CIRA, CEH, CRISC Hands on Hacking.
Internet Safety.
Spear Phishing Common cause of data breaches Targeted s
What they are and how to protect against them
Edexcel GCSE Cyber security threats Computer Science 1CP1
PHISHING Hi, The comms team asked if I could refresh everyone about Phishing after a fairly successful phishing circulated last week that led to.
Class Name: Online Safety & Privacy Basics
Learn how to protect yourself against common attacks
Unit 4 IT Security.
How to use the internet safely and How to protect my personal data?
Information Security.
How to use the internet safely and How to protect my personal data?
Lesson 3 Safe Computing.
Dangers of the internet
Information Security 101 Richard Davis, Rob Laltrello.
Teaching Internet Safety
Presented by Security Management Partners Waltham, MA
Protect Your Computer Against Harmful Attacks!
John Glenn and David Dinkel PC(USA) Information Technology
Forensics Week 11.
Lesson 2- Protecting Yourself Online
Cybersecurity Awareness
Risk of the Internet At Home
Take Cyber Security “TO HEART”
Electronic Mail Opening Activity: 411 of
Internet Safety Vocabulary
David J. Carter, CISO Commonwealth Office of Technology
Ransomware and Data breaches in public libraries
Anatomy of a Large Scale Attack
Security Hardening through Awareness August 2018
IGraphic Social impacts of IT
Internet Safety – Social Media
The Internet: Encryption & Public Keys
How to Stay Safe Online Rollie Edwards.
Lesson 2- Protecting Yourself Online
Stop Ignoring the Problem
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Communicating in the IT Industry
Presentation transcript:

Cybersecurity Awareness Rusty Haferkamp, CISO Central National Bank rhaferkamp@cnbwaco.com

Who is this guy and why do we care what he says? Microsoft, CISCO, HP, Dell, CompTIA Certifications Contractor for Army, Navy, and Air Force (Top Secret Clearance) Small Business Owner, Loyal Wacoan Currently focused on financial institution trends in tech as the Chief Information Security Officer at Central National Bank What is a Cybersecurity Awareness? Educating others about policies and procedures for working with information technology with a focus on security. Sometimes it is called Info Security or infosec.

Agenda Passwords Viruses, Malware Spam and Email Phishing Scams Hacktivism Card Skimming Corporate Account Takeover Personal Computers at Home / Mobile What should I do if…

Password Strategy A Bad Password Can Be Cracked In A Few Seconds by a dictionary attack. Passphrases are Better than Passwords A Passphrase Usually Has Spaces Longer Than Any Random String Of Letters That An Ordinary Person Could Remember 123456 password 12345678 qwerty 12345 123456789 football 1234 1234567 baseball welcome 1234567890 abc123 111111 1qaz2wsx dragon master monkey letmein login princess qwertyuiop solo passw0rd starwars

Malware Malware is short for malicious software and essentially covers all virus types. Free Stuff – music, movies, file sharing (dark web) Clickbait – alluring links to draw you in Ransomware using Crypto”variants” – These viruses encrypt files on your computer and any other files it can touch on the same network. They usually have a message that appears out of nowhere with a phone number to call with instructions for paying the ransom. The ransom gets you a code to decrypt your data.

Email Spam Fodder – everything all at once to muddy the waters and challenge the spam filter or firewall Phishing – cast a big net and see what comes in Spearphishing – target a specific person or role #1 Threat Trend included in Social Engineering Are you expecting something from Jim@firesell.biz Why is Michelle Holland sending something out at 3AM? Have doubts? Throw it out

What if the Facebook photo changer was a trick? Hacktivism is the act of hacking, or breaking into a computer system, for a politically or socially motivated purpose. The individual who performs an act of hacktivism is said to be a hacktivist. “Anonymous” is a loosely associated international network of activist and hacktivist EVENT: Paris, Charlie Hebdo #JeSuisCharlie What if the Facebook photo changer was a trick? https://www.youtube.com/watch?v=ybz59LbbACQ

Card Skimming Does something look out of place? Added on, protruding, mismatch, etc. Try and pull it off, wiggle it, report it

Corporate Account Takeover more than stealing money ASHLEY MADISON “I’ve got their profile right in front of me, all their work credentials,” explained Biderman. “It was definitely a person here that was not an employee but certainly had touched our technical services.” ANTHEM The data breach is being linked to the Chinese government and Chinese government-sponsored entities, including researchers.9 The FBI has been in the process of connecting the same dots, while the organization ThreatConnect matched up the patterns between the malware used in the Anthem attack with the malware used in the breach of a small U.S. defense contractor.

Corporate Account Takeover cont… Spearphishing Email – Bad guy emails wiring instructions using a spoofed email address with instructions HOMEWORK! Go to CNBWACO.COM/BLOG “VIDEO: Protecting Your Business from Spear Phishing” The best safeguard—especially when the communication involves financial transactions (such as wire transfers)—is to pick up the phone and give the email’s sender a call. If the sender is at lunch, wait to take action on the email until they’ve returned and you’ve had the chance to speak with them.

Home and Mobile Security IoT “Internet of Things” is HUGE, Gartner predicts 6.4 BILLION connected devices in 2016, iPhones, Printers, Watches, Refrigerators, Light Bulbs, Cars Public WiFi – Don’t Use Never login to online banking or any site you don’t want something stolen Use the same logic at home that you would at work.

What Should I Do? Keep your computers up to date. Patches are good. Backup files Use strong passwords, don’t use the same pwd for everything Beware - Hyperlinks in Emails, Word Docs, Excel Spreads, PDFs can be dangerous Refrain from following the rabbit down the hole in email or on the web. Most Important Takeway!