SlideShare a Scribd company logo
1 of 17
Cybersecurity Threatscape
Quick Information Security Tips for Business and Individuals
Joshua S. Moulin, MSISA –
ACE,CAWFE,CCENT,CEECS,CEH,CFCE,CHFI,DFCP,GCFA,GSEC
• 2+ years in federal cybersecurity for federal agency focusing on national
security
• 18 years of public safety experience, 11 years were in law enforcement
(patrol, detectives, sergeant, lieutenant)
• The last 7 years in law enforcement were spent as the commander of a
Cyber Crimes Task Force. Sworn in by both the FBI and the US Marshal’s
Service
• Handled hundreds of investigations and forensic cases including murder,
terrorism, cybercrime, hacking, child pornography, extortion, human
trafficking, intellectual property, fraud, misconduct, etc. and performed
thousands of forensic examinations
• Have been qualified as an expert witness in state and federal court
• Multiple certifications in law enforcement, cybersecurity, and forensics
• Graduated Summa Cum Laude with a Bachelor’s degree and hold a Master’s
degree in Information Security and Assurance
• Adjunct Instructor for college teaching computer security
Background
The Adversaries are Real
Source: Mandiant M-Trends 2012
InfoSec for you and your Business
• Passwords and multifactor authentication
• Encryption of data and devices
• Enforced policies and procedures (especially an AUP)
• Disaster Recovery and Continuity Plans
• Employee Training and Awareness
• Social Engineering Attacks and Recon
• Wireless Networking
• Least Privileged Access
• Endpoint Security, Patching, and Security Controls
Security costs…you can pay now, or you can pay later –
but if you pay later, you always pay more.
Passwords and Multifactor Authentication
• Want at least two factor
authentication (2FA):
– Something you have
– Something you know
– Something you are
• Website to locate
compatibles sites:
https://twofactorauth.org/
Passwords and Multifactor Authentication
• Strong passwords should include uppercase,
lowercase, numbers, and special characters
• Password attacks are extremely common
(Brute force, dictionary, or hybrid)
• Simple passwords can be cracked in seconds
• Consider a password management tool (e.g.,
KeyPass, LastPass, etc.)
• Consider passphrases
• Never reuse passwords
Encryption
• Encryption should be mandatory on all portable
devices (tablets, phones, laptops, USB devices, etc.)
• Encryption should also be used to transmit sensitive
data via email (especially PII and IP)
• Many free and inexpensive encryption programs
available
Policies and Procedures
• Policies are a must, especially if you are in any
type of regulated business (HIPAA, SOX, GLBA,
PCI-DSS,etc.)
• Polices are only good if they are enforced
• If nothing else, have a well written Acceptable
Use Policy (AUP) and have all employees sign
it (preferably annually)
• The AUP should discuss several items,
particularly that there is no expectation of
privacy on the business network
Disaster Recovery / Continuity
• 93% of companies that lost their data for 10
days or more filed for bankruptcy within one
year
• 50% of companies that lost their data for 10
days or more filed for bankruptcy immediately
• Every week 140,000 hard drives crash in the
United States
• Have a backup plan for home and work
• Consider offsite backup solutions as well and
geographic location is important
http://www.concertonenetworks.com/files/DriveSavers_Industry%20Facts_stats.pdf
Employee Awareness Training
• The most common security violations
include:
– Failing to encrypt data and devices
– Clicking on links within phishing email
messages
– Downloading unauthorized software
(p2p, malware)
– Misuse of company IT assets
– Plugging in unauthorized devices such
as USB devices or home computers to
company assets
Social Engineering Attacks & Recon
• Phishing, Vishing, Smishing, Spear Phishing,
Whaling, pharming…the list goes on and on
• Be aware of what is on the Internet about you
and your company (OPSEC)
• Social engineering also includes dumpster
diving, tailgating, diversion, etc.
Wireless Networking
• NEVER use public open Wi-Fi access points for
anything sensitive (or maybe at all)
• If accessing work, make sure you use a Virtual Private
Network (VPN) solution
• SMS messages sent over Wi-Fi are all plaintext
• At home take the following precautions on your
wireless router:
– Don’t broadcast the SSID
– Change the default username/password for the router
– Enable WPA2 encryption (Not WEP)
– Use MAC address filtering
Least Privileged Access
• Usually a culture change and
not popular (but absolutely
essential)
• Limit who has administrative
privileges
• No one should ever use an
admin account for their day-to-
day work
• Admin account should never be
used to check email or surf the
Internet
Endpoint Security, Patching & Security
Controls
• Endpoint Security is essential – on everything
including mobile devices
• Have up to date anti-malware software
• Use host firewalls
• Keep operating system and third-party
software patched from security vulnerabilities
• Make sure your business network is secure
and you have an incident response plan
The Life Cycle of a Cyber-attack
Source: Mandiant M-Trends 2012
Questions?
Email: Josh@JoshMoulin.com
@JoshMoulin
https://www.linkedin.com/in/joshmoulin

More Related Content

What's hot

Information security / Cyber Security ppt
Information security / Cyber Security pptInformation security / Cyber Security ppt
Information security / Cyber Security pptGryffin EJ
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecuritylearnt
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityAtlantic Training, LLC.
 
