SlideShare a Scribd company logo
1 of 22
Download to read offline
Securing Your
Cyberspace

Patricia Watson
National Cyber Security Awareness Month
10.2013
National
Cyber
Security
Awareness
Month

What we will cover…
• In cyberspace…ignorance is NOT
bliss!
• Welcome to the new era of
“involuntary transparency”
• Do you manage your internet
footprint?

• Do you know what your kids are
browsing?
• Appendix - Resources
Ignorance is NOT bliss!
• Myth…
– I don’t have anything to
hide
– I don’t have anything of
value
– Hackers are not
interested in hacking my
home PC
The fact is…
• Cyber adversaries are
looking for the easy
targets!
• They are not necessarily
targeting YOU – they
mostly want financial
and PII (in masses)

• And free WIFI,
hardware and
bandwidth (zombies)
Cyber Security Levels
Level 1
Flawed Integration

Level 2
Inconsistent
Practices

Level 3
Maturing & Refining

Risk = High

Default
settings,
dated
systems,
no
firewall,
weak
passwords

Level 4
Continuously
Verified

Risk = Low

Use of
firewall,
some
patching,
strong
passwords

Firewalls
strong
passwords
security
patches &
AV scans

Firewalls,
separate
networks &
accounts,
automated
security
patches & AV
scans,
awareness!
Don’t be a gummy bear!
• Use a firewall – software/hardware.
• Password protect your WIFI, never use the
default credentials.
• Check the default security settings on your
devices.

• Automate security patches.
• Automate signature updates for anti-virus
software.
• Plug & Scan: all USB devices, email
attachments and downloadable files should
be checked for viruses.
• Be diligent – Stop.Think.Connect!
Welcome to the new era of
involuntary transparency!
• When you are connected to the internet,
the internet is connected to YOU!
• What is the internet saying about YOU?
• Is your mobile device tracking your
every move?
• Is your browser broadcasting your
interests?

• Are your “friends” over-sharing your
information?
Social Media Etiquette…
Do you manage your
Internet footprint?
• Everything you post on the internet is
PUBLIC…there is NO privacy in cyberspace!
• Once you hit the upload, share, tweet or
send button, you have no control regarding
the destiny of that “post“
• The Internet is not the place to broadcast
your grievances about your friends or foes
• Don’t post embarrassing information that
would be awkward to explain to relatives,
friends and current/future employers
OMG R U #sharing TMI?
• Take the time to manage the privacy
settings for your accounts?

• Don’t advertise your travel plans
on Facebook or other social media
• Remove all metadata from files
BEFORE sharing
• Never use the same user name &
password for all accounts
Do you manage your
Internet footprint?
• Do you know your “friends”?
• Don’t feel obligated to “Like”,
“Friend” or “Follow” profiles
of people you don’t actually
know!
• What is the purpose of your
social media account?
– Work
– Family & Friends
– News & Trends
Do you Know what your
kids are browsing?
• Use separate login accounts for
each user – apply concept of
least privilege.
• Manage internet access on all
devices!
• If your kids use social media,
be sure to “friend” &/or “follow”
them.
• Take off your technology
blinders - stay stay current
with the latest cyber trends &
threats…awareness is key!
“…the upside of painful
knowledge is so much greater
than the downside of blissful
ignorance” (Sheryl Sandberg)
National
Cyber
Security
Awareness
Month

Questions?
Appendix: Resources
• Firewalls
• Social media tips
• Location Service GPS settings
• Separate user accounts
• For your viewing enjoyment…
Firewalls
Firewall - a technological barrier designed to
prevent unauthorized or unwanted communications
between computer networks or hosts.
• Hardware Firewall – Apple AirPort Extreme:
http://www.apple.com/airport-extreme/specs/
– Short Video – How to set up the new AirPort
Extreme:

http://sharepoint.bc.com/sites/Corp/ComputerSecurity/Whitepape
rsandreferencematerial/Forms/AllItems.aspx

– Anti Virus Software – Intego VirusBarrier
(Windows friendly): http://www.intego.com/virusbarrier

