Personal Cybersecurity

Similar documents
Cyber Insurance: What is your bank doing to manage risk? presented by

DHG presenter. August 17, Addressing the Evolving Cybersecurity Landscape. DHG Birmingham CPE Seminar 1

How Cyber-Criminals Steal and Profit from your Data

Cyber fraud and its impact on the NHS: How organisations can manage the risk

June 2 nd, 2016 Security Awareness

Top Ten IT Security Risks CHRISTOPHER S. ELLINGWOOD SENIOR MANAGER, IT ASSURANCE SERVICES

CERTIFIED SECURE COMPUTER USER COURSE OUTLINE

Managing IT Risk: What Now and What to Look For. Presented By Tina Bode IT Assurance Services

Identity Theft, Fraud & You. PrePare. Protect. Prevent.

CLICK TO EDIT MASTER TITLE STYLE Fraud Overview and Mitigation Strategies

Legal Aspects of Cybersecurity

The Cyber War on Small Business

Security & Phishing

Your security on click Jobs

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person)

Cybersecurity The Evolving Landscape

Chapter 6 Network and Internet Security and Privacy

Who We Are! Natalie Timpone

Introduction to Information Security Dr. Rick Jerz

security FRAUD PREVENTION Business Checklist Safeguard your money, your credit and your good name.

Securing the SMB Cloud Generation

WHAT IS CORPORATE ACCOUNT TAKEOVER? HOW DOES IT HAPPEN?

Course Outline (version 2)

Cyber Security Updates and Trends Affecting the Real Estate Industry

Security Awareness & Best Practices Best Practices for Maintaining Data Security in Your Business Environment

2016 Tri-State CF Partnership Webinar Series. Cyber Crime Trends a State of the Union April 7, 2016

Cybersecurity A Regulatory Perspective Sara Nielsen IT Manager Federal Reserve Bank of Kansas City

Meeting FFIEC Meeting Regulations for Online and Mobile Banking

Online Threats. This include human using them!

Wire Fraud Scams: How to Protect

Newcomer Finances Toolkit. Fraud. Worksheets

Quick recap on ing Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page

CYBER SECURITY RISK ASSESSMENT: WHAT EVERY PENSION GOVERNMENTAL ENTITY NEEDS TO KNOW

What is a mobile protection product?

CYBER THREATS: REAL ESTATE FRAUD ADVISORY COUNCIL

PCI Compliance. What is it? Who uses it? Why is it important?

ISACA West Florida Chapter - Cybersecurity Event

Accounting Information Systems

Retail/Consumer Client Internet Banking Awareness and Education Program

Security Awareness. Chapter 2 Personal Security

IS Today: Managing in a Digital World 9/17/12

Train employees to avoid inadvertent cyber security breaches

Cyber Security for PSNTs John Burger, Colonel, U.S. Army (Retired) VP Strategy and Threat Management, Reliaquest

Large-Scale Internet Crimes Global Reach, Vast Numbers, and Anonymity

Safety and Security. April 2015

Multilayered technology, machine learning and human expertise working together to provide comprehensive security for all platforms.

Cyber-Threats and Countermeasures in Financial Sector

Tackling Cybersecurity with Data Analytics. Identifying and combatting cyber fraud

Quick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft.

Multilayered technology, machine learning and human expertise working together to provide comprehensive security for all platforms.

Best Practices Guide to Electronic Banking

Chapter 4 Network and Internet Security

It pays to stop and think

9/11/ FALL CONFERENCE & TRAINING SEMINAR 2014 FALL CONFERENCE & TRAINING SEMINAR

1) Are employees required to sign an Acceptable Use Policy (AUP)?

Defending Our Digital Density.

