Trend Micro Securing your Web World Trend Micro Securing your Web
Securing your cyberspace_Watson
-
Upload
patriciawatson -
Category
Technology
-
view
461 -
download
0
description
Transcript of Securing your cyberspace_Watson
Securing Your
Cyberspace
Patricia Watson
National Cyber Security Awareness Month
10.2013
What we will cover… • In cyberspace…ignorance is NOT bliss!
• Welcome to the new era of “involuntary transparency”
• Do you manage your internet footprint?
• Do you know what your kids are browsing?
• Appendix - Resources
National
Cyber
Security
Awareness
Month
Ignorance is NOT bliss!
• Myth…
– I don’t have anything to hide
– I don’t have anything of value
– Hackers are not interested in hacking my home PC
• Cyber adversaries are looking for the easy targets!
• They are not necessarily targeting YOU – they mostly want financial and PII (in masses)
• And free WIFI, hardware and bandwidth (zombies)
The fact is…
Level 3
Maturing & Refining
Level 1
Flawed Integration
Cyber Security Levels
Level 4
Continuously
Verified
Level 2
Inconsistent
Practices
Risk = High Risk = Low
Default
settings,
dated
systems,
no
firewall,
weak
passwords
Use of
firewall,
some
patching,
strong
passwords
Firewalls
strong
passwords
security
patches &
AV scans
Firewalls,
separate
networks &
accounts,
automated
security
patches & AV
scans,
awareness!
• Use a firewall – software/hardware.
• Password protect your WIFI, never use the default credentials.
• Check the default security settings on your devices.
• Automate security patches.
• Automate signature updates for anti-virus software.
• Plug & Scan: all USB devices, email attachments and downloadable files should be checked for viruses.
• Be diligent – Stop.Think.Connect!
Don’t be a gummy bear!
• When you are connected to the internet, the internet is connected to YOU!
• What is the internet saying about YOU?
• Is your mobile device tracking your every move?
• Is your browser broadcasting your interests?
• Are your “friends” over-sharing your information?
Welcome to the new era of
involuntary transparency!
Social Media Etiquette…
Do you manage your
Internet footprint?
• Everything you post on the internet is
PUBLIC…there is NO privacy in cyberspace!
• Once you hit the upload, share, tweet or
send button, you have no control regarding
the destiny of that “post“
• The Internet is not the place to broadcast
your grievances about your friends or foes
• Don’t post embarrassing information that
would be awkward to explain to relatives,
friends and current/future employers
• Take the time to manage the privacy settings for your accounts?
• Don’t advertise your travel plans on Facebook or other social media
• Remove all metadata from files BEFORE sharing
• Never use the same user name & password for all accounts
OMG R U #sharing TMI?
• Do you know your “friends”?
• Don’t feel obligated to “Like”,
“Friend” or “Follow” profiles
of people you don’t actually
know!
• What is the purpose of your
social media account?
– Work
– Family & Friends
– News & Trends
Do you manage your
Internet footprint?
• Use separate login accounts for each user – apply concept of least privilege.
• Manage internet access on all devices!
• If your kids use social media, be sure to “friend” &/or “follow” them.
• Take off your technology blinders - stay stay current with the latest cyber trends & threats…awareness is key!
Do you Know what your
kids are browsing?
“…the upside of painful
knowledge is so much greater
than the downside of blissful
ignorance” (Sheryl Sandberg)
Questions?
National
Cyber
Security
Awareness
Month
• Firewalls
• Social media tips
• Location Service GPS settings
• Separate user accounts
• For your viewing enjoyment…
Appendix: Resources
Firewall - a technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts.
• Hardware Firewall – Apple AirPort Extreme: http://www.apple.com/airport-extreme/specs/
– Short Video – How to set up the new AirPort Extreme: http://sharepoint.bc.com/sites/Corp/ComputerSecurity/Whitepapersandreferencematerial/Forms/AllItems.aspx
– Anti Virus Software – Intego VirusBarrier (Windows friendly): http://www.intego.com/virusbarrier
• Software Firewall (it’s free) – ZoneAlarm: http://www.zonealarm.com/security/en-us/zonealarm-pc-security-free-firewall.htm
– Configuring ZoneAlarm at home: http://hdc.tamu.edu/Security/Firewalls/Personal_Firewalls/Configuring_ZoneAlarm_Firewall__Free_Version_.php
Firewalls
• Depending on the purpose of your social media
account, you don’t need to provide all your personal information – tailor the account to your needs, including privacy settings.
• Remove all metadata from pictures before sharing, especially if you are posting while traveling.
• There’s an App for that! Yes, most social media providers have an App for mobile phones and tablets. Be sure to manage the privacy, notifications and location services settings to avoid oversharing.
• Remember, posts on social media are intended to be a “short status” not a detailed diary, keep it short, sweet and to the point.
• If you want to share links to other websites via your social media account, use a reputable URL shortening service such as Bitly.
• Stop.Think.Post – Remember, once you hit the upload, share, tweet or send button, you have no control regarding the destiny of that “post“!
Social Media Tips
Location Services allows location-based apps and websites (including Maps, Camera, Safari, and other Apple and third-party apps) to use information from cellular, WIFI, Global Positioning System (GPS)2 networks, and iBeacons3 to determine your approximate location.
While this tool serves a good purpose, unfortunately it has unintended consequences:
• Adversaries can use it to track your every move
• Companies use it to craft their marketing campaigns based on your whereabouts
• Not to mention, big brother is always watching/tracking!
Be sure to take the time to manage your security settings on your mobile device.
Location Services
Given that almost every action we take in cyberspace is tracked, interconnected, or transmitted, it is good practice to keep separate user and login accounts (based on purpose or ownership):
• Create separate user accounts (user name & password) if you share devices that connect to the internet with other members of your household
• Create separate login accounts (user name & password) for browsers (Mozilla, Chrome, IE) and applications (iTunes, Facebook, etc.)
• Apply the principle of least privilege to all accounts and keep them separate from your Administrator account!
• NEVER use the same password for multiple accounts & change your password often!
User Accounts
• Short Film – The Dawn of the Net: http://www.youtube.com/watch?v=RhvKm0RdUY0&feature=youtu.be
• Video – 10 top time-saving tech tips by David Pogue: https://www.youtube.com/watch?v=QoT0-2vu9m4&feature=youtu.be
• Video – History of computer viruses: http://www.youtube.com/watch?v=1g1yZVWrbtE#!
• Video – Cracking Stuxnet, a 21st Century Cyber Weapon: http://www.ted.com/talks/ralph_langner_cracking_stuxnet_a_21st_century_cyberweapon.html
• Funny Video - #Hashtag with Jimmy Fallon & Justin Timberlake: https://www.youtube.com/watch?v=57dzaMaouXA
For your viewing enjoyment…
Geek humor :)