cybersecurity awareness training · malicious websites and drive-by downloads, p2p file sharing....
TRANSCRIPT
Cybersecurity Awareness Trainingbe vigilant but unafraid
Leo F HowellC hief Information S ecurity Officerlfhowelluoregonedu
University1 COMPLIANCE increases business
opportunities required bya) DFAR FAR Data Use Agreements (research)b) HIPAA FERPAGLBA (financial aid)c) GDPR (EU persons)d) State Laws (OR CA CT hellip)
2 DATA BREACHES cause financial amp reputational losses
3 DENIAL OF SERVICE disrupts operations4 SOCIAL RESPONSIBILITY extends to Data
Protection
Why YOU should careYOU1 Research at risk2 Bank Account may be emptied3 Medical Records subject to theft
or exposure4 Embarrassment via exposure of
private social media interactions5 Computers Locked for ransom6 Indictment without guilt
Meet the adversary
Script Kiddies
Nation StatesOrganized CrimesInsiders
Hacktivists Hacktivist
Common attack methods
bull Email - Phishingbull Phone - Vishingbull Text - Smishing
Phishing
bull Password theftbull Backdoorsbull Website exploits
Hacking
bull Ransomwarebull Key loggersbull Spyware
Malware
Can you spot the phish1 Fake D0mains uoregonedu d2 Urgency
3 Impers onated Unknown S ender
4 Unexpected Unus ual R eques t Tone
5 Flattery
6 Letter S ub5titution5
7 B ad G rammra
Dear Dr [X]
I recently read your article [Title] It was very useful in my field of researchI wonder if possible to send me these articles to use in my current research
httpshibbolethuoregonedudinidpAuthnloginphpurl=httpwwwsciencedirectcomsciencearticlepiiS03085961100HT00238
Thanks for you Cooperation in AdvanceAssoc Prof [Name]
Phishing-4-faculty withhellip
Phishing-4-faculty withhellipflattery grammar fake domain urgencyDear Dr [X]
I recently read your article [Title] It was very useful in my field of research I wonder if possible to send me these articles to use in my current research
httpshibbolethuoregonedudinidpAuthnloginphpurl=httpwwwsciencedirectcomsciencearticlepiiS03085961100HT00238
Thanks for you Cooperation in AdvanceAssoc Prof [Name]
Phishing-4-faculty withhellipflattery grammar fake domain urgencyDear Dr [X]
I recently read your article [Title] It was very useful in my field of research I wonder if possible to send me these articles to use in my current research
httpshibbolethuoregonedudinidpAuthnloginphpurl=httpwwwsciencedirectcomsciencearticlepiiS03085961100HT00238 38
Thanks for you Cooperation in AdvanceAssoc Prof [Name]
o $34B IP Thefto 3800 Professors targeted acrosso 144 US universitieso 10 Indictments
o 60+ UO Faculty amp Staff Compromised
Phishing-4-whales withhellip
From Michael Schill [mailtomarkrossemailolympicorg]
Sent Friday March 02 2018 202 PM
Subject Michael Schill as Shared a file with you using One Drive
Hello
Please find attached the Look Ahead files for Friday March 2nd2018
Open
Kindly let me have your opinion
Michael Schill541-346-3936President
Phishing-4-whales withhellipsender impersonation bad link tone
From Michael Schill [mailtomarkrossemailolympicorg]
Sent Friday March 02 2018 202 PM
Subject Michael Schill as Shared a file with you using One Drive
Hello
Please find attached the Look Ahead files for Friday March 2nd2018
Open = httpko-ontapcomcatindexhtml
Kindly let me have your opinion
Michael Schill541-346-3936President
Gift card scam withhellip
From bartconoveruoregoncom
Hello You
P lease purchase 6 gift cards valued at $250 each and send me the numbers right away I will tell you a funny story about this when I return to the office but send me those cards NOW
B art
Gift card scamhellipfake domain context urgency
From bartconoveruoregoncom
Hello You
P lease purchase 6 gift cards valued at $250 each and send me the numbers right away I will tell you a funny story about this when I return to the office but send me those cards NOW
B art
Unable to display message phish
Logged out due to inactivity Sign in to continue
www-svhamsgload9icu
Unable to display message phish
www-svhamsgload9icu
27K Users Received the Msg15K Users Read Msg62K Msg Deleted by Security653 Users CompromisedDisabled15K Users Password Changes$80K+ in person-hours for Response
Direct Deposit Prelude
jw13925mybristolacuk
httpsimoladormilorghellip
httpsduckwebuoregonedu
httpswwwvocation100comswelm
httptrafficpillarcomperara
httpmacvalleycottoncomau
httpleojabercombr
jw13925mybristolacukbull ~ 80 users suspected of giving up DuckIDs amp passwords andor 95s amp PACs
bull 14 usersrsquo direct deposit accounts and routing numbers changed to the hackerrsquos
Key Message on Phishing
Dont get P his hed S mis hed Vis hed hellip
B y a
Dumb Hacker
Password game
123456LetmeinFootballIloveyouAdmin
WelcomeMonkeyAbc123
helloStarwars
- Time 2017
G ood Ones B ad Ones
Wr 15 bd 1wy5 Strong (76)
My 3y3s r3 p1nk Strong (70)
This is my story Strong (69)
What is fake news Strong (87)
My secret bucket list item is to sing in public
Very Strong (217)
I hate math but I totally dig chemistry
Very Strong (197)
Password GameORG ood One B ad One
toddbay Toddbay$Username Password
Password GameORG ood One B ad One
marys IloveyouUsername Password
Password GameORG ood One B ad One
samanp TheRt5atemydinnerUsername Password
Password GameORG ood One B ad One
samanp TheRt5atemydinner2Username Password
Password GameORG ood One B ad One
mandyt IwillgobcktoVTUsername Password
General password tipsbull Use password-phrase instead
bull Use 2-Factor Authentication
bull Use 5ub5t1tut10n5
bull Use more than 10 chars
bull Use different passwords for different domains (Yahoo Facebook S nap C hat UOR E G ONE DU)
bull C hange them regularly ndash at least every 6 months
bull Use a password manager (like K eyP ass or LastP ass)
bull Never use login as password
bull Never s tore them under keyboards desk drawers s ticky notes on monitor
bull S tore a clue in your walletpurse
bull Never s tore them on refrigerator
bull Never ever share passwords with anyone
bull Never send them in email
bull Never enter them with a ldquoshoulder surferrdquo present
TrojansViruses
BotsZombies
Ransomware
Dangers of malwarehellipto
YOUto
OTHERS
How do I get infected
social engineering via email instant messaging social media
malicious websites and drive-by downloads P2P file sharing
malvertising man-in-the-middle attacks exploit kits
General Malware Tips
bull Turn on automatic updates on youro P hones
o Home computers
o Tablets
o Work computers (s ee IT)
bull R un up-to-date antimalware toolo McAfee
o MalwareB ytes
o Windows Defender (free)
bull B ack up important files
bull Occas ionally try to restore something from backup
bull R eport suspicious computer activities
bull Never download from untrusted websites
bull B e careful of s ites you browse to
Social Media tips
bull No Internet delete button
bull Dont share secretsbull Trust then connectbull Use different passwords
for different personas
bull S ecure device ndash facial password fingerprint hellip
bull Setup 2 -factor authNbull Turn on privacy settingsbull S etup private accountsbull Limit who sees postsbull Limit who can find you
Insecure connection
Photos by Unknown author is licensed under CC BY-SA
Evil InternetEvil Wifi
intercepthelliphijackhellipmodify
VPN https
Photos by Unknown author is licensed under CC BY-SA
Evil InternetEvil Wifi
secure encrypted tunnel
Top 5 defenses
Awareness amp Vigilance
Key takeaways1 Dont get hished by a dumb hacker
2 Make strong passwords or phrases and never share them with anyone ever
3 Always use 2-factor login where available
Finally be vigilant but unafraid
UO Cybersecurity Briefing amp Awareness Training
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncom541-346-1732
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncomlfhowelluoregonedu541-346-1732
UO C ybersecurity B riefing amp Awareness Training
- Slide Number 1
- Slide Number 2
- Meet the adversary
- Common attack methods
- Slide Number 5
- Can you spot the phish
- Phishing-4-faculty withhellip
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-whales withhellip
- Phishing-4-whales withhellipsender impersonation bad link tone
- Gift card scam withhellip
- Gift card scamhellipfake domain context urgency
- Unable to display message phish
- Slide Number 15
- Unable to display message phish
- Slide Number 17
- Slide Number 18
- Slide Number 19
- Slide Number 20
- Key Message on Phishing
- UseSTRONG PASSWORDS
- Password game
- Password Game
- Password Game
- Password Game
- Password Game
- Password Game
- General password tips
- TrojansVirusesBotsZombiesRansomware
- Dangers of malwarehellip
- How do I get infected
- Slide Number 33
- General Malware Tips
- Protect yourSOCIAL BRAND
- Social Media tips
- Protect yourCOMMUNICATION
- Insecure connection
- VPN https
- Top 5 defenses
- Key takeaways
- UO Cybersecurity Briefing amp Awareness Training
- Slide Number 43
-
University1 COMPLIANCE increases business
opportunities required bya) DFAR FAR Data Use Agreements (research)b) HIPAA FERPAGLBA (financial aid)c) GDPR (EU persons)d) State Laws (OR CA CT hellip)
2 DATA BREACHES cause financial amp reputational losses
3 DENIAL OF SERVICE disrupts operations4 SOCIAL RESPONSIBILITY extends to Data
Protection
Why YOU should careYOU1 Research at risk2 Bank Account may be emptied3 Medical Records subject to theft
or exposure4 Embarrassment via exposure of
private social media interactions5 Computers Locked for ransom6 Indictment without guilt
Meet the adversary
Script Kiddies
Nation StatesOrganized CrimesInsiders
Hacktivists Hacktivist
Common attack methods
bull Email - Phishingbull Phone - Vishingbull Text - Smishing
Phishing
bull Password theftbull Backdoorsbull Website exploits
Hacking
bull Ransomwarebull Key loggersbull Spyware
Malware
Can you spot the phish1 Fake D0mains uoregonedu d2 Urgency
3 Impers onated Unknown S ender
4 Unexpected Unus ual R eques t Tone
5 Flattery
6 Letter S ub5titution5
7 B ad G rammra
Dear Dr [X]
I recently read your article [Title] It was very useful in my field of researchI wonder if possible to send me these articles to use in my current research
httpshibbolethuoregonedudinidpAuthnloginphpurl=httpwwwsciencedirectcomsciencearticlepiiS03085961100HT00238
Thanks for you Cooperation in AdvanceAssoc Prof [Name]
Phishing-4-faculty withhellip
Phishing-4-faculty withhellipflattery grammar fake domain urgencyDear Dr [X]
I recently read your article [Title] It was very useful in my field of research I wonder if possible to send me these articles to use in my current research
httpshibbolethuoregonedudinidpAuthnloginphpurl=httpwwwsciencedirectcomsciencearticlepiiS03085961100HT00238
Thanks for you Cooperation in AdvanceAssoc Prof [Name]
Phishing-4-faculty withhellipflattery grammar fake domain urgencyDear Dr [X]
I recently read your article [Title] It was very useful in my field of research I wonder if possible to send me these articles to use in my current research
httpshibbolethuoregonedudinidpAuthnloginphpurl=httpwwwsciencedirectcomsciencearticlepiiS03085961100HT00238 38
Thanks for you Cooperation in AdvanceAssoc Prof [Name]
o $34B IP Thefto 3800 Professors targeted acrosso 144 US universitieso 10 Indictments
o 60+ UO Faculty amp Staff Compromised
Phishing-4-whales withhellip
From Michael Schill [mailtomarkrossemailolympicorg]
Sent Friday March 02 2018 202 PM
Subject Michael Schill as Shared a file with you using One Drive
Hello
Please find attached the Look Ahead files for Friday March 2nd2018
Open
Kindly let me have your opinion
Michael Schill541-346-3936President
Phishing-4-whales withhellipsender impersonation bad link tone
From Michael Schill [mailtomarkrossemailolympicorg]
Sent Friday March 02 2018 202 PM
Subject Michael Schill as Shared a file with you using One Drive
Hello
Please find attached the Look Ahead files for Friday March 2nd2018
Open = httpko-ontapcomcatindexhtml
Kindly let me have your opinion
Michael Schill541-346-3936President
Gift card scam withhellip
From bartconoveruoregoncom
Hello You
P lease purchase 6 gift cards valued at $250 each and send me the numbers right away I will tell you a funny story about this when I return to the office but send me those cards NOW
B art
Gift card scamhellipfake domain context urgency
From bartconoveruoregoncom
Hello You
P lease purchase 6 gift cards valued at $250 each and send me the numbers right away I will tell you a funny story about this when I return to the office but send me those cards NOW
B art
Unable to display message phish
Logged out due to inactivity Sign in to continue
www-svhamsgload9icu
Unable to display message phish
www-svhamsgload9icu
27K Users Received the Msg15K Users Read Msg62K Msg Deleted by Security653 Users CompromisedDisabled15K Users Password Changes$80K+ in person-hours for Response
Direct Deposit Prelude
jw13925mybristolacuk
httpsimoladormilorghellip
httpsduckwebuoregonedu
httpswwwvocation100comswelm
httptrafficpillarcomperara
httpmacvalleycottoncomau
httpleojabercombr
jw13925mybristolacukbull ~ 80 users suspected of giving up DuckIDs amp passwords andor 95s amp PACs
bull 14 usersrsquo direct deposit accounts and routing numbers changed to the hackerrsquos
Key Message on Phishing
Dont get P his hed S mis hed Vis hed hellip
B y a
Dumb Hacker
Password game
123456LetmeinFootballIloveyouAdmin
WelcomeMonkeyAbc123
helloStarwars
- Time 2017
G ood Ones B ad Ones
Wr 15 bd 1wy5 Strong (76)
My 3y3s r3 p1nk Strong (70)
This is my story Strong (69)
What is fake news Strong (87)
My secret bucket list item is to sing in public
Very Strong (217)
I hate math but I totally dig chemistry
Very Strong (197)
Password GameORG ood One B ad One
toddbay Toddbay$Username Password
Password GameORG ood One B ad One
marys IloveyouUsername Password
Password GameORG ood One B ad One
samanp TheRt5atemydinnerUsername Password
Password GameORG ood One B ad One
samanp TheRt5atemydinner2Username Password
Password GameORG ood One B ad One
mandyt IwillgobcktoVTUsername Password
General password tipsbull Use password-phrase instead
bull Use 2-Factor Authentication
bull Use 5ub5t1tut10n5
bull Use more than 10 chars
bull Use different passwords for different domains (Yahoo Facebook S nap C hat UOR E G ONE DU)
bull C hange them regularly ndash at least every 6 months
bull Use a password manager (like K eyP ass or LastP ass)
bull Never use login as password
bull Never s tore them under keyboards desk drawers s ticky notes on monitor
bull S tore a clue in your walletpurse
bull Never s tore them on refrigerator
bull Never ever share passwords with anyone
bull Never send them in email
bull Never enter them with a ldquoshoulder surferrdquo present
TrojansViruses
BotsZombies
Ransomware
Dangers of malwarehellipto
YOUto
OTHERS
How do I get infected
social engineering via email instant messaging social media
malicious websites and drive-by downloads P2P file sharing
malvertising man-in-the-middle attacks exploit kits
