SlideShare a Scribd company logo
1 of 21
Download to read offline
Cyber Hygiene
Stay Clean at work and at Home!
About the Author- Mike Ahern
Director, Corporate and Professional Education
Worcester Polytechnic Institute
Leads the development of WPI’s Corporate and Professional Graduate
Education Programs in: Cybersecurity; Electrical and Computer
Engineering and Power Systems
Previous Experience:
– Vice-President, Northeast Utilities (responsibilities included: Distribution
Engineering; Training; Planning, Performance and Analysis)
– Member, Executive Compliance and Internal Controls Committee
– Member, Executive Steering Committee for Cyber Security
– Director, Transmission Operations and Planning
– Director, Distribution Engineering
– Director, Nuclear Oversight, Millstone Nuclear Power Station
B.S. from Worcester Polytechnic Institute
M.S. and M.B.A. from Rensselaer Polytechnic Institute
Professional Engineer - Connecticut
NERC Certified System Operator - Transmission (2005 to 2010)
Human Firewall Trained . . . Back at the turn of the century!
About WPI
 Non-profit, top quartile national
university (U.S. News and World
Report ranking)
 Founded in 1865 to teach both
“Theory and Practice”
 Strong Computer Science,
Engineering and Business Schools
 DHS/NSA Designated Center of
Excellence in Information Security
Research
WPI- Accreditations
Computer Science Engineering
Business Whole University
Cyber Hygiene
Outline:
• The Growing Menace
• Risk Reduction
• Attacker Motives and Methods
• Where Do We Start?
• Covering All the Bases
• Questions and Answers
The Growing Menace
We’ve been seeing news articles about the threat of hackers for quite a while
JPMorgan and other banks struck by
cyberattack
Nicole Perlroth
Wednesday, 27 Aug 2014 | New York Times
U.S. notified 3,000 companies in 2013
about cyberattacks
By Ellen Nakashima March 24, 2014
The Washington Post
DOD Needs Industry’s Help to Catch Cyber
Attacks, Commander Says
By Lisa Daniel March 27, 2012
American Forces Press Service, DoD News
The Growing Menace
Remember Target?
Missed Alarms and 40 Million Stolen Credit Card Numbers: How
Target Blew It
By Michael Riley, Ben Elgin, Dune Lawrence, and Carol Matlack BloombergBusinessweek 3/13/14
Target’s Story . . . Continued
Cyber attack takes toll on Target
By Elizabeth Paton in New York Financial Times 8/20/14
 Cyber attack cost Target $148M
 To win back sales, Target took another $234M charge for discounting
The new CEO was announced on 8/1/14
The new CEO lowered the annual earnings forecast by ~15%
What About Me?
OK, a company lost a lot of money . . .how does this affect me?
Thieves also want to steal your money!
How?
 Hacking Your Debit Account(s)
 Identity Theft
 Ransomware
What About Me?
Is this a big threat to me?
The FBI reports that in 2014:
 US Citizens reported losses of over $800,000,000 from over
123,000 cyber attacks
 The median loss was $530 but the average was $6,472
 The trend is to more frequent Ransomware attacks
 80% of the losses were to both men and women between
the ages of 20 and 60
Source: http://www.ic3.gov/media/annualreport/2014_IC3Report.pdf
Risk Reduction Through Cyber Hygiene
With cybersecurity attacks and threats growing . . .
What personal behaviors can reduce my risk?
Let’s start by understanding attackers motives and methods . . .
Attacker Motives
Source: http://www.slideshare.net/NortonSecuredUK/cybercrime-attack-of-the-cyber-spies
Attacker Methods
The Most Recent Verizon Data Breach Investigations Report* gives us some
insights into methods attackers use
Top “attack vectors”:
1. Behavioral – 80%+ of the attackers are
external people but insiders can cause
the extensive damage
2. Behavioral – Phishing in 2/3 of attacks,
used all by itself in 20% of attacks
3. Technical – 80% of attacks use malware;
almost always exploiting known
vulnerabilities
*http://www.verizonenterprise.com/DBIR/2015/
Attacker Methods
The FBI Reports growing use of:
 Click-jacking - Concealing hyperlinks beneath legitimate clickable content which,
when clicked, causes a user to unknowingly perform actions, such as downloading
malware, or sending personal information to a website. Numerous click-jacking
scams have employed “Like” and “Share” buttons on social networking websites.
Research other ways to use your browser options to maximize security.
 Doxing - Publicly releasing a person’s identifying information online without
authorization. Caution should be exercised by users when sharing or posting
information about themselves, family, and friends.
 Pharming - Redirecting users from legitimate websites to fraudulent ones for the
