SlideShare a Scribd company logo
1 of 64
Welcome, we will
begin shortly.
Keep the
Grinch from
Ruining Your
Cyber-Monday
Michele Chubirka
Security Bossy-Pants
v. 4 10/16/2015
Helpful Information
• Michele Chubirka, aka "Mrs.
Y.”
• Analyst, blogger, tech writer,
podcaster and Security Jedi
Knight.
• Focuses on topics such as
security vulnerabilities and
best practices.
• Twitter: @MrsYisWhy
Bio
You’re a Mean One, Mr. Grinch
• In 2014, multiple, large retailers hacked, including
Target, with 40M credit cards compromised and Home
Depot with 56M credit card numbers stolen.
• Sony Pictures breached, corporate data including
employee personal information (including SSNs)
compromised and email posted on Wikileaks.
• Office of Personnel Management (OPM) hacked,
records of 22.1M federal workers and contractors
compromised.
• IRS online application exploited to steal 334K taxpayer
records.
• Anthem Blue Cross, 78M records breached.
Consequences
• Stolen information used in identity theft.
• Increased costs to government, business and
the consumer through fraud.
Identity Theft
• According to TransUnion,
fastest growing crime in the
US with 9.9M incidents per
year.
• Every minute 19 people are
victimized
• Everyone is vulnerable.
• How to shop online safely.
• Protecting yourself from internet
scams, phishing, and fraud.
• Safeguarding your personal
information against identity theft.
• Security tools and tricks to keep
your digital information safe.
8
Today you’ll learn about:
Data Has Value
Personally Identifiable Information(PII)
– Payment card information
– Social Security Number
– Email address
– Home address
– Birth date
– Passwords
– Health information
Comparison: Online vs. In-Store
In-Store Online
Credit card skimmers or vulnerable point-
of-sale (PoS) system.
Insecure web site application.
Must trust employees who handle
payment cards to protect data.
Dependent upon ecommerce company IT
staff to follow “best practices.”
Must follow PCI DSS compliance
standards.
Must follow PCI DSS compliance
standards.
Safe protection and disposal of paper
records.
Safe protection and disposal of electronic
records.
Skimmer
ATM
Skimmer
How To Protect Yourself
Verify SSL/TLS encrypted sites in your
browser.
Do Business With Reputable
Merchants
Other Shopping Tips
• Don’t save payment card info with
an online retailer.
• Don’t provide your credit card
number over the phone.
• Never use your bank’s debit card for
online or PoS transactions.
• Consider using a digital payment
service such as Paypal or
prepaid/reloadable cards.
• Check your bills regularly for
fraudulent charges.
Just Say “No” to Phishing
Examples
Group
Chat
Exercise
Group
Chat
Exercise
Group Chat Exercise
Group Chat Exercise
Useful Tips
Verify the email address matches the name of the
sender.
Check spelling, grammar and punctuation.
Hover over links & review the URL- does it
match?
If it’s not personalized to you, then it’s suspicious.
No one should ask you for credentials (pin or
password) via email.
When in doubt- DON’T CLICK!!!
What If I
Accidentally
Click on the
Link?
Group Chat Exercise
Group Chat Exercise
Group Chat Exercise
Phish Walk-through
Actual Hosting Site
• A page on Iriver’s web site, a South Korean
company that makes portable media players.
Gmail
Analysis
Redirection
Protecting Yourself From Phishing and Fraud
• Email Links are bad. Run away.
• Don’t open attachments you aren’t
expecting.
• Be careful when sharing ANY information
on social media.
• Never send passwords in email.
• Avoid using public computers in libraries
or hotels.
• Never leave passwords, credit card
numbers or your SSN unencrypted in
email, in the cloud or on your computer.
• Shred, shred, shred anything with your
data before throwing away.
Securing Your Browser (and Your Privacy)
• Web browsers can be dangerous. Information
they collect and store can be used by malicious
actors.
• Helpful tools:
– Privacy Badger
– Ghostery privacy extension
– Incognito mode in Chrome or private browsing in
Firefox.
– DuckDuckGo - search engine without personalization
or tracking.
Adding Extensions in Firefox
• Open Firefox
• Click Tools
• Click Add-ons
• Search for the
Add-On
• Install the Add-On
Adding Extensions in Chrome
• Open Chrome
• Click Tools
• Click More Tools
• Extensions
• Get More
Extensions
Ghostery and Privacy Badger
https://duckduckgo.com/
Chrome and Firefox Private Browsing
Be Proactive
• Use a password safe for storing credentials securely.
• Enable multi-factor authentication options and regularly change
passwords.
• Check your credit reports and/or use credit monitoring services.
• Use anti-virus and patch your computers and mobile devices
regularly.
• Secure your home network (i.e. encrypt your wireless, change the
default password on your router, configure the firewall).
• Never use unencrypted wireless.
• Consider an automatically renewing fraud alert or a security freeze
on your credit file. http://krebsonsecurity.com/2014/03/are-credit-
monitoring-services-worth-it/
• Enable privacy options in social media and in your browser.
• Stay informed.
Password
Managers
Bank Authentication
Social Media Privacy and Security Options
Identity Theft Resource Center
Have I Been Pwned?
Breach Level Index
Privacy Rights Clearinghouse
Resources
• Identity Theft Resource Center
http://www.idtheftcenter.org/
• have i been pwned? https://haveibeenpwned.com/
• Breach Level Index http://www.breachlevelindex.com/
• Krebs On Security http://krebsonsecurity.com/
• Privacy Rights Clearinghouse
http://www.privacyrights.org/
• Adding extensions in Firefox
http://www.accessfirefox.org/Addons_Installation_Gui
de.php
• Password managers: Dashlane, 1Password, Lastpass
Learn More!
AARP TEK Academy
http://aarptek.aarp.org/
Learn More at AARP TEK Academy
http://aarptek.org
Learn More at AARP TEK Academy
http://aarptek.org
Learn More!
AARP TEK Academy
http://aarptek.aarp.org/
Step 1: Select
the “share”
icon
Step 2: Select
Facebook
Step 3: Type a message & share!
Share
Thank you
and be safe
online!

