Keeping 'Em Safe: Ways to Protect Your Clients Online

  • 281 views
Uploaded on

A presentation for the 2011 Virginia Annual Statewide Legal Aid Conference. …

A presentation for the 2011 Virginia Annual Statewide Legal Aid Conference.

You need to protect yourself and your clients' data online. We'll look at using social network sites, downloading viruses, leaving metadata in documents, having bad password practices, putting information in the cloud.

More in: Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
No Downloads

Views

Total Views
281
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
4
Comments
0
Likes
1

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Keeping em Safe:8 More Waysto Help YourClients
  • 2. More than 8 in 10 US small businesses believe their firms are safe from cyber threats yetalmost 80% have no formal security policies in place.You can be attacked and not even know it. Even worse, your system could be used to attack other people, and you may not know it.
  • 3. What Is Cyber Crime?● Spam● Fraud● Obscene or offensive content● Harassment● Child pornography● Drug trafficking● Cyber terrorism● Cyber warfare
  • 4. Who Is Behind Cyber Crime?● Script kiddies● Hacktivists● Individual miscreants● National & transnational organized criminal enterprises● Nation states
  • 5. Why Should You Care?● Your clients trust you with very sensitive data.● If they become victims, your clients have less of an ability to bounce back.● Systems that are used to commit crimes often support the same organized networks that are behind human trafficking, identity theft, child pornography, and other issues you battle against daily.
  • 6. Biggest Threat? You
  • 7. What? No Way!● Acting maliciously● Forgetting to log off● Losing laptops, USB keys, or smartphones● Storing client data in questionable places● Downloading viruses and malware● Using social network sites carelessly● Leaving metadata in documents● Having bad password practices● Getting tricked
  • 8. Acting maliciously
  • 9. What You Can Do● Put policies in place and enforce them● Trust your gut
  • 10. Forgetting to log off
  • 11. What You Can Do● Log off when you leave your computer● Shut down your computer at the end of the day● Set up your computer to automatically lock when the screensaver comes on
  • 12. Losing laptops,USB keys, orsmartphones
  • 13. What You Can Do● Pay special attention and be careful● Store only the client data you absolutely need● Encrypt your data● Set up phones so you can erase them remotely● Use strong passwords● Back up the data before you leave
  • 14. Storing client data inquestionable places
  • 15. What You Can Do● Read privacy policies● Develop a set of approved sites that client information can be stored on and train staff to not store data on any other sites● Dont include identifiable client information in emails
  • 16. Downloadingviruses andmalware
  • 17. What You Can Do● Patch software and systems religiously● Read before you click● Ask if the email or attachment seems “funny”● Avoid downloading screensavers, fonts, & porn● Use your anti-virus software● Ignore any website that pops up a virus warning
  • 18. Using socialnetworksitescarelessly
  • 19. What You Can Do● Be careful what you click● Dont friend people you dont know● Use strong passwords● Avoid playing games and installing applications● Be very careful about what you post
  • 20. Leavingmetadata in documents
  • 21. What You Can Do● Clean metadata from documents before sending electronic copies● Use the Document Inspector tool in Office● Download and use Metadata Removal tool for WordPerfect
  • 22. Having badpasswordpractices
  • 23. What You Can Do● Use strong passwords● Change passwords quarterly● Dont use a password for more than one site● Dont share passwords● Establish password guidelines for the organization and follow them● Try a password manager
  • 24. Getting tricked
  • 25. What You Can Do● Be skeptical● Dont give anyone your passwords● Dont click a link to your bank website
  • 26. What If?● Tell your supervisor immediately● Be prepared to help figure out what happened● Notify the proper authorities
  • 27. Who Are the Proper Authorities?Computer Intrusion Local FBI Office US Secret Service Internet Crime Complaint CenterPassword trafficking Local FBI Office US Secret Service Internet Crime Complaint CenterCounterfeiting of currency US Secret Service
  • 28. Who Are the Proper Authorities?Child pornography or Local FBI Officeexploitation US Customs and Enforcement (if imported) Internet Crime Complaint CenterInternet fraud & SPAM Local FBI Office US Secret Service (Financial Crimes Division) Federal Trade Commission Securities & Exchange Commission (if securities/investment-related) Internet Crime Complaint CenterInternet harassment Local FBI Office
  • 29. Resources● Cybercrime Reporting http://www.cybercrime.gov/reporting.htm● Stay Safe Online http://www.staysafeonline.org/● US CERT http://www.us-cert.gov/nav/nt01/
  • 30. Resources● US CERT http://www.us-cert.gov/cas/tips/● OnGuard Online http://www.onguardonline.gov/topics/computer-security.aspx
  • 31. Picture AttributionsIn orderhttp://www.flickr.com/photos/jesseshapins/3788641411/http://commons.wikimedia.org/wiki/File:Harry_Potter_Lightning.gifhttp://commons.wikimedia.org/wiki/File:Computer_n_screen.svghttp://www.flickr.com/photos/dunechaser/385847284/sizes/l/http://www.flickr.com/photos/sravi_in/3623242288/sizes/z/http://www.flickr.com/photos/stukjefotogebeuren/2081170312/http://www.flickr.com/photos/librarianbyday/3983719036/http://www.flickr.com/photos/booleansplit/4650422195/http://www.flickr.com/photos/the-icing-on-the-cake/2424326595/http://www.flickr.com/photos/sshb/3619977273/http://www.flickr.com/photos/esm723/4377802647/http://www.flickr.com/photos/stevendepolo/4027405671/
  • 32. Contact InformationKate BladowFounder & Strategistpresentations@poweredpursuits.com