• Software Firewall (it’s free) – ZoneAlarm:

http://www.zonealarm.com/security/en-us/zonealarmpc-security-free-firewall.htm
– Configuring ZoneAlarm at home:

http://hdc.tamu.edu/Security/Firewalls/Personal_Firewalls/Conf
iguring_ZoneAlarm_Firewall__Free_Version_.php
Social Media Tips
• Depending on the purpose of your social media
account, you don’t need to provide all your
personal information – tailor the account to
your needs, including privacy settings.
• Remove all metadata from pictures before
sharing, especially if you are posting while
traveling.
• There’s an App for that! Yes, most social
media providers have an App for mobile phones
and tablets. Be sure to manage the privacy,
notifications and location services settings to
avoid oversharing.
• Remember, posts on social media are intended to
be a “short status” not a detailed diary, keep
it short, sweet and to the point.
• If you want to share links to other websites
via your social media account, use a reputable
URL shortening service such as Bitly.
• Stop.Think.Post – Remember, once you hit the
upload, share, tweet or send button, you have
no control regarding the destiny of that “post“!
Location Services
Location Services allows location-based apps and
websites (including Maps, Camera, Safari, and
other Apple and third-party apps) to use
information from cellular, WIFI, Global
Positioning System (GPS)2 networks, and iBeacons3
to determine your approximate location.
While this tool serves a good purpose,
unfortunately it has unintended consequences:
• Adversaries can use it to track your every move
• Companies use it to craft their marketing
campaigns based on your whereabouts
• Not to mention, big brother is always
watching/tracking!
Be sure to take the time to manage your security
settings on your mobile device.
User Accounts
Given that almost every action we take in
cyberspace is tracked, interconnected, or
transmitted, it is good practice to keep
separate user and login accounts (based on
purpose or ownership):
• Create separate user accounts (user name &
password) if you share devices that connect
to the internet with other members of your
household
• Create separate login accounts (user name &
password) for browsers (Mozilla, Chrome, IE)
and applications (iTunes, Facebook, etc.)
• Apply the principle of least privilege to all
accounts and keep them separate from your
Administrator account!
• NEVER use the same password for multiple
accounts & change your password often!
For your viewing enjoyment…
• Short Film – The Dawn of the Net:
http://www.youtube.com/watch?v=RhvKm0RdUY0&featu
re=youtu.be
• Video – 10 top time-saving tech tips by David
Pogue: https://www.youtube.com/watch?v=QoT02vu9m4&feature=youtu.be
• Video – History of computer viruses:
http://www.youtube.com/watch?v=1g1yZVWrbtE#!
• Video – Cracking Stuxnet, a 21st Century Cyber
Weapon:
http://www.ted.com/talks/ralph_langner_cracking_
stuxnet_a_21st_century_cyberweapon.html
• Funny Video - #Hashtag with Jimmy Fallon &
Justin Timberlake:
https://www.youtube.com/watch?v=57dzaMaouXA
Geek humor :)

More Related Content

What's hot

Presentation internet safety & security by idaho web marketing meetup
Presentation   internet safety & security by idaho web marketing meetupPresentation   internet safety & security by idaho web marketing meetup
Presentation internet safety & security by idaho web marketing meetup
Jason Weaver
 
Mobile:personal learning presentation
Mobile:personal learning presentationMobile:personal learning presentation
Mobile:personal learning presentation
Ryan Tachibana
 

What's hot (20)

Cyber crime awareness
Cyber crime awarenessCyber crime awareness
Cyber crime awareness
 
Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak
 
Presentation internet safety & security by idaho web marketing meetup
Presentation   internet safety & security by idaho web marketing meetupPresentation   internet safety & security by idaho web marketing meetup
Presentation internet safety & security by idaho web marketing meetup
 
Do’s and Don’ts of Cybersecurity
Do’s and Don’ts of CybersecurityDo’s and Don’ts of Cybersecurity
Do’s and Don’ts of Cybersecurity
 
Computer / Internet Security WHPL
Computer / Internet Security WHPLComputer / Internet Security WHPL
Computer / Internet Security WHPL
 
Personal Threat Models
Personal Threat ModelsPersonal Threat Models
Personal Threat Models
 
HELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICTHELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICT
 