purpose of extracting confidential data. Type in an official website, instead of
“linking” to it from an unsolicited source.
Source: http://www.ic3.gov/media/annualreport/2014_IC3Report.pdf
Risk Reduction – Where to Start
Start with Behaviors!
Training for basic cyber defense
For you and your family - how to be “human firewalls”
 Don’t Store Sensitive Information On Your Computer
 Password Protect your Phones and Computers
 Never Share Passwords Outside Your Family
 Defeat Decoders - Use Strong Passwords, unrelated to public
information (your name, your pet’s name, your birthday)
 Defeat Phishers –
 Be Skeptical
 Hover Over Links To See Where They’re Taking You
 Don’t Click in Suspect Dialog Boxes – Quit The Application Instead
 Defeat Known Vulnerabilities – Have Everyone In Your Family Install
Software Updates As Soon As They’re Available
Cyber Defense Against Phishing
How do I stop phishing?
• Keep your spam filter switched on to reduce spam (which can contain viruses or be
used for phishing);
• Be suspicious of unsolicited advertising and offers;
• Be on the alert if you do not know the sender;
• A trusted website or online payment processor will never ask you to confirm sensitive
information like passwords or account details;
• Delete any suspected spam immediately and do NOT open any attachments.
A phishing email may appear to come from a trusted source. Some warning signs are if the e-mail:
• Is sent from a free webmail address, not from an organization’s official address;
• Opens with a generic greeting, and is not personalized with your name;
• Contains a threat, for example that your account is not secure or may be shut down;
• Requests personal information such as username, password or bank details;
• Includes a link to a website with a URL (web address) that is different from the
organization’s official address.
Source: http://www.interpol.int/Crime-areas/Cybercrime/Online-safety
Covering All The Bases
The US National Cybersecurity Workforce Framework*
* http://csrc.nist.gov/nice/framework/
The U.S. National Initiative for Cybersecurity Education (NICE) issued the
National Cybersecurity Workforce Framework (“the Framework”)
– Developed with more than 20 Federal departments and agencies and
numerous national organizations from within academia and general industry.
– The categories, serving as an overarching structure for the Framework, group
related specialty areas together.
– Within each specialty area, typical tasks and knowledge, skills, and abilities
(KSAs) are provided.
You can use the Framework to make sure your organization is
“covering all the bases”
US National Cybersecurity Workforce Framework
Covers All the Bases
Framework Category Specialty Areas Include:
Securely Provision
Systems Security Architecture
Software Assurance and Security Engineering
Secure Acquisition
Test and Evaluation
Systems Development
Operate and Maintain
System Administration
Systems Security Analysis
Network Services
Protect and Defend
Computer Network Defense Analysis
Incident Response
Vulnerability Assessment and Management
Investigate
Digital Forensics
Cyber Investigation
Collect and Operate
Federal Government Role
Collection Operations
Cyber Operations and Planning
Analyze
Federal Government Role
All Source Intelligence
Exploitation Analysis / Targets / Threat Analysis
Oversight and Development
Legal Advice and Advocacy
Strategic Planning and Policy Development
Training, Education and Awareness
Security Program Management
Knowledge Management
http://csrc.nist.gov/nice/framework/national_cybersecurity_workforce_framework_03_2013_version1_0_interactive.pdf
Draft Version 2.0: http://niccs.us-cert.gov/sites/default/files/documents/files/DraftNationalCybersecurityWorkforceFrameworkV2.xlsx
Risk Reduction At Work
Threat Actions Measures
Insider
Background Checks
Training – Everyone, IT, HR, Leadership
Remove Access Promptly
Regular
Exception Reports
External Hacker
Patches to Keep Software Updated
Anti-Virus for Known Malware
Limited Administrative Rights
Two-factor Authentication
Regular Time
Delay Reports and
Rights Reviews
Successful
Intrusion
Certified IT Professionals
Access Log Reviews
Intrusion Detection Software
Exfiltration Software
“White-listing” for Control Systems
Frequent (Daily?)
Results Reports
Successful
Attack
“Loss of IT” Business Continuity Exercises
Engage/Develop Forensic Capability
Exercise
Frequency and
Results
Cybersecurity Webinar Series
Thank you
Mike Ahern
Director, Corporate and Professional Education
508-831-6563
mfahern@wpi.edu
What do you think?
Your feedback is welcome!

