SlideShare a Scribd company logo
1 of 22
Download to read offline
Securing Your
Cyberspace

Patricia Watson
National Cyber Security Awareness Month
10.2013
National
Cyber
Security
Awareness
Month

What we will cover…
• In cyberspace…ignorance is NOT
bliss!
• Welcome to the new era of
“involuntary transparency”
• Do you manage your internet
footprint?

• Do you know what your kids are
browsing?
• Appendix - Resources
Ignorance is NOT bliss!
• Myth…
– I don’t have anything to
hide
– I don’t have anything of
value
– Hackers are not
interested in hacking my
home PC
The fact is…
• Cyber adversaries are
looking for the easy
targets!
• They are not necessarily
targeting YOU – they
mostly want financial
and PII (in masses)

• And free WIFI,
hardware and
bandwidth (zombies)
Cyber Security Levels
Level 1
Flawed Integration

Level 2
Inconsistent
Practices

Level 3
Maturing & Refining

Risk = High

Default
settings,
dated
systems,
no
firewall,
weak
passwords

Level 4
Continuously
Verified

Risk = Low

Use of
firewall,
some
patching,
strong
passwords

Firewalls
strong
passwords
security
patches &
AV scans

Firewalls,
separate
networks &
accounts,
automated
security
patches & AV
scans,
awareness!
Don’t be a gummy bear!
• Use a firewall – software/hardware.
• Password protect your WIFI, never use the
default credentials.
• Check the default security settings on your
devices.

• Automate security patches.
• Automate signature updates for anti-virus
software.
• Plug & Scan: all USB devices, email
attachments and downloadable files should
be checked for viruses.
• Be diligent – Stop.Think.Connect!
Welcome to the new era of
involuntary transparency!
• When you are connected to the internet,
the internet is connected to YOU!
• What is the internet saying about YOU?
• Is your mobile device tracking your
every move?
• Is your browser broadcasting your
interests?

• Are your “friends” over-sharing your
information?
Social Media Etiquette…
Do you manage your
Internet footprint?
• Everything you post on the internet is
PUBLIC…there is NO privacy in cyberspace!
• Once you hit the upload, share, tweet or
send button, you have no control regarding
the destiny of that “post“
• The Internet is not the place to broadcast
your grievances about your friends or foes
• Don’t post embarrassing information that
would be awkward to explain to relatives,
friends and current/future employers
OMG R U #sharing TMI?
• Take the time to manage the privacy
settings for your accounts?

• Don’t advertise your travel plans
on Facebook or other social media
• Remove all metadata from files
BEFORE sharing
• Never use the same user name &
password for all accounts
Do you manage your
Internet footprint?
• Do you know your “friends”?
• Don’t feel obligated to “Like”,
“Friend” or “Follow” profiles
of people you don’t actually
know!
• What is the purpose of your
social media account?
– Work
– Family & Friends
– News & Trends
Do you Know what your
kids are browsing?
• Use separate login accounts for
each user – apply concept of
least privilege.
• Manage internet access on all
devices!
• If your kids use social media,
be sure to “friend” &/or “follow”
them.
• Take off your technology
blinders - stay stay current
with the latest cyber trends &
threats…awareness is key!
“…the upside of painful
knowledge is so much greater
than the downside of blissful
ignorance” (Sheryl Sandberg)
National
Cyber
Security
Awareness
Month

Questions?
Appendix: Resources
• Firewalls
• Social media tips
• Location Service GPS settings
• Separate user accounts
• For your viewing enjoyment…
Firewalls
Firewall - a technological barrier designed to
prevent unauthorized or unwanted communications
between computer networks or hosts.
• Hardware Firewall – Apple AirPort Extreme:
http://www.apple.com/airport-extreme/specs/
– Short Video – How to set up the new AirPort
Extreme:

http://sharepoint.bc.com/sites/Corp/ComputerSecurity/Whitepape
rsandreferencematerial/Forms/AllItems.aspx

– Anti Virus Software – Intego VirusBarrier
(Windows friendly): http://www.intego.com/virusbarrier