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)Biswajit Bhattacharjee
 
Security awareness-checklist 2019
Security awareness-checklist 2019Security awareness-checklist 2019
Security awareness-checklist 2019Mustafa Kuğu
 
INFORMATION SECURITY: THREATS AND SOLUTIONS.
INFORMATION SECURITY: THREATS AND SOLUTIONS.INFORMATION SECURITY: THREATS AND SOLUTIONS.
INFORMATION SECURITY: THREATS AND SOLUTIONS.Ni
 
Security and control in mis
Security and control in misSecurity and control in mis
Security and control in misGurjit
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityjayashri kolekar
 
Cyber Security School Workshop
Cyber Security School WorkshopCyber Security School Workshop
Cyber Security School WorkshopRahul Nayan
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training OpenFred Beck MBA, CPA
 
Network security
Network securityNetwork security
Network securitymena kaheel
 
Information security and other issues
Information security and other issuesInformation security and other issues
Information security and other issuesHaseeb Ahmed Awan
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to CybersecurityKrutarth Vasavada
 

What's hot (20)

Information security / Cyber Security ppt
Information security / Cyber Security pptInformation security / Cyber Security ppt
Information security / Cyber Security ppt
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecurity
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
 
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
 
Iss lecture 1
Iss lecture 1Iss lecture 1
Iss lecture 1
 
Topic11
Topic11Topic11
Topic11
 
Information security
Information securityInformation security
Information security
 
Security awareness-checklist 2019
Security awareness-checklist 2019Security awareness-checklist 2019
Security awareness-checklist 2019
 
INFORMATION SECURITY: THREATS AND SOLUTIONS.
INFORMATION SECURITY: THREATS AND SOLUTIONS.INFORMATION SECURITY: THREATS AND SOLUTIONS.
INFORMATION SECURITY: THREATS AND SOLUTIONS.
 
Security and control in mis
Security and control in misSecurity and control in mis
Security and control in mis
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
 
Information security
Information securityInformation security
Information security
 
Cyber Security School Workshop
Cyber Security School WorkshopCyber Security School Workshop
Cyber Security School Workshop
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
 
Network security
Network securityNetwork security
Network security
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
Information security and other issues
Information security and other issuesInformation security and other issues
Information security and other issues
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 

Similar to Information Security Basics for Businesses and Individuals

IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptOoXair
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfMansoorAhmed57263
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness TrainingRandy Bowman
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpointArifa Ali
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpointArifa Ali
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityKaushal Solanki
 
Refugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityRefugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityGianluca Varisco
 
Module2_General_Security
Module2_General_SecurityModule2_General_Security
Module2_General_SecurityDulcey Whyte
 
InformationSecurity.ppt
InformationSecurity.pptInformationSecurity.ppt
InformationSecurity.pptAnshikaGoel42
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security InnovationPriyanka Aash
 
Keeping you and your library safe and secure
Keeping you and your library safe and secureKeeping you and your library safe and secure
Keeping you and your library safe and secureLYRASIS
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Abzetdin Adamov
 
VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing Netpluz Asia Pte Ltd
 
It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version Brian Pichman
 

Similar to Information Security Basics for Businesses and Individuals (20)

IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Refugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityRefugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on Security
 
Hackers
HackersHackers
Hackers
 
Module2_General_Security
Module2_General_SecurityModule2_General_Security
Module2_General_Security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
InformationSecurity.ppt
InformationSecurity.pptInformationSecurity.ppt
InformationSecurity.ppt
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security Innovation
 
How to become Hackers .
How to become Hackers .How to become Hackers .
How to become Hackers .
 
Hackers Cracker Network Intruder
Hackers Cracker Network IntruderHackers Cracker Network Intruder
Hackers Cracker Network Intruder
 
Keeping you and your library safe and secure
Keeping you and your library safe and secureKeeping you and your library safe and secure
Keeping you and your library safe and secure
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
 
Personal Threat Models
Personal Threat ModelsPersonal Threat Models
Personal Threat Models
 
VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing
 
It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version
 

More from Josh Moulin, MSISA,CISSP

Disheveled Digital Forensics: The Impact of Inconsistent Standards, Certifica...
Disheveled Digital Forensics: The Impact of Inconsistent Standards, Certifica...Disheveled Digital Forensics: The Impact of Inconsistent Standards, Certifica...
Disheveled Digital Forensics: The Impact of Inconsistent Standards, Certifica...Josh Moulin, MSISA,CISSP
 