More Related Content

What's hot

Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Radar Cyber Security
 
Cyber Security & Hygine
Cyber Security & HygineCyber Security & Hygine
Cyber Security & HygineAmit Arya
 
7 Cybersecurity Sins When Working From Home
7 Cybersecurity Sins When Working From Home7 Cybersecurity Sins When Working From Home
7 Cybersecurity Sins When Working From HomeDallasHaselhorst
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness TrainingDave Monahan
 
Cyber threats landscape and defense
Cyber threats landscape and defenseCyber threats landscape and defense
Cyber threats landscape and defensefantaghost
 
cyber security and impact on national security (3)
cyber security and impact on national security (3)cyber security and impact on national security (3)
cyber security and impact on national security (3)Tughral Yamin
 
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...Simplilearn
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber securityKeshab Nath
 
Vulnerability Assessment
Vulnerability AssessmentVulnerability Assessment
Vulnerability Assessmentprimeteacher32
 
Real World Application Threat Modelling By Example
Real World Application Threat Modelling By ExampleReal World Application Threat Modelling By Example
Real World Application Threat Modelling By ExampleNCC Group
 
Cyber Security Threats in the Financial Sector
Cyber Security Threats in the Financial SectorCyber Security Threats in the Financial Sector
Cyber Security Threats in the Financial SectorFarook Al-Jibouri
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Simon Salter
 
Introduction to penetration testing
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testingNezar Alazzabi
 
So you want to be a red teamer
So you want to be a red teamerSo you want to be a red teamer
So you want to be a red teamerJorge Orchilles
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
NETWORK PENETRATION TESTING
NETWORK PENETRATION TESTINGNETWORK PENETRATION TESTING
NETWORK PENETRATION TESTINGEr Vivek Rana
 
Web Application Security and Awareness
Web Application Security and AwarenessWeb Application Security and Awareness
Web Application Security and AwarenessAbdul Rahman Sherzad
 

What's hot (20)

Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
Cyber Security & Hygine
Cyber Security & HygineCyber Security & Hygine
Cyber Security & Hygine
 
7 Cybersecurity Sins When Working From Home
7 Cybersecurity Sins When Working From Home7 Cybersecurity Sins When Working From Home
7 Cybersecurity Sins When Working From Home
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
 
Cyber threats landscape and defense
Cyber threats landscape and defenseCyber threats landscape and defense
Cyber threats landscape and defense
 
cyber security and impact on national security (3)
cyber security and impact on national security (3)cyber security and impact on national security (3)
cyber security and impact on national security (3)
 
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
 
cyber security
cyber securitycyber security
cyber security
 
Vulnerability Assessment
Vulnerability AssessmentVulnerability Assessment
Vulnerability Assessment
 
