SlideShare a Scribd company logo
© 2017 Imperva, Inc. All rights reserved.
Practical Tips And Tactics To
Stay Safe Online
David Dowling | Director Worldwide Inside Sales
@David_S_Dowling
Thursday, 15 June 2017
© 2017 Imperva, Inc. All rights reserved.
Intro
Confidential2
• Hiring – Anyone looking to hire? Anyone looking for roles?
• Brief Overview of Imperva and the DDoS Threat landscape
• How to check if your accounts have been compromised
• Moving away from the same password or an Excel sheet
• Why 2FA is A-OK
• Quick easy way to reduce spam
• How to secure your computer
• Tips and tricks from the audience
© 2017 Imperva, Inc. All rights reserved.
Staying Safe Online?
3
U Wot M8?
© 2017 Imperva, Inc. All rights reserved.
Don’t Worry! This Is Not A Sales Pitch – Everything mainly free and online
© 2017 Imperva, Inc. All rights reserved.
Background on Imperva – Data and App Security
Confidential5
• We focus on Database and application security, stopping DDoS attacks
(stopped 17,000 DDoS attacks in Q1
• DDoS trends – More short hit and run DDoS attacks
• Increase in application DDoS attacks – Seeing up to 176,000 Requests per
second (RPS)
© 2017 Imperva, Inc. All rights reserved.
Bay Area Meet Up Hiring Managers?
Confidential6
• Imperva has multiple technical roles open at Imperva – Join the team
• Who else is hiring?
© 2017 Imperva, Inc. All rights reserved.
Way To Check URLs or files for viruses
Confidential7
• VirusTotal – Way to check URLs or files
• URL Extenders - http://urlex.org/
• Google Docs – Safer way to open Word docs
© 2017 Imperva, Inc. All rights reserved.
Has my Ashley Madison / LinkedIn / Adobe account been ‘pwned’?
8
• https://haveibeenpwned.com – Free service run by fellow Strayan Troy Hunt
• 2015 had 34 ‘pwned’ websites, 2017 had 220 ‘pwned’ websites
• Now upto 3.8 Billion pwned accounts – Left is 2015, right is 2017
© 2017 Imperva, Inc. All rights reserved.
But I Didn’t Click Anywhere!
9
• A Malvertising attack on Yahoo users in Eastern Europe via the advertising
meant that users DIDN’T have to click on ads to get malware – Just had to
visit the site
• Ad Blockers are your friend – Electronic Frontier Foundation (EFF) has
Privacy Badger and Ad Block Plus is good for Google Chrome. NoScript is for
Firefox.
© 2017 Imperva, Inc. All rights reserved.
If You Visit “Dodgy” Sites
Confidential10
• Use FireFox and Install NoScript
• Duckduck Go – Do you really want “Hooli knowing everything?
• Don’t forget to set Private Browsing for other computer users
© 2017 Imperva, Inc. All rights reserved.
Example of Passwords from 42 Million Accounts At OkCupid
• If this is your password – Please change!
• Source: Krebs on Security
© 2017 Imperva, Inc. All rights reserved.
Password Management
12
• KeePass, Dashlane – A way to generate passwords
• www.PasswordGenerator.net
• Do your research – Tavis Ormandy from Google
© 2017 Imperva, Inc. All rights reserved.
Two Factor What?
Confidential13
• Two Factor Authentication or Multi-Factor Authentication sends one time
passwords via email or SMS
• Gmail, LinkedIn, HootSuite, LastPass, Yahoo, PayPal, Facebook
• Great blog post by Imperva’s Solutions Manager Jeff Serota
© 2017 Imperva, Inc. All rights reserved.
How Can I Check If My Bank / App Has 2FA?
Confidential14
• https://twofactorauth.org/ - Free site that lists all apps that have 2FA
• Gmail, LinkedIn, HootSuite, LastPass, Yahoo, PayPal, Facebook
© 2017 Imperva, Inc. All rights reserved.
Why Is Two Factor Authentication Important?
Confidential15
• Stops people that you don’t want to read your
email or do your banking for you.
• Example I had post Yahoo breach notification
• Look for solutions that let you accept or reject like
Duo Security, Authy as well as Google
Authenticator
• Physical tokens are making a come back –
Yubico’s Yubikey is good
© 2017 Imperva, Inc. All rights reserved.
Brian Krebs – Tools for a Safer PC
16
• Turn On automatic updates so your operating system can receive the latest
fixes
• Especially Adobe and Java
© 2017 Imperva, Inc. All rights reserved.
How Not Give Marketers Your Emails
Confidential17
• Use temporary services like Shark Lasers, Mailnator and more
• Reduce the number of accounts that tie back to your main email and reduce
your spam
© 2017 Imperva, Inc. All rights reserved.
Using “Free” Wi-Fi At a Cafe
Confidential18
• Source: Life Hacker
• Use a VPN and turn on Firewall
• Turn off Sharing
• Https
• Use Public Network
© 2017 Imperva, Inc. All rights reserved.
Useful Websites
1919
• Information is Beautiful – Data Breaches
• Have I Been Pwned.com
• Twitter
• Naked Security - Sophos
• Krebs On Security.com
• Incapsula.com/blog
• Dark Reading
• Swift on Security
• Troyhunt.com
Bay Area Cyber Security Meetup - How To Stay Safe Online

