California Capital Cyber Security and Privacy Workshop ... · Cyber Security Workshop •Intro and...

65
California Capital Cyber Security and Privacy Workshop Presenter: Bob Hollis The Mobius Network, LLC

Transcript of California Capital Cyber Security and Privacy Workshop ... · Cyber Security Workshop •Intro and...

Page 1: California Capital Cyber Security and Privacy Workshop ... · Cyber Security Workshop •Intro and Background •Mobile Devices •Computers •Social Media •Resources for Participants

California Capital

Cyber Security

and Privacy Workshop

Presenter: Bob Hollis

The Mobius Network, LLC

Page 2: California Capital Cyber Security and Privacy Workshop ... · Cyber Security Workshop •Intro and Background •Mobile Devices •Computers •Social Media •Resources for Participants

Cyber Security Workshop

• Intro and Background

• Mobile Devices

• Computers

• Social Media

• Resources for Participants

Page 3: California Capital Cyber Security and Privacy Workshop ... · Cyber Security Workshop •Intro and Background •Mobile Devices •Computers •Social Media •Resources for Participants

Bob Hollis Bio/Background

Founding Principal – The Mobius Network, LLC

Founding Principal – Carnegie Partners, LLC

Board Member – National Recycling Coalition

Board Member – U.S. Zero Waste Business Council

Board Advisor – California Resource Recovery Association

Advisory Board – Rock the Earth

Development Committee – Earth Island Institute

Education

Carnegie Mellon – Industrial Management, Information Systems

University of Chicago – Business/B2B Marketing

Harvard – Environmental Management

Stanford – Internet and Social Media Technologies

Page 4: California Capital Cyber Security and Privacy Workshop ... · Cyber Security Workshop •Intro and Background •Mobile Devices •Computers •Social Media •Resources for Participants

The Mobius Network

Goal: Help groups with a public benefit

mission achieve objectives while driving

Web and Technology Costs to near $0.

Clients: Non-profits, Recycling

Organizations, Product Stewardship

Groups, Community Groups,

Government Agencies, Schools, Values

Driven Companies, Sustainability

Consultants, the Music Community

Page 5: California Capital Cyber Security and Privacy Workshop ... · Cyber Security Workshop •Intro and Background •Mobile Devices •Computers •Social Media •Resources for Participants

Who Wants Your Information?

Page 6: California Capital Cyber Security and Privacy Workshop ... · Cyber Security Workshop •Intro and Background •Mobile Devices •Computers •Social Media •Resources for Participants

Foreign Governments

Page 7: California Capital Cyber Security and Privacy Workshop ... · Cyber Security Workshop •Intro and Background •Mobile Devices •Computers •Social Media •Resources for Participants

Five Eyes – Collect Everything,

Keep it Forever

Page 8: California Capital Cyber Security and Privacy Workshop ... · Cyber Security Workshop •Intro and Background •Mobile Devices •Computers •Social Media •Resources for Participants

Mozilla vs FBI

Page 9: California Capital Cyber Security and Privacy Workshop ... · Cyber Security Workshop •Intro and Background •Mobile Devices •Computers •Social Media •Resources for Participants

Hackers

Page 10: California Capital Cyber Security and Privacy Workshop ... · Cyber Security Workshop •Intro and Background •Mobile Devices •Computers •Social Media •Resources for Participants

CIA and NSA HACKED!

Page 11: California Capital Cyber Security and Privacy Workshop ... · Cyber Security Workshop •Intro and Background •Mobile Devices •Computers •Social Media •Resources for Participants

Marketing Networks

Page 12: California Capital Cyber Security and Privacy Workshop ... · Cyber Security Workshop •Intro and Background •Mobile Devices •Computers •Social Media •Resources for Participants

Current Events

Page 13: California Capital Cyber Security and Privacy Workshop ... · Cyber Security Workshop •Intro and Background •Mobile Devices •Computers •Social Media •Resources for Participants

Journalist and Activist Tools

Page 14: California Capital Cyber Security and Privacy Workshop ... · Cyber Security Workshop •Intro and Background •Mobile Devices •Computers •Social Media •Resources for Participants

Beware of ToS

Page 15: California Capital Cyber Security and Privacy Workshop ... · Cyber Security Workshop •Intro and Background •Mobile Devices •Computers •Social Media •Resources for Participants

Mobile Devices

Page 16: California Capital Cyber Security and Privacy Workshop ... · Cyber Security Workshop •Intro and Background •Mobile Devices •Computers •Social Media •Resources for Participants

Android Banking Trojan

Page 17: California Capital Cyber Security and Privacy Workshop ... · Cyber Security Workshop •Intro and Background •Mobile Devices •Computers •Social Media •Resources for Participants

Manage Access Points

Page 18: California Capital Cyber Security and Privacy Workshop ... · Cyber Security Workshop •Intro and Background •Mobile Devices •Computers •Social Media •Resources for Participants

Encrypt Device

Page 19: California Capital Cyber Security and Privacy Workshop ... · Cyber Security Workshop •Intro and Background •Mobile Devices •Computers •Social Media •Resources for Participants