Real World Application Threat Modelling By Example
Real World Application Threat Modelling By ExampleReal World Application Threat Modelling By Example
Real World Application Threat Modelling By Example
 
Cyber Security Threats in the Financial Sector
Cyber Security Threats in the Financial SectorCyber Security Threats in the Financial Sector
Cyber Security Threats in the Financial Sector
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
Introduction to penetration testing
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testing
 
So you want to be a red teamer
So you want to be a red teamerSo you want to be a red teamer
So you want to be a red teamer
 
cyber security
cyber security cyber security
cyber security
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
NETWORK PENETRATION TESTING
NETWORK PENETRATION TESTINGNETWORK PENETRATION TESTING
NETWORK PENETRATION TESTING
 
Web Application Security and Awareness
Web Application Security and AwarenessWeb Application Security and Awareness
Web Application Security and Awareness
 

Viewers also liked

Viewers also liked (6)

Tipología uso y consumo de las redes
Tipología uso y consumo de las redesTipología uso y consumo de las redes
Tipología uso y consumo de las redes
 
A Complete Guide to Cyber Hygiene
A Complete Guide to Cyber HygieneA Complete Guide to Cyber Hygiene
A Complete Guide to Cyber Hygiene
 
Good-cyber-hygiene-at-scale-and-speed
Good-cyber-hygiene-at-scale-and-speedGood-cyber-hygiene-at-scale-and-speed
Good-cyber-hygiene-at-scale-and-speed
 
Power Point 2007 Get Up To Speed
Power Point 2007  Get Up To SpeedPower Point 2007  Get Up To Speed
Power Point 2007 Get Up To Speed
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Ms excel 2007
Ms excel 2007Ms excel 2007
Ms excel 2007
 

Similar to Stay Clean with Cyber Hygiene

Webinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity RiskWebinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity RiskWPICPE
 
Cyber security.docx
Cyber security.docxCyber security.docx
Cyber security.docxsaivarun91
 
VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing Netpluz Asia Pte Ltd
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness trainingAbdalrhmanTHassan
 
Info Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsInfo Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsGDSCCVR
 
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptxCyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptxprtabal_25
 
Cybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awarenessCybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awarenessImran Khan
 
FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International Scott Mills
 
I’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextI’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextBrian Pichman
 
The Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice GuideThe Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice GuideInspiring Women
 
Cybersecurity - Webinar Session
Cybersecurity - Webinar SessionCybersecurity - Webinar Session
Cybersecurity - Webinar SessionKalilur Rahman
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanControlScan, Inc.
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationTriCorps Technologies
 
securityattackvectorsslidesharefinal-160405191759.pdf
securityattackvectorsslidesharefinal-160405191759.pdfsecurityattackvectorsslidesharefinal-160405191759.pdf
securityattackvectorsslidesharefinal-160405191759.pdfssuser6c59cb
 
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...AwodiranOlumide
 
What's Hot In IT - Cybersecurity
What's Hot In IT - CybersecurityWhat's Hot In IT - Cybersecurity
What's Hot In IT - CybersecurityRow Murray
 
Breakfast Briefings - February 2018
Breakfast Briefings - February 2018Breakfast Briefings - February 2018
Breakfast Briefings - February 2018PKF Francis Clark
 

Similar to Stay Clean with Cyber Hygiene (20)

Webinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity RiskWebinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity Risk
 
Cyber security.docx
Cyber security.docxCyber security.docx
Cyber security.docx
 
VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness training
 
Info Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsInfo Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study Jams
 
Amir bouker
Amir bouker Amir bouker
Amir bouker
 
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptxCyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
 
Cybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awarenessCybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awareness
 
FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International
 
I’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextI’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take Next
 
The Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice GuideThe Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice Guide
 
