SlideShare ist ein Scribd-Unternehmen logo
1 von 35
Private Data, Prying Eyes
Welcome!
Paul Hager
Owner & CEO
Who is that is writing all these viruses?​
Why do they do it?​
Is Anti Virus enough?​
How do we keep our corporate data safe while
traveling?​
How do I keep my family safe?​
Tips for technical safety while traveling​
What does the IoT mean for travel and security?
Your Questions Answered Today
Not about scare tactics
today
Education
Empower you to choose
between convenience and
privacy
Ground Rules
The first SPAM email in 1978
Name does come from Monty Python
Grows in the 90’s and early 2000’s
SPAM exists to sell:
Adult Content
Pharma
Major Botnet and ISP take downs in 2008 but
they strive on
A Brief History of Security
Only stopped by….
VISA and MASTERCARD
Now what?
Viruses
Ransomware
BOTNETS
A Brief History of Security
New Currency in a new modern
black market Bitcoins
Bit mining is the new money
laundering
The Onion Router Network
The Darknet
A Brief History of Security
Where is it sold?
65 Adversaries, 36 most active
Increase in Ransomware
Increase in sophistication
POS Targeting Credit Card Track Data in memory
Phone scams on the rise
(https://www.youtube.com/watch?v=sz0cEo2h3f8)
More Damage Than Ever
XP EOL and Server 2003 EOL
http://map.ipviking.com
State of Security
Sears
Kmart
Delta
Best Buy
Panera Bread
Whole Foods
Sonic
http://www.businessinsider.com/data-breaches-2018-4
Review of Recent Consumer Breaches
DNC
Olympics Anti Doping Agency
Target
Sony
Home Depot
Anthem
477 million identities/accounts
have been compromised in the
last 12 months.
Review of Notable Breaches
http://www.informationisbeautiful.net/v
isualizations/worlds-biggest-data-
breaches-hacks/
The Adversary
The Adversary
Criminal
Hacktivist
State-sponsored
Nationalist
The Average time to detection is
271 days
https://databreachcalculator.com
Average is around $200 per record
Other Security Statistics That
Will Scare You
https://crowdstrike.lookbookhq.com/gl
obal-threat-report-2018-web/cs-2018-
global-threat-report
Huge Boom in
Ransomware
Profitable
Effective
Rise of Ransomware
First version taken down in June of 2014 with the
ZeusBot Net going down
No longer uses BOTNETS uses P2P
Polymorhpic and self registering Domain names
Locking Computer Screens
AV won’t prevent it
Cryptolocker AKA: Cryptowall
Breach Update: 900 Million
Android Devices
QuadRooter. A vulnerability in the hardware
Discovered by Check Point
Download and install the latest Android updates as soon as they
become available. These include important security updates that help
keep your device and data protected.
Examine carefully any app installation request before accepting it to
make sure it’s legitimate.
Download apps only from Google Play.
Read permission requests carefully when installing any apps. Be
wary of apps that ask for permissions that seem unusual or
unnecessary or that use large amounts of data or battery life.
Use known, trusted Wi-Fi networks or while traveling use only those
that you can verify are provided by a trustworthy source.
End users and enterprises should consider using mobile security
solutions designed to detect suspicious behavior on a device,
including malware that could be obfuscated within installed apps.
Phishing Emails
What To Look For
Spoof emails from CEO to CFO has cost one WI
manufacturing company $50,000
HIPPA breach for a Madison Dental practice with 7 dentist
was over $250,000
Even Schools!
The Federal Family Educational Rights and Privacy Act
Having Student Names/Addresses released can not only lead to
fines from the DOE but school board actions and beyond
Auto industry
Tesla Hack Example
Just this week VW has 11 million cars that the keys can be hacked
Threats to a Range of Businesses
Multi Layered Approach
Education
Technology
Not Just AV/IPS
DLP – Data Loss Prevention
SSO/Password Vaults
Testing/Validation/Runbook
How do you protect a business?
Personal Tips
http://store.apple.com
iforgot.apple.com
iCloud.com
Check for Valid Domains
Credit monitoring for your kids
Use DuckDuckGo.com for your search engine
Enable Privacy Protections on your devices and in your
browsers
Personal Security Tips
WIFI While Traveling
Use your cellular hot spot
Its your private connection to the internet
If using public WIFI always execute a VPN
No Corporate VPN then use a personal one:
IP Vanish as a personal VPN solution
Never do banking or online purchasing while in public
WIFI While Traveling
Setup a separate email account for logging into the
bank and other sensitive online accounts.
Never re-use your work or personal email for critical financial
online activities
Use a different password for this account
What is the best free email? None
Not Google
Hushmail.com (Its OK I know it sounds creepy)
Ad Free outlook.com (paid)
Personal Security Tips Email
EZ way to protect your family?
OpenDNS Home from OpenDNS.com
Setup a free account and set your DNS servers to:
208.67.222.222
208.67.220.220
Your free account lets you monitor and manage security
levels
Protecting Your Kids at Home
No file called Passwords
Not digital
No Excel Spreadsheets
https://lastpass.com/
Other password manager
Password Management
Encrypt your phone:
iPhone: DONE. Turn on Locate my iPhone for remote
monitoring and wiping
Android:
Settings -> Security -> Encrypt
May take an hour
Have a company policy on remote wiping lost devices
Protect From Stolen Devices on The
Road
Facebook
Set your security to friends only for all
information
Don’t friend people you don’t know
Check your security settings every 3
months (set a calendar reminder)
NO Geotagged Photos
Clean Geo Photos before posting XIFCleaner
Post about vacations AFTER not before
Social Media While Traveling
http://app.teachingpriv
acy.com
Shows your pattern
of life
Social Tracking
Craigslist is a No almost always, especially for
electronics
Don’t buy used phones or devices from people you
don’t know
Never send money to someone, even someone you
know online
Personal Security Tips
Questions?
Submit through the chat box!
Paul Hager
phager@itprosusa.com
608-251-6755
Slides: itprosusa.com/prying-eyes
Contact Info

