SlideShare a Scribd company logo
1 of 46
How to manage your client’s
data responsibly
Protect your clients from fraud, identity theft and
confidential information
Jeremiah Cruz
jeremy@cryptoaustralia.org.au
Nick Kavadias
nick@cryptoaustralia.org.au
Gabor Szathmari
gabor@cryptoaustralia.org.aucryptoaustralia.org.au
Who is CryptoAUSTRALIA
• A not-for-profit started by security and privacy enthusiasts.
• We have nothing to do with BitCoin, so please stop asking.
• We are for finding practical ways of dealing with the modern
privacy and security challenges.
• We are looking for sponsors in order to continue our work
and research.
• This may be a new concept to lawyers, but we are running
these events for free*.
* This presentation does not constitute cybersecurity advice.
Self Promotion..
Tonight’s speakers:
•Jeremy – Network Security Expert
•Nick – Solicitor and Technologist
•Gabor – Cybersecurity Expert
We know how to internet…
@CryptoAustralia
#cryptoaus
http://chat.cryptoaustralia.org.au
https://fb.me/CryptoStraya
Interact with us in the digital world…
What we are covering tonight…
1) Bad practices
2) Password security
(2FA and Password reuse)
3) Sharing documents securely
4) Storing documents securely
5) Prudent data disposal practices
6) Physical security (dos and don’ts)
7) What to do post-breach 🙏
Secret: “hackers” log into your webmail
Password hygiene
• Websites get hacked.
• People reuse same
email and password
across multiple online
accounts. D’oh!
Haveibeenpwned
Do you have leaked passwords? https://haveibeenpwned.com/
Haveibeenpwned Leaderboard
Today’s winner is …
Meanwhile on SpyCloud...
(an unrelated account)
Meanwhile on SpyCloud
Bad client document & personal
information management practices
• VOI checks
• Online document conversion
• Document sharing (e.g. Dropbox)
• Keeping emails forever
• Public Wifi
Bad practices - VOI checks
100 points ID checks – Leaks everywhere
• Scan-to-email printers (bonus: unencrypted
traffic)
• Documents sent/received over emails
• Emails are never deleted on the
sender/receiver side
Bad practices - VOI checks
• Don’t ask for scanned documents to be sent over
emails
• Rely on VOI providers instead
• Secure smartphone app and web portal
• https://www.dvs.gov.au/users/Pages/Identity-
service-providers.aspx
Bad practices
Bad practices - Online document conversion
Online2PDF.com, freepdfconvert.com...
• They provide a convenient service to
convert documents to PDF
Bad practices - Online document conversion
Online2PDF.com, freepdfconvert.com...
• Who’s behind the service?
• What happens to your documents?
• Why would you upload
sensitive documents to random
strangers?
Online document conversion
Convert documents offline with
Adobe Professional
Bad practices -
Document sharing over emails
Problem statement:
Your email file attachments and
embedder download links remain in
your ‘Sent’ email folder forever, waiting
for a hacker to login and download them
Bad practices -
Document sharing over cloud-based file
storage services
File sharing with Dropbox, OneDrive, random
service:
• Download links are valid forever
• Mailbox gets hacked → Links are still live
Transferring sensitive documents securely
• Send web links instead of file
attachments where appropriate
• Use expiring web links
Services:
Google Drive, Sync.com, Tresorit...
Bad practices
Transferring documents securely