Cybersecurity - Webinar Session
Cybersecurity - Webinar SessionCybersecurity - Webinar Session
Cybersecurity - Webinar Session
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
securityattackvectorsslidesharefinal-160405191759.pdf
securityattackvectorsslidesharefinal-160405191759.pdfsecurityattackvectorsslidesharefinal-160405191759.pdf
securityattackvectorsslidesharefinal-160405191759.pdf
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
 
Social Engineering 2.0
Social Engineering 2.0Social Engineering 2.0
Social Engineering 2.0
 
What's Hot In IT - Cybersecurity
What's Hot In IT - CybersecurityWhat's Hot In IT - Cybersecurity
What's Hot In IT - Cybersecurity
 
Breakfast Briefings - February 2018
Breakfast Briefings - February 2018Breakfast Briefings - February 2018
Breakfast Briefings - February 2018
 

More from WPICPE

Reliability Engineering in Biomanufacturing - Presentation by Michael Andrews
Reliability Engineering in Biomanufacturing - Presentation by Michael AndrewsReliability Engineering in Biomanufacturing - Presentation by Michael Andrews
Reliability Engineering in Biomanufacturing - Presentation by Michael AndrewsWPICPE
 
Quality by Design - Presentation by Naveen Pathak
Quality by Design - Presentation by Naveen PathakQuality by Design - Presentation by Naveen Pathak
Quality by Design - Presentation by Naveen PathakWPICPE
 
BETC Advanced Industrial Biomanufacturing Symposium | April 2016
BETC Advanced Industrial Biomanufacturing Symposium | April 2016BETC Advanced Industrial Biomanufacturing Symposium | April 2016
BETC Advanced Industrial Biomanufacturing Symposium | April 2016WPICPE
 
WPI's Energy Symposium Photos
WPI's Energy Symposium PhotosWPI's Energy Symposium Photos
WPI's Energy Symposium PhotosWPICPE
 
Fire Protection Engineering: Specific Application Sprinklers
Fire Protection Engineering: Specific Application SprinklersFire Protection Engineering: Specific Application Sprinklers
Fire Protection Engineering: Specific Application SprinklersWPICPE
 
Fire Protection Engineering: Critical Decisions
Fire Protection Engineering: Critical DecisionsFire Protection Engineering: Critical Decisions
Fire Protection Engineering: Critical DecisionsWPICPE
 
Graduation Reception WPI CPE 2016 Photo Album
Graduation Reception WPI CPE 2016 Photo AlbumGraduation Reception WPI CPE 2016 Photo Album
Graduation Reception WPI CPE 2016 Photo AlbumWPICPE
 
Webinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on UtilitiesWebinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on UtilitiesWPICPE
 
Webinar - Distributed and Renewable Power Generation
Webinar - Distributed and Renewable Power GenerationWebinar - Distributed and Renewable Power Generation
Webinar - Distributed and Renewable Power GenerationWPICPE
 
An Overview of Biologics Manufacturing Processes and Things to Consider from ...
An Overview of Biologics Manufacturing Processes and Things to Consider from ...An Overview of Biologics Manufacturing Processes and Things to Consider from ...
An Overview of Biologics Manufacturing Processes and Things to Consider from ...WPICPE
 
High Level Recombinant Protein Production In Insect Cell Culture
High Level Recombinant Protein Production In Insect Cell CultureHigh Level Recombinant Protein Production In Insect Cell Culture
High Level Recombinant Protein Production In Insect Cell CultureWPICPE
 
Tracking Single-Use & Scale-Up Best Practices
Tracking Single-Use & Scale-Up Best PracticesTracking Single-Use & Scale-Up Best Practices
Tracking Single-Use & Scale-Up Best PracticesWPICPE
 
How to ruin a perfectly good webinar
How to ruin a perfectly good webinarHow to ruin a perfectly good webinar
How to ruin a perfectly good webinarWPICPE
 
What makes a webinar great
What makes a webinar greatWhat makes a webinar great
What makes a webinar greatWPICPE
 