Insider Threat Program: Protecting the Crown Jewels. Monday, March 2, 2:15 pm - 3:15 pm

Cyber Criminal Methods & Prevention Techniques. By

A practical guide to IT security

ELECTRONIC BANKING & ONLINE AUTHENTICATION

HOW SAFE IS YOUR DATA? Micho Schumann, KPMG, Cayman Islands

ECDL / ICDL IT Security. Syllabus Version 2.0

Regulator s Perspective of Best Practices in Combatting Cybercrime Executive Fraud Forum October 30, 2013

Governance Ideas Exchange

Evolution of Spear Phishing. White Paper

Review Kaspersky Internet Security - multi-device 2015 online software downloader ]

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.

Security Audit What Why

Common Scams and Fraud. Charlottesville/Albemarle County TRIAD Group

Cyber Security Practice Questions. Varying Difficulty

716 West Ave Austin, TX USA

SECURE USE OF IT Syllabus Version 2.0

SUMMARIES OF INTERACTIVE MULTIMEDIA

Target Breach Overview

Employee Privacy in the Electronic Workplace

Internet of Things Toolkit for Small and Medium Businesses

Information Technology Enhancing Productivity and Securing Against Cyber Attacks

Cyber Security Risk Management and Identity Theft

Business/Commercial Client Internet Banking Awareness and Education Program

Keys to a more secure data environment

DeMystifying Data Breaches and Information Security Compliance

(U) Cyber Threats to the Homeland

FAQ. Usually appear to be sent from official address

2017 Annual Meeting of Members and Board of Directors Meeting

Discount Kaspersky PURE 3.0 internet download software for windows 8 ]

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

EMERGING TRENDS IN WHITE COLLAR CRIMES

3.5 SECURITY. How can you reduce the risk of getting a virus?

Engaging Executives and Boards in Cybersecurity Session 303, Feb 20, 2017 Sanjeev Sah, CISO, Texas Children s Hospital Jimmy Joseph, Senior Manager,

The Credential Phishing Handbook. Why It Still Works and 4 Steps to Prevent It

Security Gaps from the Field

INTERNET SAFETY IS IMPORTANT

Restech. User Security AVOIDING LOSS GAINING CONFIDENCE IN THE FACE OF TODAY S THREATS

KnowBe4 is the world s largest integrated platform for awareness training combined with simulated phishing attacks.

Computer Security. Assoc. Prof. Pannipa Phaiboonnimit. Adapted for English Section by Kittipitch Kuptavanich and Prakarn Unachak

5LINX ID GUARD Product Overview. Credit/Presenter Goes Here

Brian S. Dennis Director Cyber Security Center for Small Business Kansas Small Business Development Center


Identity Theft and Data Breach. How to protect yourself?

Cyber Crime Update. Mark Brett Programme Director February 2016

Transcription:

Personal Cybersecurity The Basic Principles Jeremiah School, CEO

How big is the issue? 9 8 7 6 5 4 3 2 1 Estimated global damages in 2018 0 2016 2018 2020 2022 2024 2026 2028 2030 Internet Users Billions of people Internet users vs world population trend Source: Cybersecurity Ventures 2018

How big is the issue? 1600 1400 1200 1000 800 600 400 200 0 Millions of Dollars $15.8M 2013 2014 2015 2016 2017 Reported cybercrime losses by Americans Americans are victims of cybercrime Reported cybercrime losses by Wisconsinites Source: FBI IC3 2017 Source: Symantec 2017 Source: FBI IC3 2017

What are they looking for? What do they want to do? How do they get my data? How do I protect myself? What if I become a victim?