Bad practices - Emails are kept forever
Keeping all emails for extended period
• Limit the damage if the mailbox gets hacked
• Set an archive and retention policy and archive
emails to a secure third-party service
(e.g. Spinbackup, Backupify)
• Office 365, G Suite support retention policies
Bad practices
Bad practices - Public Wifi
Lots of hacking wizardry:
• Password theft via fake login pages
• HTTP pages tampered on the fly
• Theft of unencrypted sensitive data
Just take our advice on the next slide
Public Wifi – Use VPN or a 4G dongle
Good security hygiene
What else you can do
Secret: “hackers” log into your webmail
Password hygiene
• Websites get hacked.
• People reuse same
email and password
across multiple online
accounts. D’oh!
Two-factor authentication
Most powerful defence from:
•Crappy passwords (Letmein1)
•Stolen passwords (phishing)
•Leaked passwords (reuse)
Two-factor authentication
Password hygiene – Wallets
Remember a single password only
• LastPass
• 1Password
• Dashlane
• RoboForm
• < Any random password wallet >
Storing documents securely
Cloud file storage – Who your adversary is
• Hackers? - Dropbox, G Drive, OneDrive + Two-factor
authentication turned on
• Government? - End-to-end encrypted service: Sync.com, Tresorit
• Encrypt your disks, USB flash drives and smartphones
• BitLocker - Windows 10 Professional
• FileVault – Mac
• Android supports disk encryption
• On iOS disk encryption is turned on by default
Prudent data disposal practices
Laptops, computers:
• Magnetic disks: overwrite
• DBAN (https://dban.org/)
• SSD: Physical destruction
• USB flash drives: Physical destruction
Prudent data disposal practices
iPhone: Factory reset
Android*:
1. Encrypt device
2. Remove storage and SIM cards
3. Factory reset
4. Remove from Google account
Phones (SD card): Physical destruction
* https://www.computerworld.com/article/3243253/android/how-to-securely-erase-your-android-device-in-4-steps.html
Physical security (dos and don’ts)
Physical security (dos and don’ts)
• Shredding documents
• Diamond cut shredder
• Secure document disposal service
• Can secure dispose digital media for you
• Digital certificates (e.g. PEXA key)
•Leave them unplugged when not in use
•Cut the built-in smart card in half to dispose
What to do when you get hacked 🙏
• Disconnect your computer from the
Internet and stop using it
• Notify LawCover - They have an
incident response team
• Checklist:
http://lca.lawcouncil.asn.au/lawcou
ncil/images/cyber/CP-What-to-
Do.pdf
Summary
1) Use a VOI provider for identity checks
2) Use 2FA and don’t reuse your password
3) Share documents with expiring links
4) Store documents in the cloud securely (2FA)
5) Dispose data securely
6) Shred documents & protect digital certificates
7) Notify LawCover when the house is on fire
Where to get help
• Law Council of Australia Cyber Precedent, great learning resource
• Law Council cyber-attack checklist
• Lawcover crisis management team can help you clean up the
mess.
• Victim of identity theft, you should contact IDCARE, NFP helping
people
• Have a conversation with your IT Service Provider, or staff. Use
these slides as a talking point!
@CryptoAustralia
#cryptoaus
http://chat.cryptoaustralia.org.au
https://fb.me/CryptoStraya
Get updates:
https://cryptoaustralia.org.au/newsletter
Next workshop:
https://www.meetup.com/Cybersecurity
-for-Lawyers-by-CryptoAUSTRALIA/