More from WPICPE (14)

Reliability Engineering in Biomanufacturing - Presentation by Michael Andrews
Reliability Engineering in Biomanufacturing - Presentation by Michael AndrewsReliability Engineering in Biomanufacturing - Presentation by Michael Andrews
Reliability Engineering in Biomanufacturing - Presentation by Michael Andrews
 
Quality by Design - Presentation by Naveen Pathak
Quality by Design - Presentation by Naveen PathakQuality by Design - Presentation by Naveen Pathak
Quality by Design - Presentation by Naveen Pathak
 
BETC Advanced Industrial Biomanufacturing Symposium | April 2016
BETC Advanced Industrial Biomanufacturing Symposium | April 2016BETC Advanced Industrial Biomanufacturing Symposium | April 2016
BETC Advanced Industrial Biomanufacturing Symposium | April 2016
 
WPI's Energy Symposium Photos
WPI's Energy Symposium PhotosWPI's Energy Symposium Photos
WPI's Energy Symposium Photos
 
Fire Protection Engineering: Specific Application Sprinklers
Fire Protection Engineering: Specific Application SprinklersFire Protection Engineering: Specific Application Sprinklers
Fire Protection Engineering: Specific Application Sprinklers
 
Fire Protection Engineering: Critical Decisions
Fire Protection Engineering: Critical DecisionsFire Protection Engineering: Critical Decisions
Fire Protection Engineering: Critical Decisions
 
Graduation Reception WPI CPE 2016 Photo Album
Graduation Reception WPI CPE 2016 Photo AlbumGraduation Reception WPI CPE 2016 Photo Album
Graduation Reception WPI CPE 2016 Photo Album
 
Webinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on UtilitiesWebinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on Utilities
 
Webinar - Distributed and Renewable Power Generation
Webinar - Distributed and Renewable Power GenerationWebinar - Distributed and Renewable Power Generation
Webinar - Distributed and Renewable Power Generation
 
An Overview of Biologics Manufacturing Processes and Things to Consider from ...
An Overview of Biologics Manufacturing Processes and Things to Consider from ...An Overview of Biologics Manufacturing Processes and Things to Consider from ...
An Overview of Biologics Manufacturing Processes and Things to Consider from ...
 
High Level Recombinant Protein Production In Insect Cell Culture
High Level Recombinant Protein Production In Insect Cell CultureHigh Level Recombinant Protein Production In Insect Cell Culture
High Level Recombinant Protein Production In Insect Cell Culture
 
Tracking Single-Use & Scale-Up Best Practices
Tracking Single-Use & Scale-Up Best PracticesTracking Single-Use & Scale-Up Best Practices
Tracking Single-Use & Scale-Up Best Practices
 
How to ruin a perfectly good webinar
How to ruin a perfectly good webinarHow to ruin a perfectly good webinar
How to ruin a perfectly good webinar
 
What makes a webinar great
What makes a webinar greatWhat makes a webinar great
What makes a webinar great
 

Recently uploaded

JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sectoritnewsafrica
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...itnewsafrica
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessWSO2
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Nikki Chapple
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 

Recently uploaded (20)

JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with Platformless
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 