General Malware Tips
bull Turn on automatic updates on youro P hones
o Home computers
o Tablets
o Work computers (s ee IT)
bull R un up-to-date antimalware toolo McAfee
o MalwareB ytes
o Windows Defender (free)
bull B ack up important files
bull Occas ionally try to restore something from backup
bull R eport suspicious computer activities
bull Never download from untrusted websites
bull B e careful of s ites you browse to
Social Media tips
bull No Internet delete button
bull Dont share secretsbull Trust then connectbull Use different passwords
for different personas
bull S ecure device ndash facial password fingerprint hellip
bull Setup 2 -factor authNbull Turn on privacy settingsbull S etup private accountsbull Limit who sees postsbull Limit who can find you
Insecure connection
Photos by Unknown author is licensed under CC BY-SA
Evil InternetEvil Wifi
intercepthelliphijackhellipmodify
VPN https
Photos by Unknown author is licensed under CC BY-SA
Evil InternetEvil Wifi
secure encrypted tunnel
Top 5 defenses
Awareness amp Vigilance
Key takeaways1 Dont get hished by a dumb hacker
2 Make strong passwords or phrases and never share them with anyone ever
3 Always use 2-factor login where available
Finally be vigilant but unafraid
UO Cybersecurity Briefing amp Awareness Training
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncom541-346-1732
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncomlfhowelluoregonedu541-346-1732
UO C ybersecurity B riefing amp Awareness Training
- Slide Number 1
- Slide Number 2
- Meet the adversary
- Common attack methods
- Slide Number 5
- Can you spot the phish
- Phishing-4-faculty withhellip
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-whales withhellip
- Phishing-4-whales withhellipsender impersonation bad link tone
- Gift card scam withhellip
- Gift card scamhellipfake domain context urgency
- Unable to display message phish
- Slide Number 15
- Unable to display message phish
- Slide Number 17
- Slide Number 18
- Slide Number 19
- Slide Number 20
- Key Message on Phishing
- UseSTRONG PASSWORDS
- Password game
- Password Game
- Password Game
- Password Game
- Password Game
- Password Game
- General password tips
- TrojansVirusesBotsZombiesRansomware
- Dangers of malwarehellip
- How do I get infected
- Slide Number 33
- General Malware Tips
- Protect yourSOCIAL BRAND
- Social Media tips
- Protect yourCOMMUNICATION
- Insecure connection
- VPN https
- Top 5 defenses
- Key takeaways
- UO Cybersecurity Briefing amp Awareness Training
- Slide Number 43
-
Meet the adversary
Script Kiddies
Nation StatesOrganized CrimesInsiders
Hacktivists Hacktivist
Common attack methods
bull Email - Phishingbull Phone - Vishingbull Text - Smishing
Phishing
bull Password theftbull Backdoorsbull Website exploits
Hacking
bull Ransomwarebull Key loggersbull Spyware
Malware
Can you spot the phish1 Fake D0mains uoregonedu d2 Urgency
3 Impers onated Unknown S ender
4 Unexpected Unus ual R eques t Tone
5 Flattery
6 Letter S ub5titution5
7 B ad G rammra
Dear Dr [X]
I recently read your article [Title] It was very useful in my field of researchI wonder if possible to send me these articles to use in my current research
httpshibbolethuoregonedudinidpAuthnloginphpurl=httpwwwsciencedirectcomsciencearticlepiiS03085961100HT00238
Thanks for you Cooperation in AdvanceAssoc Prof [Name]
Phishing-4-faculty withhellip
Phishing-4-faculty withhellipflattery grammar fake domain urgencyDear Dr [X]
I recently read your article [Title] It was very useful in my field of research I wonder if possible to send me these articles to use in my current research
httpshibbolethuoregonedudinidpAuthnloginphpurl=httpwwwsciencedirectcomsciencearticlepiiS03085961100HT00238
Thanks for you Cooperation in AdvanceAssoc Prof [Name]
Phishing-4-faculty withhellipflattery grammar fake domain urgencyDear Dr [X]
I recently read your article [Title] It was very useful in my field of research I wonder if possible to send me these articles to use in my current research
httpshibbolethuoregonedudinidpAuthnloginphpurl=httpwwwsciencedirectcomsciencearticlepiiS03085961100HT00238 38
Thanks for you Cooperation in AdvanceAssoc Prof [Name]
o $34B IP Thefto 3800 Professors targeted acrosso 144 US universitieso 10 Indictments
o 60+ UO Faculty amp Staff Compromised
Phishing-4-whales withhellip
From Michael Schill [mailtomarkrossemailolympicorg]
Sent Friday March 02 2018 202 PM
Subject Michael Schill as Shared a file with you using One Drive
Hello
Please find attached the Look Ahead files for Friday March 2nd2018
Open
Kindly let me have your opinion
Michael Schill541-346-3936President
Phishing-4-whales withhellipsender impersonation bad link tone
From Michael Schill [mailtomarkrossemailolympicorg]
Sent Friday March 02 2018 202 PM
Subject Michael Schill as Shared a file with you using One Drive
Hello
Please find attached the Look Ahead files for Friday March 2nd2018
Open = httpko-ontapcomcatindexhtml
Kindly let me have your opinion
Michael Schill541-346-3936President
Gift card scam withhellip
From bartconoveruoregoncom
Hello You
P lease purchase 6 gift cards valued at $250 each and send me the numbers right away I will tell you a funny story about this when I return to the office but send me those cards NOW
B art
Gift card scamhellipfake domain context urgency
From bartconoveruoregoncom
Hello You
P lease purchase 6 gift cards valued at $250 each and send me the numbers right away I will tell you a funny story about this when I return to the office but send me those cards NOW
B art
Unable to display message phish
Logged out due to inactivity Sign in to continue
www-svhamsgload9icu
Unable to display message phish
www-svhamsgload9icu
27K Users Received the Msg15K Users Read Msg62K Msg Deleted by Security653 Users CompromisedDisabled15K Users Password Changes$80K+ in person-hours for Response
Direct Deposit Prelude
jw13925mybristolacuk
httpsimoladormilorghellip
httpsduckwebuoregonedu
httpswwwvocation100comswelm
httptrafficpillarcomperara
httpmacvalleycottoncomau
httpleojabercombr
jw13925mybristolacukbull ~ 80 users suspected of giving up DuckIDs amp passwords andor 95s amp PACs
bull 14 usersrsquo direct deposit accounts and routing numbers changed to the hackerrsquos
Key Message on Phishing
Dont get P his hed S mis hed Vis hed hellip
B y a
Dumb Hacker
Password game
123456LetmeinFootballIloveyouAdmin
WelcomeMonkeyAbc123
helloStarwars
- Time 2017
G ood Ones B ad Ones
Wr 15 bd 1wy5 Strong (76)
My 3y3s r3 p1nk Strong (70)
This is my story Strong (69)
What is fake news Strong (87)
My secret bucket list item is to sing in public
Very Strong (217)
I hate math but I totally dig chemistry
Very Strong (197)
Password GameORG ood One B ad One
toddbay Toddbay$Username Password
Password GameORG ood One B ad One
marys IloveyouUsername Password
Password GameORG ood One B ad One
samanp TheRt5atemydinnerUsername Password
Password GameORG ood One B ad One
samanp TheRt5atemydinner2Username Password
Password GameORG ood One B ad One
mandyt IwillgobcktoVTUsername Password
General password tipsbull Use password-phrase instead
bull Use 2-Factor Authentication
bull Use 5ub5t1tut10n5
bull Use more than 10 chars
bull Use different passwords for different domains (Yahoo Facebook S nap C hat UOR E G ONE DU)
bull C hange them regularly ndash at least every 6 months
bull Use a password manager (like K eyP ass or LastP ass)
bull Never use login as password
bull Never s tore them under keyboards desk drawers s ticky notes on monitor
bull S tore a clue in your walletpurse
bull Never s tore them on refrigerator
bull Never ever share passwords with anyone
bull Never send them in email
bull Never enter them with a ldquoshoulder surferrdquo present
TrojansViruses
BotsZombies
Ransomware
Dangers of malwarehellipto
YOUto
OTHERS
How do I get infected
social engineering via email instant messaging social media
malicious websites and drive-by downloads P2P file sharing
malvertising man-in-the-middle attacks exploit kits
General Malware Tips
bull Turn on automatic updates on youro P hones
o Home computers
o Tablets
o Work computers (s ee IT)
bull R un up-to-date antimalware toolo McAfee
o MalwareB ytes
o Windows Defender (free)
bull B ack up important files
bull Occas ionally try to restore something from backup
bull R eport suspicious computer activities
bull Never download from untrusted websites
bull B e careful of s ites you browse to
Social Media tips
bull No Internet delete button
bull Dont share secretsbull Trust then connectbull Use different passwords
for different personas
bull S ecure device ndash facial password fingerprint hellip
bull Setup 2 -factor authNbull Turn on privacy settingsbull S etup private accountsbull Limit who sees postsbull Limit who can find you
Insecure connection
Photos by Unknown author is licensed under CC BY-SA
Evil InternetEvil Wifi
intercepthelliphijackhellipmodify
VPN https
Photos by Unknown author is licensed under CC BY-SA
Evil InternetEvil Wifi
secure encrypted tunnel
Top 5 defenses
Awareness amp Vigilance
Key takeaways1 Dont get hished by a dumb hacker
2 Make strong passwords or phrases and never share them with anyone ever
3 Always use 2-factor login where available
Finally be vigilant but unafraid
UO Cybersecurity Briefing amp Awareness Training
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncom541-346-1732
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncomlfhowelluoregonedu541-346-1732
UO C ybersecurity B riefing amp Awareness Training
- Slide Number 1
- Slide Number 2
- Meet the adversary
- Common attack methods
- Slide Number 5
- Can you spot the phish
- Phishing-4-faculty withhellip
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-whales withhellip
- Phishing-4-whales withhellipsender impersonation bad link tone
- Gift card scam withhellip
- Gift card scamhellipfake domain context urgency
- Unable to display message phish
- Slide Number 15
- Unable to display message phish
- Slide Number 17
- Slide Number 18
- Slide Number 19
- Slide Number 20
- Key Message on Phishing
- UseSTRONG PASSWORDS
- Password game
- Password Game
- Password Game
- Password Game
- Password Game
- Password Game
- General password tips
- TrojansVirusesBotsZombiesRansomware
- Dangers of malwarehellip
- How do I get infected
- Slide Number 33
- General Malware Tips
- Protect yourSOCIAL BRAND
- Social Media tips
- Protect yourCOMMUNICATION
- Insecure connection
- VPN https
- Top 5 defenses
- Key takeaways
- UO Cybersecurity Briefing amp Awareness Training
- Slide Number 43
-
Common attack methods
bull Email - Phishingbull Phone - Vishingbull Text - Smishing
Phishing
bull Password theftbull Backdoorsbull Website exploits
Hacking
bull Ransomwarebull Key loggersbull Spyware
Malware
Can you spot the phish1 Fake D0mains uoregonedu d2 Urgency
3 Impers onated Unknown S ender
4 Unexpected Unus ual R eques t Tone
5 Flattery
6 Letter S ub5titution5
7 B ad G rammra
Dear Dr [X]
I recently read your article [Title] It was very useful in my field of researchI wonder if possible to send me these articles to use in my current research
httpshibbolethuoregonedudinidpAuthnloginphpurl=httpwwwsciencedirectcomsciencearticlepiiS03085961100HT00238
Thanks for you Cooperation in AdvanceAssoc Prof [Name]
Phishing-4-faculty withhellip
Phishing-4-faculty withhellipflattery grammar fake domain urgencyDear Dr [X]
I recently read your article [Title] It was very useful in my field of research I wonder if possible to send me these articles to use in my current research
httpshibbolethuoregonedudinidpAuthnloginphpurl=httpwwwsciencedirectcomsciencearticlepiiS03085961100HT00238
Thanks for you Cooperation in AdvanceAssoc Prof [Name]
Phishing-4-faculty withhellipflattery grammar fake domain urgencyDear Dr [X]
I recently read your article [Title] It was very useful in my field of research I wonder if possible to send me these articles to use in my current research
httpshibbolethuoregonedudinidpAuthnloginphpurl=httpwwwsciencedirectcomsciencearticlepiiS03085961100HT00238 38
Thanks for you Cooperation in AdvanceAssoc Prof [Name]
o $34B IP Thefto 3800 Professors targeted acrosso 144 US universitieso 10 Indictments
o 60+ UO Faculty amp Staff Compromised
Phishing-4-whales withhellip
From Michael Schill [mailtomarkrossemailolympicorg]
Sent Friday March 02 2018 202 PM
Subject Michael Schill as Shared a file with you using One Drive
Hello
Please find attached the Look Ahead files for Friday March 2nd2018
Open
Kindly let me have your opinion
Michael Schill541-346-3936President
Phishing-4-whales withhellipsender impersonation bad link tone
From Michael Schill [mailtomarkrossemailolympicorg]
Sent Friday March 02 2018 202 PM
Subject Michael Schill as Shared a file with you using One Drive
Hello
Please find attached the Look Ahead files for Friday March 2nd2018
Open = httpko-ontapcomcatindexhtml
Kindly let me have your opinion
Michael Schill541-346-3936President
Gift card scam withhellip
From bartconoveruoregoncom
Hello You
P lease purchase 6 gift cards valued at $250 each and send me the numbers right away I will tell you a funny story about this when I return to the office but send me those cards NOW
B art
Gift card scamhellipfake domain context urgency
From bartconoveruoregoncom
Hello You
P lease purchase 6 gift cards valued at $250 each and send me the numbers right away I will tell you a funny story about this when I return to the office but send me those cards NOW
B art
Unable to display message phish
Logged out due to inactivity Sign in to continue
www-svhamsgload9icu
Unable to display message phish
www-svhamsgload9icu
27K Users Received the Msg15K Users Read Msg62K Msg Deleted by Security653 Users CompromisedDisabled15K Users Password Changes$80K+ in person-hours for Response
Direct Deposit Prelude
jw13925mybristolacuk
httpsimoladormilorghellip
httpsduckwebuoregonedu
httpswwwvocation100comswelm
httptrafficpillarcomperara
httpmacvalleycottoncomau
httpleojabercombr
jw13925mybristolacukbull ~ 80 users suspected of giving up DuckIDs amp passwords andor 95s amp PACs
bull 14 usersrsquo direct deposit accounts and routing numbers changed to the hackerrsquos
Key Message on Phishing
Dont get P his hed S mis hed Vis hed hellip
B y a
Dumb Hacker
Password game
123456LetmeinFootballIloveyouAdmin
WelcomeMonkeyAbc123
helloStarwars
- Time 2017
G ood Ones B ad Ones
Wr 15 bd 1wy5 Strong (76)
My 3y3s r3 p1nk Strong (70)
This is my story Strong (69)
What is fake news Strong (87)
My secret bucket list item is to sing in public
Very Strong (217)
I hate math but I totally dig chemistry
Very Strong (197)
Password GameORG ood One B ad One
toddbay Toddbay$Username Password
Password GameORG ood One B ad One
marys IloveyouUsername Password
Password GameORG ood One B ad One
samanp TheRt5atemydinnerUsername Password