Weitere ähnliche Inhalte

Was ist angesagt?

Information Security and Compliance Follow-up Cource 2019
Information Security and Compliance Follow-up Cource 2019Information Security and Compliance Follow-up Cource 2019
Information Security and Compliance Follow-up Cource 2019imc-isec-comp
 
Ia 124 1621324160 ia_124_lecture_02
Ia 124 1621324160 ia_124_lecture_02Ia 124 1621324160 ia_124_lecture_02
Ia 124 1621324160 ia_124_lecture_02ITNet
 
Hiroshima University Information Security & Compliance 2018
Hiroshima University Information Security & Compliance 2018Hiroshima University Information Security & Compliance 2018
Hiroshima University Information Security & Compliance 2018imc-isec-comp
 
Hiroshima University Information Security & Compliance 2018
Hiroshima University Information Security & Compliance 2018Hiroshima University Information Security & Compliance 2018
Hiroshima University Information Security & Compliance 2018imc-isec-comp
 
Hiroshima University Information Security & Compliance 2018
Hiroshima University Information Security & Compliance 2018Hiroshima University Information Security & Compliance 2018
Hiroshima University Information Security & Compliance 2018imc-isec-comp
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device SecurityTorian Group
 
5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile SecurityLookout
 
Cyber security tips in Banking in Nepal
Cyber security tips in Banking in NepalCyber security tips in Banking in Nepal
Cyber security tips in Banking in NepalResham Acharya
 
secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger Abhishek Hirapara
 
Email Security Awareness
Email Security AwarenessEmail Security Awareness
Email Security AwarenessDale Rapp
 
Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017CheapSSLsecurity
 
Breakfast Briefings - February 2018
Breakfast Briefings - February 2018Breakfast Briefings - February 2018
Breakfast Briefings - February 2018PKF Francis Clark
 
A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet- Mark - Fullbright
 
Must know about Phishing Attacks and How to Protect Against Them
Must know about Phishing Attacks and How to Protect Against ThemMust know about Phishing Attacks and How to Protect Against Them
Must know about Phishing Attacks and How to Protect Against Themizoologic
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is DangerousGihan Dias
 
Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businessesB2BPlanner Ltd.
 
Techvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutionsTechvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutionsSaad Ahmad
 

Was ist angesagt? (20)

Information Security and Compliance Follow-up Cource 2019
Information Security and Compliance Follow-up Cource 2019Information Security and Compliance Follow-up Cource 2019
Information Security and Compliance Follow-up Cource 2019
 
Ia 124 1621324160 ia_124_lecture_02
Ia 124 1621324160 ia_124_lecture_02Ia 124 1621324160 ia_124_lecture_02
Ia 124 1621324160 ia_124_lecture_02
 
Hiroshima University Information Security & Compliance 2018
Hiroshima University Information Security & Compliance 2018Hiroshima University Information Security & Compliance 2018
Hiroshima University Information Security & Compliance 2018
 
Hiroshima University Information Security & Compliance 2018
Hiroshima University Information Security & Compliance 2018Hiroshima University Information Security & Compliance 2018
Hiroshima University Information Security & Compliance 2018
 
Hiroshima University Information Security & Compliance 2018
Hiroshima University Information Security & Compliance 2018Hiroshima University Information Security & Compliance 2018
Hiroshima University Information Security & Compliance 2018
 