• Software Firewall (it’s free) – ZoneAlarm:

http://www.zonealarm.com/security/en-us/zonealarmpc-security-free-firewall.htm
– Configuring ZoneAlarm at home:

http://hdc.tamu.edu/Security/Firewalls/Personal_Firewalls/Conf
iguring_ZoneAlarm_Firewall__Free_Version_.php
Social Media Tips
• Depending on the purpose of your social media
account, you don’t need to provide all your
personal information – tailor the account to
your needs, including privacy settings.
• Remove all metadata from pictures before
sharing, especially if you are posting while
traveling.
• There’s an App for that! Yes, most social
media providers have an App for mobile phones
and tablets. Be sure to manage the privacy,
notifications and location services settings to
avoid oversharing.
• Remember, posts on social media are intended to
be a “short status” not a detailed diary, keep
it short, sweet and to the point.
• If you want to share links to other websites
via your social media account, use a reputable
URL shortening service such as Bitly.
• Stop.Think.Post – Remember, once you hit the
upload, share, tweet or send button, you have
no control regarding the destiny of that “post“!
Location Services
Location Services allows location-based apps and
websites (including Maps, Camera, Safari, and
other Apple and third-party apps) to use
information from cellular, WIFI, Global
Positioning System (GPS)2 networks, and iBeacons3
to determine your approximate location.
While this tool serves a good purpose,
unfortunately it has unintended consequences:
• Adversaries can use it to track your every move
• Companies use it to craft their marketing
campaigns based on your whereabouts
• Not to mention, big brother is always
watching/tracking!
Be sure to take the time to manage your security
settings on your mobile device.
User Accounts
Given that almost every action we take in
cyberspace is tracked, interconnected, or
transmitted, it is good practice to keep
separate user and login accounts (based on
purpose or ownership):
• Create separate user accounts (user name &
password) if you share devices that connect
to the internet with other members of your
household
• Create separate login accounts (user name &
password) for browsers (Mozilla, Chrome, IE)
and applications (iTunes, Facebook, etc.)
• Apply the principle of least privilege to all
accounts and keep them separate from your
Administrator account!
• NEVER use the same password for multiple
accounts & change your password often!
For your viewing enjoyment…
• Short Film – The Dawn of the Net:
http://www.youtube.com/watch?v=RhvKm0RdUY0&featu
re=youtu.be
• Video – 10 top time-saving tech tips by David
Pogue: https://www.youtube.com/watch?v=QoT02vu9m4&feature=youtu.be
• Video – History of computer viruses:
http://www.youtube.com/watch?v=1g1yZVWrbtE#!
• Video – Cracking Stuxnet, a 21st Century Cyber
Weapon:
http://www.ted.com/talks/ralph_langner_cracking_
stuxnet_a_21st_century_cyberweapon.html
• Funny Video - #Hashtag with Jimmy Fallon &
Justin Timberlake:
https://www.youtube.com/watch?v=57dzaMaouXA
Geek humor :)

More Related Content

What's hot

Cyber crime awareness
Cyber crime awarenessCyber crime awareness
Cyber crime awarenessArjun Chetry
 
Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak Deepak Khari
 
Presentation internet safety & security by idaho web marketing meetup
Presentation   internet safety & security by idaho web marketing meetupPresentation   internet safety & security by idaho web marketing meetup
Presentation internet safety & security by idaho web marketing meetupJason Weaver
 
Do’s and Don’ts of Cybersecurity
Do’s and Don’ts of CybersecurityDo’s and Don’ts of Cybersecurity
Do’s and Don’ts of Cybersecuritytechexpert2345
 
HELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICTHELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICTBenandro Palor
 
Information Security Awareness Orientation
Information Security Awareness OrientationInformation Security Awareness Orientation
Information Security Awareness Orientationmohannadalhanahnah
 
Safe and Responsible Use of ICT
Safe and Responsible Use of ICTSafe and Responsible Use of ICT
Safe and Responsible Use of ICTRolly Franco
 