More Related Content

What's hot

Digital privacy
Digital privacyDigital privacy
Digital privacyAnna Adel
 
Protecting Personal Privacy
Protecting Personal PrivacyProtecting Personal Privacy
Protecting Personal PrivacyDoubleXDS
 
Spam & Phishing
Spam & PhishingSpam & Phishing
Spam & PhishingGrittyCC
 
Internet safety and security
Internet safety and securityInternet safety and security
Internet safety and securityDjTechs
 
PROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACYPROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACYDoubleXDS
 
Cyber security (2) (2)
Cyber security (2) (2)Cyber security (2) (2)
Cyber security (2) (2)ameyjakate
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)aleeya91
 
Phishing
PhishingPhishing
PhishingSyahida
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-wowwFloroRaphaell
 
2017 Phishing Trends & Intelligence Report: Hacking the Human
2017 Phishing Trends & Intelligence Report: Hacking the Human2017 Phishing Trends & Intelligence Report: Hacking the Human
2017 Phishing Trends & Intelligence Report: Hacking the HumanPhishLabs
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORTvineetkathan
 

What's hot (20)

Staying Secure Electronically
Staying Secure ElectronicallyStaying Secure Electronically
Staying Secure Electronically
 
Digital privacy
Digital privacyDigital privacy
Digital privacy
 
Protecting Personal Privacy
Protecting Personal PrivacyProtecting Personal Privacy
Protecting Personal Privacy
 
Spam & Phishing
Spam & PhishingSpam & Phishing
Spam & Phishing
 
Internet safety and security
Internet safety and securityInternet safety and security
Internet safety and security
 
PROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACYPROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACY
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Phishing
PhishingPhishing
Phishing
 
