Take Cyber Security “TO HEART”

Slides:



Advertisements
Similar presentations
Point3r$. Password Introduction Passwords are a key part of any security system : –Work or Personal Strong passwords make your personal and work.
Advertisements

UT Wing Civil Air Patrol. Objective Identify network and cyber vulnerabilities and mitigations Social Media/Metadata/Exfil data MITM Attacks Malware Social.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Internet Security In the 21st Century Presented by Daniel Mills.
Threats to I.T Internet security By Cameron Mundy.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
MASNET GroupXiuzhen ChengFeb 8, 2006 CSCI388 Project 1 Crack the WEP key Liran Ma Department of Computer Science The George Washington University
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Protecting Yourself Online (Information Assurance)
Your Trusted Partner In All Things IT. 20 Years of IT Experience University Automotive Food Service Banking Insurance Legal Medical Dental Software Development.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Staying Safe Online Keep your Information Secure.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
Computer Security By Joey Pawoll. Introduction to computer security Have you been wondering how to be safe online? Well look no further! This powerpoint.
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point.
Password Security Module 8. Objectives Explain Authentication and Authorization Provide familiarity with how passwords are used Identify the importance.
1 #UPAugusta Today’s Topics What are Deadly IT Sins? Know them. Fear them. Fix them. #UPAugusta201 6.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
Cyber Security: Today’s Threats and Mitigations Jonathan Homer, Cyber Security Analyst Idaho National Laboratory.
Phillip Schneider Information Services Librarian Gail Borden Public Library District Cybersecurity: Keeping Your Computers & Devices Safe.
Computer Security Keeping you and your computer safe in the digital world.
Protection of Data 31 Protection of Data 31. Protection of Data 31 Having looked at threats, we’ll now look at ways to protect data: Physical Barriers.
Ransomware BISD Technology Department. Ransomware Ransomware is a type of malicious software (malware) that infects a computer and/or mobile device and.
Protecting Against Cyber Attacks PLEASE TAKE A MINUTE TO LOOK AT THIS IMPORTANT MESSAGE. THIS IS HAPPENING HERE AND NOW! LET US SAVE YOU AND YOUR INFORMATION.
Cyber Security and Computer Safety
Internet Safety.
IT Security Awareness Day October 19, 2016
What they are and how to protect against them
Unit 4 IT Security.
Information Security.
Ways to protect yourself against hackers
Types of Cyber Crimes Phishing - is a scam to steal your online username and password. Phishing attacks work by tricking you into entering your username.
Lesson 3 Safe Computing.
Some Methods Phishing Database & Password Exploits Social Engineering & Networking Weak Controls Default Accounts & Passwords Dated Software & Patch.
Data Compromises: A Tax Practitioners “Nightmare”
Cyber Security By: Pratik Gandhi.
Business Risks of Insecure Networks
Teaching Computing to GCSE
Lesson 2- Protecting Yourself Online
Information Security Session November 11, 2004
Things To Avoid: 1-Never your password to anyone.
Cybersecurity Awareness
Information Technology Services Education and Awareness Team
Risk of the Internet At Home
Protecting Your Identity:
GSBS IT Resources and Security
Malware March 26, 2018.
Martus Account Set Up Benetech is a non-profit organization that develops and supports Martus, a secure information management software for human rights.
Cyber Security and Computer Safety
Information Security Awareness
HOW DO I KEEP MY COMPUTER SAFE?
King Saud University- College OF Applied Studies
Top Ten Cyber Security Hygiene Tips
Securing Windows 7 Lesson 10.
King Saud University- College OF Applied Studies
Cyber security and Computer Misuse
Computer Security By: Muhammed Anwar.
Information Technology Services Education and Awareness Team
Cybersecurity and Cyberhygiene
Lesson 2- Protecting Yourself Online
Company Name | Phone Number | Website | Address
Unit 1.6 Systems security Lesson 1
Privacy, Security, and Ethics
Bethesda Cybersecurity Club
Presentation transcript:

Take Cyber Security “TO HEART”

SCARY STUFF Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Armada Collective U.S. healthcare company based in Rhode Island threatening The DDoS attack did occur. A ransomware attack in March 2016 compromised a U.S.-based hospital using an outdated server vulnerability, according to a state government official with direct access to the information. located and encrypted more than 100,000 files. This attack denied hospital personnel access to sensitive files for two days… On February 5, 2016, malicious cyber actors encrypted access to patient medical records and other essential computer systems at a Los Angeles, California hospital. Hospital administrators paid the cyber actors a ransom of $17,000 to regain access to their computer systems.

IoT

Let’s Talk About Cyber Security Virus Protection – Practice good cyber hygiene – Flu shots? Mumps? Measles? Malware Ransomware – Los Angeles paid $28,000 – December 30, 2016 Phishing emails Zero day - Not a know vulnerability but seems to match one-”profiling” Weak Passwords Denial Of Service Attack Unencrypted traffic – Packet Sniffing End Of Life and Unpatched Systems – ie: Windows XP – Windows Server 2003

Virus Protection

Malware Protection

Let’s Talk About Phishing To: John Q. Public From: Macy’s Award Center Subject: YOU’VE WON A $50 Gift Card ! Click the logo below to claim your prize

Let’s Talk About Phishing

Spear Phishing

Catphishing Fraudster fabricates an online identity to trick someone-financial gain

Web Browsing BE VERY CAREFUL WHERE YOU GO BE CAREFULL WHERE YOUR FAMILY GOES BE CAREFULL OF SOFTWARE DOWNLOADS BUSINESS? LOSS OF PRODUCTIVITY, LIMIT SITES, HAVE A POLICY

REALLY ??? Strong Passwords !!! Most Common Passwords? 123456 123456789 Qwerty password REALLY ???

Password vs. Passphrase Password Don’t use dictionary words Make it complex Combination of upper AND lower case letters Include numeric Include special characters ()!@#$%^&,*

Password Examples Time it takes to crack a password joekoval - 1 minute JoeKoval - 5 Hours Capitalize certain letters J0eK0val - 21 Hours Add complexity by using numbers. In this example I substituted zeros for the letter O (as in Ocean) J0eK0val.. - 609 YEARS Just by adding the two periods at the end.

Passphrase Much stronger than passwords Easier to remember than a cryptic password Much more difficult to crack EXAMPLES Ilovearainyday – 730years IL0veaR@inyDay – 140449117 years .IL0veaR@inyDay. - 420805123888006 years

What Can You Do? Keep your devices up to date with patches/updates

What Can You Do? Windows / IOS Updates Anti-Virus – Get your inoculations Adobe Product Updates Malwarebytes – FREE download STRONG PASSWORDS/PASSPHRASES Change Default Passwords on all devices ! Especially wireless devices Good Email Hygiene Good Browsing Habits

BACKUP BACKUP BACKUP Cloud

BACKUP BACKUP BACKUP USB THUMB DRIVE Network Area Storage STORE YOUR BACKUPS OFF SITE FULL BACKUP INCREMENTAL BACKUP

LIVE HACKING DEMO

JOSEPH KOVAL 845-608-2505 JOE@SYBER3.COM WWW.SYBER3.COM