Securing your Business Office

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

9/20/07 STLSecurity is Everyone's Responsibility 1 FHDA Technology Security Awareness.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Part of the BRE Trust Protecting People, Property and the Planet Smart Buildings and Security: Developing a unified approach Will Lloyd BRE Global Limited,
© 2004 Control 4 August 4, 2015 Control4 Get the most out of your home.
Do you know how to keep yourself safe?
September 2007 General Security Basics Your Responsibilities for Safe Computing.
Threats to I.T Internet security By Cameron Mundy.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Networks and Hackers Copyright © Texas Education Agency, All rights reserved. 1.
Stay Safe & Secure Online. Outline Passwords Everyday Security Security Physical Security Protecting Personal Information.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Cyber Security. Security – It’s About Layers There’s no one stop solution to protection Each layer you add, an additional tool will be needed to pierce.
Royal Latin School. Spec Coverage: a) Explain the advantages of networking stand-alone computers into a local area network e) Describe the differences.
Specialist communication channel. Sarah-Jane king.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
Joel Rosenblatt Director, Computer and Network Security September 10, 2013.
Computer security By Isabelle Cooper.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
Society & Computers PowerPoint
Securing A Wireless Home Network. Simple home wired LAN.
Computer Networks. Computer Network ► A computer network is a group of computers that are linked together.
1. Guard your privacy. What people know about you is up to you. 2. Protect your reputation. Self-reflect before you self-reveal. What’s funny or edgy.
Physical Security Concerns for LAN Management By: Derek McQuillen.
Outline of this module By the end of this module, you will be able to: Identify the benefits of using social networking to communicate with family and.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
The internet is a place of both useful and bad information. It has both good and bad side- and it’s all too easy for kids to stray into it. And no parents/guardian.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
Skype – Safe, Secure and Legal
What they are and how to protect against them
Malware and Computer Maintenance
Unit 4 IT Security.
How to use the internet safely and How to protect my personal data?
Before the talk… Zix Mail is the approved encrypted platform, we will have training on this soon. Citrix Sharefile has been approved for use for.
Ways to protect yourself against hackers
How to use the internet safely and How to protect my personal data?
Overview 1. Phishing Scams
How to build a good reputation online
INTRODUCTION TO NETWORKS AND COMMUNICATIONS
Home Computer Security
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Lesson 2- Protecting Yourself Online
Internet of Things
STOP. THINK. CONNECT. Online Safety Quiz.
Information Security Awareness 101
Information is at the heart of any University, and Harvard is no exception. We create it, analyze it, share it, and apply it. As you would imagine, we.
Chapter 1 - Introduction to Computers and the Internet
Cyber Security in Today’s World
Risk of the Internet At Home
Securing your Business Office
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Shopping experience! Avoiding online fraud Ian Ramsey C of E School
What is on your Business Network
Network Security for your Business
Cybersecurity Am I concerned?
Top Ten Cyber Security Hygiene Tips
Safe and secure? Protecting yourself, your equipment and your wallet in today’s digital universe.
Lesson 2- Protecting Yourself Online
6. Application Software Security
Cybercrime By: Kimberly Foreiter
Principles of Information Technology
Presentation transcript:

Securing your Business Office How to secure your business with today’s Internet risks June 20, 2017 David Mandala

Who is David Mandala? I’ve worked in the Electronics and Computer Industries for 40+ years. I’ve been with 7 startups, the principal of 3 of them. Spent the last 10 years developing embedded computer operating systems or improving them. Ubuntu Linux for ARM System on Chip (SoC). Improving Linux for the ARM SoC’s with Linaro. Standardization of the 96Boards platform so that binaries run on any board without recompilation of source code. Started Secured by THEM LLC to specifically help small businesses secure their business computers and networks. Copyright Secured by THEM 2017 Slide

