SlideShare a Scribd company logo
Online
       Self-Defense
Don’t Let Bad Stuff Happen To You
                    Barry Caplin
         Chief Information Security Officer
      Minnesota Department of Human Services
             barry.caplin@state.mn.us

               Slides on InfoLink
Happy
  CyberSecurity
    Month!
(and belated Happy National Coffee day!)
2 Main Issues

• Passwords
• Clicking on Links
Passwords

Why Are They A Problem?
•Hard to remember
•Hard to enter
•Need too many
•Inconsistent Rules
•Changes
How Passwords Work
• Site saves encrypted pw
• At login – enter pw – it’s encrypted
  and compared to stored value
• Some sites:
  – Don’t encrypt well
  – Don’t encrypt at all!
Password Hacks in the News

It was a busy year
How Passwords Get Hacked
• Site attacked – many methods
• Encrypted pw file downloaded
  (should be more difficult!)
• Over time, hackers crack the file

• What does that get them?
Passwords
• Avg. web user has:
  – 25 separate accounts but
  – 6.5 unique passwords
     password reuse – not good

• So…
Password Self-Defense

1.   Don’t reuse passwords
2.   Only enter on secure sites
3.   Login notifications
4.   Choose good (long) passwords
Password Self-Defense

5.   Vault it
6.   Care with “secret” questions
7.   Care with linking accounts
8.   2-step authentication
9.   Use separate email addresses
Password Self-Defense

Handouts
• Password Self-Defense tips
  and resources
Safe Computer Use
      and Web Surfing
Don’t Click!
How Your Computer Gets Sick
• Attachments
• Downloads
  – Intentional
    • Clicks
    • URL shortening
  – Unintentional - Website Visits/Drive-
    By
Attachments
•   File sent via email
•   Can execute when clicked
•   doc, xls, pdf, jpg (and other images), etc.
•   Even zip files can cause problems

• Only open expected attachments
• Don’t open chain emails
• Watch holiday emails
Downloads
• Intentional – Clicking on link downloads
  page or file
Click here to download




                     http://www.download.com/filename
Downloads
• Only some executables ask permission
  – Dialog boxes often ignored
URL shortening
• http://ht.cdn.turner.com/si/danpatrick/aud
  io/2009/11/03/DP-Hr3_11-03-
  2009_stream.mp3 or…
• http://bit.ly/2d5LUP

• bit.ly, tinyurl.com, others

• Some browsers support URL lengthening
  – Long URL Please
URL lengthening
Safe Surfing Tips
•   Look before you click
•   Use Link Rating
•   Consider the source (subjective)
•   Beware – file sharing, gaming, gambling,
    questionable legality
Safe Surfing Tips
• Use Care – Social Networking (limit
  apps), ads, pop-ups, banners
• https and lock for shopping, banking, etc.
• Limit – open/public networks, scripts
• Protect web pw’s
Safe Surfing Tips


Handouts
• PC Protection Tips/Tools
• Safe Surfing Tips
Phishing
Phishing

Looks real, but rarely is
From a familiar business (not)
May threaten to close account, warn of fraud or
  virus
Legitimate businesses will not ask for private
  info via email

http://192.160.201.5/trusted.bank/index.htm
Phishing on Social Networks
Scams seem real when they come from a
  “friend”
Malicious links/apps
Spread quickly when posted or “liked”
“Just say no” to apps
• Installs app
• Grabs info
• Posts on your wall
• Click-fraud
Phone Phishing
At work: gain access/info,
 supplement intel
  Impersonate user/exec/vendor
  Ask probing questions or for
    access
At home: get personal/financial
 info
  Verify cc, ssn, etc.
  Use fear of theft or fraud to
   commit theft or fraud!
Tips to Avoid Phishing
Look before you Click - Don’t click links
 asking for personal info
Never enter personal info in a pop-up
Use spam filters, anti-virus/spyware, and keep
 updated
Only open email attachments you’re expecting
Don’t give out personal info over the phone
 unless you initiated the call
Tips to Avoid Phishing
Know what you’ve posted about yourself on
  social networks
Know who your “friends” are
Use care with apps
Recheck your social network privacy settings
Verify callers asking for “too much” info
Initiate calls to known numbers for banks, etc.
Act immediately if you’ve been hooked
Tips for Avoiding Phishing

Handouts
• Top Tips to Help Avoid
  Phishing Scams
• 10 Tips for Social
  Networking Safety
Mobile Devices
Computer is always with you
•Device theft
•Data theft
•Wireless networks
•Malicious software
•Geolocation
Device Theft
• How to protect
  your devices
  when you’re
  mobile?

