Download presentation
Presentation is loading. Please wait.
Published byせとか こやぎ Modified over 6 years ago
1
UNIVERSITY Common Cyber Security Myths An Update on Cyber Security
2
it.troy.edu/security
3
Equifax suffered another breach (sarcasm)
During the minute… last 45 new viruses emerged 200 new malicious websites launched 180 identities stolen 5,000 new versions of malware created $2,000,000 lost Equifax suffered another breach (sarcasm) it.troy.edu/security
4
of Cybersecurity Issues
Principles of Effective Cybersecurity Prevalence • of Cybersecurity Issues 2016 – Almost 80,000 documented incidents and 2,100+ confirmed data breaches • Ten vulnerabilities accounted for 97% of all documented exploits • The remaining 3% consist of over 7,000,000 different vulnerabilities, some dating to 1999 • Average cost per stolen record: ~ $200.00 • Since 2005, 4,500+ data breaches have been announced • Average breach time is less than two minutes • 23% response to Phishing attempts it.troy.edu/security
5
Principles of Effective Cybersecurity
Cybersecurity Trends • Specificity of targets have increased since 2005 • Casting a wider net, with a directed approach • Users continue to be a major source of problems • 73% of successful attacks are attributed to user problems • 42% of successful attacks result from misconfigured systems • 31% of successful attacks result from end-user error • Poor security awareness and IT product management • 99.9% of the exploited vulnerabilities in 2016 had associated patches that were over 1 year old • Awareness campaigns are often poorly designed and lack “teeth” • 96% of mobile malware targets Android devices it.troy.edu/security
6
Attacks and Incidents it.troy.edu/security
7
Small doesn't mean overlooked We don't store anything significant
Principles of Effective Cybersecurity Myth #1 – It Won’t Happen to Me! • Common misconception Small doesn't mean overlooked We don't store anything significant All of my stuff is stored in "the cloud" My wife's cousin's son is really smart Small businesses suffer the majority of attacks - However, colleges remain a prime target it.troy.edu/security
8
They are already in… it.troy.edu/security
9
Cybersecurity Trends – Small Businesses, Colleges
Principles of Effective Cybersecurity Cybersecurity Trends – Small Businesses, Colleges it.troy.edu/security
10
Myth #2 – Hackers are geniuses from over there…
Principles of Effective Cybersecurity Myth #2 – Hackers are geniuses from over there… it.troy.edu/security
11
Myth #2 – Hackers are geniuses from over there…
Principles of Effective Cybersecurity Myth #2 – Hackers are geniuses from over there… it.troy.edu/security
12
Myth #3 – “But I bought that thingy…”
Principles of Effective Cybersecurity Myth #3 – “But I bought that thingy…” it.troy.edu/security
13
“Are you sure?” Principles of Effective Cybersecurity
it.troy.edu/security
14
Attacks and Incidents it.troy.edu/security
15
• Regulatory – FERPA, PCI, GLBA, HIPAA, EUGDPR,
Principles of Effective Cybersecurity What’s Hot? • Social Engineering – Phishing, Spear-Phishing • Wifi Hijacking • Side-Jacking • Ransomware • Poor patching practices • Close loop on poor HR processes – know who’s in, and who shouldn’t • Regulatory – FERPA, PCI, GLBA, HIPAA, EUGDPR, NIST 800 it.troy.edu/security
16
Five major areas of concern Principles of Effective Cybersecurity
it.troy.edu/security
17
Lateral Movement – exfiltration – watch the logs - CnC
Principles of Effective Cybersecurity How? • Patch Management – Secunia, SCCM, WSUS Whitelisting, Remove local admin Better A/V – Cylance, Carbon Black SIEM – Splunk, Alien Vault, Qradar, OpenSource Security Response Team External Audits Close the HR loop NAC with onboarding Encryption – MBAM Lateral Movement – exfiltration – watch the logs - CnC Recursive DNS – create blackhole routing paths Mandatory password expiration – REACT, NO! Complex Network Segmentation, no, Segregation – VPN internally Mandatory Security Training – Secure the Human – SANS Phishing – phish yourselves, Phish.Me, Metasploit it.troy.edu/security
18
In the media… Principles of Effective Cybersecurity
it.troy.edu/security
19
Are you training users on the dangers of phishing?
Principles of Effective Cybersecurity Ransomware 1. 2. 3. 4. Are you training users on the dangers of phishing? Do you back up your business data regularly? Do you have anti-phishing security? Have you deployed endpoint security with specific ransomware protection? 5. 6. Are your mobile devices secure? Do you have a patch management policy? it.troy.edu/security
20
From a malformed domain/sender Came a faux message (phishing)
Principles of Effective Cybersecurity Well … From an message From a web scrape From a malformed domain/sender Came a faux message (phishing) ~ 68% open rate, 16% visit URL it.troy.edu/security
21
In the media… Principles of Effective Cybersecurity
it.troy.edu/security
22
In the media… Principles of Effective Cybersecurity
it.troy.edu/security
23
Principles of Effective Cybersecurity
Quick tips it.troy.edu/security
24
Protecting Today's Kids Online - Security Awareness Video
�
25
W. Greg Price, PhD wgprice@troy.edu Cyber Security
C 0 it.troy.edu/security/ �troy.edu Q. Search C• Logout 9 System Notice Information Technology Security Cyber Security Troy University Cyber Security works with campus divisions to identify, deter and thwart attacks on campus IT resources and data. We endeavor to educate users about cyber threats, and ensure compliance with information security laws and policies. We invite you to review our resources and to offer feedback for improvement. Your participation in our efforts will foster greater success in protecting Troy's resources. W. Greg Price, PhD
26
Principles of Effective Cybersecurity
it.troy.edu/security
27
Principles of Effective Cybersecurity
it.troy.edu/security
28
Principles of Effective Cybersecurity
it.troy.edu/security
29
Principles of Effective Cybersecurity
it.troy.edu/security
30
Principles of Effective Cybersecurity
it.troy.edu/security
31
Principles of Effective Cybersecurity
it.troy.edu/security
32
Principles of Effective Cybersecurity
it.troy.edu/security
33
Principles of Effective Cybersecurityv
it.troy.edu/security
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.