Lock Sim Card

Page 20: California Capital Cyber Security and Privacy Workshop ... · Cyber Security Workshop •Intro and Background •Mobile Devices •Computers •Social Media •Resources for Participants

App Lock

Page 21: California Capital Cyber Security and Privacy Workshop ... · Cyber Security Workshop •Intro and Background •Mobile Devices •Computers •Social Media •Resources for Participants

Mobile Security Apps

Page 22: California Capital Cyber Security and Privacy Workshop ... · Cyber Security Workshop •Intro and Background •Mobile Devices •Computers •Social Media •Resources for Participants

Norton Mobile Security and VPN

Car

Hack

Page 23: California Capital Cyber Security and Privacy Workshop ... · Cyber Security Workshop •Intro and Background •Mobile Devices •Computers •Social Media •Resources for Participants

Encrypted Texting, Photos, Calls

Page 24: California Capital Cyber Security and Privacy Workshop ... · Cyber Security Workshop •Intro and Background •Mobile Devices •Computers •Social Media •Resources for Participants

Google Authenticator

Page 25: California Capital Cyber Security and Privacy Workshop ... · Cyber Security Workshop •Intro and Background •Mobile Devices •Computers •Social Media •Resources for Participants

Encrypted Email

Page 26: California Capital Cyber Security and Privacy Workshop ... · Cyber Security Workshop •Intro and Background •Mobile Devices •Computers •Social Media •Resources for Participants

QR Codes

Page 27: California Capital Cyber Security and Privacy Workshop ... · Cyber Security Workshop •Intro and Background •Mobile Devices •Computers •Social Media •Resources for Participants

Android Security Apps

Page 28: California Capital Cyber Security and Privacy Workshop ... · Cyber Security Workshop •Intro and Background •Mobile Devices •Computers •Social Media •Resources for Participants

Social Media

Page 29: California Capital Cyber Security and Privacy Workshop ... · Cyber Security Workshop •Intro and Background •Mobile Devices •Computers •Social Media •Resources for Participants

Linkedin Privacy and Security

Page 30: California Capital Cyber Security and Privacy Workshop ... · Cyber Security Workshop •Intro and Background •Mobile Devices •Computers •Social Media •Resources for Participants

Linkedin Authentication

Page 31: California Capital Cyber Security and Privacy Workshop ... · Cyber Security Workshop •Intro and Background •Mobile Devices •Computers •Social Media •Resources for Participants

Linkedin Email Alert

Page 32: California Capital Cyber Security and Privacy Workshop ... · Cyber Security Workshop •Intro and Background •Mobile Devices •Computers •Social Media •Resources for Participants

Facebook

Page 33: California Capital Cyber Security and Privacy Workshop ... · Cyber Security Workshop •Intro and Background •Mobile Devices •Computers •Social Media •Resources for Participants

Facebook - Ghost for Chat

Page 34: California Capital Cyber Security and Privacy Workshop ... · Cyber Security Workshop •Intro and Background •Mobile Devices •Computers •Social Media •Resources for Participants

Computers

Passwords

Security Updates

Security Software

Browser Security

Page 35: California Capital Cyber Security and Privacy Workshop ... · Cyber Security Workshop •Intro and Background •Mobile Devices •Computers •Social Media •Resources for Participants

Bio Insecurity

You Can’t Reset Your Fingerprint!

Page 36: California Capital Cyber Security and Privacy Workshop ... · Cyber Security Workshop •Intro and Background •Mobile Devices •Computers •Social Media •Resources for Participants

Hacking Made Easy

Page 37: California Capital Cyber Security and Privacy Workshop ... · Cyber Security Workshop •Intro and Background •Mobile Devices •Computers •Social Media •Resources for Participants

Unsecured Open Wifi Networks

Page 38: California Capital Cyber Security and Privacy Workshop ... · Cyber Security Workshop •Intro and Background •Mobile Devices •Computers •Social Media •Resources for Participants

LAX Wifi Demo Hack

Page 39: California Capital Cyber Security and Privacy Workshop ... · Cyber Security Workshop •Intro and Background •Mobile Devices •Computers •Social Media •Resources for Participants

Are you sure you want to

venture into dangerous

communities?

Page 40: California Capital Cyber Security and Privacy Workshop ... · Cyber Security Workshop •Intro and Background •Mobile Devices •Computers •Social Media •Resources for Participants

The Dark Web

Enter at Your Own Risk

Page 41: California Capital Cyber Security and Privacy Workshop ... · Cyber Security Workshop •Intro and Background •Mobile Devices •Computers •Social Media •Resources for Participants

Passwords

At Least 10 Characters

Upper, Lower, Numbers, Symbols

No Words or Social Media Data

Different for EVERY Account

Security Questions

Discreet Patterns

Page 42: California Capital Cyber Security and Privacy Workshop ... · Cyber Security Workshop •Intro and Background •Mobile Devices •Computers •Social Media •Resources for Participants