Stay Clean with Cyber Hygiene

  • 1. Cyber Hygiene Stay Clean at work and at Home!
  • 2. About the Author- Mike Ahern Director, Corporate and Professional Education Worcester Polytechnic Institute Leads the development of WPI’s Corporate and Professional Graduate Education Programs in: Cybersecurity; Electrical and Computer Engineering and Power Systems Previous Experience: – Vice-President, Northeast Utilities (responsibilities included: Distribution Engineering; Training; Planning, Performance and Analysis) – Member, Executive Compliance and Internal Controls Committee – Member, Executive Steering Committee for Cyber Security – Director, Transmission Operations and Planning – Director, Distribution Engineering – Director, Nuclear Oversight, Millstone Nuclear Power Station B.S. from Worcester Polytechnic Institute M.S. and M.B.A. from Rensselaer Polytechnic Institute Professional Engineer - Connecticut NERC Certified System Operator - Transmission (2005 to 2010) Human Firewall Trained . . . Back at the turn of the century!
  • 3. About WPI  Non-profit, top quartile national university (U.S. News and World Report ranking)  Founded in 1865 to teach both “Theory and Practice”  Strong Computer Science, Engineering and Business Schools  DHS/NSA Designated Center of Excellence in Information Security Research
  • 4. WPI- Accreditations Computer Science Engineering Business Whole University
  • 5. Cyber Hygiene Outline: • The Growing Menace • Risk Reduction • Attacker Motives and Methods • Where Do We Start? • Covering All the Bases • Questions and Answers
  • 6. The Growing Menace We’ve been seeing news articles about the threat of hackers for quite a while JPMorgan and other banks struck by cyberattack Nicole Perlroth Wednesday, 27 Aug 2014 | New York Times U.S. notified 3,000 companies in 2013 about cyberattacks By Ellen Nakashima March 24, 2014 The Washington Post DOD Needs Industry’s Help to Catch Cyber Attacks, Commander Says By Lisa Daniel March 27, 2012 American Forces Press Service, DoD News
  • 7. The Growing Menace Remember Target? Missed Alarms and 40 Million Stolen Credit Card Numbers: How Target Blew It By Michael Riley, Ben Elgin, Dune Lawrence, and Carol Matlack BloombergBusinessweek 3/13/14
  • 8. Target’s Story . . . Continued Cyber attack takes toll on Target By Elizabeth Paton in New York Financial Times 8/20/14  Cyber attack cost Target $148M  To win back sales, Target took another $234M charge for discounting The new CEO was announced on 8/1/14 The new CEO lowered the annual earnings forecast by ~15%
  • 9. What About Me? OK, a company lost a lot of money . . .how does this affect me? Thieves also want to steal your money! How?  Hacking Your Debit Account(s)  Identity Theft  Ransomware
  • 10. What About Me? Is this a big threat to me? The FBI reports that in 2014:  US Citizens reported losses of over $800,000,000 from over 123,000 cyber attacks  The median loss was $530 but the average was $6,472  The trend is to more frequent Ransomware attacks  80% of the losses were to both men and women between the ages of 20 and 60 Source: http://www.ic3.gov/media/annualreport/2014_IC3Report.pdf
  • 11. Risk Reduction Through Cyber Hygiene With cybersecurity attacks and threats growing . . . What personal behaviors can reduce my risk? Let’s start by understanding attackers motives and methods . . .
  • 13. Attacker Methods The Most Recent Verizon Data Breach Investigations Report* gives us some insights into methods attackers use Top “attack vectors”: 1. Behavioral – 80%+ of the attackers are external people but insiders can cause the extensive damage 2. Behavioral – Phishing in 2/3 of attacks, used all by itself in 20% of attacks 3. Technical – 80% of attacks use malware; almost always exploiting known vulnerabilities *http://www.verizonenterprise.com/DBIR/2015/
  • 14. Attacker Methods The FBI Reports growing use of:  Click-jacking - Concealing hyperlinks beneath legitimate clickable content which, when clicked, causes a user to unknowingly perform actions, such as downloading malware, or sending personal information to a website. Numerous click-jacking scams have employed “Like” and “Share” buttons on social networking websites. Research other ways to use your browser options to maximize security.  Doxing - Publicly releasing a person’s identifying information online without authorization. Caution should be exercised by users when sharing or posting information about themselves, family, and friends.  Pharming - Redirecting users from legitimate websites to fraudulent ones for the purpose of extracting confidential data. Type in an official website, instead of “linking” to it from an unsolicited source. Source: http://www.ic3.gov/media/annualreport/2014_IC3Report.pdf