• Keep it with
  you, or
• Lock it up –
  out of sight
Data Theft
• Most people have a device: smartphone,
  tablet, netbook, laptop
• Do you know your surroundings?
• What network are you using?
Data Theft
Shoulder surfing…
Data Theft
• USB devices
• “evil maid”




• Be aware of
  your
  surroundings
Wireless Networks
• Open Wi-Fi
• “evil twin”
• firesheep
Wireless Networks
• Use Wi-fi with WPA2
• Verify your connection (ask the provider)
• 3G/4G relatively safer… for now
Malicious Software
• There’s an app
  for that!

• Use official
  app markets
• Use anti-
  malware
Geolocation


The world knows
• Where you are
• Where you are not
Tips for Mobile Devices
• Use official app markets
• Use anti-malware
• Keep your device close or locked-up out of
  sight
• Watch your surroundings
• Be stingy with your personal data
Tips for Mobile Devices
• No government data on personal devices
• Use only DHS-managed connections
  
Tips for Mobile Devices

Handouts
• 10 Tips for Securing Your
  Mobile Device
Let’s Be Careful Out There
Discussion?

More Related Content

What's hot

An Introduction To IT Security And Privacy In Libraries
 An Introduction To IT Security And Privacy In Libraries An Introduction To IT Security And Privacy In Libraries
An Introduction To IT Security And Privacy In Libraries
Blake Carver
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and Libraries
Blake Carver
 
An Introduction To IT Security And Privacy - Servers And More
An Introduction To IT Security And Privacy - Servers And MoreAn Introduction To IT Security And Privacy - Servers And More
An Introduction To IT Security And Privacy - Servers And More
Blake Carver
 
It security in healthcare
It security in healthcareIt security in healthcare
It security in healthcare
Nicholas Davis
 
Securing your cyberspace_Watson
Securing your cyberspace_WatsonSecuring your cyberspace_Watson
Securing your cyberspace_Watson
Patricia M Watson
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
jitiyaashwin
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
Marian Merritt
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
ICT Frame Magazine Pvt. Ltd.
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipstephensc
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipstephensc
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
Stephen Thomas, CISSP
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security Practice
Brian Pichman
 
Online reputation
Online reputationOnline reputation
Online reputationesl2m
 
Internet safety presentation sv
Internet safety presentation svInternet safety presentation sv
Internet safety presentation sv
Imtiaz Khan - netbrix.net [LION]
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipstephensc
 
Ethics and safety measures in Computing
Ethics and safety measures in ComputingEthics and safety measures in Computing
Ethics and safety measures in Computing
Ankit Malviya
 

What's hot (17)

An Introduction To IT Security And Privacy In Libraries
 An Introduction To IT Security And Privacy In Libraries An Introduction To IT Security And Privacy In Libraries
An Introduction To IT Security And Privacy In Libraries
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and Libraries
 
An Introduction To IT Security And Privacy - Servers And More
An Introduction To IT Security And Privacy - Servers And MoreAn Introduction To IT Security And Privacy - Servers And More
An Introduction To IT Security And Privacy - Servers And More
 
It security in healthcare
It security in healthcareIt security in healthcare
It security in healthcare
 
Securing your cyberspace_Watson
Securing your cyberspace_WatsonSecuring your cyberspace_Watson
Securing your cyberspace_Watson
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
001 ho basic computer
001 ho basic computer001 ho basic computer
001 ho basic computer
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security Practice
 