More Related Content

Similar to Bay Area Cyber Security Meetup - How To Stay Safe Online

Aaron Higbee - The Humanity of Phishing Attack & Defense
Aaron Higbee - The Humanity of Phishing Attack & DefenseAaron Higbee - The Humanity of Phishing Attack & Defense
Aaron Higbee - The Humanity of Phishing Attack & Defense
centralohioissa
 
How to Think About Your Technology Roadmap for 2017 - Kristi Kennelly
How to Think About Your Technology Roadmap for 2017 - Kristi KennellyHow to Think About Your Technology Roadmap for 2017 - Kristi Kennelly
How to Think About Your Technology Roadmap for 2017 - Kristi Kennelly
Inman News
 
Cyber Resilency VANCOUVER, BC Nov 2017
Cyber Resilency VANCOUVER, BC  Nov 2017  Cyber Resilency VANCOUVER, BC  Nov 2017
Cyber Resilency VANCOUVER, BC Nov 2017
Kevin Murphy
 
Jisc cyber security posture survey
Jisc cyber security posture surveyJisc cyber security posture survey
Jisc cyber security posture survey
Jisc
 
2017 Phishing Trends & Intelligence Report: Hacking the Human
2017 Phishing Trends & Intelligence Report: Hacking the Human2017 Phishing Trends & Intelligence Report: Hacking the Human
2017 Phishing Trends & Intelligence Report: Hacking the Human
PhishLabs
 
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External ThreatsUnderstanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Ulf Mattsson
 
The Case for EDR: What's In Your Toolkit
The Case for EDR: What's In Your ToolkitThe Case for EDR: What's In Your Toolkit
The Case for EDR: What's In Your Toolkit
Dawn Yankeelov
 
Cerdant Security State of the Union
Cerdant Security State of the UnionCerdant Security State of the Union
Cerdant Security State of the Union
David Perkins
 
Journey to Establish an Open Source Policy in a Fortune 20 Health Care Company
Journey to Establish an Open Source Policy in a Fortune 20 Health Care CompanyJourney to Establish an Open Source Policy in a Fortune 20 Health Care Company
Journey to Establish an Open Source Policy in a Fortune 20 Health Care Company
All Things Open
 
Your Service Desk is Privileged, Too
Your Service Desk is Privileged, TooYour Service Desk is Privileged, Too
Your Service Desk is Privileged, Too
Bomgar
 
Multi channel marketing 2017 across mobile, email, display and search
Multi channel marketing 2017 across mobile, email, display and searchMulti channel marketing 2017 across mobile, email, display and search
Multi channel marketing 2017 across mobile, email, display and search
Roberto Gennaro
 
The Very Best Intranets & Digital Workplace from the 2016 Intranet Global Forum
The Very Best Intranets & Digital Workplace from the 2016 Intranet Global ForumThe Very Best Intranets & Digital Workplace from the 2016 Intranet Global Forum
The Very Best Intranets & Digital Workplace from the 2016 Intranet Global Forum
Prescient Digital Media
 
14 Online Tools Every Small Business Owner Should Use
14 Online Tools Every Small Business Owner Should Use14 Online Tools Every Small Business Owner Should Use
14 Online Tools Every Small Business Owner Should Use
dywtsi
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security Seminar
Jeremy Quadri
 
Masterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy BasicsMasterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy Basics
Excellence Foundation for South Sudan
 
How to improve resilience and respond better to Cyber Attacks with ISO 22301?
How to improve resilience and respond better to Cyber Attacks with ISO 22301?How to improve resilience and respond better to Cyber Attacks with ISO 22301?
How to improve resilience and respond better to Cyber Attacks with ISO 22301?
PECB
 
What it Takes to be a CISO in 2017
What it Takes to be a CISO in 2017What it Takes to be a CISO in 2017
What it Takes to be a CISO in 2017
Doug Copley
 
Cybersecurity for CRM v0219-3
Cybersecurity for CRM v0219-3Cybersecurity for CRM v0219-3
Cybersecurity for CRM v0219-3
Caston Thomas
 
Security in the Digital Workplace
Security in the Digital WorkplaceSecurity in the Digital Workplace
Security in the Digital Workplace
LiveTiles
 
