33
Today’s Technology and You Safe computing in a digital world May 17, 2013 Eric A. Vanderburg, MBA, CISSP Director, Cyber Security and Information Systems

Today's technology and you: Safe computing in a digital world - Eric Vanderburg - JurInnov

Embed Size (px)

DESCRIPTION

It is a dangerous world out there in cyberspace with organizations losing corporate secrets or private customer data almost daily. Protecting yourself, however, doesn’t have to be difficult and neither should it be left to those in IT. The keys to safe computing in a digital world can be yours. Eric Vanderburg, Director of Information Systems and Security at JurInnov, presents "Today's technology and you: Safe computing in a digital world" at The Union Club.

Citation preview

Page 1: Today's technology and you: Safe computing in a digital world - Eric Vanderburg - JurInnov

Today’s Technology and YouSafe computing in a digital world

May 17, 2013

Eric A. Vanderburg, MBA, CISSP Director, Cyber Security and Information Systems

Page 2: Today's technology and you: Safe computing in a digital world - Eric Vanderburg - JurInnov

© 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved

Who Are We?

JurInnov works with organizations that want to more effectively manage matters involving “Electronically Stored Information” (ESI). – Computer Forensics– Cyber Security– Electronic Discovery– Document and Case Management

Page 3: Today's technology and you: Safe computing in a digital world - Eric Vanderburg - JurInnov

© 2013 Property of JurInnov Ltd. All Rights Reserved4

What are Cybercriminals After?

Access to:– Personal information– Patent applications– Financial information– M&A documents– Intellectual property– Client correspondence

Business disruption of:– Calendar system– Billing system– Website

Page 4: Today's technology and you: Safe computing in a digital world - Eric Vanderburg - JurInnov

© 2013 Property of JurInnov Ltd. All Rights Reserved

90/10 Rule

Process

Technology

People

10%

90%

Page 5: Today's technology and you: Safe computing in a digital world - Eric Vanderburg - JurInnov

© 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved

Starts with you• Exercise safe computing practices• Report suspicious activity• Notify IT/information security of potential

security incidents• Escort guests through facilities• Challenge guests

SEC-U-R-IT-Y

Page 6: Today's technology and you: Safe computing in a digital world - Eric Vanderburg - JurInnov

© 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved

Passwords• Passwords are the keys to many things: your bank

account, your computer, your email, a server on a network.

• Your password gives others the power to:– Access your account (financial, email, etc)– Modify or destroy your files– Send malicious e-mail such as spam or threats

in your name– Commit fraud while masquerading as you– Use your computer to distribute illegally files

such as movies, songs or worse (child pornography)

Page 7: Today's technology and you: Safe computing in a digital world - Eric Vanderburg - JurInnov

© 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved

Passwords and Accounts• Creating a secure password• Passphrase: Here24octopihad5legslike*fish• Secondary logon• Limit administrative accounts• Lock the computer• Autolock• Change default passwords• Change passwords that you suspect may have

been compromised• Choose recovery hints and challenges wisely

Page 8: Today's technology and you: Safe computing in a digital world - Eric Vanderburg - JurInnov

© 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved

Passwords• Do not store them in obvious places• Do not let anyone observe you entering it• Do not share your password• Do not reveal a password

– on questionnaires or security forms– to anyone over the phone, e-mail, or IM

• Do not use same password for different servers/services

• Do not use written examples of passwords

Page 9: Today's technology and you: Safe computing in a digital world - Eric Vanderburg - JurInnov

© 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved

Spotting password theft• Email

– Large number of rejected messages– Missing emails– Messages in sent mail that you didn’t send

• Social media– Posts you did not make– Many unknown contacts

Page 10: Today's technology and you: Safe computing in a digital world - Eric Vanderburg - JurInnov

© 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved

When is data really gone?• Deleting a file does not actually remove it

from your computer• Files persist until they are overwritten• Full or partial files may be recoverable• Sensitive data should be wiped• Drives should be wiped before being

reused

Page 11: Today's technology and you: Safe computing in a digital world - Eric Vanderburg - JurInnov

© 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved

Browser security• Cookies• Block pop-ups• HTTP vs. HTTPS• Certificates• Fake sites

– Swapped Characters yuotube.com– Replaced Characters wschovia.com– Inserted Characters Gooogle.com– Deleted Character Facbook.com– Missing dot wwwmicrosoft.com

Page 12: Today's technology and you: Safe computing in a digital world - Eric Vanderburg - JurInnov

© 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved

Working remotely

• Free Wi-Fi• Encrypt and password protect mobile

devices• VPN• Enable computer firewall• Disable shares or use a homegroup

(if not on a domain)

Page 13: Today's technology and you: Safe computing in a digital world - Eric Vanderburg - JurInnov

© 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved

Public computers• Limit what you do• Erase your tracks (clear history)

– IE (Tools, Internet Options, General tab, Delete Browsing History)