More Related Content

What's hot

What's hot (16)

The dark web
The dark webThe dark web
The dark web
 
Dark web presentation
Dark web presentationDark web presentation
Dark web presentation
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
The deepweb
The deepwebThe deepweb
The deepweb
 
SecuredBox - Secure your privacy
SecuredBox - Secure your privacySecuredBox - Secure your privacy
SecuredBox - Secure your privacy
 
Deep web
Deep webDeep web
Deep web
 
Darknet
DarknetDarknet
Darknet
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and Privacy
 
Gripla slides 09 2011
Gripla slides 09 2011Gripla slides 09 2011
Gripla slides 09 2011
 
Deep web
Deep webDeep web
Deep web
 
Deep web
Deep webDeep web
Deep web
 
Dark and Deep web
Dark and Deep webDark and Deep web
Dark and Deep web
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
Dark web by Claudine Impas
Dark web by Claudine ImpasDark web by Claudine Impas
Dark web by Claudine Impas
 
Your Digital Afterlife: What happens to your digital memories when you die? ...
Your Digital Afterlife: What happens to your digital memories when you die?  ...Your Digital Afterlife: What happens to your digital memories when you die?  ...
Your Digital Afterlife: What happens to your digital memories when you die? ...
 
Internet Security is an Oxymoron
Internet Security is an OxymoronInternet Security is an Oxymoron
Internet Security is an Oxymoron
 

Similar to Manage client data responsibly with password security, document sharing best practices

Iron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyIron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyGabor Szathmari
 
How to protect your clients and your law firm from money transfer scams
How to protect your clients and your law firm from money transfer scamsHow to protect your clients and your law firm from money transfer scams
How to protect your clients and your law firm from money transfer scamsGabor Szathmari
 
Learning about Security and Compliance in Office 365
Learning about Security and Compliance in Office 365Learning about Security and Compliance in Office 365
Learning about Security and Compliance in Office 365Aptera Inc
 
Protecting Customer Confidential Information
Protecting Customer Confidential InformationProtecting Customer Confidential Information
Protecting Customer Confidential InformationWilliam McBorrough
 
Secure Yourself, Practice what we preach - BSides Austin 2015
Secure Yourself, Practice what we preach - BSides Austin 2015Secure Yourself, Practice what we preach - BSides Austin 2015
Secure Yourself, Practice what we preach - BSides Austin 2015Michael Gough
 
Law Practice Management - Organization, Cloud, Social Media and Ethics
Law Practice Management - Organization, Cloud, Social Media and EthicsLaw Practice Management - Organization, Cloud, Social Media and Ethics
Law Practice Management - Organization, Cloud, Social Media and EthicsJennifer Ellis, JD, LLC
 
Data protection in Practice
Data protection in PracticeData protection in Practice
Data protection in PracticeTomppa Järvinen
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security PracticeBrian Pichman
 
Presentation cyber forensics & ethical hacking
Presentation   cyber forensics & ethical hackingPresentation   cyber forensics & ethical hacking
Presentation cyber forensics & ethical hackingAmbuj Kumar
 
Computer Forensics – What Every Lawyer Needs to Know
Computer Forensics – What Every Lawyer Needs to KnowComputer Forensics – What Every Lawyer Needs to Know
Computer Forensics – What Every Lawyer Needs to KnowWinston & Strawn LLP
 
Harbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidHarbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidErnest Staats
 
Sara Day Thomson, 'Personal Digital Archiving: Storing, Organising and Protec...
Sara Day Thomson, 'Personal Digital Archiving: Storing, Organising and Protec...Sara Day Thomson, 'Personal Digital Archiving: Storing, Organising and Protec...
Sara Day Thomson, 'Personal Digital Archiving: Storing, Organising and Protec...dri_ireland
 
Security Best Practices for Regular Users
Security Best Practices for Regular UsersSecurity Best Practices for Regular Users
Security Best Practices for Regular UsersSecurity Innovation
 
Security best practices for regular users
Security best practices for regular usersSecurity best practices for regular users
Security best practices for regular usersGeoffrey Vaughan
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online PrivacyKazi Sarwar Hossain
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self DefenseBarry Caplin
 
Better to Ask Permission? Best Practices for Privacy and Security
Better to Ask Permission? Best Practices for Privacy and SecurityBetter to Ask Permission? Best Practices for Privacy and Security
Better to Ask Permission? Best Practices for Privacy and SecurityEric Kavanagh
 

Similar to Manage client data responsibly with password security, document sharing best practices (20)

Iron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyIron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data Responsibly
 
How to protect your clients and your law firm from money transfer scams
How to protect your clients and your law firm from money transfer scamsHow to protect your clients and your law firm from money transfer scams
How to protect your clients and your law firm from money transfer scams
 
Learning about Security and Compliance in Office 365
Learning about Security and Compliance in Office 365Learning about Security and Compliance in Office 365
Learning about Security and Compliance in Office 365
 
Protecting Customer Confidential Information
Protecting Customer Confidential InformationProtecting Customer Confidential Information
Protecting Customer Confidential Information
 
Tresorit intro - Europas 2014
Tresorit intro - Europas 2014Tresorit intro - Europas 2014
Tresorit intro - Europas 2014
 
Secure Yourself, Practice what we preach - BSides Austin 2015
Secure Yourself, Practice what we preach - BSides Austin 2015Secure Yourself, Practice what we preach - BSides Austin 2015
Secure Yourself, Practice what we preach - BSides Austin 2015
 
Law Practice Management - Organization, Cloud, Social Media and Ethics
Law Practice Management - Organization, Cloud, Social Media and EthicsLaw Practice Management - Organization, Cloud, Social Media and Ethics
Law Practice Management - Organization, Cloud, Social Media and Ethics
 
Data protection in Practice
Data protection in PracticeData protection in Practice
Data protection in Practice
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security Practice
 
Presentation cyber forensics & ethical hacking
Presentation   cyber forensics & ethical hackingPresentation   cyber forensics & ethical hacking
Presentation cyber forensics & ethical hacking
 