  • 15. Risk Reduction – Where to Start Start with Behaviors! Training for basic cyber defense For you and your family - how to be “human firewalls”  Don’t Store Sensitive Information On Your Computer  Password Protect your Phones and Computers  Never Share Passwords Outside Your Family  Defeat Decoders - Use Strong Passwords, unrelated to public information (your name, your pet’s name, your birthday)  Defeat Phishers –  Be Skeptical  Hover Over Links To See Where They’re Taking You  Don’t Click in Suspect Dialog Boxes – Quit The Application Instead  Defeat Known Vulnerabilities – Have Everyone In Your Family Install Software Updates As Soon As They’re Available
  • 16. Cyber Defense Against Phishing How do I stop phishing? • Keep your spam filter switched on to reduce spam (which can contain viruses or be used for phishing); • Be suspicious of unsolicited advertising and offers; • Be on the alert if you do not know the sender; • A trusted website or online payment processor will never ask you to confirm sensitive information like passwords or account details; • Delete any suspected spam immediately and do NOT open any attachments. A phishing email may appear to come from a trusted source. Some warning signs are if the e-mail: • Is sent from a free webmail address, not from an organization’s official address; • Opens with a generic greeting, and is not personalized with your name; • Contains a threat, for example that your account is not secure or may be shut down; • Requests personal information such as username, password or bank details; • Includes a link to a website with a URL (web address) that is different from the organization’s official address. Source: http://www.interpol.int/Crime-areas/Cybercrime/Online-safety
  • 17. Covering All The Bases The US National Cybersecurity Workforce Framework* * http://csrc.nist.gov/nice/framework/ The U.S. National Initiative for Cybersecurity Education (NICE) issued the National Cybersecurity Workforce Framework (“the Framework”) – Developed with more than 20 Federal departments and agencies and numerous national organizations from within academia and general industry. – The categories, serving as an overarching structure for the Framework, group related specialty areas together. – Within each specialty area, typical tasks and knowledge, skills, and abilities (KSAs) are provided. You can use the Framework to make sure your organization is “covering all the bases”
  • 18. US National Cybersecurity Workforce Framework Covers All the Bases Framework Category Specialty Areas Include: Securely Provision Systems Security Architecture Software Assurance and Security Engineering Secure Acquisition Test and Evaluation Systems Development Operate and Maintain System Administration Systems Security Analysis Network Services Protect and Defend Computer Network Defense Analysis Incident Response Vulnerability Assessment and Management Investigate Digital Forensics Cyber Investigation Collect and Operate Federal Government Role Collection Operations Cyber Operations and Planning Analyze Federal Government Role All Source Intelligence Exploitation Analysis / Targets / Threat Analysis Oversight and Development Legal Advice and Advocacy Strategic Planning and Policy Development Training, Education and Awareness Security Program Management Knowledge Management http://csrc.nist.gov/nice/framework/national_cybersecurity_workforce_framework_03_2013_version1_0_interactive.pdf Draft Version 2.0: http://niccs.us-cert.gov/sites/default/files/documents/files/DraftNationalCybersecurityWorkforceFrameworkV2.xlsx
  • 19. Risk Reduction At Work Threat Actions Measures Insider Background Checks Training – Everyone, IT, HR, Leadership Remove Access Promptly Regular Exception Reports External Hacker Patches to Keep Software Updated Anti-Virus for Known Malware Limited Administrative Rights Two-factor Authentication Regular Time Delay Reports and Rights Reviews Successful Intrusion Certified IT Professionals Access Log Reviews Intrusion Detection Software Exfiltration Software “White-listing” for Control Systems Frequent (Daily?) Results Reports Successful Attack “Loss of IT” Business Continuity Exercises Engage/Develop Forensic Capability Exercise Frequency and Results
  • 21. Thank you Mike Ahern Director, Corporate and Professional Education 508-831-6563 mfahern@wpi.edu What do you think? Your feedback is welcome!