Presentation on cyber safety
Presentation on cyber safetyPresentation on cyber safety
Presentation on cyber safety
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Internet safety
Internet safetyInternet safety
Internet safety
 
5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security
 
Cyber security tips in Banking in Nepal
Cyber security tips in Banking in NepalCyber security tips in Banking in Nepal
Cyber security tips in Banking in Nepal
 
E commerce-securityy
E commerce-securityyE commerce-securityy
E commerce-securityy
 
secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger
 
Email Security Awareness
Email Security AwarenessEmail Security Awareness
Email Security Awareness
 
Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017
 
Breakfast Briefings - February 2018
Breakfast Briefings - February 2018Breakfast Briefings - February 2018
Breakfast Briefings - February 2018
 
A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet
 
Must know about Phishing Attacks and How to Protect Against Them
Must know about Phishing Attacks and How to Protect Against ThemMust know about Phishing Attacks and How to Protect Against Them
Must know about Phishing Attacks and How to Protect Against Them
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is Dangerous
 
Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businesses
 
Techvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutionsTechvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutions
 

Ähnlich wie Private Data and Prying Eyes

Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101mateenzero
 
Autisable com-2020-05-13-cybersecurity-matters-
Autisable com-2020-05-13-cybersecurity-matters-Autisable com-2020-05-13-cybersecurity-matters-
Autisable com-2020-05-13-cybersecurity-matters-Saad Ahmad
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things The Center for Identity
 
InfraGard Albany Member Alliance Monthly Security Tips
InfraGard Albany Member Alliance Monthly Security TipsInfraGard Albany Member Alliance Monthly Security Tips
InfraGard Albany Member Alliance Monthly Security TipsLiberteks
 
Cyber Security School Workshop
Cyber Security School WorkshopCyber Security School Workshop
Cyber Security School WorkshopRahul Nayan
 
Security Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessSecurity Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessGreg Wartes, MCP
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security TipsInfusionsoft
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself OnlineGary Wagnon
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014B2BPlanner Ltd.
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of securityMatthew Pascucci
 
Cyber security for women using mobile devices
Cyber security for women using mobile devicesCyber security for women using mobile devices
Cyber security for women using mobile devicesJ A Bhavsar
 
Security Tips To Keep Your Laptop Safe
Security Tips To Keep Your Laptop SafeSecurity Tips To Keep Your Laptop Safe
Security Tips To Keep Your Laptop SafeNoida
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfSoo Chin Hock
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02amiinaaa
 
Smart Phone Security
Smart Phone SecuritySmart Phone Security
Smart Phone SecurityGuneet Pahwa
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...Rishi Singh
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crimehomeworkping4
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet SecurityAshley Zimmerman
 

Ähnlich wie Private Data and Prying Eyes (20)

Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
Autisable com-2020-05-13-cybersecurity-matters-
Autisable com-2020-05-13-cybersecurity-matters-Autisable com-2020-05-13-cybersecurity-matters-
Autisable com-2020-05-13-cybersecurity-matters-
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
 
InfraGard Albany Member Alliance Monthly Security Tips
InfraGard Albany Member Alliance Monthly Security TipsInfraGard Albany Member Alliance Monthly Security Tips
InfraGard Albany Member Alliance Monthly Security Tips
 
Cyber Security School Workshop
Cyber Security School WorkshopCyber Security School Workshop
Cyber Security School Workshop
 
Security Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessSecurity Minded - Ransomware Awareness
Security Minded - Ransomware Awareness
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security Tips
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself Online
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
 
Cyber security for women using mobile devices
Cyber security for women using mobile devicesCyber security for women using mobile devices
Cyber security for women using mobile devices
 
Security Tips To Keep Your Laptop Safe
Security Tips To Keep Your Laptop SafeSecurity Tips To Keep Your Laptop Safe
Security Tips To Keep Your Laptop Safe
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
Smartphone Security Article
Smartphone Security ArticleSmartphone Security Article
Smartphone Security Article
 
Smart Phone Security
Smart Phone SecuritySmart Phone Security
Smart Phone Security
 
Wk4 project
Wk4 projectWk4 project
Wk4 project
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 

Kürzlich hochgeladen

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 

Kürzlich hochgeladen (20)