Computer Forensics – What Every Lawyer Needs to Know
Computer Forensics – What Every Lawyer Needs to KnowComputer Forensics – What Every Lawyer Needs to Know
Computer Forensics – What Every Lawyer Needs to Know
 
001 ho basic computer
001 ho basic computer001 ho basic computer
001 ho basic computer
 
Harbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidHarbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vid
 
Sara Day Thomson, 'Personal Digital Archiving: Storing, Organising and Protec...
Sara Day Thomson, 'Personal Digital Archiving: Storing, Organising and Protec...Sara Day Thomson, 'Personal Digital Archiving: Storing, Organising and Protec...
Sara Day Thomson, 'Personal Digital Archiving: Storing, Organising and Protec...
 
Security Best Practices for Regular Users
Security Best Practices for Regular UsersSecurity Best Practices for Regular Users
Security Best Practices for Regular Users
 
Security best practices for regular users
Security best practices for regular usersSecurity best practices for regular users
Security best practices for regular users
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self Defense
 
Better to Ask Permission? Best Practices for Privacy and Security
Better to Ask Permission? Best Practices for Privacy and SecurityBetter to Ask Permission? Best Practices for Privacy and Security
Better to Ask Permission? Best Practices for Privacy and Security
 
Computer / Internet Security WHPL
Computer / Internet Security WHPLComputer / Internet Security WHPL
Computer / Internet Security WHPL
 

More from Gabor Szathmari

Iron Bastion: Preventing business email compromise fraud at your firm
Iron Bastion: Preventing business email compromise fraud at your firmIron Bastion: Preventing business email compromise fraud at your firm
Iron Bastion: Preventing business email compromise fraud at your firmGabor Szathmari
 
Hacking law firms with abandoned domain names
Hacking law firms with abandoned domain namesHacking law firms with abandoned domain names
Hacking law firms with abandoned domain namesGabor Szathmari
 
Phishing stories from the trenches
Phishing stories from the trenchesPhishing stories from the trenches
Phishing stories from the trenchesGabor Szathmari
 
Help! I am an Investigative Journalist in 2017
Help! I am an Investigative Journalist in 2017Help! I am an Investigative Journalist in 2017
Help! I am an Investigative Journalist in 2017Gabor Szathmari
 
CryptoParty Tor Relay Workshop
CryptoParty Tor Relay WorkshopCryptoParty Tor Relay Workshop
CryptoParty Tor Relay WorkshopGabor Szathmari
 
Privacy for journalists introduction
Privacy for journalists introductionPrivacy for journalists introduction
Privacy for journalists introductionGabor Szathmari
 
Threat Modeling for Journalists
Threat Modeling for JournalistsThreat Modeling for Journalists
Threat Modeling for JournalistsGabor Szathmari
 
Privacy for Journalists Introduction
Privacy for Journalists IntroductionPrivacy for Journalists Introduction
Privacy for Journalists IntroductionGabor Szathmari
 
When the CDN goes bananas
When the CDN goes bananasWhen the CDN goes bananas
When the CDN goes bananasGabor Szathmari
 
PGP and Keybase (CryptoParty Belfast)
PGP and Keybase (CryptoParty Belfast)PGP and Keybase (CryptoParty Belfast)
PGP and Keybase (CryptoParty Belfast)Gabor Szathmari
 

More from Gabor Szathmari (11)

Iron Bastion: Preventing business email compromise fraud at your firm
Iron Bastion: Preventing business email compromise fraud at your firmIron Bastion: Preventing business email compromise fraud at your firm
Iron Bastion: Preventing business email compromise fraud at your firm
 
Hacking law firms with abandoned domain names
Hacking law firms with abandoned domain namesHacking law firms with abandoned domain names
Hacking law firms with abandoned domain names
 
Phishing stories from the trenches
Phishing stories from the trenchesPhishing stories from the trenches
Phishing stories from the trenches
 
Help! I am an Investigative Journalist in 2017
Help! I am an Investigative Journalist in 2017Help! I am an Investigative Journalist in 2017
Help! I am an Investigative Journalist in 2017
 
CryptoParty Tor Relay Workshop
CryptoParty Tor Relay WorkshopCryptoParty Tor Relay Workshop
CryptoParty Tor Relay Workshop
 