Why Security Matters for Marketers
Why Security Matters for MarketersWhy Security Matters for Marketers
Why Security Matters for Marketers
HubSpot
 

Similar to Bay Area Cyber Security Meetup - How To Stay Safe Online (20)

Aaron Higbee - The Humanity of Phishing Attack & Defense
Aaron Higbee - The Humanity of Phishing Attack & DefenseAaron Higbee - The Humanity of Phishing Attack & Defense
Aaron Higbee - The Humanity of Phishing Attack & Defense
 
How to Think About Your Technology Roadmap for 2017 - Kristi Kennelly
How to Think About Your Technology Roadmap for 2017 - Kristi KennellyHow to Think About Your Technology Roadmap for 2017 - Kristi Kennelly
How to Think About Your Technology Roadmap for 2017 - Kristi Kennelly
 
Cyber Resilency VANCOUVER, BC Nov 2017
Cyber Resilency VANCOUVER, BC  Nov 2017  Cyber Resilency VANCOUVER, BC  Nov 2017
Cyber Resilency VANCOUVER, BC Nov 2017
 
Jisc cyber security posture survey
Jisc cyber security posture surveyJisc cyber security posture survey
Jisc cyber security posture survey
 
2017 Phishing Trends & Intelligence Report: Hacking the Human
2017 Phishing Trends & Intelligence Report: Hacking the Human2017 Phishing Trends & Intelligence Report: Hacking the Human
2017 Phishing Trends & Intelligence Report: Hacking the Human
 
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External ThreatsUnderstanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External Threats
 
The Case for EDR: What's In Your Toolkit
The Case for EDR: What's In Your ToolkitThe Case for EDR: What's In Your Toolkit
The Case for EDR: What's In Your Toolkit
 
Cerdant Security State of the Union
Cerdant Security State of the UnionCerdant Security State of the Union
Cerdant Security State of the Union
 
Journey to Establish an Open Source Policy in a Fortune 20 Health Care Company
Journey to Establish an Open Source Policy in a Fortune 20 Health Care CompanyJourney to Establish an Open Source Policy in a Fortune 20 Health Care Company
Journey to Establish an Open Source Policy in a Fortune 20 Health Care Company
 
Your Service Desk is Privileged, Too
Your Service Desk is Privileged, TooYour Service Desk is Privileged, Too
Your Service Desk is Privileged, Too
 
Multi channel marketing 2017 across mobile, email, display and search
Multi channel marketing 2017 across mobile, email, display and searchMulti channel marketing 2017 across mobile, email, display and search
Multi channel marketing 2017 across mobile, email, display and search
 
The Very Best Intranets & Digital Workplace from the 2016 Intranet Global Forum
The Very Best Intranets & Digital Workplace from the 2016 Intranet Global ForumThe Very Best Intranets & Digital Workplace from the 2016 Intranet Global Forum
The Very Best Intranets & Digital Workplace from the 2016 Intranet Global Forum
 
14 Online Tools Every Small Business Owner Should Use
14 Online Tools Every Small Business Owner Should Use14 Online Tools Every Small Business Owner Should Use
14 Online Tools Every Small Business Owner Should Use
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security Seminar
 
Masterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy BasicsMasterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy Basics
 
How to improve resilience and respond better to Cyber Attacks with ISO 22301?
How to improve resilience and respond better to Cyber Attacks with ISO 22301?How to improve resilience and respond better to Cyber Attacks with ISO 22301?
How to improve resilience and respond better to Cyber Attacks with ISO 22301?
 
What it Takes to be a CISO in 2017
What it Takes to be a CISO in 2017What it Takes to be a CISO in 2017
What it Takes to be a CISO in 2017
 
Cybersecurity for CRM v0219-3
Cybersecurity for CRM v0219-3Cybersecurity for CRM v0219-3
Cybersecurity for CRM v0219-3
 
Security in the Digital Workplace
Security in the Digital WorkplaceSecurity in the Digital Workplace
Security in the Digital Workplace
 
Why Security Matters for Marketers
Why Security Matters for MarketersWhy Security Matters for Marketers
Why Security Matters for Marketers
 

Recently uploaded

How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
Federico Razzoli
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 

Recently uploaded (20)