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 

Private Data and Prying Eyes

  • 3. Who is that is writing all these viruses?​ Why do they do it?​ Is Anti Virus enough?​ How do we keep our corporate data safe while traveling?​ How do I keep my family safe?​ Tips for technical safety while traveling​ What does the IoT mean for travel and security? Your Questions Answered Today
  • 4. Not about scare tactics today Education Empower you to choose between convenience and privacy Ground Rules
  • 5. The first SPAM email in 1978 Name does come from Monty Python Grows in the 90’s and early 2000’s SPAM exists to sell: Adult Content Pharma Major Botnet and ISP take downs in 2008 but they strive on A Brief History of Security
  • 6. Only stopped by…. VISA and MASTERCARD Now what? Viruses Ransomware BOTNETS A Brief History of Security
  • 7. New Currency in a new modern black market Bitcoins Bit mining is the new money laundering The Onion Router Network The Darknet A Brief History of Security
  • 8. Where is it sold?
  • 9. 65 Adversaries, 36 most active Increase in Ransomware Increase in sophistication POS Targeting Credit Card Track Data in memory Phone scams on the rise (https://www.youtube.com/watch?v=sz0cEo2h3f8) More Damage Than Ever XP EOL and Server 2003 EOL http://map.ipviking.com State of Security
  • 10. Sears Kmart Delta Best Buy Panera Bread Whole Foods Sonic http://www.businessinsider.com/data-breaches-2018-4 Review of Recent Consumer Breaches
  • 11. DNC Olympics Anti Doping Agency Target Sony Home Depot Anthem 477 million identities/accounts have been compromised in the last 12 months. Review of Notable Breaches http://www.informationisbeautiful.net/v isualizations/worlds-biggest-data- breaches-hacks/
  • 14. The Average time to detection is 271 days https://databreachcalculator.com Average is around $200 per record Other Security Statistics That Will Scare You https://crowdstrike.lookbookhq.com/gl obal-threat-report-2018-web/cs-2018- global-threat-report
  • 16. First version taken down in June of 2014 with the ZeusBot Net going down No longer uses BOTNETS uses P2P Polymorhpic and self registering Domain names Locking Computer Screens AV won’t prevent it Cryptolocker AKA: Cryptowall
  • 17. Breach Update: 900 Million Android Devices QuadRooter. A vulnerability in the hardware Discovered by Check Point Download and install the latest Android updates as soon as they become available. These include important security updates that help keep your device and data protected. Examine carefully any app installation request before accepting it to make sure it’s legitimate. Download apps only from Google Play. Read permission requests carefully when installing any apps. Be wary of apps that ask for permissions that seem unusual or unnecessary or that use large amounts of data or battery life. Use known, trusted Wi-Fi networks or while traveling use only those that you can verify are provided by a trustworthy source. End users and enterprises should consider using mobile security solutions designed to detect suspicious behavior on a device, including malware that could be obfuscated within installed apps.
  • 19.
  • 20. Spoof emails from CEO to CFO has cost one WI manufacturing company $50,000 HIPPA breach for a Madison Dental practice with 7 dentist was over $250,000 Even Schools! The Federal Family Educational Rights and Privacy Act Having Student Names/Addresses released can not only lead to fines from the DOE but school board actions and beyond Auto industry Tesla Hack Example Just this week VW has 11 million cars that the keys can be hacked Threats to a Range of Businesses
  • 21. Multi Layered Approach Education Technology Not Just AV/IPS DLP – Data Loss Prevention SSO/Password Vaults Testing/Validation/Runbook How do you protect a business?
  • 24. Credit monitoring for your kids Use DuckDuckGo.com for your search engine Enable Privacy Protections on your devices and in your browsers Personal Security Tips
  • 26. Use your cellular hot spot Its your private connection to the internet If using public WIFI always execute a VPN No Corporate VPN then use a personal one: IP Vanish as a personal VPN solution Never do banking or online purchasing while in public WIFI While Traveling
  • 27. Setup a separate email account for logging into the bank and other sensitive online accounts. Never re-use your work or personal email for critical financial online activities Use a different password for this account What is the best free email? None Not Google Hushmail.com (Its OK I know it sounds creepy) Ad Free outlook.com (paid) Personal Security Tips Email
  • 28. EZ way to protect your family? OpenDNS Home from OpenDNS.com Setup a free account and set your DNS servers to: 208.67.222.222 208.67.220.220 Your free account lets you monitor and manage security levels Protecting Your Kids at Home
  • 29. No file called Passwords Not digital No Excel Spreadsheets https://lastpass.com/ Other password manager Password Management
  • 30. Encrypt your phone: iPhone: DONE. Turn on Locate my iPhone for remote monitoring and wiping Android: Settings -> Security -> Encrypt May take an hour Have a company policy on remote wiping lost devices Protect From Stolen Devices on The Road
  • 31. Facebook Set your security to friends only for all information Don’t friend people you don’t know Check your security settings every 3 months (set a calendar reminder) NO Geotagged Photos Clean Geo Photos before posting XIFCleaner Post about vacations AFTER not before Social Media While Traveling
  • 33. Craigslist is a No almost always, especially for electronics Don’t buy used phones or devices from people you don’t know Never send money to someone, even someone you know online Personal Security Tips