What are they looking for? Personal Information Passwords Email Accounts

What are they looking for? Personal Information Social Security information Drivers license numbers Credit card numbers Account information Trading information Social information for building a convincing persona Intellectual property Anything that can be used for ransom Passwords Email Accounts

What are they looking for? Personal Information Passwords Gain access to higher valued assets Gain access to bank accounts Gather payment card details Make fraudulent purchases Email Accounts

What are they looking for? Personal Information Passwords Email Accounts Password reset requests Tax, travel, and order information Spamming contacts Leverage social engineering opportunities

What do they want to do? Extort Money Utilize Your Resources Disrupt & Destroy

What do they want to do? Extort Money Ransomware Encrypting your files until a ransom is paid Encrypts all files available Between $400 and $1400, more for businesses Mobile ransomware is growing quickly Identity Theft Scare Tactics & Blackmail Utilize Your Resources Disrupt & Destroy

What do they want to do? Extort Money Ransomware Identity Theft Tax fraud Setup credit cards Open up lines of credit Falsify employment records Obtain medical care Insurance fraud Scare Tactics & Blackmail Utilize Your Resources Disrupt & Destroy

What do they want to do? Extort Money Ransomware Identity Theft Scare Tactics & Blackmail False scares of having a virus Warnings of device being locked Threats of personal harm Use of cameras and photos for blackmail Utilize Your Resources Disrupt & Destroy

What do they want to do? Extort Money Ransomware Identity Theft Scare Tactics & Blackmail Utilize Your Resources Disrupt & Destroy Turning your device into a bot Used for spamming, crypto mining and denial of service attacks Used for brute force attacks and password cracking Used in social media for mass info dumping and creating trends

What do they want to do? Extort Money Ransomware Identity Theft Scare Tactics & Blackmail Utilize Your Resources Disrupt & Destroy Hacktivism & political purposes Personal sabotage or popularity Damage equipment Distraction for larger & more complex attacks

How do they get my data? Phishing Spoofing Password Cracking

How do they get my data? Phishing Spoofing Email Websites Phone / Caller ID Password Cracking Email Phishing Legitimate-looking emails that appear as though they originated from reputable sources often including links, documents and pictures Phone / Voice Phishing Is a form of criminal phone fraud, using social engineering over the telephone system to gain access to private personal and financial information

How do they get my data? Phishing Spoofing Email Requests for help and money from contacts Baiting with great deals Fraudulent bank wire fund transfers Websites Phone / Caller ID Password Cracking

How do they get my data? Phishing Spoofing Email Websites Banking websites Government agency Those asking for personal information Phone / Caller ID Password Cracking

How do they get my data? Phishing Spoofing Email Websites Phone / Caller ID Microsoft calling to inform you of a virus Workplace IT Support Government agency Winning a prize Password Cracking

How do they get my data? Phishing Spoofing Email Websites Phone / Caller ID Password Cracking Brute Force Social Engineering Snooping

How do I protect myself?

How do I protect myself? Updating & Upgrading Firewalls Smart Devices Antivirus & Antimalware Wireless Connections Email Phone Passwords Backups Credit & Debit Cards Update vs Upgrade Be aware of end of support dates Ensure hardware and software stays up to date Utilize automatic update settings where possible Identify Theft Protection Cyber Security Insurance Protecting Children Other

How do I protect myself? Updating & Upgrading Firewalls Smart Devices Antivirus & Antimalware Wireless Connections Email Phone Passwords Backups Credit & Debit Cards Ensure you have a hardware and software firewall Ensure software is up to date Maintain opened and forwarded ports if used Disable remote access Identify Theft Protection Cyber Security Insurance Protecting Children Other

How do I protect myself? Updating & Upgrading Firewalls Smart Devices Antivirus & Antimalware Wireless Connections Email Phone Passwords Backups Take inventory Use strong passwords on all devices Disable remote access to the device unless necessary Keep them up to date Credit & Debit Cards Identify Theft Protection Cyber Security Insurance Protecting Children Other

How do I protect myself? Updating & Upgrading Firewalls Smart Devices Antivirus & Antimalware Wireless Connections Email Phone Passwords Backups Credit & Debit Cards Have antivirus software installed Ensure it s up to date Setup to run prescheduled scans All operating systems are vulnerable Identify Theft Protection Cyber Security Insurance Protecting Children Other