Information Security Awareness Orientation
Information Security Awareness OrientationInformation Security Awareness Orientation
Information Security Awareness Orientation
 
Safe and Responsible Use of ICT
Safe and Responsible Use of ICTSafe and Responsible Use of ICT
Safe and Responsible Use of ICT
 
Mobile:personal learning presentation
Mobile:personal learning presentationMobile:personal learning presentation
Mobile:personal learning presentation
 
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and Etiquette
 
Empowerment
EmpowermentEmpowerment
Empowerment
 
Online Security
Online SecurityOnline Security
Online Security
 
Migo my labs
Migo my labsMigo my labs
Migo my labs
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Working better and smarter
Working better and smarterWorking better and smarter
Working better and smarter
 
Cyber security
Cyber securityCyber security
Cyber security
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2
 
Ethics and safety measures in Computing
Ethics and safety measures in ComputingEthics and safety measures in Computing
Ethics and safety measures in Computing
 
Keeping you and your library safe and secure
Keeping you and your library safe and secureKeeping you and your library safe and secure
Keeping you and your library safe and secure
 

Viewers also liked

Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
Robin Rafique
 
BASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSBASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESS
Md Abu Syeem Dipu
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness Briefing
Department of Defense
 

Viewers also liked (15)

What has changed in Corporate Cybersecurity?
What has changed in Corporate Cybersecurity?What has changed in Corporate Cybersecurity?
What has changed in Corporate Cybersecurity?
 
Cyber Security Awareness October 2014
Cyber Security Awareness October 2014Cyber Security Awareness October 2014
Cyber Security Awareness October 2014
 
10 Critical Corporate Cyber Security Risks
10 Critical Corporate Cyber Security Risks10 Critical Corporate Cyber Security Risks
10 Critical Corporate Cyber Security Risks
 
Cyber awareness program
Cyber awareness programCyber awareness program
Cyber awareness program
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
Social Media Safety Tips
Social Media Safety TipsSocial Media Safety Tips
Social Media Safety Tips
 
Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)
 
BASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSBASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESS
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Army Social Media Presentation
Army Social Media PresentationArmy Social Media Presentation
Army Social Media Presentation
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness Briefing
 

Similar to Securing your cyberspace_Watson

Similar to Securing your cyberspace_Watson (20)

Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
 
Security Best Practices for Regular Users
Security Best Practices for Regular UsersSecurity Best Practices for Regular Users
Security Best Practices for Regular Users
 
Internet
InternetInternet
Internet
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentation
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security Practice
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Judy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 PresentationJudy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 Presentation
 
Digital security for Sri Lankan activists
Digital security for Sri Lankan activistsDigital security for Sri Lankan activists
Digital security for Sri Lankan activists
 
Digital Security and Hygiene.pptx
Digital Security and Hygiene.pptxDigital Security and Hygiene.pptx
Digital Security and Hygiene.pptx
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security Innovation
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Secure End User
Secure End UserSecure End User
Secure End User
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Digital Self Defense (RRLC version)
Digital Self Defense (RRLC version)Digital Self Defense (RRLC version)
Digital Self Defense (RRLC version)
 
Computer security
Computer securityComputer security
Computer security
 
CyberSecurity Cyber24x7.pdf
CyberSecurity Cyber24x7.pdfCyberSecurity Cyber24x7.pdf
CyberSecurity Cyber24x7.pdf
 
Internet security
Internet securityInternet security
Internet security
 
Harbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidHarbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vid
 

More from Patricia M Watson

CIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 WatsonCIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 Watson
Patricia M Watson
 
ISACA President Letter | Patricia Watson | 2013
ISACA President Letter | Patricia Watson | 2013ISACA President Letter | Patricia Watson | 2013
ISACA President Letter | Patricia Watson | 2013
Patricia M Watson
 
Cyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise ChapterCyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise Chapter
Patricia M Watson
 
Computer Forensics | Patricia Watson | 2004
Computer Forensics | Patricia Watson | 2004Computer Forensics | Patricia Watson | 2004
Computer Forensics | Patricia Watson | 2004
Patricia M Watson
 