Josh Moulin: Designing a Mobile Digital Forensic Lab on a Budget
Josh Moulin: Designing a Mobile Digital Forensic Lab on a BudgetJosh Moulin: Designing a Mobile Digital Forensic Lab on a Budget
Josh Moulin: Designing a Mobile Digital Forensic Lab on a BudgetJosh Moulin, MSISA,CISSP
 
Josh Moulin: Finding deleted URLs in Mozilla Firefox places.sqlite
Josh Moulin:  Finding deleted URLs in Mozilla Firefox places.sqliteJosh Moulin:  Finding deleted URLs in Mozilla Firefox places.sqlite
Josh Moulin: Finding deleted URLs in Mozilla Firefox places.sqliteJosh Moulin, MSISA,CISSP
 
Josh Moulin: What every prosecutor should know about peer to-peer investigations
Josh Moulin: What every prosecutor should know about peer to-peer investigationsJosh Moulin: What every prosecutor should know about peer to-peer investigations
Josh Moulin: What every prosecutor should know about peer to-peer investigationsJosh Moulin, MSISA,CISSP
 
Josh Moulin: Law Enforcement Multi-Disciplinary Team Approach to Technology F...
Josh Moulin: Law Enforcement Multi-Disciplinary Team Approach to Technology F...Josh Moulin: Law Enforcement Multi-Disciplinary Team Approach to Technology F...
Josh Moulin: Law Enforcement Multi-Disciplinary Team Approach to Technology F...Josh Moulin, MSISA,CISSP
 
Josh Moulin: Internet Scams and Identity Theft Prevention
Josh Moulin: Internet Scams and Identity Theft PreventionJosh Moulin: Internet Scams and Identity Theft Prevention
Josh Moulin: Internet Scams and Identity Theft PreventionJosh Moulin, MSISA,CISSP
 
Josh Moulin: Basic Fire Investigation for Law Enforcement
Josh Moulin: Basic Fire Investigation for Law EnforcementJosh Moulin: Basic Fire Investigation for Law Enforcement
Josh Moulin: Basic Fire Investigation for Law EnforcementJosh Moulin, MSISA,CISSP
 

More from Josh Moulin, MSISA,CISSP (8)

Disheveled Digital Forensics: The Impact of Inconsistent Standards, Certifica...
Disheveled Digital Forensics: The Impact of Inconsistent Standards, Certifica...Disheveled Digital Forensics: The Impact of Inconsistent Standards, Certifica...
Disheveled Digital Forensics: The Impact of Inconsistent Standards, Certifica...
 
Josh Moulin: Designing a Mobile Digital Forensic Lab on a Budget
Josh Moulin: Designing a Mobile Digital Forensic Lab on a BudgetJosh Moulin: Designing a Mobile Digital Forensic Lab on a Budget
Josh Moulin: Designing a Mobile Digital Forensic Lab on a Budget
 
Josh Moulin: Cyberstalking Presentation
Josh Moulin:  Cyberstalking PresentationJosh Moulin:  Cyberstalking Presentation
Josh Moulin: Cyberstalking Presentation
 
Josh Moulin: Finding deleted URLs in Mozilla Firefox places.sqlite
Josh Moulin:  Finding deleted URLs in Mozilla Firefox places.sqliteJosh Moulin:  Finding deleted URLs in Mozilla Firefox places.sqlite
Josh Moulin: Finding deleted URLs in Mozilla Firefox places.sqlite
 
Josh Moulin: What every prosecutor should know about peer to-peer investigations
Josh Moulin: What every prosecutor should know about peer to-peer investigationsJosh Moulin: What every prosecutor should know about peer to-peer investigations
Josh Moulin: What every prosecutor should know about peer to-peer investigations
 
Josh Moulin: Law Enforcement Multi-Disciplinary Team Approach to Technology F...
Josh Moulin: Law Enforcement Multi-Disciplinary Team Approach to Technology F...Josh Moulin: Law Enforcement Multi-Disciplinary Team Approach to Technology F...
Josh Moulin: Law Enforcement Multi-Disciplinary Team Approach to Technology F...
 