– Firefox (Tools, Options, Privacy tab, clear private data)– Use private browsing window

• Do not save files locally• Don’t save passwords• Watch for over the shoulder• Delete temporary files• Exit programs and close browser when you leave

Page 14: Today's technology and you: Safe computing in a digital world - Eric Vanderburg - JurInnov

© 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved

Social media• Privacy settings

– Default– Per-post

• Who should be your friend?• Geolocation• Watch out for social scams

– Mugged on vacation– Free stuff– Spammed content and links

Page 15: Today's technology and you: Safe computing in a digital world - Eric Vanderburg - JurInnov

© 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved

Social engineering• Social engineering preys on qualities of human

nature:

the desire to be helpful the tendency to trust people the fear of getting into trouble

Page 16: Today's technology and you: Safe computing in a digital world - Eric Vanderburg - JurInnov

© 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved

Malware• Viruses• Trojans• Keyloggers• Bots• Spyware• Adware

Page 17: Today's technology and you: Safe computing in a digital world - Eric Vanderburg - JurInnov

© 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved

Why malware?• Revenge• Sense of power• To prove a point• Bragging rights• Profit• To attack other systems• Because they can

Page 18: Today's technology and you: Safe computing in a digital world - Eric Vanderburg - JurInnov

© 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved

Spyware• Corrupts/alters the current

software• Tracks browsing habits, sites• Interferes with system settings • (registry, startup)• Steals passwords, information

etc.

Page 19: Today's technology and you: Safe computing in a digital world - Eric Vanderburg - JurInnov

© 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved

Spyware• How does it get there?

– Email– Instant Messaging– Internet Browsing– P2P Software

• Don’t take downloads from strangers– What else are you getting with the “free”

stuff– Be cautious with bundled installers

Page 20: Today's technology and you: Safe computing in a digital world - Eric Vanderburg - JurInnov

© 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved

Spyware• Identifying it

– Sluggish computer– Annoying pop-ups– Changes to browser home pages– Unwanted toolbars– Unknown programs appear

Page 21: Today's technology and you: Safe computing in a digital world - Eric Vanderburg - JurInnov

© 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved

Preventing malware• Safe browsing habits• Up-to-date antivirus• Antimalware software• Computer firewall• Windows updates

Page 22: Today's technology and you: Safe computing in a digital world - Eric Vanderburg - JurInnov

© 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved

Virus Hoax

Page 23: Today's technology and you: Safe computing in a digital world - Eric Vanderburg - JurInnov

© 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved

Phishing• False Sense Of Urgency - Threatens to

"close/suspend your account”, charge a fee or talks about suspicious logon attempts, etc.

• Suspicious-Looking Links - Links containing all or part of a real company's name asking you to submit personal information.

• Not personalized – does not address you by name or include a masked version of the account number.

• Misspelled or Poorly Written – Helps fraudulent emails avoid spam filters

Page 24: Today's technology and you: Safe computing in a digital world - Eric Vanderburg - JurInnov

© 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved

Phishing Examples

Page 25: Today's technology and you: Safe computing in a digital world - Eric Vanderburg - JurInnov

© 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved

Phishing examples

Page 26: Today's technology and you: Safe computing in a digital world - Eric Vanderburg - JurInnov

© 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved

Phishing examples

Page 27: Today's technology and you: Safe computing in a digital world - Eric Vanderburg - JurInnov

© 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved

Phishing examples

Page 28: Today's technology and you: Safe computing in a digital world - Eric Vanderburg - JurInnov

© 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved

Phishing• Treat all email with suspicion• Never use a link in an email to get to any

web page• Never send personal or financial

information to any one via email • Never give personal or financial

information solicited via email

Page 29: Today's technology and you: Safe computing in a digital world - Eric Vanderburg - JurInnov

© 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved

Spatial securityWHAT’S WRONG WITH THIS PICTURE?

Page 30: Today's technology and you: Safe computing in a digital world - Eric Vanderburg - JurInnov

© 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved

Spatial security• Computers or whiteboard placement• Facing away from windows or public areas• Monitor privacy screen• One way window film

Page 31: Today's technology and you: Safe computing in a digital world - Eric Vanderburg - JurInnov

Questions

Page 32: Today's technology and you: Safe computing in a digital world - Eric Vanderburg - JurInnov

© 2013 Property of JurInnov Ltd. All Rights Reserved

Blogs & Podcasts

• 50,000 Medicaid providers’ data breached

• Data breach threats of 2013

• Ignorance of the breach is no excuse

• Over processing of ESI and the Microsoft letter

• Predictive coding gets a glossary

• LegalTech 2013

Page 33: Today's technology and you: Safe computing in a digital world - Eric Vanderburg - JurInnov

© 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved

For assistance or additional information

• Phone: 216-664-1100• Web: www.jurinnov.com• Email: [email protected]

JurInnov Ltd.The Idea Center

1375 Euclid Avenue, Suite 400Cleveland, Ohio 44115