Securing Your
Cyberspace

Patricia Watson
National Cyber Security Awareness Month
10.2013
National
Cyber
Security
Awareness
Month

What we will cover…
• In cyberspace…ignorance is NOT
bliss!
• Welcome to the new ...
Ignorance is NOT bliss!
• Myth…
– I don’t have anything to
hide
– I don’t have anything of
value
– Hackers are not
interes...
The fact is…
• Cyber adversaries are
looking for the easy
targets!
• They are not necessarily
targeting YOU – they
mostly ...
Cyber Security Levels
Level 1
Flawed Integration

Level 2
Inconsistent
Practices

Level 3
Maturing & Refining

Risk = High...
Don’t be a gummy bear!
• Use a firewall – software/hardware.
• Password protect your WIFI, never use the
default credentia...
Welcome to the new era of
involuntary transparency!
• When you are connected to the internet,
the internet is connected to...
Social Media Etiquette…
Do you manage your
Internet footprint?
• Everything you post on the internet is
PUBLIC…there is NO privacy in cyberspace!
...
OMG R U #sharing TMI?
• Take the time to manage the privacy
settings for your accounts?

• Don’t advertise your travel pla...
Do you manage your
Internet footprint?
• Do you know your “friends”?
• Don’t feel obligated to “Like”,
“Friend” or “Follow...
Do you Know what your
kids are browsing?
• Use separate login accounts for
each user – apply concept of
least privilege.
•...
“…the upside of painful
knowledge is so much greater
than the downside of blissful
ignorance” (Sheryl Sandberg)
National
Cyber
Security
Awareness
Month

Questions?
Appendix: Resources
• Firewalls
• Social media tips
• Location Service GPS settings
• Separate user accounts
• For your vi...
Firewalls
Firewall - a technological barrier designed to
prevent unauthorized or unwanted communications
between computer ...
Social Media Tips
• Depending on the purpose of your social media
account, you don’t need to provide all your
personal inf...
Location Services
Location Services allows location-based apps and
websites (including Maps, Camera, Safari, and
other App...
User Accounts
Given that almost every action we take in
cyberspace is tracked, interconnected, or
transmitted, it is good ...
For your viewing enjoyment…
• Short Film – The Dawn of the Net:
http://www.youtube.com/watch?v=RhvKm0RdUY0&featu
re=youtu....
Geek humor :)
Securing your cyberspace_Watson
Upcoming SlideShare
Loading in...5
×

Securing your cyberspace_Watson

324

Published on

National Cyber Security Awareness Month

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
324
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
7
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Securing your cyberspace_Watson

