National Cyber Security Awareness Month
What we will cover…
• In cyberspace…ignorance is NOT
• Welcome to the new era of
• Do you manage your internet
• Do you know what your kids are
• Appendix - Resources
Ignorance is NOT bliss!
– I don’t have anything to
– I don’t have anything of
– Hackers are not
interested in hacking my
The fact is…
• Cyber adversaries are
looking for the easy
• They are not necessarily
targeting YOU – they
mostly want financial
and PII (in masses)
• And free WIFI,
Cyber Security Levels
Maturing & Refining
Risk = High
Risk = Low
patches & AV
Don’t be a gummy bear!
• Use a firewall – software/hardware.
• Password protect your WIFI, never use the
• Check the default security settings on your
• Automate security patches.
• Automate signature updates for anti-virus
• Plug & Scan: all USB devices, email
attachments and downloadable files should
be checked for viruses.
• Be diligent – Stop.Think.Connect!
Welcome to the new era of
• When you are connected to the internet,
the internet is connected to YOU!
• What is the internet saying about YOU?
• Is your mobile device tracking your
• Is your browser broadcasting your
• Are your “friends” over-sharing your
Do you manage your
• Everything you post on the internet is
PUBLIC…there is NO privacy in cyberspace!
• Once you hit the upload, share, tweet or
send button, you have no control regarding
the destiny of that “post“
• The Internet is not the place to broadcast
your grievances about your friends or foes
• Don’t post embarrassing information that
would be awkward to explain to relatives,
friends and current/future employers
OMG R U #sharing TMI?
• Take the time to manage the privacy
settings for your accounts?
• Don’t advertise your travel plans
on Facebook or other social media
• Remove all metadata from files
• Never use the same user name &
password for all accounts
Do you manage your
• Do you know your “friends”?
• Don’t feel obligated to “Like”,
“Friend” or “Follow” profiles
of people you don’t actually
• What is the purpose of your
social media account?
– Family & Friends
– News & Trends
Do you Know what your
kids are browsing?
• Use separate login accounts for
each user – apply concept of
• Manage internet access on all
• If your kids use social media,
be sure to “friend” &/or “follow”
• Take off your technology
blinders - stay stay current
with the latest cyber trends &
threats…awareness is key!
“…the upside of painful
knowledge is so much greater
than the downside of blissful
ignorance” (Sheryl Sandberg)
• Social media tips
• Location Service GPS settings
• Separate user accounts
• For your viewing enjoyment…
Firewall - a technological barrier designed to
prevent unauthorized or unwanted communications
between computer networks or hosts.
• Hardware Firewall – Apple AirPort Extreme:
– Short Video – How to set up the new AirPort
– Anti Virus Software – Intego VirusBarrier
(Windows friendly): http://www.intego.com/virusbarrier
• Software Firewall (it’s free) – ZoneAlarm:
– Configuring ZoneAlarm at home:
Social Media Tips
• Depending on the purpose of your social media
account, you don’t need to provide all your
personal information – tailor the account to
your needs, including privacy settings.
• Remove all metadata from pictures before
sharing, especially if you are posting while
• There’s an App for that! Yes, most social
media providers have an App for mobile phones
and tablets. Be sure to manage the privacy,
notifications and location services settings to
• Remember, posts on social media are intended to
be a “short status” not a detailed diary, keep
it short, sweet and to the point.
• If you want to share links to other websites
via your social media account, use a reputable
URL shortening service such as Bitly.
• Stop.Think.Post – Remember, once you hit the
upload, share, tweet or send button, you have
no control regarding the destiny of that “post“!
Location Services allows location-based apps and
websites (including Maps, Camera, Safari, and
other Apple and third-party apps) to use
information from cellular, WIFI, Global
Positioning System (GPS)2 networks, and iBeacons3
to determine your approximate location.
While this tool serves a good purpose,
unfortunately it has unintended consequences:
• Adversaries can use it to track your every move
• Companies use it to craft their marketing
campaigns based on your whereabouts
• Not to mention, big brother is always
Be sure to take the time to manage your security
settings on your mobile device.
Given that almost every action we take in
cyberspace is tracked, interconnected, or
transmitted, it is good practice to keep
separate user and login accounts (based on
purpose or ownership):
• Create separate user accounts (user name &
password) if you share devices that connect
to the internet with other members of your
• Create separate login accounts (user name &
password) for browsers (Mozilla, Chrome, IE)
and applications (iTunes, Facebook, etc.)
• Apply the principle of least privilege to all
accounts and keep them separate from your
• NEVER use the same password for multiple
accounts & change your password often!
For your viewing enjoyment…
• Short Film – The Dawn of the Net:
• Video – 10 top time-saving tech tips by David
• Video – History of computer viruses:
• Video – Cracking Stuxnet, a 21st Century Cyber
• Funny Video - #Hashtag with Jimmy Fallon &