Cyber Security for Real Estate Agents
-
Upload
sedonacyberlink -
Category
Technology
-
view
664 -
download
0
description
Transcript of Cyber Security for Real Estate Agents
![Page 1: Cyber Security for Real Estate Agents](https://reader036.fdocuments.us/reader036/viewer/2022070301/546c1e85af79595d298b4ee9/html5/thumbnails/1.jpg)
SAFE COMPUTING IN THE AGE OF
PERVASIVE CYBERCRIME
A Real & Present Danger
Jane Ginn, MRP, AIT
Managing Director
SedonaCyberLink
![Page 2: Cyber Security for Real Estate Agents](https://reader036.fdocuments.us/reader036/viewer/2022070301/546c1e85af79595d298b4ee9/html5/thumbnails/2.jpg)
PURPOSE:Why are we here today?
Characterize magnitude of problem
Overview of threats/vulnerabilities Identify potential cyber exploits
Outline countermeasures Online resources
Hotlinks on PowerPoint Local resources
Tech support
![Page 3: Cyber Security for Real Estate Agents](https://reader036.fdocuments.us/reader036/viewer/2022070301/546c1e85af79595d298b4ee9/html5/thumbnails/3.jpg)
KEY ISSUES TO PLAN FOR
Data Security Customer Privacy
![Page 4: Cyber Security for Real Estate Agents](https://reader036.fdocuments.us/reader036/viewer/2022070301/546c1e85af79595d298b4ee9/html5/thumbnails/4.jpg)
GROWTH OFCYBERCRIME
Exponential growth of criminal activity on the web ---
![Page 5: Cyber Security for Real Estate Agents](https://reader036.fdocuments.us/reader036/viewer/2022070301/546c1e85af79595d298b4ee9/html5/thumbnails/5.jpg)
STATE OF THE WORLDCenters of Criminal Activity ---
Source: HostExploit – Global Security Report, April 2012
![Page 6: Cyber Security for Real Estate Agents](https://reader036.fdocuments.us/reader036/viewer/2022070301/546c1e85af79595d298b4ee9/html5/thumbnails/6.jpg)
DEEP WEBDark Nets of Cyber Crime ---
![Page 7: Cyber Security for Real Estate Agents](https://reader036.fdocuments.us/reader036/viewer/2022070301/546c1e85af79595d298b4ee9/html5/thumbnails/7.jpg)
CYBER CRIMINALSWhat is their motivation?
![Page 8: Cyber Security for Real Estate Agents](https://reader036.fdocuments.us/reader036/viewer/2022070301/546c1e85af79595d298b4ee9/html5/thumbnails/8.jpg)
CRIMINAL ACTIVITY2011 Poneman Benchmark Study
Source: Symantec
![Page 9: Cyber Security for Real Estate Agents](https://reader036.fdocuments.us/reader036/viewer/2022070301/546c1e85af79595d298b4ee9/html5/thumbnails/9.jpg)
NEW MALWARE2011 Patterns ---
Source: Panda Labs
![Page 10: Cyber Security for Real Estate Agents](https://reader036.fdocuments.us/reader036/viewer/2022070301/546c1e85af79595d298b4ee9/html5/thumbnails/10.jpg)
GLOBAL SPAMTypes ---
Source: McAfee 2011 Q4 Report
![Page 11: Cyber Security for Real Estate Agents](https://reader036.fdocuments.us/reader036/viewer/2022070301/546c1e85af79595d298b4ee9/html5/thumbnails/11.jpg)
SPAM TO USOver 50% from US, China & Brazil-
http://www.securelist.com/en/analysis/204792234/Spam_report_May_2012
![Page 12: Cyber Security for Real Estate Agents](https://reader036.fdocuments.us/reader036/viewer/2022070301/546c1e85af79595d298b4ee9/html5/thumbnails/12.jpg)
BOTNET HERDS2011 Infections ---
Source: McAfee 2011 Report
![Page 13: Cyber Security for Real Estate Agents](https://reader036.fdocuments.us/reader036/viewer/2022070301/546c1e85af79595d298b4ee9/html5/thumbnails/13.jpg)
EXPLOITS EVERYWHERE
Apple Exploits (2009 data)---
http://www.sans.org/top-cyber-security-risks/trends.php
![Page 14: Cyber Security for Real Estate Agents](https://reader036.fdocuments.us/reader036/viewer/2022070301/546c1e85af79595d298b4ee9/html5/thumbnails/14.jpg)
RELATIVE VOLUMEHuman errors lead to most exploits ---
![Page 15: Cyber Security for Real Estate Agents](https://reader036.fdocuments.us/reader036/viewer/2022070301/546c1e85af79595d298b4ee9/html5/thumbnails/15.jpg)
ACTIVITIES & EXPLOITS
What you do during the day that could lead to a cyber exploit ---
![Page 16: Cyber Security for Real Estate Agents](https://reader036.fdocuments.us/reader036/viewer/2022070301/546c1e85af79595d298b4ee9/html5/thumbnails/16.jpg)