Mobile:personal learning presentation
Mobile:personal learning presentationMobile:personal learning presentation
Mobile:personal learning presentationRyan Tachibana
 
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteDOFJLCCDD
 
Empowerment
EmpowermentEmpowerment
Empowermentrairuta
 
Migo my labs
Migo my labsMigo my labs
Migo my labsrairuta
 
Working better and smarter
Working better and smarterWorking better and smarter
Working better and smarterSuzanne Reymer
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2alicelagajino
 
Ethics and safety measures in Computing
Ethics and safety measures in ComputingEthics and safety measures in Computing
Ethics and safety measures in ComputingAnkit Malviya
 
Keeping you and your library safe and secure
Keeping you and your library safe and secureKeeping you and your library safe and secure
Keeping you and your library safe and secureLYRASIS
 

What's hot (20)

Cyber crime awareness
Cyber crime awarenessCyber crime awareness
Cyber crime awareness
 
Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak
 
Presentation internet safety & security by idaho web marketing meetup
Presentation   internet safety & security by idaho web marketing meetupPresentation   internet safety & security by idaho web marketing meetup
Presentation internet safety & security by idaho web marketing meetup
 
Do’s and Don’ts of Cybersecurity
Do’s and Don’ts of CybersecurityDo’s and Don’ts of Cybersecurity
Do’s and Don’ts of Cybersecurity
 
Computer / Internet Security WHPL
Computer / Internet Security WHPLComputer / Internet Security WHPL
Computer / Internet Security WHPL
 
Personal Threat Models
Personal Threat ModelsPersonal Threat Models
Personal Threat Models
 
HELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICTHELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICT
 
Information Security Awareness Orientation
Information Security Awareness OrientationInformation Security Awareness Orientation
Information Security Awareness Orientation
 
Safe and Responsible Use of ICT
Safe and Responsible Use of ICTSafe and Responsible Use of ICT
Safe and Responsible Use of ICT
 
Mobile:personal learning presentation
Mobile:personal learning presentationMobile:personal learning presentation
Mobile:personal learning presentation
 
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and Etiquette
 
Empowerment
EmpowermentEmpowerment
Empowerment
 
Online Security
Online SecurityOnline Security
Online Security
 
Migo my labs
Migo my labsMigo my labs
Migo my labs
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Working better and smarter
Working better and smarterWorking better and smarter
Working better and smarter
 
Cyber security
Cyber securityCyber security
Cyber security
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2
 
Ethics and safety measures in Computing
Ethics and safety measures in ComputingEthics and safety measures in Computing
Ethics and safety measures in Computing
 
Keeping you and your library safe and secure
Keeping you and your library safe and secureKeeping you and your library safe and secure
Keeping you and your library safe and secure
 

Viewers also liked

What has changed in Corporate Cybersecurity?
What has changed in Corporate Cybersecurity?What has changed in Corporate Cybersecurity?
What has changed in Corporate Cybersecurity?Nixu Corporation
 
Cyber Security Awareness October 2014
Cyber Security Awareness October 2014Cyber Security Awareness October 2014
Cyber Security Awareness October 2014Donald E. Hester
 
10 Critical Corporate Cyber Security Risks
10 Critical Corporate Cyber Security Risks10 Critical Corporate Cyber Security Risks
10 Critical Corporate Cyber Security RisksHeimdal Security
 
Cyber awareness program
Cyber awareness programCyber awareness program
Cyber awareness programAvanzo net
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awarenessRobin Rafique
 
Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Gian Gentile
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber Security Infotech
 
BASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSBASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSMd Abu Syeem Dipu
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationJamie Proctor-Brassard
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessRamiro Cid
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awarenessJason Murray
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber SecurityDominic Rajesh
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingDepartment of Defense
 

Viewers also liked (15)

What has changed in Corporate Cybersecurity?
What has changed in Corporate Cybersecurity?What has changed in Corporate Cybersecurity?
What has changed in Corporate Cybersecurity?
 
