Download presentation
Presentation is loading. Please wait.
Published byEdgar Simon Modified over 8 years ago
1
Staying Secure in an Insecure World NATE HOWE CHIEF INFORMATION SECURITY OFFICER NATE.HOWE@UTDALLAS.EDU Education – Partnerships – Solutions
2
What is information security? Information has value; it is an asset. Securing information requires people, processes, technologies, and facilities properly designed and operating to resist threats. Risks can be managed, but never fully eliminated. Education – Partnerships – Solutions
3
Agenda Physical security Computer security Social networking security Mobile device security Discussion Education – Partnerships – Solutions
4
Physical security Education – Partnerships – Solutions
5
Yourself and your family Be aware of your surroundings, especially at night / unfamiliar neighborhoods / during holidays / ATMs Avoid traveling alone when possible Consider how your appearance, dress, and vehicle appear to attackers Identify threats, make eye contact, avoid conflict [but prepare for the worst] Avoid carrying unnecessary personal information on you Take photos/make copies of the cards in your wallet Education – Partnerships – Solutions
6
Your home and vehicle Don’t leave valuables in plain sight Consistently lock doors and close windows Alarm system with monitoring, use even when home Cameras as deterrent and evidence Exterior lighting Interior lighting, even when away Relationships with neighbors Education – Partnerships – Solutions
7
Information storage & destruction Get your mail before someone else does Shred mail rather than trash it Card statements, bills, and documented passwords should be locked up within the home Properly destroy or overwrite hard drives, memory cards, and electronic devices Decline writing SSN when possible Education – Partnerships – Solutions
8
Scenarios Mistake: Before you go on vacation, you leave a spare house key under the welcome mat for your neighbor to water your plants while you are gone. Recommendation: Give your key to a trusted friend or neighbor to hold on to. Burglars know where to look for spare keys. Mistake: You are cleaning out the garage and drop off an obsolete computer at the local electronics recycling center. Recommendation: Your valuable data is stored on the hard drive within the computer. Remove the hard drive and retain it, or ensure that is destroyed properly or overwritten by a professional. Education – Partnerships – Solutions
9
Computer security Education – Partnerships – Solutions
10
Trustworthy computing Passwords ◦ Longer is stronger – consider a “passphrase” ◦ Different passwords for different services ◦ Keep passwords written down somewhere under your control ◦ Be careful when answering security questions – sometimes the answers can be researched using social media and online databases Software Updates ◦ Operating system, 3 rd party software, and anti-malware software ◦ Enable automatic update options on your devices ◦ Beware malicious look-alike anti-malware software Backup Everything ◦ Online services such as CrashPlan, Carbonite, and iCloud ◦ External hard drives Education – Partnerships – Solutions
11
Online scams Stick with reputable sellers; when using lesser-known websites look for familiar payment systems like PayPal and Amazon Regularly review your credit card statements for unusual charges Monitor your credit reports periodically (Equifax, Experian, and Trans Union) IRS scams are on the rise – file before someone does for you Be wary of e-mails and website banners offering “free” gifts, prizes, vacations Education – Partnerships – Solutions
12
Online scams Avoid suspicious websites and links or attachments in unsolicited emails Take note of the website address – is it constructed properly? Fake charities after a well-publicized disaster Job scams ◦ Job offers without an interview or without applying ◦ Pay a fee in advance ◦ Job describing huge rewards for little effort Craigslist scams ◦ Deal locally and face-to-face ◦ Avoid shipping or wiring money ◦ Rental properties that you can only drive by and view from the outside; refuse background / credit checks / deposits until you’ve met a landlord in person Education – Partnerships – Solutions
13
Scenarios Mistake: Your computer becomes infected with “ransomware” which locks your files and instructs you to enter your credit card data to pay a fee and restore access. Recommendation: Don’t provide your credit card and don’t make deals with attackers. If you have proper backups of your valuable information, seek the assistance of a professional to format your computer and restore from backups. Take steps to ensure you do not get infected again, such as regular software updates and caution when using email and the web. Mistake: You receive an e-mail from a credit report monitoring service offering you a free trial and access to your credit report. Recommendation: Beware unsolicited emails, especially when they require you to provide valuable personal information. Interact directly with the three credit bureaus or reputable service providers where you initiate the relationship. Education – Partnerships – Solutions
14
Social networking security Education – Partnerships – Solutions
15
Safe social networking Avoid establishing relationships online with people you have not met in person Adjust the available privacy settings within each website Consider the privacy and permanence of what you post, including pictures and location data Educate younger users about the risks of their “online lifestyles” Education – Partnerships – Solutions
16
Scenarios Mistake: Your daughter starts her first day of school and you decide to share a photo of her on Facebook. A location tag will be stored with the photo which displays exactly where the photo was taken. Recommendation: Disable location tagging to reduce the information shared with attackers. If you intend to share the picture with only a few friends and family, email may be a more private method. Mistake: Excited about your upcoming vacation, you post online that you are about to depart for Hawaii. Recommendation: Avoid sharing information about your travel and current location. Burglars can plan their attacks based on your social media and email “out of office” messages. Education – Partnerships – Solutions
17
Mobile device security Education – Partnerships – Solutions
18
Mobile device security Set a strong passcode to unlock the screen Do not leave the device unattended Run current versions of software Only install apps from trusted sources Enable security settings, e.g. remote wipe and locate device Ensure data is backed up Avoid unsolicited calls, texts, and emails Education – Partnerships – Solutions
19
Scenarios Mistake: An automated recording on your phone that says your auto warranty will expire. The message instructs you to call a phone number to update personal information. Recommendation: Don’t discuss personal information requested from an unsolicited call. Realize that Caller ID can be impersonated. Attackers use common elements that apply to many people in the population such as auto warranty, IRS, and Bank of America in order to maximize response rate. Mistake: You receive an unsolicited text message claiming to be from your bank, telling you to call a number presented in the text message to resolve an issue with your account. Recommendation: Avoid responding to unsolicited text messages and only contact a service provider using a phone number you know to be valid. Education – Partnerships – Solutions
20
Thank you! Let’s discuss… Education – Partnerships – Solutions NATE HOWE CHIEF INFORMATION SECURITY OFFICER NATE.HOWE@UTDALLAS.EDU
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.