Online reputation
Online reputationOnline reputation
Online reputation
 
Internet safety presentation sv
Internet safety presentation svInternet safety presentation sv
Internet safety presentation sv
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Ethics and safety measures in Computing
Ethics and safety measures in ComputingEthics and safety measures in Computing
Ethics and safety measures in Computing
 

Viewers also liked

Strategic Self Defense
Strategic Self DefenseStrategic Self Defense
Strategic Self Defense
Adam LTC
 
Six Principle Of Self Defense
Six Principle Of Self DefenseSix Principle Of Self Defense
Six Principle Of Self Defense
Reggie Jones
 
Self Defense Tactics Don't Always Have to Involve Violence
Self Defense Tactics Don't Always Have to Involve ViolenceSelf Defense Tactics Don't Always Have to Involve Violence
Self Defense Tactics Don't Always Have to Involve Violence
combattraining
 
Karate self defense
Karate self defenseKarate self defense
Karate self defense
Madhvi31
 
The Gentle Art of Verbal Self Defense Working with Difficult People And Impro...
The Gentle Art of Verbal Self Defense Working with Difficult People And Impro...The Gentle Art of Verbal Self Defense Working with Difficult People And Impro...
The Gentle Art of Verbal Self Defense Working with Difficult People And Impro...
Donald E. Hester
 
MARTIAL ARTS : The Art of Self-Defence
MARTIAL ARTS : The Art of Self-DefenceMARTIAL ARTS : The Art of Self-Defence
MARTIAL ARTS : The Art of Self-Defence
HariNani04
 
Self defence workshops for women - part i
Self defence workshops for women - part iSelf defence workshops for women - part i
Self defence workshops for women - part iKravmaga Sreeram
 
Female Self Defense
Female Self DefenseFemale Self Defense
Female Self Defense
JeanneDaniels
 
Self Defence, Defence of Another and Prevention of a Crime Lecture
Self Defence, Defence of Another and Prevention of a Crime LectureSelf Defence, Defence of Another and Prevention of a Crime Lecture
Self Defence, Defence of Another and Prevention of a Crime Lecture
shummi
 
Self defence
Self defenceSelf defence
Self defenceMiss Hart
 
Self Defence For Women
Self Defence For WomenSelf Defence For Women
Self Defence For Women
Warrel Sequeira
 
Self defense 2
Self defense 2Self defense 2
Self defense 2107750
 
Verbal self defense
Verbal self defenseVerbal self defense
Verbal self defense
Mason Weiss
 
Self defense power point by giri bdr. sunar
Self defense power point by giri bdr. sunarSelf defense power point by giri bdr. sunar
Self defense power point by giri bdr. sunar
girithejorba
 
15 common defense mechanisms
15 common defense mechanisms15 common defense mechanisms

Viewers also liked (16)

Strategic Self Defense
Strategic Self DefenseStrategic Self Defense
Strategic Self Defense
 
Six Principle Of Self Defense
Six Principle Of Self DefenseSix Principle Of Self Defense
Six Principle Of Self Defense
 
Self Defense Tactics Don't Always Have to Involve Violence
Self Defense Tactics Don't Always Have to Involve ViolenceSelf Defense Tactics Don't Always Have to Involve Violence
Self Defense Tactics Don't Always Have to Involve Violence
 
Karate self defense
Karate self defenseKarate self defense
Karate self defense
 
4 self defence techniques
4 self defence techniques4 self defence techniques
4 self defence techniques
 
The Gentle Art of Verbal Self Defense Working with Difficult People And Impro...
The Gentle Art of Verbal Self Defense Working with Difficult People And Impro...The Gentle Art of Verbal Self Defense Working with Difficult People And Impro...
The Gentle Art of Verbal Self Defense Working with Difficult People And Impro...
 
