Download presentation
Presentation is loading. Please wait.
Published byReynard Walton Modified over 6 years ago
1
A Service Disabled Veteran Owned Small Business Company
State of Cyber Security (a serious security consideration for Everyone on the Internet) by Dane A. Deutsch CEO/DCS Netlink A Service Disabled Veteran Owned Small Business Company © 2016 All Rights Reserved – DCS Netlink
2
How to Stay Secure in a Dangerous Internet Connected World
Norse Attack Map © 2016 All Rights Reserved – DCS Netlink
3
How to Stay Secure in a Dangerous Internet Connected World
DYN DDOS Attack Oct 21, 2016 © 2016 All Rights Reserved – DCS Netlink
4
How to Stay Secure in a Dangerous Internet Connected World
Today’s Briefing: Introduction - Dane & Bobby Blackhat Mission Today - ID the enemy & Learn Protection Objective-Learn about the Human Factor (Top 3) Cyber Landscape - Dangerous + Houdini Concept © 2016 All Rights Reserved – DCS Netlink
5
How to Stay Secure in a Dangerous Internet Connected World
Today’s Briefing (Continued): 3 Real World Examples of the Human Factor 5 Keys to Strengthen the Human Factor Top 3 Keys to better security on the Internet © 2016 All Rights Reserved – DCS Netlink
6
© 2016 All Rights Reserved – DCS Netlink
My Background Introduction to Bobby Blackhat Dane is a US Air Force Retired Officer Last USAF Active Duty Assignment IT Chief of Maintenance for the country of Turkey All wireless in 1980's; first server; and more Technology in Turkey was more modern than US Today! © 2016 All Rights Reserved – DCS Netlink
7
© 2016 All Rights Reserved – DCS Netlink
My Background Last 25 years building our IT business DCS Netlink - focused on leading IT with security DCS=Dynamic Cloud Solutions FBI Secured Infragard Members © 2016 All Rights Reserved – DCS Netlink
8
© 2016 All Rights Reserved – DCS Netlink
SECRET CLASSIFIED SECRET © 2016 All Rights Reserved – DCS Netlink
9
MISSION Identify the enemy on the Internet &
how to protect against those threats © 2016 All Rights Reserved – DCS Netlink
10
Objective Learn top 3 HUMAN FACTOR threats on Internet &
how to protect against those threats © 2016 All Rights Reserved – DCS Netlink
11
© 2016 All Rights Reserved – DCS Netlink
Cyber Landscape Today Dangerous! What if I told you...? First time in history that the US Government & military can't protect us as citizens 4 Star Generals still can't stand up a Cyber Command Past NSA person says, "Chinese are in every one of our systems....it is only a matter of time." Media has reported government and business being hacked at one time or another (i.e.- US Army, US Senate) Cyber threats are increasing in quantity and severity © 2016 All Rights Reserved – DCS Netlink
12
© 2016 All Rights Reserved – DCS Netlink
Cyber Landscape Today Houdini Concept - If built by mankind, then it can be broken into by mankind. “Business is Combat….eBusiness is .COMbat” HUMAN FACTOR is the Weakest Link! © 2016 All Rights Reserved – DCS Netlink
13
FBI Director - Robert Mueller Story of The Human Factor
© 2016 All Rights Reserved – DCS Netlink
14
Ubiquity Hacked-$47 Mil Hackers siphon $47 million out of tech company's accounts A tech company has made an unusual admission to its investors: A hacker posed as one of its employees online and stole $46.7 million from the company's accounts.
15
Cate Machine & Welding Small Wisconsin Manufacturing Company taken over by Chinese! And like many small businesses, they have a dusty old computer humming away in the back office. On this one, however, an unusual spy-versus-spy battle is playing out: The machine has been taken over by Chinese hackers. The hackers use it to plan and stage attacks.
16
Top 3 HUMAN FACTOR threats (on Internet & how to protect
against those threats) Your Beliefs: that you are not hackable or have nothing anyone would want! Passwords: Lastpass & 2 Factor Authentication (i.e.- MFA or 2FA) Social Engineering: Scareware/Phishing/Vishing/Smishing (SMS Phishing) © 2016 All Rights Reserved – DCS Netlink
17
5 Keys to strengthen Human Factor
1. Beliefs Firewalls & Antivirus are good enough! NOT! 77% Of Ransomware Attacks Bypass Filtering 95% of the attacks bypassed the victims’ firewall(s) and 52% bypassed anti-malware solutions. 90% decided to beef up security awareness training... © 2016 All Rights Reserved – DCS Netlink
18
5 Keys to strengthen Human Factor
1. Beliefs - Continued We Trust and then Verify - but the rest of the world says: “Verify First and Trust after that, but each & every time” “My IT takes care of that, I am NOT techy” - CEO/COO/CFO said! “I have nothing on my computer anyone wants.” Ostrich Complex - “Nothing to worry about. It is like Life Insurance...If it hasn’t happened yet, it most likely won’t happen at all.” © 2016 All Rights Reserved – DCS Netlink
19
5 Keys to strengthen Human Factor
2. Passwords Lastpass.com - Free & automated strong passwords 2 Factor 2 of 3 Factors to be secure Turn it on everywhere (i.e.- FB,Twitter,Amazon,Banks) © 2016 All Rights Reserved – DCS Netlink
20
5 Keys to strengthen Human Factor
3. Social Engineering - KnowBe4 you click Phishing/Vishing/SmShing - links & attachments in s/calls/Text Msgs Mouse over the address Delete if not expected-(i.e.-Microsoft pop-ups, wrong time) © 2016 All Rights Reserved – DCS Netlink
21
Social Engineering Example
Famous Phishing John Podesta (Hillary Clinton Campaign Manager) IT people can be the greatest Threat! (Note: if you are only 1 person deep in IT - then it is possible you may be one person deep in - - IT! © 2016 All Rights Reserved – DCS Netlink
22
Ransomware = Greatest Threat
Ransomware - Phishing is primary attack vector! 90% of all phishing s deliver Ransomware now! Make sure you are doing image backups and the backups are stored in a secondary facility! Can you actually “spin up” that image in the Cloud? © 2016 All Rights Reserved – DCS Netlink
23
Hospitals = Major Target
Underground credit cards worth less than $.50 ea Health records are selling at $11 or more each © 2016 All Rights Reserved – DCS Netlink
24
US may give up the rights to control of the internet to the UN:
What happens IF? US may give up the rights to control of the internet to the UN: © 2016 All Rights Reserved – DCS Netlink
25
“US - You and I” WE are The Human Factor
MISSION Identify the enemy on the Internet & how to protect against those threats “US - You and I” WE are The Human Factor © 2016 All Rights Reserved – DCS Netlink
26
How to Stay Secure in a Dangerous Internet Connected World
Today’s Briefing: Introduction - Dane & Bobby Blackhat Mission Today - ID the enemy & Learn Protection Objective-Learn about the Human Factor (Top 3) Cyber Landscape - Dangerous + Houdini Concept 3 Real World Examples of the Human Factor 5 Keys to Strengthen the Human Factor Top 3 Keys to better security on the Internet © 2016 All Rights Reserved – DCS Netlink
27
© 2016 All Rights Reserved – DCS Netlink
SECRET CLASSIFIED SECRET © 2016 All Rights Reserved – DCS Netlink
28
A Service Disabled Veteran Owned Small Business Company
State of Cyber Security (a serious security consideration for Everyone on the Internet) by Dane A. Deutsch CEO/DCS Netlink A Service Disabled Veteran Owned Small Business Company © 2016 All Rights Reserved – DCS Netlink
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.