Privacy for journalists introduction
Privacy for journalists introductionPrivacy for journalists introduction
Privacy for journalists introduction
 
Threat Modeling for Journalists
Threat Modeling for JournalistsThreat Modeling for Journalists
Threat Modeling for Journalists
 
Privacy for Journalists Introduction
Privacy for Journalists IntroductionPrivacy for Journalists Introduction
Privacy for Journalists Introduction
 
Safe Browsing in 2016
Safe Browsing in 2016Safe Browsing in 2016
Safe Browsing in 2016
 
When the CDN goes bananas
When the CDN goes bananasWhen the CDN goes bananas
When the CDN goes bananas
 
PGP and Keybase (CryptoParty Belfast)
PGP and Keybase (CryptoParty Belfast)PGP and Keybase (CryptoParty Belfast)
PGP and Keybase (CryptoParty Belfast)
 

Recently uploaded

Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxConstitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxsrikarna235
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书SD DS
 
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTSVIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTSDr. Oliver Massmann
 
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝soniya singh
 
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书FS LS
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A HistoryJohn Hustaix
 
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书SD DS
 
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书Fir L
 
如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书Fir L
 
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书SD DS
 
Test Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxTest Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxsrikarna235
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptjudeplata
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptjudeplata
 
Why Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdfWhy Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdfMilind Agarwal
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书Fir L
 
Cleades Robinson's Commitment to Service
Cleades Robinson's Commitment to ServiceCleades Robinson's Commitment to Service
Cleades Robinson's Commitment to ServiceCleades Robinson
 
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Dr. Oliver Massmann
 
Trial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionTrial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionNilamPadekar1
 

Recently uploaded (20)

Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxConstitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
 
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTSVIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
 
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
 
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
 
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A History
 
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
 
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
 
如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书
 
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
 
Test Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxTest Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptx
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
 
Why Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdfWhy Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdf
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书
 
Cleades Robinson's Commitment to Service
Cleades Robinson's Commitment to ServiceCleades Robinson's Commitment to Service
Cleades Robinson's Commitment to Service
 
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
 
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Trial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionTrial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 sedition
 

Manage client data responsibly with password security, document sharing best practices