I’ve come to talk to you about office network security Today the Internet is pervasive, nearly every business has an Internet connection. Weekly you see in the news new computer ransomware or leeching attacks (data loss). Target Chipotle & Pizzeria Locale The Buckle Inc. 450 stores hit between Oct. 28, 2016 and April 14, 2017 InterContinental Hotel Chain 1,175 properties on the list: Holiday Inn Express (781), Holiday Inn (176), Candlewood Suites (120), Staybridge Suites (54), Crowne Plaza (30), Hotel Indigo (11), Holiday Inn Resort (3) Other hotel chains: Kimpton Hotels, Trump Hotels (2x), Hilton, Mandarin Oriental, and White Lodging (2x). Card breaches also have hit hospitality chains Starwood Hotels and Hyatt. Laptops are more prevalent, a lot of small business owners are both working from home and from a small office.

I’ve come to talk to you about office network security Today the Internet is pervasive, nearly every business has an Internet connection. Smart low cost Devices are widely available, they are connected to the Internet. They are called Internet of Things or IoT for short. 6.4 Billion were connected to the Internet at the end of 2016, 20.8 Billion expected by 2020. These devices can easily end up in your office providing points behind your firewall to attack your business computers and network from. If you use a home office, it is likely to be even riskier. More IoT devices, more friends connecting unknown devices to your network.

What kinds of IoT can I buy today? There are more more than 43 classes of IoT devices sold on Amazon alone: Smart Lightbulbs Smart Locks Smart Wall Plugs Smart Light Switches Smart Wall Touchscreen Smart Thermostat Smart Garage Door Opener Smart Blinds Smart Curtains Amazon Alexa Amazon Dot Smart Keyrings Smart Egg Minder Smart Blu-Ray Player Smart TV Smart Outdoor Switch/Plug Smart Trackers (keys, luggage, etc) Smart Speakers Smart Cameras (security) Smart Alarm Systems Smart Pet Feeder Smart Smoke Detector Smart Carbon Monoxide Detector Smart Air Quality Detector Smart Landscape Lighting Smart Home Controller Smart Doorbell Smart Pet Treat Feeder / Camera Smart Weather Station Smart Plant Watering Device Smart Garden Sensors Smart Picture Frames AeroGarden with WiFi Smart Plant Pots Smart Sprinkler Controller Smart Crock Pot Streaming Media Player Smart Coffee/Tea Pot WiFi Video Projector Smart Robot Vacuum Smart Range Smart Microwave Smart Dishwasher

What kinds of IoT might migrate to the office? There are more more than 43 classes of IoT devices sold on Amazon alone: Smart Lightbulbs Smart Door Locks Smart Wall Plugs Smart Light Switches Smart Wall Touchscreen Smart Thermostat Smart Garage Door Opener Smart Blinds Smart Curtains Amazon Alexa Amazon Dot Smart Keyrings Smart Egg Minder Smart Blu-Ray Player Smart TV Smart Outdoor Switch/Plug Smart Trackers (keys, luggage, etc) Smart Speakers Smart Cameras (security) Smart Alarm Systems Smart Pet Feeder Smart Smoke Detector Smart Carbon Monoxide Detector Smart Air Quality Detector Smart Landscape Lighting Smart Home Controller Smart Doorbell Smart Pet Treat Feeder / Camera Smart Weather Station Smart Plant Watering Device Smart Garden Sensors Smart Picture Frames AeroGarden with WiFi Smart Plant Pots Smart Sprinkler Controller Smart Crock Pot Streaming Media Player Smart Coffee/Tea Pot WiFi Video Projector Smart Robot Vacuum Smart Range Smart Microwave Smart Dishwasher

So there are a “lot” of IoT things, who cares? According to: James Lyne, global head of security research at Sopho: "IoT devices are coming in with security flaws which were out-of-date ten years ago you wouldn't dream of seeing on a modern PC" "Maybe that wireless kettle isn't an interesting target, but if it helps you see across to the PC where all the goodies are, that matters" Cybersecurity expert Bruce Schneier: "Given how experts have repeatedly warned IoT devices do pose a potentially huge security risk, why isn't more care being taken by those producing and selling them? That's largely because the IoT is so new that standards don't exist and vendors are reluctant to spend money on security for products that might not take off anyway." In short, since no one else cares, you should care for your own security.