IT Governance | 2013 Interface Conf | Watson
IT Governance | 2013 Interface Conf | WatsonIT Governance | 2013 Interface Conf | Watson
IT Governance | 2013 Interface Conf | Watson
Patricia M Watson
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
Patricia M Watson
 
Cyber Security | Patricia Watson
Cyber Security | Patricia WatsonCyber Security | Patricia Watson
Cyber Security | Patricia Watson
Patricia M Watson
 
Leveraging Digital Forensics | Patricia Watson
Leveraging Digital Forensics | Patricia WatsonLeveraging Digital Forensics | Patricia Watson
Leveraging Digital Forensics | Patricia Watson
Patricia M Watson
 

More from Patricia M Watson (8)

CIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 WatsonCIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 Watson
 
ISACA President Letter | Patricia Watson | 2013
ISACA President Letter | Patricia Watson | 2013ISACA President Letter | Patricia Watson | 2013
ISACA President Letter | Patricia Watson | 2013
 
Cyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise ChapterCyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise Chapter
 
Computer Forensics | Patricia Watson | 2004
Computer Forensics | Patricia Watson | 2004Computer Forensics | Patricia Watson | 2004
Computer Forensics | Patricia Watson | 2004
 
IT Governance | 2013 Interface Conf | Watson
IT Governance | 2013 Interface Conf | WatsonIT Governance | 2013 Interface Conf | Watson
IT Governance | 2013 Interface Conf | Watson
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
 
Cyber Security | Patricia Watson
Cyber Security | Patricia WatsonCyber Security | Patricia Watson
Cyber Security | Patricia Watson
 
Leveraging Digital Forensics | Patricia Watson
Leveraging Digital Forensics | Patricia WatsonLeveraging Digital Forensics | Patricia Watson
Leveraging Digital Forensics | Patricia Watson
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Securing your cyberspace_Watson