Password GameORG ood One B ad One
samanp TheRt5atemydinner2Username Password
Password GameORG ood One B ad One
mandyt IwillgobcktoVTUsername Password
General password tipsbull Use password-phrase instead
bull Use 2-Factor Authentication
bull Use 5ub5t1tut10n5
bull Use more than 10 chars
bull Use different passwords for different domains (Yahoo Facebook S nap C hat UOR E G ONE DU)
bull C hange them regularly ndash at least every 6 months
bull Use a password manager (like K eyP ass or LastP ass)
bull Never use login as password
bull Never s tore them under keyboards desk drawers s ticky notes on monitor
bull S tore a clue in your walletpurse
bull Never s tore them on refrigerator
bull Never ever share passwords with anyone
bull Never send them in email
bull Never enter them with a ldquoshoulder surferrdquo present
TrojansViruses
BotsZombies
Ransomware
Dangers of malwarehellipto
YOUto
OTHERS
How do I get infected
social engineering via email instant messaging social media
malicious websites and drive-by downloads P2P file sharing
malvertising man-in-the-middle attacks exploit kits
General Malware Tips
bull Turn on automatic updates on youro P hones
o Home computers
o Tablets
o Work computers (s ee IT)
bull R un up-to-date antimalware toolo McAfee
o MalwareB ytes
o Windows Defender (free)
bull B ack up important files
bull Occas ionally try to restore something from backup
bull R eport suspicious computer activities
bull Never download from untrusted websites
bull B e careful of s ites you browse to
Social Media tips
bull No Internet delete button
bull Dont share secretsbull Trust then connectbull Use different passwords
for different personas
bull S ecure device ndash facial password fingerprint hellip
bull Setup 2 -factor authNbull Turn on privacy settingsbull S etup private accountsbull Limit who sees postsbull Limit who can find you
Insecure connection
Photos by Unknown author is licensed under CC BY-SA
Evil InternetEvil Wifi
intercepthelliphijackhellipmodify
VPN https
Photos by Unknown author is licensed under CC BY-SA
Evil InternetEvil Wifi
secure encrypted tunnel
Top 5 defenses
Awareness amp Vigilance
Key takeaways1 Dont get hished by a dumb hacker
2 Make strong passwords or phrases and never share them with anyone ever
3 Always use 2-factor login where available
Finally be vigilant but unafraid
UO Cybersecurity Briefing amp Awareness Training
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncom541-346-1732
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncomlfhowelluoregonedu541-346-1732
UO C ybersecurity B riefing amp Awareness Training
- Slide Number 1
- Slide Number 2
- Meet the adversary
- Common attack methods
- Slide Number 5
- Can you spot the phish
- Phishing-4-faculty withhellip
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-whales withhellip
- Phishing-4-whales withhellipsender impersonation bad link tone
- Gift card scam withhellip
- Gift card scamhellipfake domain context urgency
- Unable to display message phish
- Slide Number 15
- Unable to display message phish
- Slide Number 17
- Slide Number 18
- Slide Number 19
- Slide Number 20
- Key Message on Phishing
- UseSTRONG PASSWORDS
- Password game
- Password Game
- Password Game
- Password Game
- Password Game
- Password Game
- General password tips
- TrojansVirusesBotsZombiesRansomware
- Dangers of malwarehellip
- How do I get infected
- Slide Number 33
- General Malware Tips
- Protect yourSOCIAL BRAND
- Social Media tips
- Protect yourCOMMUNICATION
- Insecure connection
- VPN https
- Top 5 defenses
- Key takeaways
- UO Cybersecurity Briefing amp Awareness Training
- Slide Number 43
-
Can you spot the phish1 Fake D0mains uoregonedu d2 Urgency
3 Impers onated Unknown S ender
4 Unexpected Unus ual R eques t Tone
5 Flattery
6 Letter S ub5titution5
7 B ad G rammra
Dear Dr [X]
I recently read your article [Title] It was very useful in my field of researchI wonder if possible to send me these articles to use in my current research
httpshibbolethuoregonedudinidpAuthnloginphpurl=httpwwwsciencedirectcomsciencearticlepiiS03085961100HT00238
Thanks for you Cooperation in AdvanceAssoc Prof [Name]
Phishing-4-faculty withhellip
Phishing-4-faculty withhellipflattery grammar fake domain urgencyDear Dr [X]
I recently read your article [Title] It was very useful in my field of research I wonder if possible to send me these articles to use in my current research
httpshibbolethuoregonedudinidpAuthnloginphpurl=httpwwwsciencedirectcomsciencearticlepiiS03085961100HT00238
Thanks for you Cooperation in AdvanceAssoc Prof [Name]
Phishing-4-faculty withhellipflattery grammar fake domain urgencyDear Dr [X]
I recently read your article [Title] It was very useful in my field of research I wonder if possible to send me these articles to use in my current research
httpshibbolethuoregonedudinidpAuthnloginphpurl=httpwwwsciencedirectcomsciencearticlepiiS03085961100HT00238 38
Thanks for you Cooperation in AdvanceAssoc Prof [Name]
o $34B IP Thefto 3800 Professors targeted acrosso 144 US universitieso 10 Indictments
o 60+ UO Faculty amp Staff Compromised
Phishing-4-whales withhellip
From Michael Schill [mailtomarkrossemailolympicorg]
Sent Friday March 02 2018 202 PM
Subject Michael Schill as Shared a file with you using One Drive
Hello
Please find attached the Look Ahead files for Friday March 2nd2018
Open
Kindly let me have your opinion
Michael Schill541-346-3936President
Phishing-4-whales withhellipsender impersonation bad link tone
From Michael Schill [mailtomarkrossemailolympicorg]
Sent Friday March 02 2018 202 PM
Subject Michael Schill as Shared a file with you using One Drive
Hello
Please find attached the Look Ahead files for Friday March 2nd2018
Open = httpko-ontapcomcatindexhtml
Kindly let me have your opinion
Michael Schill541-346-3936President
Gift card scam withhellip
From bartconoveruoregoncom
Hello You
P lease purchase 6 gift cards valued at $250 each and send me the numbers right away I will tell you a funny story about this when I return to the office but send me those cards NOW
B art
Gift card scamhellipfake domain context urgency
From bartconoveruoregoncom
Hello You
P lease purchase 6 gift cards valued at $250 each and send me the numbers right away I will tell you a funny story about this when I return to the office but send me those cards NOW
B art
Unable to display message phish
Logged out due to inactivity Sign in to continue
www-svhamsgload9icu
Unable to display message phish
www-svhamsgload9icu
27K Users Received the Msg15K Users Read Msg62K Msg Deleted by Security653 Users CompromisedDisabled15K Users Password Changes$80K+ in person-hours for Response
Direct Deposit Prelude
jw13925mybristolacuk
httpsimoladormilorghellip
httpsduckwebuoregonedu
httpswwwvocation100comswelm
httptrafficpillarcomperara
httpmacvalleycottoncomau
httpleojabercombr
jw13925mybristolacukbull ~ 80 users suspected of giving up DuckIDs amp passwords andor 95s amp PACs
bull 14 usersrsquo direct deposit accounts and routing numbers changed to the hackerrsquos
Key Message on Phishing
Dont get P his hed S mis hed Vis hed hellip
B y a
Dumb Hacker
Password game
123456LetmeinFootballIloveyouAdmin
WelcomeMonkeyAbc123
helloStarwars
- Time 2017
G ood Ones B ad Ones
Wr 15 bd 1wy5 Strong (76)
My 3y3s r3 p1nk Strong (70)
This is my story Strong (69)
What is fake news Strong (87)
My secret bucket list item is to sing in public
Very Strong (217)
I hate math but I totally dig chemistry
Very Strong (197)
Password GameORG ood One B ad One
toddbay Toddbay$Username Password
Password GameORG ood One B ad One
marys IloveyouUsername Password
Password GameORG ood One B ad One
samanp TheRt5atemydinnerUsername Password
Password GameORG ood One B ad One
samanp TheRt5atemydinner2Username Password
Password GameORG ood One B ad One
mandyt IwillgobcktoVTUsername Password
General password tipsbull Use password-phrase instead
bull Use 2-Factor Authentication
bull Use 5ub5t1tut10n5
bull Use more than 10 chars
bull Use different passwords for different domains (Yahoo Facebook S nap C hat UOR E G ONE DU)
bull C hange them regularly ndash at least every 6 months
bull Use a password manager (like K eyP ass or LastP ass)
bull Never use login as password
bull Never s tore them under keyboards desk drawers s ticky notes on monitor
bull S tore a clue in your walletpurse
bull Never s tore them on refrigerator
bull Never ever share passwords with anyone
bull Never send them in email
bull Never enter them with a ldquoshoulder surferrdquo present
TrojansViruses
BotsZombies
Ransomware
Dangers of malwarehellipto
YOUto
OTHERS
How do I get infected
social engineering via email instant messaging social media
malicious websites and drive-by downloads P2P file sharing
malvertising man-in-the-middle attacks exploit kits
General Malware Tips
bull Turn on automatic updates on youro P hones
o Home computers
o Tablets
o Work computers (s ee IT)
bull R un up-to-date antimalware toolo McAfee
o MalwareB ytes
o Windows Defender (free)
bull B ack up important files
bull Occas ionally try to restore something from backup
bull R eport suspicious computer activities
bull Never download from untrusted websites
bull B e careful of s ites you browse to
Social Media tips
bull No Internet delete button
bull Dont share secretsbull Trust then connectbull Use different passwords
for different personas
bull S ecure device ndash facial password fingerprint hellip
bull Setup 2 -factor authNbull Turn on privacy settingsbull S etup private accountsbull Limit who sees postsbull Limit who can find you
Insecure connection
Photos by Unknown author is licensed under CC BY-SA
Evil InternetEvil Wifi
intercepthelliphijackhellipmodify
VPN https
Photos by Unknown author is licensed under CC BY-SA
Evil InternetEvil Wifi
secure encrypted tunnel
Top 5 defenses
Awareness amp Vigilance
Key takeaways1 Dont get hished by a dumb hacker
2 Make strong passwords or phrases and never share them with anyone ever
3 Always use 2-factor login where available
Finally be vigilant but unafraid
UO Cybersecurity Briefing amp Awareness Training
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncom541-346-1732
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncomlfhowelluoregonedu541-346-1732
UO C ybersecurity B riefing amp Awareness Training
- Slide Number 1
- Slide Number 2
- Meet the adversary
- Common attack methods
- Slide Number 5
- Can you spot the phish
- Phishing-4-faculty withhellip
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-whales withhellip
- Phishing-4-whales withhellipsender impersonation bad link tone
- Gift card scam withhellip
- Gift card scamhellipfake domain context urgency
- Unable to display message phish
- Slide Number 15
- Unable to display message phish
- Slide Number 17
- Slide Number 18
- Slide Number 19
- Slide Number 20
- Key Message on Phishing
- UseSTRONG PASSWORDS
- Password game
- Password Game
- Password Game
- Password Game
- Password Game
- Password Game
- General password tips
- TrojansVirusesBotsZombiesRansomware
- Dangers of malwarehellip
- How do I get infected
- Slide Number 33
- General Malware Tips
- Protect yourSOCIAL BRAND
- Social Media tips
- Protect yourCOMMUNICATION
- Insecure connection
- VPN https
- Top 5 defenses
- Key takeaways
- UO Cybersecurity Briefing amp Awareness Training
- Slide Number 43
-
Dear Dr [X]
I recently read your article [Title] It was very useful in my field of researchI wonder if possible to send me these articles to use in my current research
httpshibbolethuoregonedudinidpAuthnloginphpurl=httpwwwsciencedirectcomsciencearticlepiiS03085961100HT00238
Thanks for you Cooperation in AdvanceAssoc Prof [Name]
Phishing-4-faculty withhellip
Phishing-4-faculty withhellipflattery grammar fake domain urgencyDear Dr [X]
I recently read your article [Title] It was very useful in my field of research I wonder if possible to send me these articles to use in my current research
httpshibbolethuoregonedudinidpAuthnloginphpurl=httpwwwsciencedirectcomsciencearticlepiiS03085961100HT00238
Thanks for you Cooperation in AdvanceAssoc Prof [Name]
Phishing-4-faculty withhellipflattery grammar fake domain urgencyDear Dr [X]
I recently read your article [Title] It was very useful in my field of research I wonder if possible to send me these articles to use in my current research
httpshibbolethuoregonedudinidpAuthnloginphpurl=httpwwwsciencedirectcomsciencearticlepiiS03085961100HT00238 38
Thanks for you Cooperation in AdvanceAssoc Prof [Name]
o $34B IP Thefto 3800 Professors targeted acrosso 144 US universitieso 10 Indictments
o 60+ UO Faculty amp Staff Compromised
Phishing-4-whales withhellip
From Michael Schill [mailtomarkrossemailolympicorg]
Sent Friday March 02 2018 202 PM
Subject Michael Schill as Shared a file with you using One Drive
Hello
Please find attached the Look Ahead files for Friday March 2nd2018
Open
Kindly let me have your opinion
Michael Schill541-346-3936President
Phishing-4-whales withhellipsender impersonation bad link tone
From Michael Schill [mailtomarkrossemailolympicorg]
Sent Friday March 02 2018 202 PM
Subject Michael Schill as Shared a file with you using One Drive
Hello
Please find attached the Look Ahead files for Friday March 2nd2018
Open = httpko-ontapcomcatindexhtml
Kindly let me have your opinion
Michael Schill541-346-3936President
Gift card scam withhellip
From bartconoveruoregoncom
Hello You
P lease purchase 6 gift cards valued at $250 each and send me the numbers right away I will tell you a funny story about this when I return to the office but send me those cards NOW
B art
Gift card scamhellipfake domain context urgency
From bartconoveruoregoncom
Hello You
P lease purchase 6 gift cards valued at $250 each and send me the numbers right away I will tell you a funny story about this when I return to the office but send me those cards NOW
B art
Unable to display message phish
Logged out due to inactivity Sign in to continue
www-svhamsgload9icu
Unable to display message phish
www-svhamsgload9icu
27K Users Received the Msg15K Users Read Msg62K Msg Deleted by Security653 Users CompromisedDisabled15K Users Password Changes$80K+ in person-hours for Response
Direct Deposit Prelude
jw13925mybristolacuk
httpsimoladormilorghellip
httpsduckwebuoregonedu
httpswwwvocation100comswelm
httptrafficpillarcomperara
httpmacvalleycottoncomau
httpleojabercombr
jw13925mybristolacukbull ~ 80 users suspected of giving up DuckIDs amp passwords andor 95s amp PACs
bull 14 usersrsquo direct deposit accounts and routing numbers changed to the hackerrsquos
Key Message on Phishing
Dont get P his hed S mis hed Vis hed hellip
B y a
Dumb Hacker
Password game
123456LetmeinFootballIloveyouAdmin
WelcomeMonkeyAbc123
helloStarwars
- Time 2017
G ood Ones B ad Ones
Wr 15 bd 1wy5 Strong (76)
My 3y3s r3 p1nk Strong (70)
This is my story Strong (69)