  • 1. How to manage your client’s data responsibly Protect your clients from fraud, identity theft and confidential information Jeremiah Cruz jeremy@cryptoaustralia.org.au Nick Kavadias nick@cryptoaustralia.org.au Gabor Szathmari gabor@cryptoaustralia.org.aucryptoaustralia.org.au
  • 2. Who is CryptoAUSTRALIA • A not-for-profit started by security and privacy enthusiasts. • We have nothing to do with BitCoin, so please stop asking. • We are for finding practical ways of dealing with the modern privacy and security challenges. • We are looking for sponsors in order to continue our work and research. • This may be a new concept to lawyers, but we are running these events for free*. * This presentation does not constitute cybersecurity advice.
  • 3. Self Promotion.. Tonight’s speakers: •Jeremy – Network Security Expert •Nick – Solicitor and Technologist •Gabor – Cybersecurity Expert
  • 4. We know how to internet… @CryptoAustralia #cryptoaus http://chat.cryptoaustralia.org.au https://fb.me/CryptoStraya Interact with us in the digital world…
  • 5. What we are covering tonight… 1) Bad practices 2) Password security (2FA and Password reuse) 3) Sharing documents securely 4) Storing documents securely 5) Prudent data disposal practices 6) Physical security (dos and don’ts) 7) What to do post-breach 🙏
  • 6. Secret: “hackers” log into your webmail
  • 7. Password hygiene • Websites get hacked. • People reuse same email and password across multiple online accounts. D’oh!
  • 8. Haveibeenpwned Do you have leaked passwords? https://haveibeenpwned.com/
  • 10.
  • 11.
  • 12.
  • 13. Meanwhile on SpyCloud... (an unrelated account)
  • 15. Bad client document & personal information management practices • VOI checks • Online document conversion • Document sharing (e.g. Dropbox) • Keeping emails forever • Public Wifi
  • 16. Bad practices - VOI checks 100 points ID checks – Leaks everywhere • Scan-to-email printers (bonus: unencrypted traffic) • Documents sent/received over emails • Emails are never deleted on the sender/receiver side
  • 17. Bad practices - VOI checks • Don’t ask for scanned documents to be sent over emails • Rely on VOI providers instead • Secure smartphone app and web portal • https://www.dvs.gov.au/users/Pages/Identity- service-providers.aspx
  • 19. Bad practices - Online document conversion Online2PDF.com, freepdfconvert.com... • They provide a convenient service to convert documents to PDF
  • 20.
  • 21. Bad practices - Online document conversion Online2PDF.com, freepdfconvert.com... • Who’s behind the service? • What happens to your documents? • Why would you upload sensitive documents to random strangers?
  • 22. Online document conversion Convert documents offline with Adobe Professional
  • 23. Bad practices - Document sharing over emails Problem statement: Your email file attachments and embedder download links remain in your ‘Sent’ email folder forever, waiting for a hacker to login and download them
  • 24. Bad practices - Document sharing over cloud-based file storage services File sharing with Dropbox, OneDrive, random service: • Download links are valid forever • Mailbox gets hacked → Links are still live
  • 25. Transferring sensitive documents securely • Send web links instead of file attachments where appropriate • Use expiring web links Services: Google Drive, Sync.com, Tresorit...
  • 28. Bad practices - Emails are kept forever Keeping all emails for extended period • Limit the damage if the mailbox gets hacked • Set an archive and retention policy and archive emails to a secure third-party service (e.g. Spinbackup, Backupify) • Office 365, G Suite support retention policies
  • 30. Bad practices - Public Wifi Lots of hacking wizardry: • Password theft via fake login pages • HTTP pages tampered on the fly • Theft of unencrypted sensitive data Just take our advice on the next slide
  • 31. Public Wifi – Use VPN or a 4G dongle
  • 32. Good security hygiene What else you can do
  • 33. Secret: “hackers” log into your webmail
  • 34. Password hygiene • Websites get hacked. • People reuse same email and password across multiple online accounts. D’oh!
  • 35. Two-factor authentication Most powerful defence from: •Crappy passwords (Letmein1) •Stolen passwords (phishing) •Leaked passwords (reuse)
  • 37. Password hygiene – Wallets Remember a single password only • LastPass • 1Password • Dashlane • RoboForm • < Any random password wallet >
  • 38. Storing documents securely Cloud file storage – Who your adversary is • Hackers? - Dropbox, G Drive, OneDrive + Two-factor authentication turned on • Government? - End-to-end encrypted service: Sync.com, Tresorit • Encrypt your disks, USB flash drives and smartphones • BitLocker - Windows 10 Professional • FileVault – Mac • Android supports disk encryption • On iOS disk encryption is turned on by default
  • 39. Prudent data disposal practices Laptops, computers: • Magnetic disks: overwrite • DBAN (https://dban.org/) • SSD: Physical destruction • USB flash drives: Physical destruction
  • 40. Prudent data disposal practices iPhone: Factory reset Android*: 1. Encrypt device 2. Remove storage and SIM cards 3. Factory reset 4. Remove from Google account Phones (SD card): Physical destruction * https://www.computerworld.com/article/3243253/android/how-to-securely-erase-your-android-device-in-4-steps.html
  • 41. Physical security (dos and don’ts)
  • 42. Physical security (dos and don’ts) • Shredding documents • Diamond cut shredder • Secure document disposal service • Can secure dispose digital media for you • Digital certificates (e.g. PEXA key) •Leave them unplugged when not in use •Cut the built-in smart card in half to dispose
  • 43. What to do when you get hacked 🙏 • Disconnect your computer from the Internet and stop using it • Notify LawCover - They have an incident response team • Checklist: http://lca.lawcouncil.asn.au/lawcou ncil/images/cyber/CP-What-to- Do.pdf
  • 44. Summary 1) Use a VOI provider for identity checks 2) Use 2FA and don’t reuse your password 3) Share documents with expiring links 4) Store documents in the cloud securely (2FA) 5) Dispose data securely 6) Shred documents & protect digital certificates 7) Notify LawCover when the house is on fire
  • 45. Where to get help • Law Council of Australia Cyber Precedent, great learning resource • Law Council cyber-attack checklist • Lawcover crisis management team can help you clean up the mess. • Victim of identity theft, you should contact IDCARE, NFP helping people • Have a conversation with your IT Service Provider, or staff. Use these slides as a talking point!