Securing your cyberspace_Watson

22
Securing Your Cyberspace Patricia Watson National Cyber Security Awareness Month 10.2013

description

National Cyber Security Awareness Month

Transcript of Securing your cyberspace_Watson

Page 1: Securing your cyberspace_Watson

Securing Your

Cyberspace

Patricia Watson

National Cyber Security Awareness Month

10.2013

Page 2: Securing your cyberspace_Watson

What we will cover… • In cyberspace…ignorance is NOT bliss!

• Welcome to the new era of “involuntary transparency”

• Do you manage your internet footprint?

• Do you know what your kids are browsing?

• Appendix - Resources

National

Cyber

Security

Awareness

Month

Page 3: Securing your cyberspace_Watson

Ignorance is NOT bliss!

• Myth…

– I don’t have anything to hide

– I don’t have anything of value

– Hackers are not interested in hacking my home PC

Page 4: Securing your cyberspace_Watson

• Cyber adversaries are looking for the easy targets!

• They are not necessarily targeting YOU – they mostly want financial and PII (in masses)

• And free WIFI, hardware and bandwidth (zombies)

The fact is…

Page 5: Securing your cyberspace_Watson

Level 3

Maturing & Refining

Level 1

Flawed Integration

Cyber Security Levels

Level 4

Continuously

Verified

Level 2

Inconsistent

Practices

Risk = High Risk = Low

Default

settings,

dated

systems,

no

firewall,

weak

passwords

Use of

firewall,

some

patching,

strong

passwords

Firewalls

strong

passwords

security

patches &

AV scans

Firewalls,

separate

networks &

accounts,

automated

security

patches & AV

scans,

awareness!

Page 6: Securing your cyberspace_Watson

• Use a firewall – software/hardware.

• Password protect your WIFI, never use the default credentials.

• Check the default security settings on your devices.

• Automate security patches.

• Automate signature updates for anti-virus software.

• Plug & Scan: all USB devices, email attachments and downloadable files should be checked for viruses.

• Be diligent – Stop.Think.Connect!

Don’t be a gummy bear!

Page 7: Securing your cyberspace_Watson

• When you are connected to the internet, the internet is connected to YOU!

• What is the internet saying about YOU?

• Is your mobile device tracking your every move?

• Is your browser broadcasting your interests?

• Are your “friends” over-sharing your information?

Welcome to the new era of

involuntary transparency!

Page 8: Securing your cyberspace_Watson

Social Media Etiquette…

Page 9: Securing your cyberspace_Watson

Do you manage your

Internet footprint?

• Everything you post on the internet is

PUBLIC…there is NO privacy in cyberspace!

• Once you hit the upload, share, tweet or

send button, you have no control regarding

the destiny of that “post“

• The Internet is not the place to broadcast

your grievances about your friends or foes

• Don’t post embarrassing information that

would be awkward to explain to relatives,

friends and current/future employers

Page 10: Securing your cyberspace_Watson

• Take the time to manage the privacy settings for your accounts?

• Don’t advertise your travel plans on Facebook or other social media

• Remove all metadata from files BEFORE sharing

• Never use the same user name & password for all accounts

OMG R U #sharing TMI?

Page 11: Securing your cyberspace_Watson

• Do you know your “friends”?

• Don’t feel obligated to “Like”,

“Friend” or “Follow” profiles

of people you don’t actually

know!

• What is the purpose of your

social media account?

– Work

– Family & Friends

– News & Trends

Do you manage your

Internet footprint?

Page 12: Securing your cyberspace_Watson
Page 13: Securing your cyberspace_Watson

• Use separate login accounts for each user – apply concept of least privilege.

• Manage internet access on all devices!

• If your kids use social media, be sure to “friend” &/or “follow” them.

• Take off your technology blinders - stay stay current with the latest cyber trends & threats…awareness is key!

Do you Know what your

kids are browsing?