How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 

Bay Area Cyber Security Meetup - How To Stay Safe Online

  • 1. © 2017 Imperva, Inc. All rights reserved. Practical Tips And Tactics To Stay Safe Online David Dowling | Director Worldwide Inside Sales @David_S_Dowling Thursday, 15 June 2017
  • 2. © 2017 Imperva, Inc. All rights reserved. Intro Confidential2 • Hiring – Anyone looking to hire? Anyone looking for roles? • Brief Overview of Imperva and the DDoS Threat landscape • How to check if your accounts have been compromised • Moving away from the same password or an Excel sheet • Why 2FA is A-OK • Quick easy way to reduce spam • How to secure your computer • Tips and tricks from the audience
  • 3. © 2017 Imperva, Inc. All rights reserved. Staying Safe Online? 3 U Wot M8?
  • 4. © 2017 Imperva, Inc. All rights reserved. Don’t Worry! This Is Not A Sales Pitch – Everything mainly free and online
  • 5. © 2017 Imperva, Inc. All rights reserved. Background on Imperva – Data and App Security Confidential5 • We focus on Database and application security, stopping DDoS attacks (stopped 17,000 DDoS attacks in Q1 • DDoS trends – More short hit and run DDoS attacks • Increase in application DDoS attacks – Seeing up to 176,000 Requests per second (RPS)
  • 6. © 2017 Imperva, Inc. All rights reserved. Bay Area Meet Up Hiring Managers? Confidential6 • Imperva has multiple technical roles open at Imperva – Join the team • Who else is hiring?
  • 7. © 2017 Imperva, Inc. All rights reserved. Way To Check URLs or files for viruses Confidential7 • VirusTotal – Way to check URLs or files • URL Extenders - http://urlex.org/ • Google Docs – Safer way to open Word docs
  • 8. © 2017 Imperva, Inc. All rights reserved. Has my Ashley Madison / LinkedIn / Adobe account been ‘pwned’? 8 • https://haveibeenpwned.com – Free service run by fellow Strayan Troy Hunt • 2015 had 34 ‘pwned’ websites, 2017 had 220 ‘pwned’ websites • Now upto 3.8 Billion pwned accounts – Left is 2015, right is 2017
  • 9. © 2017 Imperva, Inc. All rights reserved. But I Didn’t Click Anywhere! 9 • A Malvertising attack on Yahoo users in Eastern Europe via the advertising meant that users DIDN’T have to click on ads to get malware – Just had to visit the site • Ad Blockers are your friend – Electronic Frontier Foundation (EFF) has Privacy Badger and Ad Block Plus is good for Google Chrome. NoScript is for Firefox.
  • 10. © 2017 Imperva, Inc. All rights reserved. If You Visit “Dodgy” Sites Confidential10 • Use FireFox and Install NoScript • Duckduck Go – Do you really want “Hooli knowing everything? • Don’t forget to set Private Browsing for other computer users
  • 11. © 2017 Imperva, Inc. All rights reserved. Example of Passwords from 42 Million Accounts At OkCupid • If this is your password – Please change! • Source: Krebs on Security
  • 12. © 2017 Imperva, Inc. All rights reserved. Password Management 12 • KeePass, Dashlane – A way to generate passwords • www.PasswordGenerator.net • Do your research – Tavis Ormandy from Google
  • 13. © 2017 Imperva, Inc. All rights reserved. Two Factor What? Confidential13 • Two Factor Authentication or Multi-Factor Authentication sends one time passwords via email or SMS • Gmail, LinkedIn, HootSuite, LastPass, Yahoo, PayPal, Facebook • Great blog post by Imperva’s Solutions Manager Jeff Serota
  • 14. © 2017 Imperva, Inc. All rights reserved. How Can I Check If My Bank / App Has 2FA? Confidential14 • https://twofactorauth.org/ - Free site that lists all apps that have 2FA • Gmail, LinkedIn, HootSuite, LastPass, Yahoo, PayPal, Facebook
  • 15. © 2017 Imperva, Inc. All rights reserved. Why Is Two Factor Authentication Important? Confidential15 • Stops people that you don’t want to read your email or do your banking for you. • Example I had post Yahoo breach notification • Look for solutions that let you accept or reject like Duo Security, Authy as well as Google Authenticator • Physical tokens are making a come back – Yubico’s Yubikey is good
  • 16. © 2017 Imperva, Inc. All rights reserved. Brian Krebs – Tools for a Safer PC 16 • Turn On automatic updates so your operating system can receive the latest fixes • Especially Adobe and Java
  • 17. © 2017 Imperva, Inc. All rights reserved. How Not Give Marketers Your Emails Confidential17 • Use temporary services like Shark Lasers, Mailnator and more • Reduce the number of accounts that tie back to your main email and reduce your spam
  • 18. © 2017 Imperva, Inc. All rights reserved. Using “Free” Wi-Fi At a Cafe Confidential18 • Source: Life Hacker • Use a VPN and turn on Firewall • Turn off Sharing • Https • Use Public Network
  • 19. © 2017 Imperva, Inc. All rights reserved. Useful Websites 1919 • Information is Beautiful – Data Breaches • Have I Been Pwned.com • Twitter • Naked Security - Sophos • Krebs On Security.com • Incapsula.com/blog • Dark Reading • Swift on Security • Troyhunt.com