2. A MESSAGE
FROM
PATRICK
As a person whose mother
was targeted online by a
Texas prison inmate who
was given Internet privileges,
I have developed a deep
passion for cybersecurity
and all that it entails. I do
not claim to be an expert on
the subject (not yet anyway)
but my hope is that by
sharing what I do know will
help at least one person to
avoid what could be a life
altering cyber attack. The
effects can linger for the rest
of your life. SEC RITY is not
complete without U. Be safe
online, we are ALL
connected.
3. No Technology That’s Connected To
The Internet Is Unhackable.
“It takes 20 years to build a reputation and a few minutes
of cyber-incident to ruin it.”
– Stephane Nappo
4. Hackers Don’t Break In, They Login
Keep Personal
Information Professional
and Limited
Practice Safe Browsing
Make Sure Your Internet
Connection is Secure
(never bank over open
public Wi-Fi)
Be Careful What You
Download
Choose Strong Passwords
(phrases work best)
Make Online Purchases
From Secure Sites
Be Careful What You Post
(vacation posts can lead to
home break-ins)
Be Careful Who You Meet
Online
6. PHISHING
This type of threat is the practice of sending fraudulent
emails that resemble emails from legitimate sources.
The attacker aims to steal sensitive information like
credit card numbers and login information. It is by far
the most common type of cyber attack. Cap Rock has
an excellent filter solution but remember, all
technology connected to the Internet has the potential
to be hacked.
7. SOCIAL ENGINEERING
Social Engineering takes on a manipulative approach in
that the actor will try to “trick” you into revealing
personal or confidential information using authoritative
or urgent tactics. The actor will try to gain your trust to
get you to reveal Personally Identifiable Information
(PII). More damage can be done with just your cell
phone number than you realize.
8. MALWARE
Malicious Software (Malware) is a type of software
designed to gain unauthorized access to computer
systems often resulting in damage or failure. A
computer cannot judge intent therefore malware may
coincide with your computer’s normal functionality. To
sum it up; Malware is bad software. Think before you
click!
9. RANSOMWARE
Ransomware is one of many types of Malware. The
threat actors using this technique have taken things to
a new level of cyber crime; extortion. The actors will
block access to files by encrypting them one by one
while deleting the originals and demanding payment
(ransom) for the decryption key. Recent statistics show
that telecommunications has surpassed healthcare as
the most frequently targeted sector of Ransomware
hijackers. This is especially concerning for obvious
reasons. Help protect our livelihood!
10. NO MORE PASSWORDS?
The Fast Identity Online or FIDO Alliance and The World
Wide Web Consortium are on track to eliminate
passwords altogether. Giants like Google, Apple, and
Microsoft are forging this password-free future
together. This will be possible by utilizing a
cryptographic token called a passkey shared by your
cell phone and the website or app you are using. Logins
will be as simple as typing in your PIN, drawing a
pattern, or using biometrics; face recognition or
fingerprint. You might use these today, but you still
have a password.
11. -REMEMBER-
FREE SPEECH DOESN’T MEAN CARELESS
TALK!
What happens at Cap Rock stays at Cap Rock. One must
watch what is said in the office, around town, and at
home. Cybersecurity must be practiced daily to avoid
any slip-ups. Thank you for taking the time to complete
this presentation. Enjoy the rest of your day!
-Patrick