Your SlideShare is downloading. ×
Keeping 'Em Safe: Ways to Protect Your Clients Online
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Keeping 'Em Safe: Ways to Protect Your Clients Online

320

Published on

A presentation for the 2011 Virginia Annual Statewide Legal Aid Conference. …

A presentation for the 2011 Virginia Annual Statewide Legal Aid Conference.

You need to protect yourself and your clients' data online. We'll look at using social network sites, downloading viruses, leaving metadata in documents, having bad password practices, putting information in the cloud.

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
320
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
11
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Keeping em Safe:8 More Waysto Help YourClients
  • 2. More than 8 in 10 US small businesses believe their firms are safe from cyber threats yetalmost 80% have no formal security policies in place.You can be attacked and not even know it. Even worse, your system could be used to attack other people, and you may not know it.
  • 3. What Is Cyber Crime?● Spam● Fraud● Obscene or offensive content● Harassment● Child pornography● Drug trafficking● Cyber terrorism● Cyber warfare
  • 4. Who Is Behind Cyber Crime?● Script kiddies● Hacktivists● Individual miscreants● National & transnational organized criminal enterprises● Nation states
  • 5. Why Should You Care?● Your clients trust you with very sensitive data.● If they become victims, your clients have less of an ability to bounce back.● Systems that are used to commit crimes often support the same organized networks that are behind human trafficking, identity theft, child pornography, and other issues you battle against daily.
  • 6. Biggest Threat? You
  • 7. What? No Way!● Acting maliciously● Forgetting to log off● Losing laptops, USB keys, or smartphones● Storing client data in questionable places● Downloading viruses and malware● Using social network sites carelessly● Leaving metadata in documents● Having bad password practices● Getting tricked
  • 8. Acting maliciously
  • 9. What You Can Do● Put policies in place and enforce them● Trust your gut
  • 10. Forgetting to log off
  • 11. What You Can Do● Log off when you leave your computer● Shut down your computer at the end of the day● Set up your computer to automatically lock when the screensaver comes on
  • 12. Losing laptops,USB keys, orsmartphones
  • 13. What You Can Do● Pay special attention and be careful● Store only the client data you absolutely need● Encrypt your data● Set up phones so you can erase them remotely● Use strong passwords● Back up the data before you leave
  • 14. Storing client data inquestionable places
  • 15. What You Can Do● Read privacy policies● Develop a set of approved sites that client information can be stored on and train staff to not store data on any other sites● Dont include identifiable client information in emails
  • 16. Downloadingviruses andmalware
  • 17. What You Can Do● Patch software and systems religiously● Read before you click● Ask if the email or attachment seems “funny”● Avoid downloading screensavers, fonts, & porn● Use your anti-virus software● Ignore any website that pops up a virus warning
  • 18. Using socialnetworksitescarelessly
  • 19. What You Can Do● Be careful what you click● Dont friend people you dont know● Use strong passwords● Avoid playing games and installing applications● Be very careful about what you post
  • 20. Leavingmetadata in documents
  • 21. What You Can Do● Clean metadata from documents before sending electronic copies● Use the Document Inspector tool in Office● Download and use Metadata Removal tool for WordPerfect
  • 22. Having badpasswordpractices
  • 23. What You Can Do● Use strong passwords● Change passwords quarterly● Dont use a password for more than one site● Dont share passwords● Establish password guidelines for the organization and follow them● Try a password manager
  • 24. Getting tricked
  • 25. What You Can Do● Be skeptical● Dont give anyone your passwords● Dont click a link to your bank website
  • 26. What If?● Tell your supervisor immediately● Be prepared to help figure out what happened● Notify the proper authorities
  • 27. Who Are the Proper Authorities?Computer Intrusion Local FBI Office US Secret Service Internet Crime Complaint CenterPassword trafficking Local FBI Office US Secret Service Internet Crime Complaint CenterCounterfeiting of currency US Secret Service
  • 28. Who Are the Proper Authorities?Child pornography or Local FBI Officeexploitation US Customs and Enforcement (if imported) Internet Crime Complaint CenterInternet fraud & SPAM Local FBI Office US Secret Service (Financial Crimes Division) Federal Trade Commission Securities & Exchange Commission (if securities/investment-related) Internet Crime Complaint CenterInternet harassment Local FBI Office
  • 29. Resources● Cybercrime Reporting http://www.cybercrime.gov/reporting.htm● Stay Safe Online http://www.staysafeonline.org/● US CERT http://www.us-cert.gov/nav/nt01/
  • 30. Resources● US CERT http://www.us-cert.gov/cas/tips/● OnGuard Online http://www.onguardonline.gov/topics/computer-security.aspx
  • 31. Picture AttributionsIn orderhttp://www.flickr.com/photos/jesseshapins/3788641411/http://commons.wikimedia.org/wiki/File:Harry_Potter_Lightning.gifhttp://commons.wikimedia.org/wiki/File:Computer_n_screen.svghttp://www.flickr.com/photos/dunechaser/385847284/sizes/l/http://www.flickr.com/photos/sravi_in/3623242288/sizes/z/http://www.flickr.com/photos/stukjefotogebeuren/2081170312/http://www.flickr.com/photos/librarianbyday/3983719036/http://www.flickr.com/photos/booleansplit/4650422195/http://www.flickr.com/photos/the-icing-on-the-cake/2424326595/http://www.flickr.com/photos/sshb/3619977273/http://www.flickr.com/photos/esm723/4377802647/http://www.flickr.com/photos/stevendepolo/4027405671/
  • 32. Contact InformationKate BladowFounder & Strategistpresentations@poweredpursuits.com

×