  • 1. Securing Your Cyberspace Patricia Watson National Cyber Security Awareness Month 10.2013
  • 2. National Cyber Security Awareness Month What we will cover… • In cyberspace…ignorance is NOT bliss! • Welcome to the new era of “involuntary transparency” • Do you manage your internet footprint? • Do you know what your kids are browsing? • Appendix - Resources
  • 3. Ignorance is NOT bliss! • Myth… – I don’t have anything to hide – I don’t have anything of value – Hackers are not interested in hacking my home PC
  • 4. The fact is… • Cyber adversaries are looking for the easy targets! • They are not necessarily targeting YOU – they mostly want financial and PII (in masses) • And free WIFI, hardware and bandwidth (zombies)
  • 5. Cyber Security Levels Level 1 Flawed Integration Level 2 Inconsistent Practices Level 3 Maturing & Refining Risk = High Default settings, dated systems, no firewall, weak passwords Level 4 Continuously Verified Risk = Low Use of firewall, some patching, strong passwords Firewalls strong passwords security patches & AV scans Firewalls, separate networks & accounts, automated security patches & AV scans, awareness!
  • 6. Don’t be a gummy bear! • Use a firewall – software/hardware. • Password protect your WIFI, never use the default credentials. • Check the default security settings on your devices. • Automate security patches. • Automate signature updates for anti-virus software. • Plug & Scan: all USB devices, email attachments and downloadable files should be checked for viruses. • Be diligent – Stop.Think.Connect!
  • 7. Welcome to the new era of involuntary transparency! • When you are connected to the internet, the internet is connected to YOU! • What is the internet saying about YOU? • Is your mobile device tracking your every move? • Is your browser broadcasting your interests? • Are your “friends” over-sharing your information?
  • 9. Do you manage your Internet footprint? • Everything you post on the internet is PUBLIC…there is NO privacy in cyberspace! • Once you hit the upload, share, tweet or send button, you have no control regarding the destiny of that “post“ • The Internet is not the place to broadcast your grievances about your friends or foes • Don’t post embarrassing information that would be awkward to explain to relatives, friends and current/future employers
  • 10. OMG R U #sharing TMI? • Take the time to manage the privacy settings for your accounts? • Don’t advertise your travel plans on Facebook or other social media • Remove all metadata from files BEFORE sharing • Never use the same user name & password for all accounts
  • 11. Do you manage your Internet footprint? • Do you know your “friends”? • Don’t feel obligated to “Like”, “Friend” or “Follow” profiles of people you don’t actually know! • What is the purpose of your social media account? – Work – Family & Friends – News & Trends
  • 12.
  • 13. Do you Know what your kids are browsing? • Use separate login accounts for each user – apply concept of least privilege. • Manage internet access on all devices! • If your kids use social media, be sure to “friend” &/or “follow” them. • Take off your technology blinders - stay stay current with the latest cyber trends & threats…awareness is key!
  • 14. “…the upside of painful knowledge is so much greater than the downside of blissful ignorance” (Sheryl Sandberg)
  • 16. Appendix: Resources • Firewalls • Social media tips • Location Service GPS settings • Separate user accounts • For your viewing enjoyment…
  • 17. Firewalls Firewall - a technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts. • Hardware Firewall – Apple AirPort Extreme: http://www.apple.com/airport-extreme/specs/ – Short Video – How to set up the new AirPort Extreme: http://sharepoint.bc.com/sites/Corp/ComputerSecurity/Whitepape rsandreferencematerial/Forms/AllItems.aspx – Anti Virus Software – Intego VirusBarrier (Windows friendly): http://www.intego.com/virusbarrier • Software Firewall (it’s free) – ZoneAlarm: http://www.zonealarm.com/security/en-us/zonealarmpc-security-free-firewall.htm – Configuring ZoneAlarm at home: http://hdc.tamu.edu/Security/Firewalls/Personal_Firewalls/Conf iguring_ZoneAlarm_Firewall__Free_Version_.php
  • 18. Social Media Tips • Depending on the purpose of your social media account, you don’t need to provide all your personal information – tailor the account to your needs, including privacy settings. • Remove all metadata from pictures before sharing, especially if you are posting while traveling. • There’s an App for that! Yes, most social media providers have an App for mobile phones and tablets. Be sure to manage the privacy, notifications and location services settings to avoid oversharing. • Remember, posts on social media are intended to be a “short status” not a detailed diary, keep it short, sweet and to the point. • If you want to share links to other websites via your social media account, use a reputable URL shortening service such as Bitly. • Stop.Think.Post – Remember, once you hit the upload, share, tweet or send button, you have no control regarding the destiny of that “post“!
  • 19. Location Services Location Services allows location-based apps and websites (including Maps, Camera, Safari, and other Apple and third-party apps) to use information from cellular, WIFI, Global Positioning System (GPS)2 networks, and iBeacons3 to determine your approximate location. While this tool serves a good purpose, unfortunately it has unintended consequences: • Adversaries can use it to track your every move • Companies use it to craft their marketing campaigns based on your whereabouts • Not to mention, big brother is always watching/tracking! Be sure to take the time to manage your security settings on your mobile device.
  • 20. User Accounts Given that almost every action we take in cyberspace is tracked, interconnected, or transmitted, it is good practice to keep separate user and login accounts (based on purpose or ownership): • Create separate user accounts (user name & password) if you share devices that connect to the internet with other members of your household • Create separate login accounts (user name & password) for browsers (Mozilla, Chrome, IE) and applications (iTunes, Facebook, etc.) • Apply the principle of least privilege to all accounts and keep them separate from your Administrator account! • NEVER use the same password for multiple accounts & change your password often!
  • 21. For your viewing enjoyment… • Short Film – The Dawn of the Net: http://www.youtube.com/watch?v=RhvKm0RdUY0&featu re=youtu.be • Video – 10 top time-saving tech tips by David Pogue: https://www.youtube.com/watch?v=QoT02vu9m4&feature=youtu.be • Video – History of computer viruses: http://www.youtube.com/watch?v=1g1yZVWrbtE#! • Video – Cracking Stuxnet, a 21st Century Cyber Weapon: http://www.ted.com/talks/ralph_langner_cracking_ stuxnet_a_21st_century_cyberweapon.html • Funny Video - #Hashtag with Jimmy Fallon & Justin Timberlake: https://www.youtube.com/watch?v=57dzaMaouXA