Cyber Security Awareness October 2014
Cyber Security Awareness October 2014Cyber Security Awareness October 2014
Cyber Security Awareness October 2014
 
10 Critical Corporate Cyber Security Risks
10 Critical Corporate Cyber Security Risks10 Critical Corporate Cyber Security Risks
10 Critical Corporate Cyber Security Risks
 
Cyber awareness program
Cyber awareness programCyber awareness program
Cyber awareness program
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
Social Media Safety Tips
Social Media Safety TipsSocial Media Safety Tips
Social Media Safety Tips
 
Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)
 
BASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSBASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESS
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Army Social Media Presentation
Army Social Media PresentationArmy Social Media Presentation
Army Social Media Presentation
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness Briefing
 

Similar to Securing Your Cyberspace - National Cyber Security Awareness Month

Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online PrivacyKazi Sarwar Hossain
 
Security Best Practices for Regular Users
Security Best Practices for Regular UsersSecurity Best Practices for Regular Users
Security Best Practices for Regular UsersSecurity Innovation
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationSheryldeVilla2
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security PracticeBrian Pichman
 
Digital security for Sri Lankan activists
Digital security for Sri Lankan activistsDigital security for Sri Lankan activists
Digital security for Sri Lankan activistsSanjana Hattotuwa
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security InnovationPriyanka Aash
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptxCharithraaAR
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityKaushal Solanki
 
CyberSecurity Cyber24x7.pdf
CyberSecurity Cyber24x7.pdfCyberSecurity Cyber24x7.pdf
CyberSecurity Cyber24x7.pdfVarinder K
 
Internet security
Internet securityInternet security
Internet securityrfukunaga
 
Harbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidHarbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidErnest Staats
 

Similar to Securing Your Cyberspace - National Cyber Security Awareness Month (20)

Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
 
Security Best Practices for Regular Users
Security Best Practices for Regular UsersSecurity Best Practices for Regular Users
Security Best Practices for Regular Users
 
Internet
InternetInternet
Internet
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentation
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security Practice
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Judy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 PresentationJudy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 Presentation
 
Digital security for Sri Lankan activists
Digital security for Sri Lankan activistsDigital security for Sri Lankan activists
Digital security for Sri Lankan activists
 
Digital Security and Hygiene.pptx
Digital Security and Hygiene.pptxDigital Security and Hygiene.pptx
Digital Security and Hygiene.pptx
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security Innovation
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Secure End User
Secure End UserSecure End User
Secure End User
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Digital Self Defense (RRLC version)
Digital Self Defense (RRLC version)Digital Self Defense (RRLC version)
Digital Self Defense (RRLC version)
 
Computer security
Computer securityComputer security
Computer security
 
CyberSecurity Cyber24x7.pdf
CyberSecurity Cyber24x7.pdfCyberSecurity Cyber24x7.pdf
CyberSecurity Cyber24x7.pdf
 
Internet security
Internet securityInternet security
Internet security
 
Harbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidHarbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vid
 

More from Patricia M Watson

CIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 WatsonCIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 WatsonPatricia M Watson
 
ISACA President Letter | Patricia Watson | 2013
ISACA President Letter | Patricia Watson | 2013ISACA President Letter | Patricia Watson | 2013
ISACA President Letter | Patricia Watson | 2013Patricia M Watson
 
Cyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise ChapterCyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise ChapterPatricia M Watson
 
Computer Forensics | Patricia Watson | 2004
Computer Forensics | Patricia Watson | 2004Computer Forensics | Patricia Watson | 2004
Computer Forensics | Patricia Watson | 2004Patricia M Watson
 
IT Governance | 2013 Interface Conf | Watson
IT Governance | 2013 Interface Conf | WatsonIT Governance | 2013 Interface Conf | Watson
IT Governance | 2013 Interface Conf | WatsonPatricia M Watson
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonPatricia M Watson
 
Cyber Security | Patricia Watson
Cyber Security | Patricia WatsonCyber Security | Patricia Watson
Cyber Security | Patricia WatsonPatricia M Watson
 