AGENT/BROKER PROCESS
Marketing
Prospecting
Developing Deal
Closing Deal
Across
All
![Page 17: Cyber Security for Real Estate Agents](https://reader036.fdocuments.us/reader036/viewer/2022070301/546c1e85af79595d298b4ee9/html5/thumbnails/17.jpg)
USING EMAIL AS A TOOL
Local and Web-based Clients ---
Sending and receiving eMail Criminals intercept and steal
confidential information Man-in-the-Middle Attacks (DSN example)
Criminals conduct phishing attacks (spam)
Fraud, Extortion Recruiting for Botnet Herds
Criminals plant malware Viruses Spyware Trojans Worms
![Page 18: Cyber Security for Real Estate Agents](https://reader036.fdocuments.us/reader036/viewer/2022070301/546c1e85af79595d298b4ee9/html5/thumbnails/18.jpg)
SURFING THE INTERNET
All Browsers---Browsing Websites
Criminals use Cross-site Scripting (XSS)Spoofed websites for capturing
personally identifiable information (PII) Downloading Key-Loggers Downloading Screen-Capture Programs Downloading rootkits
Criminals Recruit for BotNetsDistributed Denial of Service Attacks
(DDoS) Computer used as proxy for:
Peer-to-Peer hosting Darknet usage
![Page 19: Cyber Security for Real Estate Agents](https://reader036.fdocuments.us/reader036/viewer/2022070301/546c1e85af79595d298b4ee9/html5/thumbnails/19.jpg)
BUILDING A WEBSITEGetting your message out ---
Website design Criminals seek access control
Password cracking Brute-force attacks War-dialing War-driving
Criminals want your client listsSQL injection
Criminals can steal your client informationGraham – Leach – Bliley ActCalifornia data breach notification law, SB1386
Criminals want your mailing lists (prospects)
![Page 20: Cyber Security for Real Estate Agents](https://reader036.fdocuments.us/reader036/viewer/2022070301/546c1e85af79595d298b4ee9/html5/thumbnails/20.jpg)
SOCIAL NETWORKING
Increase in exploits ---Facebook scam
Bogus Facebook warnings – June 6, 2012 Infected Apps- Software installer w/
TrojanTwitter hack
LulzSec posts 10,000 passwords in mid June, 2012 TweetGIF hack
LinkedIn hack 6 million passwords stolen in early June,
2012 Weak password encryption (SHA1)
Real estate scams – 67,190 in 2009 (FBI)
![Page 21: Cyber Security for Real Estate Agents](https://reader036.fdocuments.us/reader036/viewer/2022070301/546c1e85af79595d298b4ee9/html5/thumbnails/21.jpg)
USING WIRELESS ACCESS
Special Risks ---Cellular calls & data services
Criminals download malware to mobile devicesAndroid – iPhone - Blackberry
Mobile banking vulnerabilities Criminals intercept mobile transmissions
Gap in the WAP vulnerability
Bluetooth Criminals can hijack bluetooth devices
Wireless local area networks (LAN) Criminals can infiltrate your network
![Page 22: Cyber Security for Real Estate Agents](https://reader036.fdocuments.us/reader036/viewer/2022070301/546c1e85af79595d298b4ee9/html5/thumbnails/22.jpg)
OTHER EXPLOITSExploits Targeting Humans ---Point of Sale (POS) scams
Criminals steal credit card dataFor sale on darknet sites
Botnets Criminals set up proxies on legitimate
sitesPolitical activism
Protect activists against tyrannyHacktivism
Conduct DDoS AttacksMask IP addresses for sale of illicit items
(drugs, porn, PII, money mules, money laundering schemes, etc…
![Page 23: Cyber Security for Real Estate Agents](https://reader036.fdocuments.us/reader036/viewer/2022070301/546c1e85af79595d298b4ee9/html5/thumbnails/23.jpg)
COUNTER-MEASURES
What you can do to prevent cyber exploits ---
![Page 24: Cyber Security for Real Estate Agents](https://reader036.fdocuments.us/reader036/viewer/2022070301/546c1e85af79595d298b4ee9/html5/thumbnails/24.jpg)
ADMIN CONTROLSKeeping security tight ---
Manage networkEstablish Network AdministratorStress Test System
Perimeter testingAvoid social engineering
Maintain computer updatesPatch your operating system (OS)Patch your applications
Freeze credit reports