MARTIAL ARTS : The Art of Self-Defence
MARTIAL ARTS : The Art of Self-DefenceMARTIAL ARTS : The Art of Self-Defence
MARTIAL ARTS : The Art of Self-Defence
 
Self defence workshops for women - part i
Self defence workshops for women - part iSelf defence workshops for women - part i
Self defence workshops for women - part i
 
Female Self Defense
Female Self DefenseFemale Self Defense
Female Self Defense
 
Self Defence, Defence of Another and Prevention of a Crime Lecture
Self Defence, Defence of Another and Prevention of a Crime LectureSelf Defence, Defence of Another and Prevention of a Crime Lecture
Self Defence, Defence of Another and Prevention of a Crime Lecture
 
Self defence
Self defenceSelf defence
Self defence
 
Self Defence For Women
Self Defence For WomenSelf Defence For Women
Self Defence For Women
 
Self defense 2
Self defense 2Self defense 2
Self defense 2
 
Verbal self defense
Verbal self defenseVerbal self defense
Verbal self defense
 
Self defense power point by giri bdr. sunar
Self defense power point by giri bdr. sunarSelf defense power point by giri bdr. sunar
Self defense power point by giri bdr. sunar
 
15 common defense mechanisms
15 common defense mechanisms15 common defense mechanisms
15 common defense mechanisms
 

Similar to Online Self Defense

Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
Rayane Hazimeh
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
Rayane Hazimeh
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
Ronald Soh
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
Rayanehaz
 
Internet Security
Internet SecurityInternet Security
Internet Security
mjelson
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
CharithraaAR
 
Lesson 5 protecting yourself on the internet
Lesson 5 protecting yourself on the internetLesson 5 protecting yourself on the internet
Lesson 5 protecting yourself on the internet
San Diego Continuing Education
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
Abzetdin Adamov
 
Personal Threat Models
Personal Threat ModelsPersonal Threat Models
Personal Threat Models
Geoffrey Vaughan
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
KevinRiley83
 
Security best practices for regular users
Security best practices for regular usersSecurity best practices for regular users
Security best practices for regular users
Geoffrey Vaughan
 
Security Best Practices for Regular Users
Security Best Practices for Regular UsersSecurity Best Practices for Regular Users
Security Best Practices for Regular Users
Security Innovation
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
Community IT Innovators
 
security.ppt
security.pptsecurity.ppt
security.ppt
Bernad Bear
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety Sadaf Walliyani
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library Setup
Brian Pichman
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
Kazi Sarwar Hossain
 
Cybersecurity-Awareness-Presentation-17-May-22.pptx
Cybersecurity-Awareness-Presentation-17-May-22.pptxCybersecurity-Awareness-Presentation-17-May-22.pptx
Cybersecurity-Awareness-Presentation-17-May-22.pptx
RahulDasari12
 
Cybersecurity-Awareness-Presentation-17-May-22 (1).pptx
Cybersecurity-Awareness-Presentation-17-May-22 (1).pptxCybersecurity-Awareness-Presentation-17-May-22 (1).pptx
Cybersecurity-Awareness-Presentation-17-May-22 (1).pptx
SanjaiJinSanjaiJin
 

Similar to Online Self Defense (20)

Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Lesson 5 protecting yourself on the internet
Lesson 5 protecting yourself on the internetLesson 5 protecting yourself on the internet
Lesson 5 protecting yourself on the internet
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
 
Personal Threat Models
Personal Threat ModelsPersonal Threat Models
Personal Threat Models
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 
Security best practices for regular users
Security best practices for regular usersSecurity best practices for regular users
Security best practices for regular users
 
Security Best Practices for Regular Users
Security Best Practices for Regular UsersSecurity Best Practices for Regular Users
Security Best Practices for Regular Users
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
Online reputation
Online reputationOnline reputation
Online reputation
 
security.ppt
security.pptsecurity.ppt
security.ppt
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library Setup
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
 
Cybersecurity-Awareness-Presentation-17-May-22.pptx
Cybersecurity-Awareness-Presentation-17-May-22.pptxCybersecurity-Awareness-Presentation-17-May-22.pptx
Cybersecurity-Awareness-Presentation-17-May-22.pptx
 