Page 14: Securing your cyberspace_Watson

“…the upside of painful

knowledge is so much greater

than the downside of blissful

ignorance” (Sheryl Sandberg)

Page 15: Securing your cyberspace_Watson

Questions?

National

Cyber

Security

Awareness

Month

Page 16: Securing your cyberspace_Watson

• Firewalls

• Social media tips

• Location Service GPS settings

• Separate user accounts

• For your viewing enjoyment…

Appendix: Resources

Page 17: Securing your cyberspace_Watson

Firewall - a technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts.

• Hardware Firewall – Apple AirPort Extreme: http://www.apple.com/airport-extreme/specs/

– Short Video – How to set up the new AirPort Extreme: http://sharepoint.bc.com/sites/Corp/ComputerSecurity/Whitepapersandreferencematerial/Forms/AllItems.aspx

– Anti Virus Software – Intego VirusBarrier (Windows friendly): http://www.intego.com/virusbarrier

• Software Firewall (it’s free) – ZoneAlarm: http://www.zonealarm.com/security/en-us/zonealarm-pc-security-free-firewall.htm

– Configuring ZoneAlarm at home: http://hdc.tamu.edu/Security/Firewalls/Personal_Firewalls/Configuring_ZoneAlarm_Firewall__Free_Version_.php

Firewalls

Page 18: Securing your cyberspace_Watson

• Depending on the purpose of your social media

account, you don’t need to provide all your personal information – tailor the account to your needs, including privacy settings.

• Remove all metadata from pictures before sharing, especially if you are posting while traveling.

• There’s an App for that! Yes, most social media providers have an App for mobile phones and tablets. Be sure to manage the privacy, notifications and location services settings to avoid oversharing.

• Remember, posts on social media are intended to be a “short status” not a detailed diary, keep it short, sweet and to the point.

• If you want to share links to other websites via your social media account, use a reputable URL shortening service such as Bitly.

• Stop.Think.Post – Remember, once you hit the upload, share, tweet or send button, you have no control regarding the destiny of that “post“!

Social Media Tips

Page 19: Securing your cyberspace_Watson

Location Services allows location-based apps and websites (including Maps, Camera, Safari, and other Apple and third-party apps) to use information from cellular, WIFI, Global Positioning System (GPS)2 networks, and iBeacons3 to determine your approximate location.

While this tool serves a good purpose, unfortunately it has unintended consequences:

• Adversaries can use it to track your every move

• Companies use it to craft their marketing campaigns based on your whereabouts

• Not to mention, big brother is always watching/tracking!

Be sure to take the time to manage your security settings on your mobile device.

Location Services

Page 20: Securing your cyberspace_Watson

Given that almost every action we take in cyberspace is tracked, interconnected, or transmitted, it is good practice to keep separate user and login accounts (based on purpose or ownership):

• Create separate user accounts (user name & password) if you share devices that connect to the internet with other members of your household

• Create separate login accounts (user name & password) for browsers (Mozilla, Chrome, IE) and applications (iTunes, Facebook, etc.)

• Apply the principle of least privilege to all accounts and keep them separate from your Administrator account!

• NEVER use the same password for multiple accounts & change your password often!

User Accounts

Page 21: Securing your cyberspace_Watson

• Short Film – The Dawn of the Net: http://www.youtube.com/watch?v=RhvKm0RdUY0&feature=youtu.be

• Video – 10 top time-saving tech tips by David Pogue: https://www.youtube.com/watch?v=QoT0-2vu9m4&feature=youtu.be

• Video – History of computer viruses: http://www.youtube.com/watch?v=1g1yZVWrbtE#!

• Video – Cracking Stuxnet, a 21st Century Cyber Weapon: http://www.ted.com/talks/ralph_langner_cracking_stuxnet_a_21st_century_cyberweapon.html

• Funny Video - #Hashtag with Jimmy Fallon & Justin Timberlake: https://www.youtube.com/watch?v=57dzaMaouXA

For your viewing enjoyment…

Page 22: Securing your cyberspace_Watson

Geek humor :)