Leveraging Digital Forensics | Patricia Watson
Leveraging Digital Forensics | Patricia WatsonLeveraging Digital Forensics | Patricia Watson
Leveraging Digital Forensics | Patricia WatsonPatricia M Watson
 

More from Patricia M Watson (8)

CIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 WatsonCIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 Watson
 
ISACA President Letter | Patricia Watson | 2013
ISACA President Letter | Patricia Watson | 2013ISACA President Letter | Patricia Watson | 2013
ISACA President Letter | Patricia Watson | 2013
 
Cyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise ChapterCyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise Chapter
 
Computer Forensics | Patricia Watson | 2004
Computer Forensics | Patricia Watson | 2004Computer Forensics | Patricia Watson | 2004
Computer Forensics | Patricia Watson | 2004
 
IT Governance | 2013 Interface Conf | Watson
IT Governance | 2013 Interface Conf | WatsonIT Governance | 2013 Interface Conf | Watson
IT Governance | 2013 Interface Conf | Watson
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
 
Cyber Security | Patricia Watson
Cyber Security | Patricia WatsonCyber Security | Patricia Watson
Cyber Security | Patricia Watson
 
Leveraging Digital Forensics | Patricia Watson
Leveraging Digital Forensics | Patricia WatsonLeveraging Digital Forensics | Patricia Watson
Leveraging Digital Forensics | Patricia Watson
 

Recently uploaded

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 

Recently uploaded (20)

