Securing your cyberspace_Watson
Upcoming SlideShare
Loading in...5
×
 

Like this? Share it with your network

Share

Securing your cyberspace_Watson

on

  • 452 views

National Cyber Security Awareness Month

National Cyber Security Awareness Month

Statistics

Views

Total Views
452
Views on SlideShare
450
Embed Views
2

Actions

Likes
0
Downloads
4
Comments
0

2 Embeds 2

http://www.linkedin.com 1
https://www.linkedin.com 1

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Securing your cyberspace_Watson Presentation Transcript

  • 1. Securing Your Cyberspace Patricia Watson National Cyber Security Awareness Month 10.2013
  • 2. National Cyber Security Awareness Month What we will cover… • In cyberspace…ignorance is NOT bliss! • Welcome to the new era of “involuntary transparency” • Do you manage your internet footprint? • Do you know what your kids are browsing? • Appendix - Resources
  • 3. Ignorance is NOT bliss! • Myth… – I don’t have anything to hide – I don’t have anything of value – Hackers are not interested in hacking my home PC
  • 4. The fact is… • Cyber adversaries are looking for the easy targets! • They are not necessarily targeting YOU – they mostly want financial and PII (in masses) • And free WIFI, hardware and bandwidth (zombies)
  • 5. Cyber Security Levels Level 1 Flawed Integration Level 2 Inconsistent Practices Level 3 Maturing & Refining Risk = High Default settings, dated systems, no firewall, weak passwords Level 4 Continuously Verified Risk = Low Use of firewall, some patching, strong passwords Firewalls strong passwords security patches & AV scans Firewalls, separate networks & accounts, automated security patches & AV scans, awareness!
  • 6. Don’t be a gummy bear! • Use a firewall – software/hardware. • Password protect your WIFI, never use the default credentials. • Check the default security settings on your devices. • Automate security patches. • Automate signature updates for anti-virus software. • Plug & Scan: all USB devices, email attachments and downloadable files should be checked for viruses. • Be diligent – Stop.Think.Connect!
  • 7. Welcome to the new era of involuntary transparency! • When you are connected to the internet, the internet is connected to YOU! • What is the internet saying about YOU? • Is your mobile device tracking your every move? • Is your browser broadcasting your interests? • Are your “friends” over-sharing your information?
  • 8. Social Media Etiquette…
  • 9. Do you manage your Internet footprint? • Everything you post on the internet is PUBLIC…there is NO privacy in cyberspace! • Once you hit the upload, share, tweet or send button, you have no control regarding the destiny of that “post“ • The Internet is not the place to broadcast your grievances about your friends or foes • Don’t post embarrassing information that would be awkward to explain to relatives, friends and current/future employers
  • 10. OMG R U #sharing TMI? • Take the time to manage the privacy settings for your accounts? • Don’t advertise your travel plans on Facebook or other social media • Remove all metadata from files BEFORE sharing • Never use the same user name & password for all accounts
  • 11. Do you manage your Internet footprint? • Do you know your “friends”? • Don’t feel obligated to “Like”, “Friend” or “Follow” profiles of people you don’t actually know! • What is the purpose of your social media account? – Work – Family & Friends – News & Trends
  • 12. Do you Know what your kids are browsing? • Use separate login accounts for each user – apply concept of least privilege. • Manage internet access on all devices! • If your kids use social media, be sure to “friend” &/or “follow” them. • Take off your technology blinders - stay stay current with the latest cyber trends & threats…awareness is key!
  • 13. “…the upside of painful knowledge is so much greater than the downside of blissful ignorance” (Sheryl Sandberg)
  • 14. National Cyber Security Awareness Month Questions?
  • 15. Appendix: Resources • Firewalls • Social media tips • Location Service GPS settings • Separate user accounts • For your viewing enjoyment…
  • 16. Firewalls Firewall - a technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts. • Hardware Firewall – Apple AirPort Extreme: http://www.apple.com/airport-extreme/specs/ – Short Video – How to set up the new AirPort Extreme: http://sharepoint.bc.com/sites/Corp/ComputerSecurity/Whitepape rsandreferencematerial/Forms/AllItems.aspx – Anti Virus Software – Intego VirusBarrier (Windows friendly): http://www.intego.com/virusbarrier • Software Firewall (it’s free) – ZoneAlarm: http://www.zonealarm.com/security/en-us/zonealarmpc-security-free-firewall.htm – Configuring ZoneAlarm at home: http://hdc.tamu.edu/Security/Firewalls/Personal_Firewalls/Conf iguring_ZoneAlarm_Firewall__Free_Version_.php
  • 17. Social Media Tips • Depending on the purpose of your social media account, you don’t need to provide all your personal information – tailor the account to your needs, including privacy settings. • Remove all metadata from pictures before sharing, especially if you are posting while traveling. • There’s an App for that! Yes, most social media providers have an App for mobile phones and tablets. Be sure to manage the privacy, notifications and location services settings to avoid oversharing. • Remember, posts on social media are intended to be a “short status” not a detailed diary, keep it short, sweet and to the point. • If you want to share links to other websites via your social media account, use a reputable URL shortening service such as Bitly. • Stop.Think.Post – Remember, once you hit the upload, share, tweet or send button, you have no control regarding the destiny of that “post“!
  • 18. Location Services Location Services allows location-based apps and websites (including Maps, Camera, Safari, and other Apple and third-party apps) to use information from cellular, WIFI, Global Positioning System (GPS)2 networks, and iBeacons3 to determine your approximate location. While this tool serves a good purpose, unfortunately it has unintended consequences: • Adversaries can use it to track your every move • Companies use it to craft their marketing campaigns based on your whereabouts • Not to mention, big brother is always watching/tracking! Be sure to take the time to manage your security settings on your mobile device.
  • 19. User Accounts Given that almost every action we take in cyberspace is tracked, interconnected, or transmitted, it is good practice to keep separate user and login accounts (based on purpose or ownership): • Create separate user accounts (user name & password) if you share devices that connect to the internet with other members of your household • Create separate login accounts (user name & password) for browsers (Mozilla, Chrome, IE) and applications (iTunes, Facebook, etc.) • Apply the principle of least privilege to all accounts and keep them separate from your Administrator account! • NEVER use the same password for multiple accounts & change your password often!
  • 20. For your viewing enjoyment… • Short Film – The Dawn of the Net: http://www.youtube.com/watch?v=RhvKm0RdUY0&featu re=youtu.be • Video – 10 top time-saving tech tips by David Pogue: https://www.youtube.com/watch?v=QoT02vu9m4&feature=youtu.be • Video – History of computer viruses: http://www.youtube.com/watch?v=1g1yZVWrbtE#! • Video – Cracking Stuxnet, a 21st Century Cyber Weapon: http://www.ted.com/talks/ralph_langner_cracking_ stuxnet_a_21st_century_cyberweapon.html • Funny Video - #Hashtag with Jimmy Fallon & Justin Timberlake: https://www.youtube.com/watch?v=57dzaMaouXA
  • 21. Geek humor :)