OK, some IoT devices are not secure, so what? Just because IoT devices are small does not mean the computers in them are small. Many devices are very powerful computers. They can be used to stage attacks on your network and PC’s on your network. They can monitor (sniff) traffic on your network. Worse, they can be used to crack your PC’s and installing ransomware to force you to pay up to gain access to your data. Worse than that, they can be used to crack your PC’s and steal your personal info including your banking info, and direct your bank to send money to them, and it looks like you ordered the money to be sent. It’s really hard to prove you did not send the transaction since it is coming directly from your own computer. Finally imagine if all of your customer data was stolen and you had to tell all of your customers that their data had been stolen from your care! Would you still be in business?

What easy steps can I take to secure my network Make sure your PC bios/firmware is up to date. Check the vendor website. Do the same with printers, switches, and your firewall. Make sure your anti-virus and anti-malware software is completely up to date and the latest version. Never turn it off… Windows machines can be cracked in seconds……. But I have to turn it off to install new software. If there is absolutely no way to install the new software with your anti-virus and anti-malware software running, disconnect your network connection, then and only then disable your anti-virus and anti-malware software and install your new software. Then re-enable your anti-virus and anti-malware software. Then and only then reconnect your network connection.

What easy steps can I take to secure my network Put all of your “Smart” IoT WiFi devices on their own “guest” network. By doing that they don’t share your office network and they can’t reach anything in your office. Then criminals can’t use insecure IoT to steal from you. If you provide WiFi access for your customers when they visit your office, have a private “guest” network for them, separate from your primary network and separate your “IoT” network. Remember their computers could be compromised and have viruses or already be cracked by criminals. Make sure all of your guest networks have strong password protection. If you don’t need WiFi for your office network, don’t set it up, the safest network requires physical access, if the only way to access your network is via wire it’s more secure. Remember WiFi goes through walls and ceilings, someone could be in the parking lot or in a multistory building above or below you trying to access your network.

What easy steps can I take to secure my network If you use a laptop you can greatly add to your data security by: Encrypting the entire hard drive. Adding 2 factor authentication (2FA) Your office desktop security likewise can be improved by encrypting the entire hard drive and 2FA You can use 2FA with many social sites, if they offer it, use it. Some mobile phones offer 2FA making use of the fingerprint scanner some mobile phones have built in. Better than nothing but not a great idea, you leave copies of your fingerprints EVERYWHERE! They can be copied and used against you.

What easy steps can I take to secure my network Backup your data daily. This should be part of your daily process, do work, backup work. If you don’t you have no one to blame except yourself if you lose data in a ransomware attack. Finally most importantly use STRONG PASSWORDS on all of your computer systems. Use password manager software if you can’t remember long passwords, then protect the password manager software with a long passphrase, 60 - 120 characters long. LastPass 4.0 RoboForm 8 Everywhere And don’t write down passwords EVER.

If I do everything you suggested will I be secure? You’ll be more secure than if you don’t, but the truth is this only scratches the surface. There is no such thing as a completely secure device, only levels of security. Security is like an onion, the more layers you have the more secure you are. Criminals can still crack your firewall, or infiltrate via email attachment. Everyone’s network is different, I can’t address exact issues in a general talk. Feel free to reach out and talk with me. (info at them dot com) Adding layers can include: Security Audits Penetration testing 24x7 Network monitoring

Questions?

Reference Links Password Vault: https://www.lastpass.com https://www.roboform.com/ Whole disk encryption: https://www.veracrypt.fr/en/Home.html https://www.microsoft.com/en-us/store/d/windows-10-pro/df77x4d43rkt/48DN Comparsion of veracrypt and bitlocker: http://lifehacker.com/windows-encryption-showdown-veracrypt-vs-bitlocker-1777855025 Secured by THEM https://www.them.com/ or info@them.com or (469) 298-8436

Thank you for your time. Who’s on your Network? June 20, 2017 David Mandala Who’s on your Network?