What is fake news Strong (87)
My secret bucket list item is to sing in public
Very Strong (217)
I hate math but I totally dig chemistry
Very Strong (197)
Password GameORG ood One B ad One
toddbay Toddbay$Username Password
Password GameORG ood One B ad One
marys IloveyouUsername Password
Password GameORG ood One B ad One
samanp TheRt5atemydinnerUsername Password
Password GameORG ood One B ad One
samanp TheRt5atemydinner2Username Password
Password GameORG ood One B ad One
mandyt IwillgobcktoVTUsername Password
General password tipsbull Use password-phrase instead
bull Use 2-Factor Authentication
bull Use 5ub5t1tut10n5
bull Use more than 10 chars
bull Use different passwords for different domains (Yahoo Facebook S nap C hat UOR E G ONE DU)
bull C hange them regularly ndash at least every 6 months
bull Use a password manager (like K eyP ass or LastP ass)
bull Never use login as password
bull Never s tore them under keyboards desk drawers s ticky notes on monitor
bull S tore a clue in your walletpurse
bull Never s tore them on refrigerator
bull Never ever share passwords with anyone
bull Never send them in email
bull Never enter them with a ldquoshoulder surferrdquo present
TrojansViruses
BotsZombies
Ransomware
Dangers of malwarehellipto
YOUto
OTHERS
How do I get infected
social engineering via email instant messaging social media
malicious websites and drive-by downloads P2P file sharing
malvertising man-in-the-middle attacks exploit kits
General Malware Tips
bull Turn on automatic updates on youro P hones
o Home computers
o Tablets
o Work computers (s ee IT)
bull R un up-to-date antimalware toolo McAfee
o MalwareB ytes
o Windows Defender (free)
bull B ack up important files
bull Occas ionally try to restore something from backup
bull R eport suspicious computer activities
bull Never download from untrusted websites
bull B e careful of s ites you browse to
Social Media tips
bull No Internet delete button
bull Dont share secretsbull Trust then connectbull Use different passwords
for different personas
bull S ecure device ndash facial password fingerprint hellip
bull Setup 2 -factor authNbull Turn on privacy settingsbull S etup private accountsbull Limit who sees postsbull Limit who can find you
Insecure connection
Photos by Unknown author is licensed under CC BY-SA
Evil InternetEvil Wifi
intercepthelliphijackhellipmodify
VPN https
Photos by Unknown author is licensed under CC BY-SA
Evil InternetEvil Wifi
secure encrypted tunnel
Top 5 defenses
Awareness amp Vigilance
Key takeaways1 Dont get hished by a dumb hacker
2 Make strong passwords or phrases and never share them with anyone ever
3 Always use 2-factor login where available
Finally be vigilant but unafraid
UO Cybersecurity Briefing amp Awareness Training
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncom541-346-1732
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncomlfhowelluoregonedu541-346-1732
UO C ybersecurity B riefing amp Awareness Training
- Slide Number 1
- Slide Number 2
- Meet the adversary
- Common attack methods
- Slide Number 5
- Can you spot the phish
- Phishing-4-faculty withhellip
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-whales withhellip
- Phishing-4-whales withhellipsender impersonation bad link tone
- Gift card scam withhellip
- Gift card scamhellipfake domain context urgency
- Unable to display message phish
- Slide Number 15
- Unable to display message phish
- Slide Number 17
- Slide Number 18
- Slide Number 19
- Slide Number 20
- Key Message on Phishing
- UseSTRONG PASSWORDS
- Password game
- Password Game
- Password Game
- Password Game
- Password Game
- Password Game
- General password tips
- TrojansVirusesBotsZombiesRansomware
- Dangers of malwarehellip
- How do I get infected
- Slide Number 33
- General Malware Tips
- Protect yourSOCIAL BRAND
- Social Media tips
- Protect yourCOMMUNICATION
- Insecure connection
- VPN https
- Top 5 defenses
- Key takeaways
- UO Cybersecurity Briefing amp Awareness Training
- Slide Number 43
-
Phishing-4-faculty withhellipflattery grammar fake domain urgencyDear Dr [X]
I recently read your article [Title] It was very useful in my field of research I wonder if possible to send me these articles to use in my current research
httpshibbolethuoregonedudinidpAuthnloginphpurl=httpwwwsciencedirectcomsciencearticlepiiS03085961100HT00238
Thanks for you Cooperation in AdvanceAssoc Prof [Name]
Phishing-4-faculty withhellipflattery grammar fake domain urgencyDear Dr [X]
I recently read your article [Title] It was very useful in my field of research I wonder if possible to send me these articles to use in my current research
httpshibbolethuoregonedudinidpAuthnloginphpurl=httpwwwsciencedirectcomsciencearticlepiiS03085961100HT00238 38
Thanks for you Cooperation in AdvanceAssoc Prof [Name]
o $34B IP Thefto 3800 Professors targeted acrosso 144 US universitieso 10 Indictments
o 60+ UO Faculty amp Staff Compromised
Phishing-4-whales withhellip
From Michael Schill [mailtomarkrossemailolympicorg]
Sent Friday March 02 2018 202 PM
Subject Michael Schill as Shared a file with you using One Drive
Hello
Please find attached the Look Ahead files for Friday March 2nd2018
Open
Kindly let me have your opinion
Michael Schill541-346-3936President
Phishing-4-whales withhellipsender impersonation bad link tone
From Michael Schill [mailtomarkrossemailolympicorg]
Sent Friday March 02 2018 202 PM
Subject Michael Schill as Shared a file with you using One Drive
Hello
Please find attached the Look Ahead files for Friday March 2nd2018
Open = httpko-ontapcomcatindexhtml
Kindly let me have your opinion
Michael Schill541-346-3936President
Gift card scam withhellip
From bartconoveruoregoncom
Hello You
P lease purchase 6 gift cards valued at $250 each and send me the numbers right away I will tell you a funny story about this when I return to the office but send me those cards NOW
B art
Gift card scamhellipfake domain context urgency
From bartconoveruoregoncom
Hello You
P lease purchase 6 gift cards valued at $250 each and send me the numbers right away I will tell you a funny story about this when I return to the office but send me those cards NOW
B art
Unable to display message phish
Logged out due to inactivity Sign in to continue
www-svhamsgload9icu
Unable to display message phish
www-svhamsgload9icu
27K Users Received the Msg15K Users Read Msg62K Msg Deleted by Security653 Users CompromisedDisabled15K Users Password Changes$80K+ in person-hours for Response
Direct Deposit Prelude
jw13925mybristolacuk
httpsimoladormilorghellip
httpsduckwebuoregonedu
httpswwwvocation100comswelm
httptrafficpillarcomperara
httpmacvalleycottoncomau
httpleojabercombr
jw13925mybristolacukbull ~ 80 users suspected of giving up DuckIDs amp passwords andor 95s amp PACs
bull 14 usersrsquo direct deposit accounts and routing numbers changed to the hackerrsquos
Key Message on Phishing
Dont get P his hed S mis hed Vis hed hellip
B y a
Dumb Hacker
Password game
123456LetmeinFootballIloveyouAdmin
WelcomeMonkeyAbc123
helloStarwars
- Time 2017
G ood Ones B ad Ones
Wr 15 bd 1wy5 Strong (76)
My 3y3s r3 p1nk Strong (70)
This is my story Strong (69)
What is fake news Strong (87)
My secret bucket list item is to sing in public
Very Strong (217)
I hate math but I totally dig chemistry
Very Strong (197)
Password GameORG ood One B ad One
toddbay Toddbay$Username Password
Password GameORG ood One B ad One
marys IloveyouUsername Password
Password GameORG ood One B ad One
samanp TheRt5atemydinnerUsername Password
Password GameORG ood One B ad One
samanp TheRt5atemydinner2Username Password
Password GameORG ood One B ad One
mandyt IwillgobcktoVTUsername Password
General password tipsbull Use password-phrase instead
bull Use 2-Factor Authentication
bull Use 5ub5t1tut10n5
bull Use more than 10 chars
bull Use different passwords for different domains (Yahoo Facebook S nap C hat UOR E G ONE DU)
bull C hange them regularly ndash at least every 6 months
bull Use a password manager (like K eyP ass or LastP ass)
bull Never use login as password
bull Never s tore them under keyboards desk drawers s ticky notes on monitor
bull S tore a clue in your walletpurse
bull Never s tore them on refrigerator
bull Never ever share passwords with anyone
bull Never send them in email
bull Never enter them with a ldquoshoulder surferrdquo present
TrojansViruses
BotsZombies
Ransomware
Dangers of malwarehellipto
YOUto
OTHERS
How do I get infected
social engineering via email instant messaging social media
malicious websites and drive-by downloads P2P file sharing
malvertising man-in-the-middle attacks exploit kits
General Malware Tips
bull Turn on automatic updates on youro P hones
o Home computers
o Tablets
o Work computers (s ee IT)
bull R un up-to-date antimalware toolo McAfee
o MalwareB ytes
o Windows Defender (free)
bull B ack up important files
bull Occas ionally try to restore something from backup
bull R eport suspicious computer activities
bull Never download from untrusted websites
bull B e careful of s ites you browse to
Social Media tips
bull No Internet delete button
bull Dont share secretsbull Trust then connectbull Use different passwords
for different personas
bull S ecure device ndash facial password fingerprint hellip
bull Setup 2 -factor authNbull Turn on privacy settingsbull S etup private accountsbull Limit who sees postsbull Limit who can find you
Insecure connection
Photos by Unknown author is licensed under CC BY-SA
Evil InternetEvil Wifi
intercepthelliphijackhellipmodify
VPN https
Photos by Unknown author is licensed under CC BY-SA
Evil InternetEvil Wifi
secure encrypted tunnel
Top 5 defenses
Awareness amp Vigilance
Key takeaways1 Dont get hished by a dumb hacker
2 Make strong passwords or phrases and never share them with anyone ever
3 Always use 2-factor login where available
Finally be vigilant but unafraid
UO Cybersecurity Briefing amp Awareness Training
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncom541-346-1732
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncomlfhowelluoregonedu541-346-1732
UO C ybersecurity B riefing amp Awareness Training
- Slide Number 1
- Slide Number 2
- Meet the adversary
- Common attack methods
- Slide Number 5
- Can you spot the phish
- Phishing-4-faculty withhellip
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-whales withhellip
- Phishing-4-whales withhellipsender impersonation bad link tone
- Gift card scam withhellip
- Gift card scamhellipfake domain context urgency
- Unable to display message phish
- Slide Number 15
- Unable to display message phish
- Slide Number 17
- Slide Number 18
- Slide Number 19
- Slide Number 20
- Key Message on Phishing
- UseSTRONG PASSWORDS
- Password game
- Password Game
- Password Game
- Password Game
- Password Game
- Password Game
- General password tips
- TrojansVirusesBotsZombiesRansomware
- Dangers of malwarehellip
- How do I get infected
- Slide Number 33
- General Malware Tips
- Protect yourSOCIAL BRAND
- Social Media tips
- Protect yourCOMMUNICATION
- Insecure connection
- VPN https
- Top 5 defenses
- Key takeaways
- UO Cybersecurity Briefing amp Awareness Training
- Slide Number 43
-
Phishing-4-faculty withhellipflattery grammar fake domain urgencyDear Dr [X]
I recently read your article [Title] It was very useful in my field of research I wonder if possible to send me these articles to use in my current research
httpshibbolethuoregonedudinidpAuthnloginphpurl=httpwwwsciencedirectcomsciencearticlepiiS03085961100HT00238 38
Thanks for you Cooperation in AdvanceAssoc Prof [Name]
o $34B IP Thefto 3800 Professors targeted acrosso 144 US universitieso 10 Indictments
o 60+ UO Faculty amp Staff Compromised
Phishing-4-whales withhellip
From Michael Schill [mailtomarkrossemailolympicorg]
Sent Friday March 02 2018 202 PM
Subject Michael Schill as Shared a file with you using One Drive
Hello
Please find attached the Look Ahead files for Friday March 2nd2018
Open
Kindly let me have your opinion
Michael Schill541-346-3936President
Phishing-4-whales withhellipsender impersonation bad link tone
From Michael Schill [mailtomarkrossemailolympicorg]
Sent Friday March 02 2018 202 PM
Subject Michael Schill as Shared a file with you using One Drive
Hello
Please find attached the Look Ahead files for Friday March 2nd2018
Open = httpko-ontapcomcatindexhtml
Kindly let me have your opinion
Michael Schill541-346-3936President
Gift card scam withhellip
From bartconoveruoregoncom
Hello You
P lease purchase 6 gift cards valued at $250 each and send me the numbers right away I will tell you a funny story about this when I return to the office but send me those cards NOW
B art
Gift card scamhellipfake domain context urgency
From bartconoveruoregoncom
Hello You
P lease purchase 6 gift cards valued at $250 each and send me the numbers right away I will tell you a funny story about this when I return to the office but send me those cards NOW
B art
Unable to display message phish
Logged out due to inactivity Sign in to continue
www-svhamsgload9icu
Unable to display message phish
www-svhamsgload9icu
27K Users Received the Msg15K Users Read Msg62K Msg Deleted by Security653 Users CompromisedDisabled15K Users Password Changes$80K+ in person-hours for Response
Direct Deposit Prelude
jw13925mybristolacuk
httpsimoladormilorghellip
httpsduckwebuoregonedu
httpswwwvocation100comswelm
httptrafficpillarcomperara
httpmacvalleycottoncomau
httpleojabercombr
jw13925mybristolacukbull ~ 80 users suspected of giving up DuckIDs amp passwords andor 95s amp PACs
bull 14 usersrsquo direct deposit accounts and routing numbers changed to the hackerrsquos
Key Message on Phishing
Dont get P his hed S mis hed Vis hed hellip
B y a
Dumb Hacker
Password game
123456LetmeinFootballIloveyouAdmin
WelcomeMonkeyAbc123
helloStarwars
- Time 2017
G ood Ones B ad Ones
Wr 15 bd 1wy5 Strong (76)
My 3y3s r3 p1nk Strong (70)
This is my story Strong (69)
What is fake news Strong (87)
My secret bucket list item is to sing in public
Very Strong (217)
I hate math but I totally dig chemistry
Very Strong (197)
Password GameORG ood One B ad One
toddbay Toddbay$Username Password
Password GameORG ood One B ad One
marys IloveyouUsername Password
Password GameORG ood One B ad One
samanp TheRt5atemydinnerUsername Password
Password GameORG ood One B ad One
samanp TheRt5atemydinner2Username Password
Password GameORG ood One B ad One
mandyt IwillgobcktoVTUsername Password
General password tipsbull Use password-phrase instead
bull Use 2-Factor Authentication
bull Use 5ub5t1tut10n5
bull Use more than 10 chars
bull Use different passwords for different domains (Yahoo Facebook S nap C hat UOR E G ONE DU)
bull C hange them regularly ndash at least every 6 months
bull Use a password manager (like K eyP ass or LastP ass)
bull Never use login as password
