17
Patricia Watson, MBA Digital Forensics Program Manager ISCPA CPE Course | 11.15.13 Cyber Security Threats: Are You @ Risk?

CyberSecThreats_R_U_atRisk_Watson

Embed Size (px)

Citation preview

Page 1: CyberSecThreats_R_U_atRisk_Watson

Patricia Watson, MBA

Digital Forensics Program Manager

ISCPA CPE Course | 11.15.13

Cyber

Security

Threats:

Are You

@ Risk?

Page 2: CyberSecThreats_R_U_atRisk_Watson

What we will cover…

# Today’s cyber security landscape

# SMBs = False sense of security

# Your role in mitigating cyber

threats at work

# Appendix: Takeaways – Securing your

cyber space

Page 3: CyberSecThreats_R_U_atRisk_Watson

Today’s Cyber Security landscape

Advances in technology are

continuously reshaping methods of

storing, accessing, sharing and

transferring data…

Manual Digital Virtual

Page 4: CyberSecThreats_R_U_atRisk_Watson

Today’s Cyber Security landscape

Some examples of cyber crime:

# Distributing malware

# Phishing

# Stealing PII

# Illegally downloading files

# Espionage

# Hacktivism

# Cyber-warfare!

Page 5: CyberSecThreats_R_U_atRisk_Watson

Today’s Cyber Security landscape

Cyber crime vectors include:

# Unsuspecting Users

# Social engineering

# 0 day exploits

# Unpatched systems

# Default/weak credentials

# Mobile applications

# USB devices

Page 6: CyberSecThreats_R_U_atRisk_Watson

Today’s Cyber Security landscape

The Risks:

# Financial loss

# Loss of intellectual property

# Loss of customer confidence

# Identity theft

# Utilization of resources

# Being a hacker’s puppet!

Page 7: CyberSecThreats_R_U_atRisk_Watson

Today’s Cyber Security landscape

In the news*…

# Adobe breach impacted at least 38

million users

# New variant of trojan targeting SAP

users

# Google “outraged” at alleged NSA

hacking

# Hackers exploit latest

Windows zero-day vulnerability

* See notes section for credit to article/news…

Page 8: CyberSecThreats_R_U_atRisk_Watson

SMBs – False sense of Security

Despite overwhelming validation that

cyber threats continue rising, small

and medium-sized businesses (SMBs)

insist in perpetuating the fallacy:

We are not a hacker target!

Page 9: CyberSecThreats_R_U_atRisk_Watson

SMBs – False sense of Security

A few statistics*:

# 96% of businesses are unprepared for

a cyber attack

# 50% of targeted attacks were aimed

at SMBs

# 37% of breaches affected financial

sector

# Mobile malware increased 58% in 2012

* See notes section for credit to report references…

Page 10: CyberSecThreats_R_U_atRisk_Watson

A few more…

# Almost two-thirds of data breaches

are caused by human errors

# Weak or stolen credentials account

for 76% of network intrusions

# The United States accounts for

almost 50% of the world’s data

security breaches

* See notes section for credit to report references…

SMBs – False sense of Security

Page 11: CyberSecThreats_R_U_atRisk_Watson

Cyber Security @ work

How can YOU mitigate the risks of

cyber threats @ work:

Use strong passwords (don’t recycle)

Use encryption

Foster social media etiquette

Lock your PC & mobile devices

Avoid “free” WIFI

Be vigilant - training & awareness

Page 12: CyberSecThreats_R_U_atRisk_Watson

In summary…

# Don’t underestimate cyber

adversaries

# Cyber security is everyone’s

responsibility

# Cyber security is a

continuous process

# Training and awareness is

just one piece of the puzzle…

Page 13: CyberSecThreats_R_U_atRisk_Watson

Appendix: Takeaways

# Securing your home network

# Social Media Etiquette

# Do you know what your kids are

browsing

# For your viewing enjoyment

Page 14: CyberSecThreats_R_U_atRisk_Watson

Cyber Security @ home

Use a firewall – software/hardware.

Password protect your WIFI, never use the default

credentials

Check the default security settings on all your

devices (computers, printers, tablets, etc.)

Automate security patches

Automate signature updates for anti-virus software.

Plug & Scan: all USB devices, email attachments and

downloadable files should be checked for viruses

Be diligent – Don’t open attachments or click on

links from unknown sources!

Page 15: CyberSecThreats_R_U_atRisk_Watson

Social Media Etiquette

# Depending on the purpose of your social media account, you

don’t need to provide all your personal information – tailor

the account to your needs (including privacy settings).

# Remove all metadata from pictures and documents before

sending or uploading.

# Be mindful that in cyberspace, it is almost impossible to

distinguish between a “friend” & a “foe”. Don’t feel

obligated to “Like”, “Friend” or “Follow” profiles of people

you don’t actually know.

# There’s an App for that! Yes, most social media providers

have an App for mobile phones and tablets. Be sure to

manage the privacy, notifications and location services

settings to avoid oversharing.

# Stop.Think.Post – Remember, once you hit the upload, share,

tweet or send button, you have no control regarding the

destiny of that “post“!

Page 16: CyberSecThreats_R_U_atRisk_Watson

Do you know what your kids

are browsing?

# Create separate user accounts (user name &

password) if you share devices that connect to the

internet with other members of your household and

apply the principle of least privilege to each

account (separate from administrator account).

# Manage internet access on all devices (game

consoles, tablets, smart phones, printers, etc.)

# If your kids use social media, be sure to “friend”

&/or “follow” them.

# Take off your technology blinders and stay current

with the latest cyber trends & threats…awareness

is key!

Page 17: CyberSecThreats_R_U_atRisk_Watson

For your viewing enjoyment…

# Short Film – The Dawn of the Net: http://www.youtube.com/watch?v=RhvKm0RdUY0&feature=youtu.be

# Video – 10 top time-saving tech tips by David

Pogue: https://www.youtube.com/watch?v=QoT0-2vu9m4&feature=youtu.be

# Video – History of computer viruses: http://www.youtube.com/watch?v=1g1yZVWrbtE#!

# TedTalk – Mikko Hypponen: How the NSA betrayed the

world’s trust – time to act http://www.ted.com/talks/mikko_hypponen_how_the_nsa_betrayed_the_world_s

_trust_time_to_act.html?awesm=on.ted.com_NSAbetray&utm_content=awesm-

publisher&utm_campaign=&utm_source=t.co&utm_medium=on.ted.com-static