The document discusses securing your cybersecurity and managing your online footprint. It begins by stating that ignorance is not bliss in cyberspace and welcomes the reader to the new era of involuntary transparency online. It emphasizes the importance of using firewalls, strong passwords, updating security software, and being diligent about cybersecurity best practices. The document also stresses managing your privacy settings on social media and being aware of what information you share publicly online, as anything posted can affect your reputation and be seen by potential employers. It concludes by providing resources on firewalls, social media tips, and privacy settings to help secure your devices and online presence.
2. National
Cyber
Security
Awareness
Month
What we will cover…
• In cyberspace…ignorance is NOT
bliss!
• Welcome to the new era of
“involuntary transparency”
• Do you manage your internet
footprint?
• Do you know what your kids are
browsing?
• Appendix - Resources
3. Ignorance is NOT bliss!
• Myth…
– I don’t have anything to
hide
– I don’t have anything of
value
– Hackers are not
interested in hacking my
home PC
4. The fact is…
• Cyber adversaries are
looking for the easy
targets!
• They are not necessarily
targeting YOU – they
mostly want financial
and PII (in masses)
• And free WIFI,
hardware and
bandwidth (zombies)
5. Cyber Security Levels
Level 1
Flawed Integration
Level 2
Inconsistent
Practices
Level 3
Maturing & Refining
Risk = High
Default
settings,
dated
systems,
no
firewall,
weak
passwords
Level 4
Continuously
Verified
Risk = Low
Use of
firewall,
some
patching,
strong
passwords
Firewalls
strong
passwords
security
patches &
AV scans
Firewalls,
separate
networks &
accounts,
automated
security
patches & AV
scans,
awareness!
6. Don’t be a gummy bear!
• Use a firewall – software/hardware.
• Password protect your WIFI, never use the
default credentials.
• Check the default security settings on your
devices.
• Automate security patches.
• Automate signature updates for anti-virus
software.
• Plug & Scan: all USB devices, email
attachments and downloadable files should
be checked for viruses.
• Be diligent – Stop.Think.Connect!
7. Welcome to the new era of
involuntary transparency!
• When you are connected to the internet,
the internet is connected to YOU!
• What is the internet saying about YOU?
• Is your mobile device tracking your
every move?
• Is your browser broadcasting your
interests?
• Are your “friends” over-sharing your
information?
9. Do you manage your
Internet footprint?
• Everything you post on the internet is
PUBLIC…there is NO privacy in cyberspace!
• Once you hit the upload, share, tweet or
send button, you have no control regarding
the destiny of that “post“
• The Internet is not the place to broadcast
your grievances about your friends or foes
• Don’t post embarrassing information that
would be awkward to explain to relatives,
friends and current/future employers
10. OMG R U #sharing TMI?
• Take the time to manage the privacy
settings for your accounts?
• Don’t advertise your travel plans
on Facebook or other social media
• Remove all metadata from files
BEFORE sharing
• Never use the same user name &
password for all accounts
11. Do you manage your
Internet footprint?
• Do you know your “friends”?
• Don’t feel obligated to “Like”,
“Friend” or “Follow” profiles
of people you don’t actually
know!
• What is the purpose of your
social media account?
– Work
– Family & Friends
– News & Trends
12.
13. Do you Know what your
kids are browsing?
• Use separate login accounts for
each user – apply concept of
least privilege.
• Manage internet access on all
devices!
• If your kids use social media,
be sure to “friend” &/or “follow”
them.
• Take off your technology
blinders - stay stay current
with the latest cyber trends &
threats…awareness is key!
14. “…the upside of painful
knowledge is so much greater
than the downside of blissful
ignorance” (Sheryl Sandberg)
16. Appendix: Resources
• Firewalls
• Social media tips
• Location Service GPS settings
• Separate user accounts
• For your viewing enjoyment…
17. Firewalls
Firewall - a technological barrier designed to
prevent unauthorized or unwanted communications
between computer networks or hosts.
• Hardware Firewall – Apple AirPort Extreme:
http://www.apple.com/airport-extreme/specs/
– Short Video – How to set up the new AirPort
Extreme:
http://sharepoint.bc.com/sites/Corp/ComputerSecurity/Whitepape
rsandreferencematerial/Forms/AllItems.aspx
– Anti Virus Software – Intego VirusBarrier
(Windows friendly): http://www.intego.com/virusbarrier
• Software Firewall (it’s free) – ZoneAlarm:
http://www.zonealarm.com/security/en-us/zonealarmpc-security-free-firewall.htm
– Configuring ZoneAlarm at home:
http://hdc.tamu.edu/Security/Firewalls/Personal_Firewalls/Conf
iguring_ZoneAlarm_Firewall__Free_Version_.php
18. Social Media Tips
• Depending on the purpose of your social media
account, you don’t need to provide all your
personal information – tailor the account to
your needs, including privacy settings.
• Remove all metadata from pictures before
sharing, especially if you are posting while
traveling.
• There’s an App for that! Yes, most social
media providers have an App for mobile phones
and tablets. Be sure to manage the privacy,
notifications and location services settings to
avoid oversharing.
• Remember, posts on social media are intended to
be a “short status” not a detailed diary, keep
it short, sweet and to the point.
• If you want to share links to other websites
via your social media account, use a reputable
URL shortening service such as Bitly.
• Stop.Think.Post – Remember, once you hit the
upload, share, tweet or send button, you have
no control regarding the destiny of that “post“!
19. Location Services
Location Services allows location-based apps and
websites (including Maps, Camera, Safari, and
other Apple and third-party apps) to use
information from cellular, WIFI, Global
Positioning System (GPS)2 networks, and iBeacons3
to determine your approximate location.
While this tool serves a good purpose,
unfortunately it has unintended consequences:
• Adversaries can use it to track your every move
• Companies use it to craft their marketing
campaigns based on your whereabouts
• Not to mention, big brother is always
watching/tracking!
Be sure to take the time to manage your security
settings on your mobile device.
20. User Accounts
Given that almost every action we take in
cyberspace is tracked, interconnected, or
transmitted, it is good practice to keep
separate user and login accounts (based on
purpose or ownership):
• Create separate user accounts (user name &
password) if you share devices that connect
to the internet with other members of your
household
• Create separate login accounts (user name &
password) for browsers (Mozilla, Chrome, IE)
and applications (iTunes, Facebook, etc.)
• Apply the principle of least privilege to all
accounts and keep them separate from your
Administrator account!
• NEVER use the same password for multiple
accounts & change your password often!
21. For your viewing enjoyment…
• Short Film – The Dawn of the Net:
http://www.youtube.com/watch?v=RhvKm0RdUY0&featu
re=youtu.be
• Video – 10 top time-saving tech tips by David
Pogue: https://www.youtube.com/watch?v=QoT02vu9m4&feature=youtu.be
• Video – History of computer viruses:
http://www.youtube.com/watch?v=1g1yZVWrbtE#!
• Video – Cracking Stuxnet, a 21st Century Cyber
Weapon:
http://www.ted.com/talks/ralph_langner_cracking_
stuxnet_a_21st_century_cyberweapon.html
• Funny Video - #Hashtag with Jimmy Fallon &
Justin Timberlake:
https://www.youtube.com/watch?v=57dzaMaouXA