bull Never s tore them under keyboards desk drawers s ticky notes on monitor
bull S tore a clue in your walletpurse
bull Never s tore them on refrigerator
bull Never ever share passwords with anyone
bull Never send them in email
bull Never enter them with a ldquoshoulder surferrdquo present
TrojansViruses
BotsZombies
Ransomware
Dangers of malwarehellipto
YOUto
OTHERS
How do I get infected
social engineering via email instant messaging social media
malicious websites and drive-by downloads P2P file sharing
malvertising man-in-the-middle attacks exploit kits
General Malware Tips
bull Turn on automatic updates on youro P hones
o Home computers
o Tablets
o Work computers (s ee IT)
bull R un up-to-date antimalware toolo McAfee
o MalwareB ytes
o Windows Defender (free)
bull B ack up important files
bull Occas ionally try to restore something from backup
bull R eport suspicious computer activities
bull Never download from untrusted websites
bull B e careful of s ites you browse to
Social Media tips
bull No Internet delete button
bull Dont share secretsbull Trust then connectbull Use different passwords
for different personas
bull S ecure device ndash facial password fingerprint hellip
bull Setup 2 -factor authNbull Turn on privacy settingsbull S etup private accountsbull Limit who sees postsbull Limit who can find you
Insecure connection
Photos by Unknown author is licensed under CC BY-SA
Evil InternetEvil Wifi
intercepthelliphijackhellipmodify
VPN https
Photos by Unknown author is licensed under CC BY-SA
Evil InternetEvil Wifi
secure encrypted tunnel
Top 5 defenses
Awareness amp Vigilance
Key takeaways1 Dont get hished by a dumb hacker
2 Make strong passwords or phrases and never share them with anyone ever
3 Always use 2-factor login where available
Finally be vigilant but unafraid
UO Cybersecurity Briefing amp Awareness Training
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncom541-346-1732
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncomlfhowelluoregonedu541-346-1732
UO C ybersecurity B riefing amp Awareness Training
- Slide Number 1
- Slide Number 2
- Meet the adversary
- Common attack methods
- Slide Number 5
- Can you spot the phish
- Phishing-4-faculty withhellip
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-whales withhellip
- Phishing-4-whales withhellipsender impersonation bad link tone
- Gift card scam withhellip
- Gift card scamhellipfake domain context urgency
- Unable to display message phish
- Slide Number 15
- Unable to display message phish
- Slide Number 17
- Slide Number 18
- Slide Number 19
- Slide Number 20
- Key Message on Phishing
- UseSTRONG PASSWORDS
- Password game
- Password Game
- Password Game
- Password Game
- Password Game
- Password Game
- General password tips
- TrojansVirusesBotsZombiesRansomware
- Dangers of malwarehellip
- How do I get infected
- Slide Number 33
- General Malware Tips
- Protect yourSOCIAL BRAND
- Social Media tips
- Protect yourCOMMUNICATION
- Insecure connection
- VPN https
- Top 5 defenses
- Key takeaways
- UO Cybersecurity Briefing amp Awareness Training
- Slide Number 43
-
Phishing-4-whales withhellip
From Michael Schill [mailtomarkrossemailolympicorg]
Sent Friday March 02 2018 202 PM
Subject Michael Schill as Shared a file with you using One Drive
Hello
Please find attached the Look Ahead files for Friday March 2nd2018
Open
Kindly let me have your opinion
Michael Schill541-346-3936President
Phishing-4-whales withhellipsender impersonation bad link tone
From Michael Schill [mailtomarkrossemailolympicorg]
Sent Friday March 02 2018 202 PM
Subject Michael Schill as Shared a file with you using One Drive
Hello
Please find attached the Look Ahead files for Friday March 2nd2018
Open = httpko-ontapcomcatindexhtml
Kindly let me have your opinion
Michael Schill541-346-3936President
Gift card scam withhellip
From bartconoveruoregoncom
Hello You
P lease purchase 6 gift cards valued at $250 each and send me the numbers right away I will tell you a funny story about this when I return to the office but send me those cards NOW
B art
Gift card scamhellipfake domain context urgency
From bartconoveruoregoncom
Hello You
P lease purchase 6 gift cards valued at $250 each and send me the numbers right away I will tell you a funny story about this when I return to the office but send me those cards NOW
B art
Unable to display message phish
Logged out due to inactivity Sign in to continue
www-svhamsgload9icu
Unable to display message phish
www-svhamsgload9icu
27K Users Received the Msg15K Users Read Msg62K Msg Deleted by Security653 Users CompromisedDisabled15K Users Password Changes$80K+ in person-hours for Response
Direct Deposit Prelude
jw13925mybristolacuk
httpsimoladormilorghellip
httpsduckwebuoregonedu
httpswwwvocation100comswelm
httptrafficpillarcomperara
httpmacvalleycottoncomau
httpleojabercombr
jw13925mybristolacukbull ~ 80 users suspected of giving up DuckIDs amp passwords andor 95s amp PACs
bull 14 usersrsquo direct deposit accounts and routing numbers changed to the hackerrsquos
Key Message on Phishing
Dont get P his hed S mis hed Vis hed hellip
B y a
Dumb Hacker
Password game
123456LetmeinFootballIloveyouAdmin
WelcomeMonkeyAbc123
helloStarwars
- Time 2017
G ood Ones B ad Ones
Wr 15 bd 1wy5 Strong (76)
My 3y3s r3 p1nk Strong (70)
This is my story Strong (69)
What is fake news Strong (87)
My secret bucket list item is to sing in public
Very Strong (217)
I hate math but I totally dig chemistry
Very Strong (197)
Password GameORG ood One B ad One
toddbay Toddbay$Username Password
Password GameORG ood One B ad One
marys IloveyouUsername Password
Password GameORG ood One B ad One
samanp TheRt5atemydinnerUsername Password
Password GameORG ood One B ad One
samanp TheRt5atemydinner2Username Password
Password GameORG ood One B ad One
mandyt IwillgobcktoVTUsername Password
General password tipsbull Use password-phrase instead
bull Use 2-Factor Authentication
bull Use 5ub5t1tut10n5
bull Use more than 10 chars
bull Use different passwords for different domains (Yahoo Facebook S nap C hat UOR E G ONE DU)
bull C hange them regularly ndash at least every 6 months
bull Use a password manager (like K eyP ass or LastP ass)
bull Never use login as password
bull Never s tore them under keyboards desk drawers s ticky notes on monitor
bull S tore a clue in your walletpurse
bull Never s tore them on refrigerator
bull Never ever share passwords with anyone
bull Never send them in email
bull Never enter them with a ldquoshoulder surferrdquo present
TrojansViruses
BotsZombies
Ransomware
Dangers of malwarehellipto
YOUto
OTHERS
How do I get infected
social engineering via email instant messaging social media
malicious websites and drive-by downloads P2P file sharing
malvertising man-in-the-middle attacks exploit kits
General Malware Tips
bull Turn on automatic updates on youro P hones
o Home computers
o Tablets
o Work computers (s ee IT)
bull R un up-to-date antimalware toolo McAfee
o MalwareB ytes
o Windows Defender (free)
bull B ack up important files
bull Occas ionally try to restore something from backup
bull R eport suspicious computer activities
bull Never download from untrusted websites
bull B e careful of s ites you browse to
Social Media tips
bull No Internet delete button
bull Dont share secretsbull Trust then connectbull Use different passwords
for different personas
bull S ecure device ndash facial password fingerprint hellip
bull Setup 2 -factor authNbull Turn on privacy settingsbull S etup private accountsbull Limit who sees postsbull Limit who can find you
Insecure connection
Photos by Unknown author is licensed under CC BY-SA
Evil InternetEvil Wifi
intercepthelliphijackhellipmodify
VPN https
Photos by Unknown author is licensed under CC BY-SA
Evil InternetEvil Wifi
secure encrypted tunnel
Top 5 defenses
Awareness amp Vigilance
Key takeaways1 Dont get hished by a dumb hacker
2 Make strong passwords or phrases and never share them with anyone ever
3 Always use 2-factor login where available
Finally be vigilant but unafraid
UO Cybersecurity Briefing amp Awareness Training
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncom541-346-1732
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncomlfhowelluoregonedu541-346-1732
UO C ybersecurity B riefing amp Awareness Training
- Slide Number 1
- Slide Number 2
- Meet the adversary
- Common attack methods
- Slide Number 5
- Can you spot the phish
- Phishing-4-faculty withhellip
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-whales withhellip
- Phishing-4-whales withhellipsender impersonation bad link tone
- Gift card scam withhellip
- Gift card scamhellipfake domain context urgency
- Unable to display message phish
- Slide Number 15
- Unable to display message phish
- Slide Number 17
- Slide Number 18
- Slide Number 19
- Slide Number 20
- Key Message on Phishing
- UseSTRONG PASSWORDS
- Password game
- Password Game
- Password Game
- Password Game
- Password Game
- Password Game
- General password tips
- TrojansVirusesBotsZombiesRansomware
- Dangers of malwarehellip
- How do I get infected
- Slide Number 33
- General Malware Tips
- Protect yourSOCIAL BRAND
- Social Media tips
- Protect yourCOMMUNICATION
- Insecure connection
- VPN https
- Top 5 defenses
- Key takeaways
- UO Cybersecurity Briefing amp Awareness Training
- Slide Number 43
-
Phishing-4-whales withhellipsender impersonation bad link tone
From Michael Schill [mailtomarkrossemailolympicorg]
Sent Friday March 02 2018 202 PM
Subject Michael Schill as Shared a file with you using One Drive
Hello
Please find attached the Look Ahead files for Friday March 2nd2018
Open = httpko-ontapcomcatindexhtml
Kindly let me have your opinion
Michael Schill541-346-3936President
Gift card scam withhellip
From bartconoveruoregoncom
Hello You
P lease purchase 6 gift cards valued at $250 each and send me the numbers right away I will tell you a funny story about this when I return to the office but send me those cards NOW
B art
Gift card scamhellipfake domain context urgency
From bartconoveruoregoncom
Hello You
P lease purchase 6 gift cards valued at $250 each and send me the numbers right away I will tell you a funny story about this when I return to the office but send me those cards NOW
B art
Unable to display message phish
Logged out due to inactivity Sign in to continue
www-svhamsgload9icu
Unable to display message phish
www-svhamsgload9icu
27K Users Received the Msg15K Users Read Msg62K Msg Deleted by Security653 Users CompromisedDisabled15K Users Password Changes$80K+ in person-hours for Response
Direct Deposit Prelude
jw13925mybristolacuk
httpsimoladormilorghellip
httpsduckwebuoregonedu
httpswwwvocation100comswelm
httptrafficpillarcomperara
httpmacvalleycottoncomau
httpleojabercombr
jw13925mybristolacukbull ~ 80 users suspected of giving up DuckIDs amp passwords andor 95s amp PACs
bull 14 usersrsquo direct deposit accounts and routing numbers changed to the hackerrsquos
Key Message on Phishing
Dont get P his hed S mis hed Vis hed hellip
B y a
Dumb Hacker
Password game
123456LetmeinFootballIloveyouAdmin
WelcomeMonkeyAbc123
helloStarwars
- Time 2017
G ood Ones B ad Ones
Wr 15 bd 1wy5 Strong (76)
My 3y3s r3 p1nk Strong (70)
This is my story Strong (69)
What is fake news Strong (87)
My secret bucket list item is to sing in public
Very Strong (217)
I hate math but I totally dig chemistry
Very Strong (197)
Password GameORG ood One B ad One
toddbay Toddbay$Username Password
Password GameORG ood One B ad One
marys IloveyouUsername Password
Password GameORG ood One B ad One
samanp TheRt5atemydinnerUsername Password
Password GameORG ood One B ad One
samanp TheRt5atemydinner2Username Password
Password GameORG ood One B ad One
mandyt IwillgobcktoVTUsername Password
General password tipsbull Use password-phrase instead
bull Use 2-Factor Authentication
bull Use 5ub5t1tut10n5
bull Use more than 10 chars
bull Use different passwords for different domains (Yahoo Facebook S nap C hat UOR E G ONE DU)
bull C hange them regularly ndash at least every 6 months
bull Use a password manager (like K eyP ass or LastP ass)
bull Never use login as password
bull Never s tore them under keyboards desk drawers s ticky notes on monitor
bull S tore a clue in your walletpurse
bull Never s tore them on refrigerator
bull Never ever share passwords with anyone
bull Never send them in email
bull Never enter them with a ldquoshoulder surferrdquo present
TrojansViruses
BotsZombies
Ransomware
Dangers of malwarehellipto
YOUto
OTHERS
How do I get infected
social engineering via email instant messaging social media
malicious websites and drive-by downloads P2P file sharing
malvertising man-in-the-middle attacks exploit kits
General Malware Tips
bull Turn on automatic updates on youro P hones
o Home computers
o Tablets
o Work computers (s ee IT)
bull R un up-to-date antimalware toolo McAfee
o MalwareB ytes
o Windows Defender (free)
bull B ack up important files
bull Occas ionally try to restore something from backup
bull R eport suspicious computer activities
bull Never download from untrusted websites
bull B e careful of s ites you browse to
Social Media tips
bull No Internet delete button
bull Dont share secretsbull Trust then connectbull Use different passwords
for different personas
bull S ecure device ndash facial password fingerprint hellip
bull Setup 2 -factor authNbull Turn on privacy settingsbull S etup private accountsbull Limit who sees postsbull Limit who can find you
Insecure connection
Photos by Unknown author is licensed under CC BY-SA
Evil InternetEvil Wifi
intercepthelliphijackhellipmodify
VPN https
Photos by Unknown author is licensed under CC BY-SA
Evil InternetEvil Wifi
secure encrypted tunnel
Top 5 defenses
Awareness amp Vigilance
Key takeaways1 Dont get hished by a dumb hacker
2 Make strong passwords or phrases and never share them with anyone ever
3 Always use 2-factor login where available
Finally be vigilant but unafraid
UO Cybersecurity Briefing amp Awareness Training
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncom541-346-1732
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncomlfhowelluoregonedu541-346-1732
UO C ybersecurity B riefing amp Awareness Training
- Slide Number 1
- Slide Number 2
- Meet the adversary
- Common attack methods
- Slide Number 5
- Can you spot the phish
- Phishing-4-faculty withhellip
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-whales withhellip
- Phishing-4-whales withhellipsender impersonation bad link tone
- Gift card scam withhellip
- Gift card scamhellipfake domain context urgency
- Unable to display message phish
- Slide Number 15
- Unable to display message phish
- Slide Number 17
- Slide Number 18
- Slide Number 19
- Slide Number 20
- Key Message on Phishing
- UseSTRONG PASSWORDS
- Password game
- Password Game
- Password Game