Cybersecurity-Awareness-Presentation-17-May-22 (1).pptx
Cybersecurity-Awareness-Presentation-17-May-22 (1).pptxCybersecurity-Awareness-Presentation-17-May-22 (1).pptx
Cybersecurity-Awareness-Presentation-17-May-22 (1).pptx
 

More from Barry Caplin

Healing healthcare security
Healing healthcare securityHealing healthcare security
Healing healthcare security
Barry Caplin
 
It’s not If but When 20160503
It’s not If but When 20160503It’s not If but When 20160503
It’s not If but When 20160503
Barry Caplin
 
Dreaded Embedded sec360 5-17-16
Dreaded Embedded   sec360 5-17-16Dreaded Embedded   sec360 5-17-16
Dreaded Embedded sec360 5-17-16
Barry Caplin
 
It’s not if but when 20160503
It’s not if but when 20160503It’s not if but when 20160503
It’s not if but when 20160503
Barry Caplin
 
Wearing Your Heart On Your Sleeve - Literally!
Wearing Your Heart On Your Sleeve - Literally!Wearing Your Heart On Your Sleeve - Literally!
Wearing Your Heart On Your Sleeve - Literally!
Barry Caplin
 
CISOs are from Mars, CIOs are from Venus
CISOs are from Mars, CIOs are from VenusCISOs are from Mars, CIOs are from Venus
CISOs are from Mars, CIOs are from Venus
Barry Caplin
 
Online Self Defense - Passwords
Online Self Defense - PasswordsOnline Self Defense - Passwords
Online Self Defense - Passwords
Barry Caplin
 
The CISO Guide – How Do You Spell CISO?
The CISO Guide – How Do You Spell CISO?The CISO Guide – How Do You Spell CISO?
The CISO Guide – How Do You Spell CISO?
Barry Caplin
 
Bullying and Cyberbullying
Bullying and CyberbullyingBullying and Cyberbullying
Bullying and Cyberbullying
Barry Caplin
 
3 factors of fail sec360 5-15-13
3 factors of fail   sec360 5-15-133 factors of fail   sec360 5-15-13
3 factors of fail sec360 5-15-13
Barry Caplin
 
Tech smart preschool parent 2 13
Tech smart preschool parent 2 13Tech smart preschool parent 2 13
Tech smart preschool parent 2 13
Barry Caplin
 
Embracing the IT Consumerization Imperative NG Security
Embracing the IT Consumerization Imperative NG SecurityEmbracing the IT Consumerization Imperative NG Security
Embracing the IT Consumerization Imperative NG Security
Barry Caplin
 
Embracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveEmbracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveBarry Caplin
 
Embracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveEmbracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveBarry Caplin
 
Stuff my ciso says
Stuff my ciso saysStuff my ciso says
Stuff my ciso says
Barry Caplin
 
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
Barry Caplin
 
Toys in the office 11
Toys in the office 11Toys in the office 11
Toys in the office 11
Barry Caplin
 
Accidental Insider
Accidental InsiderAccidental Insider
Accidental Insider
Barry Caplin
 
Teens 2.0 - Teens and Social Networks
Teens 2.0 - Teens and Social NetworksTeens 2.0 - Teens and Social Networks
Teens 2.0 - Teens and Social Networks
Barry Caplin
 
Laws of the Game For Valley United Soccer Club travel soccer refs
Laws of the Game For Valley United Soccer Club travel soccer refsLaws of the Game For Valley United Soccer Club travel soccer refs
Laws of the Game For Valley United Soccer Club travel soccer refs
Barry Caplin
 

More from Barry Caplin (20)

Healing healthcare security
Healing healthcare securityHealing healthcare security
Healing healthcare security
 
It’s not If but When 20160503
It’s not If but When 20160503It’s not If but When 20160503
It’s not If but When 20160503
 
Dreaded Embedded sec360 5-17-16
Dreaded Embedded   sec360 5-17-16Dreaded Embedded   sec360 5-17-16
Dreaded Embedded sec360 5-17-16
 
It’s not if but when 20160503
It’s not if but when 20160503It’s not if but when 20160503
It’s not if but when 20160503
 
Wearing Your Heart On Your Sleeve - Literally!
Wearing Your Heart On Your Sleeve - Literally!Wearing Your Heart On Your Sleeve - Literally!
Wearing Your Heart On Your Sleeve - Literally!
 