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 

Securing Your Cyberspace - National Cyber Security Awareness Month

  • 1. Securing Your Cyberspace Patricia Watson National Cyber Security Awareness Month 10.2013
  • 2. National Cyber Security Awareness Month What we will cover… • In cyberspace…ignorance is NOT bliss! • Welcome to the new era of “involuntary transparency” • Do you manage your internet footprint? • Do you know what your kids are browsing? • Appendix - Resources
  • 3. Ignorance is NOT bliss! • Myth… – I don’t have anything to hide – I don’t have anything of value – Hackers are not interested in hacking my home PC
  • 4. The fact is… • Cyber adversaries are looking for the easy targets! • They are not necessarily targeting YOU – they mostly want financial and PII (in masses) • And free WIFI, hardware and bandwidth (zombies)
  • 5. Cyber Security Levels Level 1 Flawed Integration Level 2 Inconsistent Practices Level 3 Maturing & Refining Risk = High Default settings, dated systems, no firewall, weak passwords Level 4 Continuously Verified Risk = Low Use of firewall, some patching, strong passwords Firewalls strong passwords security patches & AV scans Firewalls, separate networks & accounts, automated security patches & AV scans, awareness!
  • 6. Don’t be a gummy bear! • Use a firewall – software/hardware. • Password protect your WIFI, never use the default credentials. • Check the default security settings on your devices. • Automate security patches. • Automate signature updates for anti-virus software. • Plug & Scan: all USB devices, email attachments and downloadable files should be checked for viruses. • Be diligent – Stop.Think.Connect!
  • 7. Welcome to the new era of involuntary transparency! • When you are connected to the internet, the internet is connected to YOU! • What is the internet saying about YOU? • Is your mobile device tracking your every move? • Is your browser broadcasting your interests? • Are your “friends” over-sharing your information?
  • 9. Do you manage your Internet footprint? • Everything you post on the internet is PUBLIC…there is NO privacy in cyberspace! • Once you hit the upload, share, tweet or send button, you have no control regarding the destiny of that “post“ • The Internet is not the place to broadcast your grievances about your friends or foes • Don’t post embarrassing information that would be awkward to explain to relatives, friends and current/future employers
  • 10. OMG R U #sharing TMI? • Take the time to manage the privacy settings for your accounts? • Don’t advertise your travel plans on Facebook or other social media • Remove all metadata from files BEFORE sharing • Never use the same user name & password for all accounts
  • 11. Do you manage your Internet footprint? • Do you know your “friends”? • Don’t feel obligated to “Like”, “Friend” or “Follow” profiles of people you don’t actually know! • What is the purpose of your social media account? – Work – Family & Friends – News & Trends
  • 12.
  • 13. Do you Know what your kids are browsing? • Use separate login accounts for each user – apply concept of least privilege. • Manage internet access on all devices! • If your kids use social media, be sure to “friend” &/or “follow” them. • Take off your technology blinders - stay stay current with the latest cyber trends & threats…awareness is key!
  • 14. “…the upside of painful knowledge is so much greater than the downside of blissful ignorance” (Sheryl Sandberg)
  • 16. Appendix: Resources • Firewalls • Social media tips • Location Service GPS settings • Separate user accounts • For your viewing enjoyment…
  • 17. Firewalls Firewall - a technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts. • Hardware Firewall – Apple AirPort Extreme: http://www.apple.com/airport-extreme/specs/ – Short Video – How to set up the new AirPort Extreme: http://sharepoint.bc.com/sites/Corp/ComputerSecurity/Whitepape rsandreferencematerial/Forms/AllItems.aspx – Anti Virus Software – Intego VirusBarrier (Windows friendly): http://www.intego.com/virusbarrier • Software Firewall (it’s free) – ZoneAlarm: http://www.zonealarm.com/security/en-us/zonealarmpc-security-free-firewall.htm – Configuring ZoneAlarm at home: http://hdc.tamu.edu/Security/Firewalls/Personal_Firewalls/Conf iguring_ZoneAlarm_Firewall__Free_Version_.php
  • 18. Social Media Tips • Depending on the purpose of your social media account, you don’t need to provide all your personal information – tailor the account to your needs, including privacy settings. • Remove all metadata from pictures before sharing, especially if you are posting while traveling. • There’s an App for that! Yes, most social media providers have an App for mobile phones and tablets. Be sure to manage the privacy, notifications and location services settings to avoid oversharing. • Remember, posts on social media are intended to be a “short status” not a detailed diary, keep it short, sweet and to the point. • If you want to share links to other websites via your social media account, use a reputable URL shortening service such as Bitly. • Stop.Think.Post – Remember, once you hit the upload, share, tweet or send button, you have no control regarding the destiny of that “post“!
  • 19. Location Services Location Services allows location-based apps and websites (including Maps, Camera, Safari, and other Apple and third-party apps) to use information from cellular, WIFI, Global Positioning System (GPS)2 networks, and iBeacons3 to determine your approximate location. While this tool serves a good purpose, unfortunately it has unintended consequences: • Adversaries can use it to track your every move • Companies use it to craft their marketing campaigns based on your whereabouts • Not to mention, big brother is always watching/tracking! Be sure to take the time to manage your security settings on your mobile device.
  • 20. User Accounts Given that almost every action we take in cyberspace is tracked, interconnected, or transmitted, it is good practice to keep separate user and login accounts (based on purpose or ownership): • Create separate user accounts (user name & password) if you share devices that connect to the internet with other members of your household • Create separate login accounts (user name & password) for browsers (Mozilla, Chrome, IE) and applications (iTunes, Facebook, etc.) • Apply the principle of least privilege to all accounts and keep them separate from your Administrator account! • NEVER use the same password for multiple accounts & change your password often!
  • 21. For your viewing enjoyment… • Short Film – The Dawn of the Net: http://www.youtube.com/watch?v=RhvKm0RdUY0&featu re=youtu.be • Video – 10 top time-saving tech tips by David Pogue: https://www.youtube.com/watch?v=QoT02vu9m4&feature=youtu.be • Video – History of computer viruses: http://www.youtube.com/watch?v=1g1yZVWrbtE#! • Video – Cracking Stuxnet, a 21st Century Cyber Weapon: http://www.ted.com/talks/ralph_langner_cracking_ stuxnet_a_21st_century_cyberweapon.html • Funny Video - #Hashtag with Jimmy Fallon & Justin Timberlake: https://www.youtube.com/watch?v=57dzaMaouXA