- Password Game
- Password Game
- Password Game
- General password tips
- TrojansVirusesBotsZombiesRansomware
- Dangers of malwarehellip
- How do I get infected
- Slide Number 33
- General Malware Tips
- Protect yourSOCIAL BRAND
- Social Media tips
- Protect yourCOMMUNICATION
- Insecure connection
- VPN https
- Top 5 defenses
- Key takeaways
- UO Cybersecurity Briefing amp Awareness Training
- Slide Number 43
-
Gift card scam withhellip
From bartconoveruoregoncom
Hello You
P lease purchase 6 gift cards valued at $250 each and send me the numbers right away I will tell you a funny story about this when I return to the office but send me those cards NOW
B art
Gift card scamhellipfake domain context urgency
From bartconoveruoregoncom
Hello You
P lease purchase 6 gift cards valued at $250 each and send me the numbers right away I will tell you a funny story about this when I return to the office but send me those cards NOW
B art
Unable to display message phish
Logged out due to inactivity Sign in to continue
www-svhamsgload9icu
Unable to display message phish
www-svhamsgload9icu
27K Users Received the Msg15K Users Read Msg62K Msg Deleted by Security653 Users CompromisedDisabled15K Users Password Changes$80K+ in person-hours for Response
Direct Deposit Prelude
jw13925mybristolacuk
httpsimoladormilorghellip
httpsduckwebuoregonedu
httpswwwvocation100comswelm
httptrafficpillarcomperara
httpmacvalleycottoncomau
httpleojabercombr
jw13925mybristolacukbull ~ 80 users suspected of giving up DuckIDs amp passwords andor 95s amp PACs
bull 14 usersrsquo direct deposit accounts and routing numbers changed to the hackerrsquos
Key Message on Phishing
Dont get P his hed S mis hed Vis hed hellip
B y a
Dumb Hacker
Password game
123456LetmeinFootballIloveyouAdmin
WelcomeMonkeyAbc123
helloStarwars
- Time 2017
G ood Ones B ad Ones
Wr 15 bd 1wy5 Strong (76)
My 3y3s r3 p1nk Strong (70)
This is my story Strong (69)
What is fake news Strong (87)
My secret bucket list item is to sing in public
Very Strong (217)
I hate math but I totally dig chemistry
Very Strong (197)
Password GameORG ood One B ad One
toddbay Toddbay$Username Password
Password GameORG ood One B ad One
marys IloveyouUsername Password
Password GameORG ood One B ad One
samanp TheRt5atemydinnerUsername Password
Password GameORG ood One B ad One
samanp TheRt5atemydinner2Username Password
Password GameORG ood One B ad One
mandyt IwillgobcktoVTUsername Password
General password tipsbull Use password-phrase instead
bull Use 2-Factor Authentication
bull Use 5ub5t1tut10n5
bull Use more than 10 chars
bull Use different passwords for different domains (Yahoo Facebook S nap C hat UOR E G ONE DU)
bull C hange them regularly ndash at least every 6 months
bull Use a password manager (like K eyP ass or LastP ass)
bull Never use login as password
bull Never s tore them under keyboards desk drawers s ticky notes on monitor
bull S tore a clue in your walletpurse
bull Never s tore them on refrigerator
bull Never ever share passwords with anyone
bull Never send them in email
bull Never enter them with a ldquoshoulder surferrdquo present
TrojansViruses
BotsZombies
Ransomware
Dangers of malwarehellipto
YOUto
OTHERS
How do I get infected
social engineering via email instant messaging social media
malicious websites and drive-by downloads P2P file sharing
malvertising man-in-the-middle attacks exploit kits
General Malware Tips
bull Turn on automatic updates on youro P hones
o Home computers
o Tablets
o Work computers (s ee IT)
bull R un up-to-date antimalware toolo McAfee
o MalwareB ytes
o Windows Defender (free)
bull B ack up important files
bull Occas ionally try to restore something from backup
bull R eport suspicious computer activities
bull Never download from untrusted websites
bull B e careful of s ites you browse to
Social Media tips
bull No Internet delete button
bull Dont share secretsbull Trust then connectbull Use different passwords
for different personas
bull S ecure device ndash facial password fingerprint hellip
bull Setup 2 -factor authNbull Turn on privacy settingsbull S etup private accountsbull Limit who sees postsbull Limit who can find you
Insecure connection
Photos by Unknown author is licensed under CC BY-SA
Evil InternetEvil Wifi
intercepthelliphijackhellipmodify
VPN https
Photos by Unknown author is licensed under CC BY-SA
Evil InternetEvil Wifi
secure encrypted tunnel
Top 5 defenses
Awareness amp Vigilance
Key takeaways1 Dont get hished by a dumb hacker
2 Make strong passwords or phrases and never share them with anyone ever
3 Always use 2-factor login where available
Finally be vigilant but unafraid
UO Cybersecurity Briefing amp Awareness Training
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncom541-346-1732
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncomlfhowelluoregonedu541-346-1732
UO C ybersecurity B riefing amp Awareness Training
- Slide Number 1
- Slide Number 2
- Meet the adversary
- Common attack methods
- Slide Number 5
- Can you spot the phish
- Phishing-4-faculty withhellip
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-whales withhellip
- Phishing-4-whales withhellipsender impersonation bad link tone
- Gift card scam withhellip
- Gift card scamhellipfake domain context urgency
- Unable to display message phish
- Slide Number 15
- Unable to display message phish
- Slide Number 17
- Slide Number 18
- Slide Number 19
- Slide Number 20
- Key Message on Phishing
- UseSTRONG PASSWORDS
- Password game
- Password Game
- Password Game
- Password Game
- Password Game
- Password Game
- General password tips
- TrojansVirusesBotsZombiesRansomware
- Dangers of malwarehellip
- How do I get infected
- Slide Number 33
- General Malware Tips
- Protect yourSOCIAL BRAND
- Social Media tips
- Protect yourCOMMUNICATION
- Insecure connection
- VPN https
- Top 5 defenses
- Key takeaways
- UO Cybersecurity Briefing amp Awareness Training
- Slide Number 43
-
Gift card scamhellipfake domain context urgency
From bartconoveruoregoncom
Hello You
P lease purchase 6 gift cards valued at $250 each and send me the numbers right away I will tell you a funny story about this when I return to the office but send me those cards NOW
B art
Unable to display message phish
Logged out due to inactivity Sign in to continue
www-svhamsgload9icu
Unable to display message phish
www-svhamsgload9icu
27K Users Received the Msg15K Users Read Msg62K Msg Deleted by Security653 Users CompromisedDisabled15K Users Password Changes$80K+ in person-hours for Response
Direct Deposit Prelude
jw13925mybristolacuk
httpsimoladormilorghellip
httpsduckwebuoregonedu
httpswwwvocation100comswelm
httptrafficpillarcomperara
httpmacvalleycottoncomau
httpleojabercombr
jw13925mybristolacukbull ~ 80 users suspected of giving up DuckIDs amp passwords andor 95s amp PACs
bull 14 usersrsquo direct deposit accounts and routing numbers changed to the hackerrsquos
Key Message on Phishing
Dont get P his hed S mis hed Vis hed hellip
B y a
Dumb Hacker
Password game
123456LetmeinFootballIloveyouAdmin
WelcomeMonkeyAbc123
helloStarwars
- Time 2017
G ood Ones B ad Ones
Wr 15 bd 1wy5 Strong (76)
My 3y3s r3 p1nk Strong (70)
This is my story Strong (69)
What is fake news Strong (87)
My secret bucket list item is to sing in public
Very Strong (217)
I hate math but I totally dig chemistry
Very Strong (197)
Password GameORG ood One B ad One
toddbay Toddbay$Username Password
Password GameORG ood One B ad One
marys IloveyouUsername Password
Password GameORG ood One B ad One
samanp TheRt5atemydinnerUsername Password
Password GameORG ood One B ad One
samanp TheRt5atemydinner2Username Password
Password GameORG ood One B ad One
mandyt IwillgobcktoVTUsername Password
General password tipsbull Use password-phrase instead
bull Use 2-Factor Authentication
bull Use 5ub5t1tut10n5
bull Use more than 10 chars
bull Use different passwords for different domains (Yahoo Facebook S nap C hat UOR E G ONE DU)
bull C hange them regularly ndash at least every 6 months
bull Use a password manager (like K eyP ass or LastP ass)
bull Never use login as password
bull Never s tore them under keyboards desk drawers s ticky notes on monitor
bull S tore a clue in your walletpurse
bull Never s tore them on refrigerator
bull Never ever share passwords with anyone
bull Never send them in email
bull Never enter them with a ldquoshoulder surferrdquo present
TrojansViruses
BotsZombies
Ransomware
Dangers of malwarehellipto
YOUto
OTHERS
How do I get infected
social engineering via email instant messaging social media
malicious websites and drive-by downloads P2P file sharing
malvertising man-in-the-middle attacks exploit kits
General Malware Tips
bull Turn on automatic updates on youro P hones
o Home computers
o Tablets
o Work computers (s ee IT)
bull R un up-to-date antimalware toolo McAfee
o MalwareB ytes
o Windows Defender (free)
bull B ack up important files
bull Occas ionally try to restore something from backup
bull R eport suspicious computer activities
bull Never download from untrusted websites
bull B e careful of s ites you browse to
Social Media tips
bull No Internet delete button
bull Dont share secretsbull Trust then connectbull Use different passwords
for different personas
bull S ecure device ndash facial password fingerprint hellip
bull Setup 2 -factor authNbull Turn on privacy settingsbull S etup private accountsbull Limit who sees postsbull Limit who can find you
Insecure connection
Photos by Unknown author is licensed under CC BY-SA
Evil InternetEvil Wifi
intercepthelliphijackhellipmodify
VPN https
Photos by Unknown author is licensed under CC BY-SA
Evil InternetEvil Wifi
secure encrypted tunnel
Top 5 defenses
Awareness amp Vigilance
Key takeaways1 Dont get hished by a dumb hacker
2 Make strong passwords or phrases and never share them with anyone ever
3 Always use 2-factor login where available
Finally be vigilant but unafraid
UO Cybersecurity Briefing amp Awareness Training
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncom541-346-1732
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncomlfhowelluoregonedu541-346-1732
UO C ybersecurity B riefing amp Awareness Training
- Slide Number 1
- Slide Number 2
- Meet the adversary
- Common attack methods
- Slide Number 5
- Can you spot the phish
- Phishing-4-faculty withhellip
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-whales withhellip
- Phishing-4-whales withhellipsender impersonation bad link tone
- Gift card scam withhellip
- Gift card scamhellipfake domain context urgency
- Unable to display message phish
- Slide Number 15
- Unable to display message phish
- Slide Number 17
- Slide Number 18
- Slide Number 19
- Slide Number 20
- Key Message on Phishing
- UseSTRONG PASSWORDS
- Password game
- Password Game
- Password Game
- Password Game
- Password Game
- Password Game
- General password tips
- TrojansVirusesBotsZombiesRansomware
- Dangers of malwarehellip
- How do I get infected
- Slide Number 33
- General Malware Tips
- Protect yourSOCIAL BRAND
- Social Media tips
- Protect yourCOMMUNICATION
- Insecure connection
- VPN https
- Top 5 defenses
- Key takeaways
- UO Cybersecurity Briefing amp Awareness Training
- Slide Number 43
-
Unable to display message phish
Logged out due to inactivity Sign in to continue
www-svhamsgload9icu
Unable to display message phish
www-svhamsgload9icu
27K Users Received the Msg15K Users Read Msg62K Msg Deleted by Security653 Users CompromisedDisabled15K Users Password Changes$80K+ in person-hours for Response
Direct Deposit Prelude
jw13925mybristolacuk
httpsimoladormilorghellip
httpsduckwebuoregonedu
httpswwwvocation100comswelm
httptrafficpillarcomperara
httpmacvalleycottoncomau
httpleojabercombr
jw13925mybristolacukbull ~ 80 users suspected of giving up DuckIDs amp passwords andor 95s amp PACs
bull 14 usersrsquo direct deposit accounts and routing numbers changed to the hackerrsquos
Key Message on Phishing
Dont get P his hed S mis hed Vis hed hellip
B y a
Dumb Hacker
Password game
123456LetmeinFootballIloveyouAdmin
WelcomeMonkeyAbc123
helloStarwars
- Time 2017
G ood Ones B ad Ones
Wr 15 bd 1wy5 Strong (76)
My 3y3s r3 p1nk Strong (70)
This is my story Strong (69)
What is fake news Strong (87)
My secret bucket list item is to sing in public
Very Strong (217)
I hate math but I totally dig chemistry
Very Strong (197)
Password GameORG ood One B ad One
toddbay Toddbay$Username Password
Password GameORG ood One B ad One
marys IloveyouUsername Password
Password GameORG ood One B ad One
samanp TheRt5atemydinnerUsername Password
Password GameORG ood One B ad One
samanp TheRt5atemydinner2Username Password
Password GameORG ood One B ad One
mandyt IwillgobcktoVTUsername Password
General password tipsbull Use password-phrase instead
bull Use 2-Factor Authentication
bull Use 5ub5t1tut10n5
bull Use more than 10 chars
bull Use different passwords for different domains (Yahoo Facebook S nap C hat UOR E G ONE DU)
bull C hange them regularly ndash at least every 6 months
bull Use a password manager (like K eyP ass or LastP ass)
bull Never use login as password
bull Never s tore them under keyboards desk drawers s ticky notes on monitor
bull S tore a clue in your walletpurse
bull Never s tore them on refrigerator
bull Never ever share passwords with anyone
bull Never send them in email
bull Never enter them with a ldquoshoulder surferrdquo present
TrojansViruses
BotsZombies
Ransomware
Dangers of malwarehellipto
YOUto
OTHERS
How do I get infected
social engineering via email instant messaging social media
malicious websites and drive-by downloads P2P file sharing
malvertising man-in-the-middle attacks exploit kits
General Malware Tips
bull Turn on automatic updates on youro P hones
o Home computers
o Tablets
o Work computers (s ee IT)
bull R un up-to-date antimalware toolo McAfee
o MalwareB ytes
o Windows Defender (free)
bull B ack up important files
bull Occas ionally try to restore something from backup
bull R eport suspicious computer activities
bull Never download from untrusted websites
bull B e careful of s ites you browse to
Social Media tips
bull No Internet delete button
bull Dont share secretsbull Trust then connectbull Use different passwords
for different personas
bull S ecure device ndash facial password fingerprint hellip
bull Setup 2 -factor authNbull Turn on privacy settingsbull S etup private accountsbull Limit who sees postsbull Limit who can find you
Insecure connection
Photos by Unknown author is licensed under CC BY-SA
Evil InternetEvil Wifi
intercepthelliphijackhellipmodify
VPN https
Photos by Unknown author is licensed under CC BY-SA
Evil InternetEvil Wifi
secure encrypted tunnel
Top 5 defenses
Awareness amp Vigilance
Key takeaways1 Dont get hished by a dumb hacker
2 Make strong passwords or phrases and never share them with anyone ever
