Keeping em Safe:8 More Waysto Help YourClients
More than 8 in 10 US small businesses believe   their firms are safe from cyber threats yetalmost 80% have no formal secur...
What Is Cyber Crime?●    Spam●    Fraud●    Obscene or offensive content●    Harassment●    Child pornography●    Drug tra...
Who Is Behind          Cyber Crime?●    Script kiddies●    Hacktivists●    Individual miscreants●    National & transnatio...
Why Should You Care?●    Your clients trust you with very sensitive data.●    If they become victims, your clients have le...
Biggest Threat?       You
What? No Way!●  Acting maliciously●  Forgetting to log off●  Losing laptops, USB keys, or smartphones●  Storing client dat...
Acting maliciously
What You Can Do●    Put policies in place and enforce them●    Trust your gut
Forgetting to log off
What You Can Do●    Log off when you leave your computer●    Shut down your computer at the end of the    day●    Set up y...
Losing laptops,USB keys, orsmartphones
What You Can Do●    Pay special attention and be careful●    Store only the client data you absolutely need●    Encrypt yo...
Storing client data inquestionable places
What You Can Do●    Read privacy policies●    Develop a set of approved sites that client    information can be stored on ...
Downloadingviruses andmalware
What You Can Do●    Patch software and systems religiously●    Read before you click●    Ask if the email or attachment se...
Using socialnetworksitescarelessly
What You Can Do●    Be careful what you click●    Dont friend people you dont know●    Use strong passwords●    Avoid play...
Leavingmetadata in documents
What You Can Do●    Clean metadata from documents before sending    electronic copies●    Use the Document Inspector tool ...
Having badpasswordpractices
What You Can Do●    Use strong passwords●    Change passwords quarterly●    Dont use a password for more than one site●   ...
Getting tricked
What You Can Do●    Be skeptical●    Dont give anyone your passwords●    Dont click a link to your bank website
What If?●    Tell your supervisor immediately●    Be prepared to help figure out what happened●    Notify the proper autho...
Who Are the         Proper Authorities?Computer Intrusion           Local FBI Office                             US Secret...
Who Are the          Proper Authorities?Child pornography or   Local FBI Officeexploitation           US Customs and Enfor...
Resources●    Cybercrime Reporting    http://www.cybercrime.gov/reporting.htm●    Stay Safe Online    http://www.staysafeo...
Resources●    US CERT    http://www.us-cert.gov/cas/tips/●    OnGuard Online    http://www.onguardonline.gov/topics/comput...
Picture AttributionsIn orderhttp://www.flickr.com/photos/jesseshapins/3788641411/http://commons.wikimedia.org/wiki/File:Ha...
Contact InformationKate BladowFounder & Strategistpresentations@poweredpursuits.com
Upcoming SlideShare
Loading in …5
×

Keeping 'Em Safe: Ways to Protect Your Clients Online

572 views

Published on

A presentation for the 2011 Virginia Annual Statewide Legal Aid Conference.

You need to protect yourself and your clients' data online. We'll look at using social network sites, downloading viruses, leaving metadata in documents, having bad password practices, putting information in the cloud.