Browsers

Page 43: California Capital Cyber Security and Privacy Workshop ... · Cyber Security Workshop •Intro and Background •Mobile Devices •Computers •Social Media •Resources for Participants

Security Software

Page 44: California Capital Cyber Security and Privacy Workshop ... · Cyber Security Workshop •Intro and Background •Mobile Devices •Computers •Social Media •Resources for Participants

Norton Browser Security

Page 45: California Capital Cyber Security and Privacy Workshop ... · Cyber Security Workshop •Intro and Background •Mobile Devices •Computers •Social Media •Resources for Participants

Norton Wifi Security and VPN

Page 46: California Capital Cyber Security and Privacy Workshop ... · Cyber Security Workshop •Intro and Background •Mobile Devices •Computers •Social Media •Resources for Participants

Norton for PC and Mac

Page 47: California Capital Cyber Security and Privacy Workshop ... · Cyber Security Workshop •Intro and Background •Mobile Devices •Computers •Social Media •Resources for Participants

Cookie Monsters

Page 48: California Capital Cyber Security and Privacy Workshop ... · Cyber Security Workshop •Intro and Background •Mobile Devices •Computers •Social Media •Resources for Participants

15 Minutes of

Unprotected Browsing

Page 49: California Capital Cyber Security and Privacy Workshop ... · Cyber Security Workshop •Intro and Background •Mobile Devices •Computers •Social Media •Resources for Participants

Opera Browser

Page 50: California Capital Cyber Security and Privacy Workshop ... · Cyber Security Workshop •Intro and Background •Mobile Devices •Computers •Social Media •Resources for Participants

OPERA – FREE VPN 8^)

Page 51: California Capital Cyber Security and Privacy Workshop ... · Cyber Security Workshop •Intro and Background •Mobile Devices •Computers •Social Media •Resources for Participants

Chrome 6 Security and DuckDuckGo

Page 52: California Capital Cyber Security and Privacy Workshop ... · Cyber Security Workshop •Intro and Background •Mobile Devices •Computers •Social Media •Resources for Participants

Website Security

Page 53: California Capital Cyber Security and Privacy Workshop ... · Cyber Security Workshop •Intro and Background •Mobile Devices •Computers •Social Media •Resources for Participants

Tor

Page 54: California Capital Cyber Security and Privacy Workshop ... · Cyber Security Workshop •Intro and Background •Mobile Devices •Computers •Social Media •Resources for Participants

The Deep Web

Page 55: California Capital Cyber Security and Privacy Workshop ... · Cyber Security Workshop •Intro and Background •Mobile Devices •Computers •Social Media •Resources for Participants

Electronic Frontier Foundation

“The Good Guys”

Page 56: California Capital Cyber Security and Privacy Workshop ... · Cyber Security Workshop •Intro and Background •Mobile Devices •Computers •Social Media •Resources for Participants

Privacy Badger

Page 57: California Capital Cyber Security and Privacy Workshop ... · Cyber Security Workshop •Intro and Background •Mobile Devices •Computers •Social Media •Resources for Participants

Certbot

HTTPS Everywhere

Page 58: California Capital Cyber Security and Privacy Workshop ... · Cyber Security Workshop •Intro and Background •Mobile Devices •Computers •Social Media •Resources for Participants

Phishing Scams

Hover over the link and look at url – DO NOT CLICK LINK!!!

Page 59: California Capital Cyber Security and Privacy Workshop ... · Cyber Security Workshop •Intro and Background •Mobile Devices •Computers •Social Media •Resources for Participants

Untrusted Links

GO DIRECT TO ACCOUNT SITE

Page 60: California Capital Cyber Security and Privacy Workshop ... · Cyber Security Workshop •Intro and Background •Mobile Devices •Computers •Social Media •Resources for Participants

Firefox Security

Page 61: California Capital Cyber Security and Privacy Workshop ... · Cyber Security Workshop •Intro and Background •Mobile Devices •Computers •Social Media •Resources for Participants

Firefox Privacy

Page 62: California Capital Cyber Security and Privacy Workshop ... · Cyber Security Workshop •Intro and Background •Mobile Devices •Computers •Social Media •Resources for Participants

Chrome Privacy and Security

Page 63: California Capital Cyber Security and Privacy Workshop ... · Cyber Security Workshop •Intro and Background •Mobile Devices •Computers •Social Media •Resources for Participants

Resources

Presentations and Resources online at:

http://TheMobiusNetwork.com/california-

capital-presentations/

Page 64: California Capital Cyber Security and Privacy Workshop ... · Cyber Security Workshop •Intro and Background •Mobile Devices •Computers •Social Media •Resources for Participants

Coming Sessions!

Web Development Series including

Website Security

See California Capital Calendar for Details

Page 65: California Capital Cyber Security and Privacy Workshop ... · Cyber Security Workshop •Intro and Background •Mobile Devices •Computers •Social Media •Resources for Participants

Contact: Bob Hollis

[email protected]

Ph 916 941-5778

www.TheMobiusNetwork.com

Questions?