How do I protect myself? Updating & Upgrading Firewalls Smart Devices Antivirus & Antimalware Wireless Connections Email Phone Passwords Backups Credit & Debit Cards Use public Wi-Fi cautiously Secure your home wireless network Do not auto connect to wireless networks Remove unused Wi-Fi networks and Bluetooth devices Identify Theft Protection Cyber Security Insurance Protecting Children Other

How do I protect myself? Updating & Upgrading Firewalls Smart Devices Antivirus & Antimalware Wireless Connections Email Phone Passwords Backups Credit & Debit Cards Identify Theft Protection Cyber Security Insurance Be aware of what's in your inbox and sent items Be on the look out for email spoofing and phishing Examine & verify the senders email address Examine & verify link URL s Verify suspicious email by calling person or company Do not send personal or sensitive information Protecting Children Other

How do I protect myself? Updating & Upgrading Firewalls Smart Devices Antivirus & Antimalware Wireless Connections Email Phone Passwords Backups Don t answer questions or push buttons Hang up and call person or company Setup voicemail passwords or change default Credit & Debit Cards Identify Theft Protection Cyber Security Insurance Protecting Children Other

How do I protect myself? Updating & Upgrading Firewalls Smart Devices Antivirus & Antimalware Wireless Connections Email Phone Passwords Backups Credit & Debit Cards Identify Theft Protection Cyber Security Insurance Protecting Children Use 2 Factor Authentication Do not reuse passwords Do not use a variation of your previous passwords Use long passwords, over 12 characters Use long memorable phrases Change password(s) at any concern of being hacked Assess how critical the account is Utilize password managers Other

How do I protect myself? Updating & Upgrading Firewalls Smart Devices Antivirus & Antimalware Wireless Connections Email Phone Passwords Backups Credit & Debit Cards If possible leverage cloud backup products Automate the process Verify and monitor Test restore Identify Theft Protection Cyber Security Insurance Protecting Children Other

How do I protect myself? Updating & Upgrading Firewalls Smart Devices Antivirus & Antimalware Wireless Connections Email Phone Passwords Backups Credit & Debit Cards Identify Theft Protection Review accounts Freeze your credit Use credit cards for online purchases Avoid storing card information on sites Be aware of payment card overlays Cyber Security Insurance Protecting Children Other

How do I protect myself? Updating & Upgrading Firewalls Smart Devices Antivirus & Antimalware Wireless Connections Email Phone Passwords Backups Credit & Debit Cards Secure personal information Freeze your credit with all credit rating agencies Follow other technology best practices Evaluate identity protection services Identify Theft Protection Cyber Security Insurance Protecting Children Other

How do I protect myself? Updating & Upgrading Firewalls Smart Devices Antivirus & Antimalware Wireless Connections Email Phone Passwords Backups Coming to the consumer market Assisting with losses such as IoT devices, ransomware, and identity theft Understand the details Credit & Debit Cards Identify Theft Protection Cyber Security Insurance Protecting Children Other

How do I protect myself? Updating & Upgrading Firewalls Smart Devices Antivirus & Antimalware Wireless Connections Email Phone Passwords Backups Credit & Debit Cards Use parental control software Use privacy settings on social media sites Bring awareness to cyber risks Setup and freeze credit Identify Theft Protection Cyber Security Insurance Protecting Children Other

How do I protect myself? Updating & Upgrading Firewalls Smart Devices Antivirus & Antimalware Wireless Connections Email Phone Passwords Backups Credit & Debit Cards Identify Theft Protection Annual audits Change from Administrative to User account Isolate activities to devices you manage and trust Remove unneeded and unused software "bloatware" Avoid 3rd party software add-ons during installs Cyber Security Insurance Protecting Children Other

What if I become a victim? Take immediate action Notify needed parties Report the crime

What s Next? Global, National, and Local Authority Better software development No more passwords Quantum computing

Questions?

Thank you! Jeremiah School 920-321-3622 jschool@weareinnova.com