![Page 25: Cyber Security for Real Estate Agents](https://reader036.fdocuments.us/reader036/viewer/2022070301/546c1e85af79595d298b4ee9/html5/thumbnails/25.jpg)
SAFE NETWORKINGReducing vulnerabilities ---
Home-based Office Solutions Use Antivirus + Personal Firewall
SolutionNorton 360, McAfee Total, Webroot Secure
Anywhere Use Specialty Software for Banking
Outsourced Solutions Hosting Service Offsite data storage
Use Secure Wireless Access 802.11i (WPA2)
![Page 26: Cyber Security for Real Estate Agents](https://reader036.fdocuments.us/reader036/viewer/2022070301/546c1e85af79595d298b4ee9/html5/thumbnails/26.jpg)
BANKING SECURITY TOOL
Simple Controls Editable Security Policy
![Page 27: Cyber Security for Real Estate Agents](https://reader036.fdocuments.us/reader036/viewer/2022070301/546c1e85af79595d298b4ee9/html5/thumbnails/27.jpg)
SAFE INTERACTIONSMaintaining constant vigilance ---
Practice Safe eMailing Spam Filters
Black listingWhite listing
Practice Safe web surfing Browser security
HTTPSGoogle ChromeCocoon (Firefox & IE)
Carefully manage client lists Salt list (proof of theft)
Monitor scams on social networks
![Page 28: Cyber Security for Real Estate Agents](https://reader036.fdocuments.us/reader036/viewer/2022070301/546c1e85af79595d298b4ee9/html5/thumbnails/28.jpg)
BROWSER MATTERSPerformance & Security ---
![Page 29: Cyber Security for Real Estate Agents](https://reader036.fdocuments.us/reader036/viewer/2022070301/546c1e85af79595d298b4ee9/html5/thumbnails/29.jpg)
3RD PARTY CRM TOOLTop Producer CRM ---
![Page 30: Cyber Security for Real Estate Agents](https://reader036.fdocuments.us/reader036/viewer/2022070301/546c1e85af79595d298b4ee9/html5/thumbnails/30.jpg)
3RD-PARTY CRM TOOLCheck security policy ---
![Page 31: Cyber Security for Real Estate Agents](https://reader036.fdocuments.us/reader036/viewer/2022070301/546c1e85af79595d298b4ee9/html5/thumbnails/31.jpg)
ONLINE RESOURCES
The websites that you can visit to learn how to protect yourself & your clients ---
![Page 32: Cyber Security for Real Estate Agents](https://reader036.fdocuments.us/reader036/viewer/2022070301/546c1e85af79595d298b4ee9/html5/thumbnails/32.jpg)
REALTOR UNIVERSITY
Course Addressing Data SecurityCourse Addressing
Privacy
![Page 33: Cyber Security for Real Estate Agents](https://reader036.fdocuments.us/reader036/viewer/2022070301/546c1e85af79595d298b4ee9/html5/thumbnails/33.jpg)
NGOS & GOV AGENCIES
Links to help you --- Identity Theft
Privacy Rights ClearinghouseElectronic Privacy Information Center
Banking FraudFederal Trade Commission
Phishing IntelligenceFraudWatch International
NotificationsUS-CERT
![Page 34: Cyber Security for Real Estate Agents](https://reader036.fdocuments.us/reader036/viewer/2022070301/546c1e85af79595d298b4ee9/html5/thumbnails/34.jpg)
PRIVATE SECTOR SOURCES
Apps for tracking latest scams ---
![Page 35: Cyber Security for Real Estate Agents](https://reader036.fdocuments.us/reader036/viewer/2022070301/546c1e85af79595d298b4ee9/html5/thumbnails/35.jpg)
COMPLIANCE ISSUES
Data Security Customer Privacy
Databases – ISO 27001 & 27002Credit Card Payments – PCI
compliance
Gramm Leach Bliley Act
NIST 800-122
![Page 36: Cyber Security for Real Estate Agents](https://reader036.fdocuments.us/reader036/viewer/2022070301/546c1e85af79595d298b4ee9/html5/thumbnails/36.jpg)
RECAP
And now?
![Page 37: Cyber Security for Real Estate Agents](https://reader036.fdocuments.us/reader036/viewer/2022070301/546c1e85af79595d298b4ee9/html5/thumbnails/37.jpg)
SUMMARY:What did we cover?
Characterize magnitude of problem
Overview of threats/vulnerabilities Identify potential cyber exploits
Outline countermeasures Online resources
Hotlinks on PowerPoint Local resources
Tech support
![Page 38: Cyber Security for Real Estate Agents](https://reader036.fdocuments.us/reader036/viewer/2022070301/546c1e85af79595d298b4ee9/html5/thumbnails/38.jpg)
Q & AJust the beginning….