Published in: Technology
  • Be the first to comment

Keeping 'Em Safe: Ways to Protect Your Clients Online

  1. 1. Keeping em Safe:8 More Waysto Help YourClients
  2. 2. More than 8 in 10 US small businesses believe their firms are safe from cyber threats yetalmost 80% have no formal security policies in place.You can be attacked and not even know it. Even worse, your system could be used to attack other people, and you may not know it.
  3. 3. What Is Cyber Crime?● Spam● Fraud● Obscene or offensive content● Harassment● Child pornography● Drug trafficking● Cyber terrorism● Cyber warfare
  4. 4. Who Is Behind Cyber Crime?● Script kiddies● Hacktivists● Individual miscreants● National & transnational organized criminal enterprises● Nation states
  5. 5. Why Should You Care?● Your clients trust you with very sensitive data.● If they become victims, your clients have less of an ability to bounce back.● Systems that are used to commit crimes often support the same organized networks that are behind human trafficking, identity theft, child pornography, and other issues you battle against daily.
  6. 6. Biggest Threat? You
  7. 7. What? No Way!● Acting maliciously● Forgetting to log off● Losing laptops, USB keys, or smartphones● Storing client data in questionable places● Downloading viruses and malware● Using social network sites carelessly● Leaving metadata in documents● Having bad password practices● Getting tricked
  8. 8. Acting maliciously
  9. 9. What You Can Do● Put policies in place and enforce them● Trust your gut
  10. 10. Forgetting to log off
  11. 11. What You Can Do● Log off when you leave your computer● Shut down your computer at the end of the day● Set up your computer to automatically lock when the screensaver comes on
  12. 12. Losing laptops,USB keys, orsmartphones
  13. 13. What You Can Do● Pay special attention and be careful● Store only the client data you absolutely need● Encrypt your data● Set up phones so you can erase them remotely● Use strong passwords● Back up the data before you leave
  14. 14. Storing client data inquestionable places
  15. 15. What You Can Do● Read privacy policies● Develop a set of approved sites that client information can be stored on and train staff to not store data on any other sites● Dont include identifiable client information in emails
  16. 16. Downloadingviruses andmalware
  17. 17. What You Can Do● Patch software and systems religiously● Read before you click● Ask if the email or attachment seems “funny”● Avoid downloading screensavers, fonts, & porn● Use your anti-virus software● Ignore any website that pops up a virus warning
  18. 18. Using socialnetworksitescarelessly
  19. 19. What You Can Do● Be careful what you click● Dont friend people you dont know● Use strong passwords● Avoid playing games and installing applications● Be very careful about what you post
  20. 20. Leavingmetadata in documents
  21. 21. What You Can Do● Clean metadata from documents before sending electronic copies● Use the Document Inspector tool in Office● Download and use Metadata Removal tool for WordPerfect
  22. 22. Having badpasswordpractices
  23. 23. What You Can Do● Use strong passwords● Change passwords quarterly● Dont use a password for more than one site● Dont share passwords● Establish password guidelines for the organization and follow them● Try a password manager
  24. 24. Getting tricked
  25. 25. What You Can Do● Be skeptical● Dont give anyone your passwords● Dont click a link to your bank website
  26. 26. What If?● Tell your supervisor immediately● Be prepared to help figure out what happened● Notify the proper authorities
  27. 27. Who Are the Proper Authorities?Computer Intrusion Local FBI Office US Secret Service Internet Crime Complaint CenterPassword trafficking Local FBI Office US Secret Service Internet Crime Complaint CenterCounterfeiting of currency US Secret Service
  28. 28. Who Are the Proper Authorities?Child pornography or Local FBI Officeexploitation US Customs and Enforcement (if imported) Internet Crime Complaint CenterInternet fraud & SPAM Local FBI Office US Secret Service (Financial Crimes Division) Federal Trade Commission Securities & Exchange Commission (if securities/investment-related) Internet Crime Complaint CenterInternet harassment Local FBI Office
  29. 29. Resources● Cybercrime Reporting http://www.cybercrime.gov/reporting.htm● Stay Safe Online http://www.staysafeonline.org/● US CERT http://www.us-cert.gov/nav/nt01/
  30. 30. Resources● US CERT http://www.us-cert.gov/cas/tips/● OnGuard Online http://www.onguardonline.gov/topics/computer-security.aspx
  31. 31. Picture AttributionsIn orderhttp://www.flickr.com/photos/jesseshapins/3788641411/http://commons.wikimedia.org/wiki/File:Harry_Potter_Lightning.gifhttp://commons.wikimedia.org/wiki/File:Computer_n_screen.svghttp://www.flickr.com/photos/dunechaser/385847284/sizes/l/http://www.flickr.com/photos/sravi_in/3623242288/sizes/z/http://www.flickr.com/photos/stukjefotogebeuren/2081170312/http://www.flickr.com/photos/librarianbyday/3983719036/http://www.flickr.com/photos/booleansplit/4650422195/http://www.flickr.com/photos/the-icing-on-the-cake/2424326595/http://www.flickr.com/photos/sshb/3619977273/http://www.flickr.com/photos/esm723/4377802647/http://www.flickr.com/photos/stevendepolo/4027405671/
  32. 32. Contact InformationKate BladowFounder & Strategistpresentations@poweredpursuits.com

×