  1. 1. Securing Your Cyberspace Patricia Watson National Cyber Security Awareness Month 10.2013
  2. 2. National Cyber Security Awareness Month What we will cover… • In cyberspace…ignorance is NOT bliss! • Welcome to the new era of “involuntary transparency” • Do you manage your internet footprint? • Do you know what your kids are browsing? • Appendix - Resources
  3. 3. Ignorance is NOT bliss! • Myth… – I don’t have anything to hide – I don’t have anything of value – Hackers are not interested in hacking my home PC
  4. 4. The fact is… • Cyber adversaries are looking for the easy targets! • They are not necessarily targeting YOU – they mostly want financial and PII (in masses) • And free WIFI, hardware and bandwidth (zombies)
  5. 5. Cyber Security Levels Level 1 Flawed Integration Level 2 Inconsistent Practices Level 3 Maturing & Refining Risk = High Default settings, dated systems, no firewall, weak passwords Level 4 Continuously Verified Risk = Low Use of firewall, some patching, strong passwords Firewalls strong passwords security patches & AV scans Firewalls, separate networks & accounts, automated security patches & AV scans, awareness!
  6. 6. Don’t be a gummy bear! • Use a firewall – software/hardware. • Password protect your WIFI, never use the default credentials. • Check the default security settings on your devices. • Automate security patches. • Automate signature updates for anti-virus software. • Plug & Scan: all USB devices, email attachments and downloadable files should be checked for viruses. • Be diligent – Stop.Think.Connect!
  7. 7. Welcome to the new era of involuntary transparency! • When you are connected to the internet, the internet is connected to YOU! • What is the internet saying about YOU? • Is your mobile device tracking your every move? • Is your browser broadcasting your interests? • Are your “friends” over-sharing your information?
  8. 8. Social Media Etiquette…
  9. 9. Do you manage your Internet footprint? • Everything you post on the internet is PUBLIC…there is NO privacy in cyberspace! • Once you hit the upload, share, tweet or send button, you have no control regarding the destiny of that “post“ • The Internet is not the place to broadcast your grievances about your friends or foes • Don’t post embarrassing information that would be awkward to explain to relatives, friends and current/future employers
  10. 10. OMG R U #sharing TMI? • Take the time to manage the privacy settings for your accounts? • Don’t advertise your travel plans on Facebook or other social media • Remove all metadata from files BEFORE sharing • Never use the same user name & password for all accounts
  11. 11. Do you manage your Internet footprint? • Do you know your “friends”? • Don’t feel obligated to “Like”, “Friend” or “Follow” profiles of people you don’t actually know! • What is the purpose of your social media account? – Work – Family & Friends – News & Trends
  12. 12. Do you Know what your kids are browsing? • Use separate login accounts for each user – apply concept of least privilege. • Manage internet access on all devices! • If your kids use social media, be sure to “friend” &/or “follow” them. • Take off your technology blinders - stay stay current with the latest cyber trends & threats…awareness is key!
  13. 13. “…the upside of painful knowledge is so much greater than the downside of blissful ignorance” (Sheryl Sandberg)
  14. 14. National Cyber Security Awareness Month Questions?
  15. 15. Appendix: Resources • Firewalls • Social media tips • Location Service GPS settings • Separate user accounts • For your viewing enjoyment…
  16. 16. Firewalls Firewall - a technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts. • Hardware Firewall – Apple AirPort Extreme: http://www.apple.com/airport-extreme/specs/ – Short Video – How to set up the new AirPort Extreme: http://sharepoint.bc.com/sites/Corp/ComputerSecurity/Whitepape rsandreferencematerial/Forms/AllItems.aspx – Anti Virus Software – Intego VirusBarrier (Windows friendly): http://www.intego.com/virusbarrier • Software Firewall (it’s free) – ZoneAlarm: http://www.zonealarm.com/security/en-us/zonealarmpc-security-free-firewall.htm – Configuring ZoneAlarm at home: http://hdc.tamu.edu/Security/Firewalls/Personal_Firewalls/Conf iguring_ZoneAlarm_Firewall__Free_Version_.php
  17. 17. Social Media Tips • Depending on the purpose of your social media account, you don’t need to provide all your personal information – tailor the account to your needs, including privacy settings. • Remove all metadata from pictures before sharing, especially if you are posting while traveling. • There’s an App for that! Yes, most social media providers have an App for mobile phones and tablets. Be sure to manage the privacy, notifications and location services settings to avoid oversharing. • Remember, posts on social media are intended to be a “short status” not a detailed diary, keep it short, sweet and to the point. • If you want to share links to other websites via your social media account, use a reputable URL shortening service such as Bitly. • Stop.Think.Post – Remember, once you hit the upload, share, tweet or send button, you have no control regarding the destiny of that “post“!
  18. 18. Location Services Location Services allows location-based apps and websites (including Maps, Camera, Safari, and other Apple and third-party apps) to use information from cellular, WIFI, Global Positioning System (GPS)2 networks, and iBeacons3 to determine your approximate location. While this tool serves a good purpose, unfortunately it has unintended consequences: • Adversaries can use it to track your every move • Companies use it to craft their marketing campaigns based on your whereabouts • Not to mention, big brother is always watching/tracking! Be sure to take the time to manage your security settings on your mobile device.
  19. 19. User Accounts Given that almost every action we take in cyberspace is tracked, interconnected, or transmitted, it is good practice to keep separate user and login accounts (based on purpose or ownership): • Create separate user accounts (user name & password) if you share devices that connect to the internet with other members of your household • Create separate login accounts (user name & password) for browsers (Mozilla, Chrome, IE) and applications (iTunes, Facebook, etc.) • Apply the principle of least privilege to all accounts and keep them separate from your Administrator account! • NEVER use the same password for multiple accounts & change your password often!
  20. 20. For your viewing enjoyment… • Short Film – The Dawn of the Net: http://www.youtube.com/watch?v=RhvKm0RdUY0&featu re=youtu.be • Video – 10 top time-saving tech tips by David Pogue: https://www.youtube.com/watch?v=QoT02vu9m4&feature=youtu.be • Video – History of computer viruses: http://www.youtube.com/watch?v=1g1yZVWrbtE#! • Video – Cracking Stuxnet, a 21st Century Cyber Weapon: http://www.ted.com/talks/ralph_langner_cracking_ stuxnet_a_21st_century_cyberweapon.html • Funny Video - #Hashtag with Jimmy Fallon & Justin Timberlake: https://www.youtube.com/watch?v=57dzaMaouXA
  21. 21. Geek humor :)
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×