CISOs are from Mars, CIOs are from Venus
CISOs are from Mars, CIOs are from VenusCISOs are from Mars, CIOs are from Venus
CISOs are from Mars, CIOs are from Venus
 
Online Self Defense - Passwords
Online Self Defense - PasswordsOnline Self Defense - Passwords
Online Self Defense - Passwords
 
The CISO Guide – How Do You Spell CISO?
The CISO Guide – How Do You Spell CISO?The CISO Guide – How Do You Spell CISO?
The CISO Guide – How Do You Spell CISO?
 
Bullying and Cyberbullying
Bullying and CyberbullyingBullying and Cyberbullying
Bullying and Cyberbullying
 
3 factors of fail sec360 5-15-13
3 factors of fail   sec360 5-15-133 factors of fail   sec360 5-15-13
3 factors of fail sec360 5-15-13
 
Tech smart preschool parent 2 13
Tech smart preschool parent 2 13Tech smart preschool parent 2 13
Tech smart preschool parent 2 13
 
Embracing the IT Consumerization Imperative NG Security
Embracing the IT Consumerization Imperative NG SecurityEmbracing the IT Consumerization Imperative NG Security
Embracing the IT Consumerization Imperative NG Security
 
Embracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveEmbracing the IT Consumerization Imperitive
Embracing the IT Consumerization Imperitive
 
Embracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveEmbracing the IT Consumerization Imperitive
Embracing the IT Consumerization Imperitive
 
Stuff my ciso says
Stuff my ciso saysStuff my ciso says
Stuff my ciso says
 
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
 
Toys in the office 11
Toys in the office 11Toys in the office 11
Toys in the office 11
 
Accidental Insider
Accidental InsiderAccidental Insider
Accidental Insider
 
Teens 2.0 - Teens and Social Networks
Teens 2.0 - Teens and Social NetworksTeens 2.0 - Teens and Social Networks
Teens 2.0 - Teens and Social Networks
 
Laws of the Game For Valley United Soccer Club travel soccer refs
Laws of the Game For Valley United Soccer Club travel soccer refsLaws of the Game For Valley United Soccer Club travel soccer refs
Laws of the Game For Valley United Soccer Club travel soccer refs
 

Recently uploaded

Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 

Recently uploaded (20)

Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 

Online Self Defense

  • 1. Online Self-Defense Don’t Let Bad Stuff Happen To You Barry Caplin Chief Information Security Officer Minnesota Department of Human Services barry.caplin@state.mn.us Slides on InfoLink
  • 2. Happy CyberSecurity Month! (and belated Happy National Coffee day!)
  • 3.
  • 4. 2 Main Issues • Passwords • Clicking on Links
  • 5. Passwords Why Are They A Problem? •Hard to remember •Hard to enter •Need too many •Inconsistent Rules •Changes
  • 6. How Passwords Work • Site saves encrypted pw • At login – enter pw – it’s encrypted and compared to stored value • Some sites: – Don’t encrypt well – Don’t encrypt at all!
  • 7. Password Hacks in the News It was a busy year
  • 8. How Passwords Get Hacked • Site attacked – many methods • Encrypted pw file downloaded (should be more difficult!) • Over time, hackers crack the file • What does that get them?
  • 9. Passwords • Avg. web user has: – 25 separate accounts but – 6.5 unique passwords  password reuse – not good • So…
  • 10. Password Self-Defense 1. Don’t reuse passwords 2. Only enter on secure sites 3. Login notifications 4. Choose good (long) passwords
  • 11. Password Self-Defense 5. Vault it 6. Care with “secret” questions 7. Care with linking accounts 8. 2-step authentication 9. Use separate email addresses
  • 12. Password Self-Defense Handouts • Password Self-Defense tips and resources
  • 13. Safe Computer Use and Web Surfing
  • 15. How Your Computer Gets Sick • Attachments • Downloads – Intentional • Clicks • URL shortening – Unintentional - Website Visits/Drive- By
  • 16. Attachments • File sent via email • Can execute when clicked • doc, xls, pdf, jpg (and other images), etc. • Even zip files can cause problems • Only open expected attachments • Don’t open chain emails • Watch holiday emails
  • 17. Downloads • Intentional – Clicking on link downloads page or file Click here to download http://www.download.com/filename
  • 18. Downloads • Only some executables ask permission – Dialog boxes often ignored
  • 19. URL shortening • http://ht.cdn.turner.com/si/danpatrick/aud io/2009/11/03/DP-Hr3_11-03- 2009_stream.mp3 or… • http://bit.ly/2d5LUP • bit.ly, tinyurl.com, others • Some browsers support URL lengthening – Long URL Please
  • 21. Safe Surfing Tips • Look before you click • Use Link Rating • Consider the source (subjective) • Beware – file sharing, gaming, gambling, questionable legality
  • 22. Safe Surfing Tips • Use Care – Social Networking (limit apps), ads, pop-ups, banners • https and lock for shopping, banking, etc. • Limit – open/public networks, scripts • Protect web pw’s
  • 23. Safe Surfing Tips Handouts • PC Protection Tips/Tools • Safe Surfing Tips
  • 25. Phishing Looks real, but rarely is From a familiar business (not) May threaten to close account, warn of fraud or virus Legitimate businesses will not ask for private info via email
  • 27. Phishing on Social Networks Scams seem real when they come from a “friend” Malicious links/apps Spread quickly when posted or “liked” “Just say no” to apps
  • 28. • Installs app • Grabs info • Posts on your wall • Click-fraud
  • 29. Phone Phishing At work: gain access/info, supplement intel Impersonate user/exec/vendor Ask probing questions or for access At home: get personal/financial info Verify cc, ssn, etc. Use fear of theft or fraud to commit theft or fraud!
  • 30. Tips to Avoid Phishing Look before you Click - Don’t click links asking for personal info Never enter personal info in a pop-up Use spam filters, anti-virus/spyware, and keep updated Only open email attachments you’re expecting Don’t give out personal info over the phone unless you initiated the call
  • 31. Tips to Avoid Phishing Know what you’ve posted about yourself on social networks Know who your “friends” are Use care with apps Recheck your social network privacy settings Verify callers asking for “too much” info Initiate calls to known numbers for banks, etc. Act immediately if you’ve been hooked
  • 32. Tips for Avoiding Phishing Handouts • Top Tips to Help Avoid Phishing Scams • 10 Tips for Social Networking Safety
  • 33. Mobile Devices Computer is always with you •Device theft •Data theft •Wireless networks •Malicious software •Geolocation
  • 34. Device Theft • How to protect your devices when you’re mobile? • Keep it with you, or • Lock it up – out of sight
  • 35. Data Theft • Most people have a device: smartphone, tablet, netbook, laptop • Do you know your surroundings? • What network are you using?
  • 37. Data Theft • USB devices • “evil maid” • Be aware of your surroundings
  • 38.
  • 39. Wireless Networks • Open Wi-Fi • “evil twin” • firesheep
  • 40. Wireless Networks • Use Wi-fi with WPA2 • Verify your connection (ask the provider) • 3G/4G relatively safer… for now
  • 41. Malicious Software • There’s an app for that! • Use official app markets • Use anti- malware
  • 42. Geolocation The world knows • Where you are • Where you are not
  • 43. Tips for Mobile Devices • Use official app markets • Use anti-malware • Keep your device close or locked-up out of sight • Watch your surroundings • Be stingy with your personal data
  • 44. Tips for Mobile Devices • No government data on personal devices • Use only DHS-managed connections 
  • 45. Tips for Mobile Devices Handouts • 10 Tips for Securing Your Mobile Device
  • 46. Let’s Be Careful Out There

Editor's Notes

  1. Foursquare, google latitude, pleaserobme