Josh Moulin: Internet Scams and Identity Theft Prevention
Josh Moulin: Internet Scams and Identity Theft PreventionJosh Moulin: Internet Scams and Identity Theft Prevention
Josh Moulin: Internet Scams and Identity Theft Prevention
 
Josh Moulin: Basic Fire Investigation for Law Enforcement
Josh Moulin: Basic Fire Investigation for Law EnforcementJosh Moulin: Basic Fire Investigation for Law Enforcement
Josh Moulin: Basic Fire Investigation for Law Enforcement
 

Recently uploaded

WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 

Recently uploaded (20)

WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 

Information Security Basics for Businesses and Individuals

  • 1. Cybersecurity Threatscape Quick Information Security Tips for Business and Individuals Joshua S. Moulin, MSISA – ACE,CAWFE,CCENT,CEECS,CEH,CFCE,CHFI,DFCP,GCFA,GSEC
  • 2. • 2+ years in federal cybersecurity for federal agency focusing on national security • 18 years of public safety experience, 11 years were in law enforcement (patrol, detectives, sergeant, lieutenant) • The last 7 years in law enforcement were spent as the commander of a Cyber Crimes Task Force. Sworn in by both the FBI and the US Marshal’s Service • Handled hundreds of investigations and forensic cases including murder, terrorism, cybercrime, hacking, child pornography, extortion, human trafficking, intellectual property, fraud, misconduct, etc. and performed thousands of forensic examinations • Have been qualified as an expert witness in state and federal court • Multiple certifications in law enforcement, cybersecurity, and forensics • Graduated Summa Cum Laude with a Bachelor’s degree and hold a Master’s degree in Information Security and Assurance • Adjunct Instructor for college teaching computer security Background
  • 3.
  • 4. The Adversaries are Real Source: Mandiant M-Trends 2012
  • 5. InfoSec for you and your Business • Passwords and multifactor authentication • Encryption of data and devices • Enforced policies and procedures (especially an AUP) • Disaster Recovery and Continuity Plans • Employee Training and Awareness • Social Engineering Attacks and Recon • Wireless Networking • Least Privileged Access • Endpoint Security, Patching, and Security Controls Security costs…you can pay now, or you can pay later – but if you pay later, you always pay more.
  • 6. Passwords and Multifactor Authentication • Want at least two factor authentication (2FA): – Something you have – Something you know – Something you are • Website to locate compatibles sites: https://twofactorauth.org/
  • 7. Passwords and Multifactor Authentication • Strong passwords should include uppercase, lowercase, numbers, and special characters • Password attacks are extremely common (Brute force, dictionary, or hybrid) • Simple passwords can be cracked in seconds • Consider a password management tool (e.g., KeyPass, LastPass, etc.) • Consider passphrases • Never reuse passwords
  • 8. Encryption • Encryption should be mandatory on all portable devices (tablets, phones, laptops, USB devices, etc.) • Encryption should also be used to transmit sensitive data via email (especially PII and IP) • Many free and inexpensive encryption programs available
  • 9. Policies and Procedures • Policies are a must, especially if you are in any type of regulated business (HIPAA, SOX, GLBA, PCI-DSS,etc.) • Polices are only good if they are enforced • If nothing else, have a well written Acceptable Use Policy (AUP) and have all employees sign it (preferably annually) • The AUP should discuss several items, particularly that there is no expectation of privacy on the business network
  • 10. Disaster Recovery / Continuity • 93% of companies that lost their data for 10 days or more filed for bankruptcy within one year • 50% of companies that lost their data for 10 days or more filed for bankruptcy immediately • Every week 140,000 hard drives crash in the United States • Have a backup plan for home and work • Consider offsite backup solutions as well and geographic location is important http://www.concertonenetworks.com/files/DriveSavers_Industry%20Facts_stats.pdf
  • 11. Employee Awareness Training • The most common security violations include: – Failing to encrypt data and devices – Clicking on links within phishing email messages – Downloading unauthorized software (p2p, malware) – Misuse of company IT assets – Plugging in unauthorized devices such as USB devices or home computers to company assets
  • 12. Social Engineering Attacks & Recon • Phishing, Vishing, Smishing, Spear Phishing, Whaling, pharming…the list goes on and on • Be aware of what is on the Internet about you and your company (OPSEC) • Social engineering also includes dumpster diving, tailgating, diversion, etc.
  • 13. Wireless Networking • NEVER use public open Wi-Fi access points for anything sensitive (or maybe at all) • If accessing work, make sure you use a Virtual Private Network (VPN) solution • SMS messages sent over Wi-Fi are all plaintext • At home take the following precautions on your wireless router: – Don’t broadcast the SSID – Change the default username/password for the router – Enable WPA2 encryption (Not WEP) – Use MAC address filtering
  • 14. Least Privileged Access • Usually a culture change and not popular (but absolutely essential) • Limit who has administrative privileges • No one should ever use an admin account for their day-to- day work • Admin account should never be used to check email or surf the Internet
  • 15. Endpoint Security, Patching & Security Controls • Endpoint Security is essential – on everything including mobile devices • Have up to date anti-malware software • Use host firewalls • Keep operating system and third-party software patched from security vulnerabilities • Make sure your business network is secure and you have an incident response plan
  • 16. The Life Cycle of a Cyber-attack Source: Mandiant M-Trends 2012