Internet fraud and identity theft
Internet fraud and identity theftInternet fraud and identity theft
Internet fraud and identity theft
 
Cyber security (2) (2)
Cyber security (2) (2)Cyber security (2) (2)
Cyber security (2) (2)
 
Digital Identity:Threats and Prevention
Digital Identity:Threats and PreventionDigital Identity:Threats and Prevention
Digital Identity:Threats and Prevention
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)
 
Phishing
PhishingPhishing
Phishing
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-woww
 
2017 Phishing Trends & Intelligence Report: Hacking the Human
2017 Phishing Trends & Intelligence Report: Hacking the Human2017 Phishing Trends & Intelligence Report: Hacking the Human
2017 Phishing Trends & Intelligence Report: Hacking the Human
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORT
 
Mcwt presentation 1
Mcwt presentation 1Mcwt presentation 1
Mcwt presentation 1
 
Introduction to phishing
Introduction to phishingIntroduction to phishing
Introduction to phishing
 
Phishing attack till now
Phishing attack till nowPhishing attack till now
Phishing attack till now
 

Similar to How To Keep the Grinch From Ruining Your Cyber Monday

E business internet fraud
E business internet fraudE business internet fraud
E business internet fraudRadiant Minds
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupBrian Pichman
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024Brian Pichman
 
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleCybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleBrian Pichman
 
Securing & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxSecuring & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxBrian Pichman
 
Phishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxPhishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxStephen Jesukanth Martin
 
Internet Security
Internet SecurityInternet Security
Internet Securitymjelson
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptxCharithraaAR
 
Identity theft in internet
Identity theft in internetIdentity theft in internet
Identity theft in internetomarjohni
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxKevinRiley83
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsKrishna Srikanth Manda
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security PracticeBrian Pichman
 
It security in healthcare
It security in healthcareIt security in healthcare
It security in healthcareNicholas Davis
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingSachin Saini
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayanehaz
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentationcharlesgarrett
 
Fraud seminar for charities
Fraud seminar for charitiesFraud seminar for charities
Fraud seminar for charitiesBlake Morgan LLP
 

Similar to How To Keep the Grinch From Ruining Your Cyber Monday (20)

E business internet fraud
E business internet fraudE business internet fraud
E business internet fraud
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library Setup
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024
 
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleCybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
 
Securing & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxSecuring & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptx
 
Phishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxPhishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptx
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Identity theft in internet
Identity theft in internetIdentity theft in internet
Identity theft in internet
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security Practice
 
It security in healthcare
It security in healthcareIt security in healthcare
It security in healthcare
 
IB Fraud
IB FraudIB Fraud
IB Fraud
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Fraud seminar for charities
Fraud seminar for charitiesFraud seminar for charities
Fraud seminar for charities
 
Protect Your Identity
Protect Your IdentityProtect Your Identity
Protect Your Identity
 
IT Security Awareness Posters
IT Security Awareness PostersIT Security Awareness Posters
IT Security Awareness Posters
 

Recently uploaded

DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 

Recently uploaded (20)

DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 

How To Keep the Grinch From Ruining Your Cyber Monday

  • 2. Keep the Grinch from Ruining Your Cyber-Monday Michele Chubirka Security Bossy-Pants v. 4 10/16/2015
  • 4. • Michele Chubirka, aka "Mrs. Y.” • Analyst, blogger, tech writer, podcaster and Security Jedi Knight. • Focuses on topics such as security vulnerabilities and best practices. • Twitter: @MrsYisWhy Bio
  • 5. You’re a Mean One, Mr. Grinch • In 2014, multiple, large retailers hacked, including Target, with 40M credit cards compromised and Home Depot with 56M credit card numbers stolen. • Sony Pictures breached, corporate data including employee personal information (including SSNs) compromised and email posted on Wikileaks. • Office of Personnel Management (OPM) hacked, records of 22.1M federal workers and contractors compromised. • IRS online application exploited to steal 334K taxpayer records. • Anthem Blue Cross, 78M records breached.
  • 6. Consequences • Stolen information used in identity theft. • Increased costs to government, business and the consumer through fraud.
  • 7. Identity Theft • According to TransUnion, fastest growing crime in the US with 9.9M incidents per year. • Every minute 19 people are victimized • Everyone is vulnerable.
  • 8. • How to shop online safely. • Protecting yourself from internet scams, phishing, and fraud. • Safeguarding your personal information against identity theft. • Security tools and tricks to keep your digital information safe. 8 Today you’ll learn about:
  • 9. Data Has Value Personally Identifiable Information(PII) – Payment card information – Social Security Number – Email address – Home address – Birth date – Passwords – Health information
  • 10. Comparison: Online vs. In-Store In-Store Online Credit card skimmers or vulnerable point- of-sale (PoS) system. Insecure web site application. Must trust employees who handle payment cards to protect data. Dependent upon ecommerce company IT staff to follow “best practices.” Must follow PCI DSS compliance standards. Must follow PCI DSS compliance standards. Safe protection and disposal of paper records. Safe protection and disposal of electronic records.
  • 13.
  • 14. How To Protect Yourself
  • 15. Verify SSL/TLS encrypted sites in your browser.
  • 16. Do Business With Reputable Merchants
  • 17. Other Shopping Tips • Don’t save payment card info with an online retailer. • Don’t provide your credit card number over the phone. • Never use your bank’s debit card for online or PoS transactions. • Consider using a digital payment service such as Paypal or prepaid/reloadable cards. • Check your bills regularly for fraudulent charges.
  • 18. Just Say “No” to Phishing
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 30. Useful Tips Verify the email address matches the name of the sender. Check spelling, grammar and punctuation. Hover over links & review the URL- does it match? If it’s not personalized to you, then it’s suspicious. No one should ask you for credentials (pin or password) via email. When in doubt- DON’T CLICK!!!
  • 32.
  • 36.
  • 38. Actual Hosting Site • A page on Iriver’s web site, a South Korean company that makes portable media players.
  • 39. Gmail
  • 42. Protecting Yourself From Phishing and Fraud • Email Links are bad. Run away. • Don’t open attachments you aren’t expecting. • Be careful when sharing ANY information on social media. • Never send passwords in email. • Avoid using public computers in libraries or hotels. • Never leave passwords, credit card numbers or your SSN unencrypted in email, in the cloud or on your computer. • Shred, shred, shred anything with your data before throwing away.
  • 43. Securing Your Browser (and Your Privacy) • Web browsers can be dangerous. Information they collect and store can be used by malicious actors. • Helpful tools: – Privacy Badger – Ghostery privacy extension – Incognito mode in Chrome or private browsing in Firefox. – DuckDuckGo - search engine without personalization or tracking.
  • 44. Adding Extensions in Firefox • Open Firefox • Click Tools • Click Add-ons • Search for the Add-On • Install the Add-On
  • 45. Adding Extensions in Chrome • Open Chrome • Click Tools • Click More Tools • Extensions • Get More Extensions
  • 48. Chrome and Firefox Private Browsing
  • 49. Be Proactive • Use a password safe for storing credentials securely. • Enable multi-factor authentication options and regularly change passwords. • Check your credit reports and/or use credit monitoring services. • Use anti-virus and patch your computers and mobile devices regularly. • Secure your home network (i.e. encrypt your wireless, change the default password on your router, configure the firewall). • Never use unencrypted wireless. • Consider an automatically renewing fraud alert or a security freeze on your credit file. http://krebsonsecurity.com/2014/03/are-credit- monitoring-services-worth-it/ • Enable privacy options in social media and in your browser. • Stay informed.
  • 52.
  • 53. Social Media Privacy and Security Options
  • 55. Have I Been Pwned?
  • 58. Resources • Identity Theft Resource Center http://www.idtheftcenter.org/ • have i been pwned? https://haveibeenpwned.com/ • Breach Level Index http://www.breachlevelindex.com/ • Krebs On Security http://krebsonsecurity.com/ • Privacy Rights Clearinghouse http://www.privacyrights.org/ • Adding extensions in Firefox http://www.accessfirefox.org/Addons_Installation_Gui de.php • Password managers: Dashlane, 1Password, Lastpass
  • 59. Learn More! AARP TEK Academy http://aarptek.aarp.org/
  • 60. Learn More at AARP TEK Academy http://aarptek.org
  • 61. Learn More at AARP TEK Academy http://aarptek.org
  • 62. Learn More! AARP TEK Academy http://aarptek.aarp.org/
  • 63. Step 1: Select the “share” icon Step 2: Select Facebook Step 3: Type a message & share! Share
  • 64. Thank you and be safe online!

Editor's Notes

  1. Welcome everyone, My Name is Kim Haslam and I will be your moderator for today. Today’s webinar ……………….
  2. Before we get started. I would like to review how to use the webinar platform. At the bottom of your screen you will see a toolbar. The first icon is for questions and answers. Throughout the presentation today, we will be taking questions from our audience. You click the icon to open the q&a box, type your question and hit submit. We will also have a live q&a at the end of the presentation. If you experience any technical difficulties please let us know by using the QA feature. The next icon that is blue is the Speaker Bio Following that is the icon for the media player. The yellow icon opens and closes the slide window. The green icon is to share this webinar on social media or email. The red icon with an image of a group of people is for our group chat which we will be using today. During the presentation we will pose a question to you and would like you to respond through the group chat. Finally the green icon with a folder is resources that are available to you for download. To open or close any of the icons you can click on the icon in the toolbar or use the minimize feature in each of the boxes. To open or close any of the icons you can click on the icon in the toolbar or use the minimize feature in each of the boxes. Now, lets get started.
  3. Jimdo is a free website creator service.
  4. Review this email- what makes this suspicious? Use the chat feature on your toolbar to respond.
  5. Items to point out Subject line: the title Open Enrollment is not all capital Health Insurance savings for the email is suspicious & email address is for best buy This type of reminder would typically come from the government not best buy- they also would not call it obamacare or promote a picture of the president Has random word “newsletter” When you hover over the links- the url is not for insurance
  6. This is an email that was detected by a gmail account. WhatsApp is a text messaging app that is very popular. What are some signs that this email suspicious?
  7. Email does not match WhatsApp Whats App is spelled differently throughout the email Voice message is spelling incorreclty Warning from gmail It is not personal (Dear Jim)
  8. In summary – here are some best practices when reviewing emails
  9. The Identity Theft Resource Center is a United States non-profit organization founded to provide victim assistance and consumer education through its toll-free call center, website and social media. The ITRC educates consumers, corporations, government agencies, and other organizations on best practices for fraud and identity theft detection, reduction and mitigation; and, serves as a relevant national resource on consumer issues related to cybersecurity, data breaches, social media, fraud, scams, and other issues. It was created in December 1999 in San Diego, California. To educate and inform consumers about identity theft, fraud, scams, and cyber-crime. Educate consumers, corporations, government agencies, and other organizations on best practices for fraud and identity theft detection, reduction and mitigation. To guide and assist victims of identity theft in the process necessary to clear fraud caused by identity theft from their personal, financial, and criminal records. Serve as a relevant national resource on consumer issues related to cybersecurity, data breaches, social media, fraud, scams and other issues.
  10. And this webinar isn’t the only way you can learn more about technology. Visit AARPTEK.ORG – go to events to sign up for live workshops or visit Online seminars page for upcoming webinars.
  11. You can also go to our Learn tab and find, short videos, articles, eLearning and tutorials about various topics. We have a number of TEK Talks with Mike Lee under Connected Life. You can also explore Learning Advisor which has over 30,000 courses on various topics to help you expand your knowledge.
  12. To wrap up, you have a great reason to post a link to Facebook… Just look below this webinar and check out the share buttons below this video player. Share a link to this webinar so more of your friends can learn about this training!