3 Always use 2-factor login where available
Finally be vigilant but unafraid
UO Cybersecurity Briefing amp Awareness Training
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncom541-346-1732
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncomlfhowelluoregonedu541-346-1732
UO C ybersecurity B riefing amp Awareness Training
- Slide Number 1
- Slide Number 2
- Meet the adversary
- Common attack methods
- Slide Number 5
- Can you spot the phish
- Phishing-4-faculty withhellip
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-whales withhellip
- Phishing-4-whales withhellipsender impersonation bad link tone
- Gift card scam withhellip
- Gift card scamhellipfake domain context urgency
- Unable to display message phish
- Slide Number 15
- Unable to display message phish
- Slide Number 17
- Slide Number 18
- Slide Number 19
- Slide Number 20
- Key Message on Phishing
- UseSTRONG PASSWORDS
- Password game
- Password Game
- Password Game
- Password Game
- Password Game
- Password Game
- General password tips
- TrojansVirusesBotsZombiesRansomware
- Dangers of malwarehellip
- How do I get infected
- Slide Number 33
- General Malware Tips
- Protect yourSOCIAL BRAND
- Social Media tips
- Protect yourCOMMUNICATION
- Insecure connection
- VPN https
- Top 5 defenses
- Key takeaways
- UO Cybersecurity Briefing amp Awareness Training
- Slide Number 43
-
Logged out due to inactivity Sign in to continue
www-svhamsgload9icu
Unable to display message phish
www-svhamsgload9icu
27K Users Received the Msg15K Users Read Msg62K Msg Deleted by Security653 Users CompromisedDisabled15K Users Password Changes$80K+ in person-hours for Response
Direct Deposit Prelude
jw13925mybristolacuk
httpsimoladormilorghellip
httpsduckwebuoregonedu
httpswwwvocation100comswelm
httptrafficpillarcomperara
httpmacvalleycottoncomau
httpleojabercombr
jw13925mybristolacukbull ~ 80 users suspected of giving up DuckIDs amp passwords andor 95s amp PACs
bull 14 usersrsquo direct deposit accounts and routing numbers changed to the hackerrsquos
Key Message on Phishing
Dont get P his hed S mis hed Vis hed hellip
B y a
Dumb Hacker
Password game
123456LetmeinFootballIloveyouAdmin
WelcomeMonkeyAbc123
helloStarwars
- Time 2017
G ood Ones B ad Ones
Wr 15 bd 1wy5 Strong (76)
My 3y3s r3 p1nk Strong (70)
This is my story Strong (69)
What is fake news Strong (87)
My secret bucket list item is to sing in public
Very Strong (217)
I hate math but I totally dig chemistry
Very Strong (197)
Password GameORG ood One B ad One
toddbay Toddbay$Username Password
Password GameORG ood One B ad One
marys IloveyouUsername Password
Password GameORG ood One B ad One
samanp TheRt5atemydinnerUsername Password
Password GameORG ood One B ad One
samanp TheRt5atemydinner2Username Password
Password GameORG ood One B ad One
mandyt IwillgobcktoVTUsername Password
General password tipsbull Use password-phrase instead
bull Use 2-Factor Authentication
bull Use 5ub5t1tut10n5
bull Use more than 10 chars
bull Use different passwords for different domains (Yahoo Facebook S nap C hat UOR E G ONE DU)
bull C hange them regularly ndash at least every 6 months
bull Use a password manager (like K eyP ass or LastP ass)
bull Never use login as password
bull Never s tore them under keyboards desk drawers s ticky notes on monitor
bull S tore a clue in your walletpurse
bull Never s tore them on refrigerator
bull Never ever share passwords with anyone
bull Never send them in email
bull Never enter them with a ldquoshoulder surferrdquo present
TrojansViruses
BotsZombies
Ransomware
Dangers of malwarehellipto
YOUto
OTHERS
How do I get infected
social engineering via email instant messaging social media
malicious websites and drive-by downloads P2P file sharing
malvertising man-in-the-middle attacks exploit kits
General Malware Tips
bull Turn on automatic updates on youro P hones
o Home computers
o Tablets
o Work computers (s ee IT)
bull R un up-to-date antimalware toolo McAfee
o MalwareB ytes
o Windows Defender (free)
bull B ack up important files
bull Occas ionally try to restore something from backup
bull R eport suspicious computer activities
bull Never download from untrusted websites
bull B e careful of s ites you browse to
Social Media tips
bull No Internet delete button
bull Dont share secretsbull Trust then connectbull Use different passwords
for different personas
bull S ecure device ndash facial password fingerprint hellip
bull Setup 2 -factor authNbull Turn on privacy settingsbull S etup private accountsbull Limit who sees postsbull Limit who can find you
Insecure connection
Photos by Unknown author is licensed under CC BY-SA
Evil InternetEvil Wifi
intercepthelliphijackhellipmodify
VPN https
Photos by Unknown author is licensed under CC BY-SA
Evil InternetEvil Wifi
secure encrypted tunnel
Top 5 defenses
Awareness amp Vigilance
Key takeaways1 Dont get hished by a dumb hacker
2 Make strong passwords or phrases and never share them with anyone ever
3 Always use 2-factor login where available
Finally be vigilant but unafraid
UO Cybersecurity Briefing amp Awareness Training
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncom541-346-1732
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncomlfhowelluoregonedu541-346-1732
UO C ybersecurity B riefing amp Awareness Training
- Slide Number 1
- Slide Number 2
- Meet the adversary
- Common attack methods
- Slide Number 5
- Can you spot the phish
- Phishing-4-faculty withhellip
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-whales withhellip
- Phishing-4-whales withhellipsender impersonation bad link tone
- Gift card scam withhellip
- Gift card scamhellipfake domain context urgency
- Unable to display message phish
- Slide Number 15
- Unable to display message phish
- Slide Number 17
- Slide Number 18
- Slide Number 19
- Slide Number 20
- Key Message on Phishing
- UseSTRONG PASSWORDS
- Password game
- Password Game
- Password Game
- Password Game
- Password Game
- Password Game
- General password tips
- TrojansVirusesBotsZombiesRansomware
- Dangers of malwarehellip
- How do I get infected
- Slide Number 33
- General Malware Tips
- Protect yourSOCIAL BRAND
- Social Media tips
- Protect yourCOMMUNICATION
- Insecure connection
- VPN https
- Top 5 defenses
- Key takeaways
- UO Cybersecurity Briefing amp Awareness Training
- Slide Number 43
-
Unable to display message phish
www-svhamsgload9icu
27K Users Received the Msg15K Users Read Msg62K Msg Deleted by Security653 Users CompromisedDisabled15K Users Password Changes$80K+ in person-hours for Response
Direct Deposit Prelude
jw13925mybristolacuk
httpsimoladormilorghellip
httpsduckwebuoregonedu
httpswwwvocation100comswelm
httptrafficpillarcomperara
httpmacvalleycottoncomau
httpleojabercombr
jw13925mybristolacukbull ~ 80 users suspected of giving up DuckIDs amp passwords andor 95s amp PACs
bull 14 usersrsquo direct deposit accounts and routing numbers changed to the hackerrsquos
Key Message on Phishing
Dont get P his hed S mis hed Vis hed hellip
B y a
Dumb Hacker
Password game
123456LetmeinFootballIloveyouAdmin
WelcomeMonkeyAbc123
helloStarwars
- Time 2017
G ood Ones B ad Ones
Wr 15 bd 1wy5 Strong (76)
My 3y3s r3 p1nk Strong (70)
This is my story Strong (69)
What is fake news Strong (87)
My secret bucket list item is to sing in public
Very Strong (217)
I hate math but I totally dig chemistry
Very Strong (197)
Password GameORG ood One B ad One
toddbay Toddbay$Username Password
Password GameORG ood One B ad One
marys IloveyouUsername Password
Password GameORG ood One B ad One
samanp TheRt5atemydinnerUsername Password
Password GameORG ood One B ad One
samanp TheRt5atemydinner2Username Password
Password GameORG ood One B ad One
mandyt IwillgobcktoVTUsername Password
General password tipsbull Use password-phrase instead
bull Use 2-Factor Authentication
bull Use 5ub5t1tut10n5
bull Use more than 10 chars
bull Use different passwords for different domains (Yahoo Facebook S nap C hat UOR E G ONE DU)
bull C hange them regularly ndash at least every 6 months
bull Use a password manager (like K eyP ass or LastP ass)
bull Never use login as password
bull Never s tore them under keyboards desk drawers s ticky notes on monitor
bull S tore a clue in your walletpurse
bull Never s tore them on refrigerator
bull Never ever share passwords with anyone
bull Never send them in email
bull Never enter them with a ldquoshoulder surferrdquo present
TrojansViruses
BotsZombies
Ransomware
Dangers of malwarehellipto
YOUto
OTHERS
How do I get infected
social engineering via email instant messaging social media
malicious websites and drive-by downloads P2P file sharing
malvertising man-in-the-middle attacks exploit kits
General Malware Tips
bull Turn on automatic updates on youro P hones
o Home computers
o Tablets
o Work computers (s ee IT)
bull R un up-to-date antimalware toolo McAfee
o MalwareB ytes
o Windows Defender (free)
bull B ack up important files
bull Occas ionally try to restore something from backup
bull R eport suspicious computer activities
bull Never download from untrusted websites
bull B e careful of s ites you browse to
Social Media tips
bull No Internet delete button
bull Dont share secretsbull Trust then connectbull Use different passwords
for different personas
bull S ecure device ndash facial password fingerprint hellip
bull Setup 2 -factor authNbull Turn on privacy settingsbull S etup private accountsbull Limit who sees postsbull Limit who can find you
Insecure connection
Photos by Unknown author is licensed under CC BY-SA
Evil InternetEvil Wifi
intercepthelliphijackhellipmodify
VPN https
Photos by Unknown author is licensed under CC BY-SA
Evil InternetEvil Wifi
secure encrypted tunnel
Top 5 defenses
Awareness amp Vigilance
Key takeaways1 Dont get hished by a dumb hacker
2 Make strong passwords or phrases and never share them with anyone ever
3 Always use 2-factor login where available
Finally be vigilant but unafraid
UO Cybersecurity Briefing amp Awareness Training
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncom541-346-1732
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncomlfhowelluoregonedu541-346-1732
UO C ybersecurity B riefing amp Awareness Training
- Slide Number 1
- Slide Number 2
- Meet the adversary
- Common attack methods
- Slide Number 5
- Can you spot the phish
- Phishing-4-faculty withhellip
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-whales withhellip
- Phishing-4-whales withhellipsender impersonation bad link tone
- Gift card scam withhellip
- Gift card scamhellipfake domain context urgency
- Unable to display message phish
- Slide Number 15
- Unable to display message phish
- Slide Number 17
- Slide Number 18
- Slide Number 19
- Slide Number 20
- Key Message on Phishing
- UseSTRONG PASSWORDS
- Password game
- Password Game
- Password Game
- Password Game
- Password Game
- Password Game
- General password tips
- TrojansVirusesBotsZombiesRansomware
- Dangers of malwarehellip
- How do I get infected
- Slide Number 33
- General Malware Tips
- Protect yourSOCIAL BRAND
- Social Media tips
- Protect yourCOMMUNICATION
- Insecure connection
- VPN https
- Top 5 defenses
- Key takeaways
- UO Cybersecurity Briefing amp Awareness Training
- Slide Number 43
-
Direct Deposit Prelude
jw13925mybristolacuk
httpsimoladormilorghellip
httpsduckwebuoregonedu
httpswwwvocation100comswelm
httptrafficpillarcomperara
httpmacvalleycottoncomau
httpleojabercombr
jw13925mybristolacukbull ~ 80 users suspected of giving up DuckIDs amp passwords andor 95s amp PACs
bull 14 usersrsquo direct deposit accounts and routing numbers changed to the hackerrsquos
Key Message on Phishing
Dont get P his hed S mis hed Vis hed hellip
B y a
Dumb Hacker
Password game
123456LetmeinFootballIloveyouAdmin
WelcomeMonkeyAbc123
helloStarwars
- Time 2017
G ood Ones B ad Ones
Wr 15 bd 1wy5 Strong (76)
My 3y3s r3 p1nk Strong (70)
This is my story Strong (69)
What is fake news Strong (87)
My secret bucket list item is to sing in public
Very Strong (217)
I hate math but I totally dig chemistry
Very Strong (197)
Password GameORG ood One B ad One
toddbay Toddbay$Username Password
Password GameORG ood One B ad One
marys IloveyouUsername Password
Password GameORG ood One B ad One
samanp TheRt5atemydinnerUsername Password
Password GameORG ood One B ad One
samanp TheRt5atemydinner2Username Password
Password GameORG ood One B ad One
mandyt IwillgobcktoVTUsername Password
General password tipsbull Use password-phrase instead
bull Use 2-Factor Authentication
bull Use 5ub5t1tut10n5
bull Use more than 10 chars
bull Use different passwords for different domains (Yahoo Facebook S nap C hat UOR E G ONE DU)
bull C hange them regularly ndash at least every 6 months
bull Use a password manager (like K eyP ass or LastP ass)
bull Never use login as password
bull Never s tore them under keyboards desk drawers s ticky notes on monitor
bull S tore a clue in your walletpurse
bull Never s tore them on refrigerator
bull Never ever share passwords with anyone
bull Never send them in email
bull Never enter them with a ldquoshoulder surferrdquo present
TrojansViruses
BotsZombies
Ransomware
Dangers of malwarehellipto
YOUto
OTHERS
How do I get infected
social engineering via email instant messaging social media
malicious websites and drive-by downloads P2P file sharing
malvertising man-in-the-middle attacks exploit kits
General Malware Tips
bull Turn on automatic updates on youro P hones
o Home computers
o Tablets
o Work computers (s ee IT)
bull R un up-to-date antimalware toolo McAfee
o MalwareB ytes
o Windows Defender (free)
bull B ack up important files
bull Occas ionally try to restore something from backup
bull R eport suspicious computer activities
bull Never download from untrusted websites
bull B e careful of s ites you browse to
Social Media tips
bull No Internet delete button
bull Dont share secretsbull Trust then connectbull Use different passwords
for different personas
bull S ecure device ndash facial password fingerprint hellip
bull Setup 2 -factor authNbull Turn on privacy settingsbull S etup private accountsbull Limit who sees postsbull Limit who can find you
Insecure connection
Photos by Unknown author is licensed under CC BY-SA
Evil InternetEvil Wifi
intercepthelliphijackhellipmodify
VPN https
Photos by Unknown author is licensed under CC BY-SA
Evil InternetEvil Wifi
secure encrypted tunnel
Top 5 defenses
Awareness amp Vigilance
Key takeaways1 Dont get hished by a dumb hacker
2 Make strong passwords or phrases and never share them with anyone ever
3 Always use 2-factor login where available
Finally be vigilant but unafraid
UO Cybersecurity Briefing amp Awareness Training
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncom541-346-1732
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncomlfhowelluoregonedu541-346-1732
UO C ybersecurity B riefing amp Awareness Training
- Slide Number 1
- Slide Number 2
- Meet the adversary
- Common attack methods
- Slide Number 5
- Can you spot the phish
- Phishing-4-faculty withhellip
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-whales withhellip
- Phishing-4-whales withhellipsender impersonation bad link tone
- Gift card scam withhellip
- Gift card scamhellipfake domain context urgency
- Unable to display message phish
- Slide Number 15
- Unable to display message phish
- Slide Number 17
- Slide Number 18
- Slide Number 19
- Slide Number 20
- Key Message on Phishing
- UseSTRONG PASSWORDS
- Password game
- Password Game
- Password Game
- Password Game
- Password Game
- Password Game
- General password tips
- TrojansVirusesBotsZombiesRansomware
- Dangers of malwarehellip
- How do I get infected
- Slide Number 33
- General Malware Tips
- Protect yourSOCIAL BRAND
- Social Media tips
- Protect yourCOMMUNICATION
- Insecure connection
- VPN https
- Top 5 defenses
- Key takeaways
- UO Cybersecurity Briefing amp Awareness Training
- Slide Number 43
-
jw13925mybristolacuk
httpsimoladormilorghellip
httpsduckwebuoregonedu
httpswwwvocation100comswelm
httptrafficpillarcomperara
httpmacvalleycottoncomau
httpleojabercombr
jw13925mybristolacukbull ~ 80 users suspected of giving up DuckIDs amp passwords andor 95s amp PACs
bull 14 usersrsquo direct deposit accounts and routing numbers changed to the hackerrsquos
Key Message on Phishing
Dont get P his hed S mis hed Vis hed hellip
B y a
Dumb Hacker
Password game
123456LetmeinFootballIloveyouAdmin
WelcomeMonkeyAbc123
helloStarwars
- Time 2017
G ood Ones B ad Ones
Wr 15 bd 1wy5 Strong (76)
My 3y3s r3 p1nk Strong (70)
This is my story Strong (69)
What is fake news Strong (87)
My secret bucket list item is to sing in public
Very Strong (217)
I hate math but I totally dig chemistry
Very Strong (197)
Password GameORG ood One B ad One
toddbay Toddbay$Username Password
Password GameORG ood One B ad One
marys IloveyouUsername Password
Password GameORG ood One B ad One
samanp TheRt5atemydinnerUsername Password
Password GameORG ood One B ad One
samanp TheRt5atemydinner2Username Password
Password GameORG ood One B ad One
mandyt IwillgobcktoVTUsername Password
General password tipsbull Use password-phrase instead
bull Use 2-Factor Authentication
bull Use 5ub5t1tut10n5
bull Use more than 10 chars
bull Use different passwords for different domains (Yahoo Facebook S nap C hat UOR E G ONE DU)
bull C hange them regularly ndash at least every 6 months
bull Use a password manager (like K eyP ass or LastP ass)
bull Never use login as password
bull Never s tore them under keyboards desk drawers s ticky notes on monitor
bull S tore a clue in your walletpurse
bull Never s tore them on refrigerator
bull Never ever share passwords with anyone
bull Never send them in email
bull Never enter them with a ldquoshoulder surferrdquo present
TrojansViruses
BotsZombies
Ransomware
Dangers of malwarehellipto
YOUto
OTHERS
How do I get infected
social engineering via email instant messaging social media
malicious websites and drive-by downloads P2P file sharing
malvertising man-in-the-middle attacks exploit kits
General Malware Tips
bull Turn on automatic updates on youro P hones
o Home computers
o Tablets
o Work computers (s ee IT)
bull R un up-to-date antimalware toolo McAfee
o MalwareB ytes
o Windows Defender (free)
bull B ack up important files
bull Occas ionally try to restore something from backup
bull R eport suspicious computer activities
bull Never download from untrusted websites
bull B e careful of s ites you browse to
Social Media tips
bull No Internet delete button
bull Dont share secretsbull Trust then connectbull Use different passwords
for different personas
bull S ecure device ndash facial password fingerprint hellip
bull Setup 2 -factor authNbull Turn on privacy settingsbull S etup private accountsbull Limit who sees postsbull Limit who can find you
Insecure connection
Photos by Unknown author is licensed under CC BY-SA
Evil InternetEvil Wifi
intercepthelliphijackhellipmodify
VPN https
Photos by Unknown author is licensed under CC BY-SA
Evil InternetEvil Wifi
secure encrypted tunnel
Top 5 defenses
Awareness amp Vigilance
Key takeaways1 Dont get hished by a dumb hacker
2 Make strong passwords or phrases and never share them with anyone ever
3 Always use 2-factor login where available
Finally be vigilant but unafraid
UO Cybersecurity Briefing amp Awareness Training
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncom541-346-1732
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncomlfhowelluoregonedu541-346-1732
UO C ybersecurity B riefing amp Awareness Training
- Slide Number 1
- Slide Number 2
- Meet the adversary
- Common attack methods
- Slide Number 5
- Can you spot the phish
- Phishing-4-faculty withhellip
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-whales withhellip
- Phishing-4-whales withhellipsender impersonation bad link tone
- Gift card scam withhellip
- Gift card scamhellipfake domain context urgency
- Unable to display message phish
- Slide Number 15
- Unable to display message phish
- Slide Number 17
- Slide Number 18
- Slide Number 19
- Slide Number 20
- Key Message on Phishing
- UseSTRONG PASSWORDS
- Password game
- Password Game
- Password Game
- Password Game
- Password Game
- Password Game
- General password tips
- TrojansVirusesBotsZombiesRansomware
- Dangers of malwarehellip
- How do I get infected
- Slide Number 33
- General Malware Tips
- Protect yourSOCIAL BRAND
- Social Media tips
- Protect yourCOMMUNICATION
- Insecure connection
- VPN https
- Top 5 defenses
- Key takeaways
- UO Cybersecurity Briefing amp Awareness Training
- Slide Number 43
-
httpsimoladormilorghellip
httpsduckwebuoregonedu
httpswwwvocation100comswelm
httptrafficpillarcomperara
httpmacvalleycottoncomau
httpleojabercombr
jw13925mybristolacukbull ~ 80 users suspected of giving up DuckIDs amp passwords andor 95s amp PACs
bull 14 usersrsquo direct deposit accounts and routing numbers changed to the hackerrsquos
Key Message on Phishing
Dont get P his hed S mis hed Vis hed hellip
B y a
Dumb Hacker
Password game
123456LetmeinFootballIloveyouAdmin
WelcomeMonkeyAbc123
helloStarwars
- Time 2017
G ood Ones B ad Ones
Wr 15 bd 1wy5 Strong (76)
My 3y3s r3 p1nk Strong (70)
This is my story Strong (69)
What is fake news Strong (87)
My secret bucket list item is to sing in public
Very Strong (217)
I hate math but I totally dig chemistry
Very Strong (197)
Password GameORG ood One B ad One
toddbay Toddbay$Username Password
Password GameORG ood One B ad One
marys IloveyouUsername Password
Password GameORG ood One B ad One
samanp TheRt5atemydinnerUsername Password
Password GameORG ood One B ad One
samanp TheRt5atemydinner2Username Password
Password GameORG ood One B ad One
mandyt IwillgobcktoVTUsername Password
General password tipsbull Use password-phrase instead
bull Use 2-Factor Authentication
bull Use 5ub5t1tut10n5
bull Use more than 10 chars
bull Use different passwords for different domains (Yahoo Facebook S nap C hat UOR E G ONE DU)
bull C hange them regularly ndash at least every 6 months
bull Use a password manager (like K eyP ass or LastP ass)
bull Never use login as password
bull Never s tore them under keyboards desk drawers s ticky notes on monitor
bull S tore a clue in your walletpurse
bull Never s tore them on refrigerator
bull Never ever share passwords with anyone
bull Never send them in email
bull Never enter them with a ldquoshoulder surferrdquo present
TrojansViruses
BotsZombies
Ransomware
Dangers of malwarehellipto
YOUto
OTHERS
How do I get infected
social engineering via email instant messaging social media
malicious websites and drive-by downloads P2P file sharing
malvertising man-in-the-middle attacks exploit kits
General Malware Tips
bull Turn on automatic updates on youro P hones
o Home computers
o Tablets
o Work computers (s ee IT)
bull R un up-to-date antimalware toolo McAfee
o MalwareB ytes
o Windows Defender (free)
bull B ack up important files
bull Occas ionally try to restore something from backup
bull R eport suspicious computer activities
bull Never download from untrusted websites
bull B e careful of s ites you browse to
Social Media tips
bull No Internet delete button
bull Dont share secretsbull Trust then connectbull Use different passwords
for different personas
bull S ecure device ndash facial password fingerprint hellip
bull Setup 2 -factor authNbull Turn on privacy settingsbull S etup private accountsbull Limit who sees postsbull Limit who can find you
Insecure connection
Photos by Unknown author is licensed under CC BY-SA
Evil InternetEvil Wifi
intercepthelliphijackhellipmodify
VPN https
Photos by Unknown author is licensed under CC BY-SA
Evil InternetEvil Wifi
secure encrypted tunnel
Top 5 defenses
Awareness amp Vigilance
Key takeaways1 Dont get hished by a dumb hacker
2 Make strong passwords or phrases and never share them with anyone ever
3 Always use 2-factor login where available
Finally be vigilant but unafraid
UO Cybersecurity Briefing amp Awareness Training
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncom541-346-1732
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncomlfhowelluoregonedu541-346-1732
UO C ybersecurity B riefing amp Awareness Training
- Slide Number 1
- Slide Number 2
- Meet the adversary
- Common attack methods
- Slide Number 5
- Can you spot the phish
- Phishing-4-faculty withhellip
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-whales withhellip
- Phishing-4-whales withhellipsender impersonation bad link tone
- Gift card scam withhellip
- Gift card scamhellipfake domain context urgency
- Unable to display message phish
- Slide Number 15
- Unable to display message phish
- Slide Number 17
- Slide Number 18
- Slide Number 19
- Slide Number 20
- Key Message on Phishing
- UseSTRONG PASSWORDS
- Password game
- Password Game
- Password Game
- Password Game
- Password Game
- Password Game
- General password tips
- TrojansVirusesBotsZombiesRansomware
- Dangers of malwarehellip
- How do I get infected
- Slide Number 33
- General Malware Tips
- Protect yourSOCIAL BRAND
- Social Media tips
- Protect yourCOMMUNICATION
- Insecure connection
- VPN https
- Top 5 defenses
- Key takeaways
- UO Cybersecurity Briefing amp Awareness Training
- Slide Number 43
-
httpswwwvocation100comswelm
httptrafficpillarcomperara
httpmacvalleycottoncomau
httpleojabercombr
jw13925mybristolacukbull ~ 80 users suspected of giving up DuckIDs amp passwords andor 95s amp PACs
bull 14 usersrsquo direct deposit accounts and routing numbers changed to the hackerrsquos
Key Message on Phishing
Dont get P his hed S mis hed Vis hed hellip
B y a
Dumb Hacker
Password game
123456LetmeinFootballIloveyouAdmin
WelcomeMonkeyAbc123
helloStarwars
- Time 2017
G ood Ones B ad Ones
Wr 15 bd 1wy5 Strong (76)
My 3y3s r3 p1nk Strong (70)
This is my story Strong (69)
What is fake news Strong (87)
My secret bucket list item is to sing in public
Very Strong (217)
I hate math but I totally dig chemistry
Very Strong (197)
Password GameORG ood One B ad One
toddbay Toddbay$Username Password
Password GameORG ood One B ad One
marys IloveyouUsername Password
Password GameORG ood One B ad One
samanp TheRt5atemydinnerUsername Password
Password GameORG ood One B ad One
samanp TheRt5atemydinner2Username Password
Password GameORG ood One B ad One
mandyt IwillgobcktoVTUsername Password
General password tipsbull Use password-phrase instead
bull Use 2-Factor Authentication
bull Use 5ub5t1tut10n5
bull Use more than 10 chars
bull Use different passwords for different domains (Yahoo Facebook S nap C hat UOR E G ONE DU)
bull C hange them regularly ndash at least every 6 months
bull Use a password manager (like K eyP ass or LastP ass)
bull Never use login as password
bull Never s tore them under keyboards desk drawers s ticky notes on monitor
bull S tore a clue in your walletpurse
bull Never s tore them on refrigerator
bull Never ever share passwords with anyone
bull Never send them in email
bull Never enter them with a ldquoshoulder surferrdquo present
TrojansViruses
BotsZombies
Ransomware
Dangers of malwarehellipto
YOUto
OTHERS
How do I get infected
social engineering via email instant messaging social media
malicious websites and drive-by downloads P2P file sharing
malvertising man-in-the-middle attacks exploit kits
General Malware Tips
bull Turn on automatic updates on youro P hones
o Home computers
o Tablets
o Work computers (s ee IT)
bull R un up-to-date antimalware toolo McAfee
o MalwareB ytes
o Windows Defender (free)
bull B ack up important files
bull Occas ionally try to restore something from backup
bull R eport suspicious computer activities
bull Never download from untrusted websites
bull B e careful of s ites you browse to
Social Media tips
bull No Internet delete button
bull Dont share secretsbull Trust then connectbull Use different passwords
for different personas
bull S ecure device ndash facial password fingerprint hellip
bull Setup 2 -factor authNbull Turn on privacy settingsbull S etup private accountsbull Limit who sees postsbull Limit who can find you
Insecure connection
Photos by Unknown author is licensed under CC BY-SA
Evil InternetEvil Wifi
intercepthelliphijackhellipmodify
VPN https
Photos by Unknown author is licensed under CC BY-SA
Evil InternetEvil Wifi
secure encrypted tunnel
Top 5 defenses
Awareness amp Vigilance
Key takeaways1 Dont get hished by a dumb hacker
2 Make strong passwords or phrases and never share them with anyone ever
3 Always use 2-factor login where available
Finally be vigilant but unafraid
UO Cybersecurity Briefing amp Awareness Training
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncom541-346-1732
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncomlfhowelluoregonedu541-346-1732
UO C ybersecurity B riefing amp Awareness Training
- Slide Number 1
- Slide Number 2
- Meet the adversary
- Common attack methods
- Slide Number 5
- Can you spot the phish
- Phishing-4-faculty withhellip
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-whales withhellip
- Phishing-4-whales withhellipsender impersonation bad link tone
- Gift card scam withhellip
- Gift card scamhellipfake domain context urgency
- Unable to display message phish
- Slide Number 15
- Unable to display message phish
- Slide Number 17
- Slide Number 18
- Slide Number 19
- Slide Number 20
- Key Message on Phishing
- UseSTRONG PASSWORDS
- Password game
- Password Game
- Password Game
- Password Game
- Password Game
- Password Game
- General password tips
- TrojansVirusesBotsZombiesRansomware
- Dangers of malwarehellip
- How do I get infected
- Slide Number 33
- General Malware Tips
- Protect yourSOCIAL BRAND
- Social Media tips
- Protect yourCOMMUNICATION
- Insecure connection
- VPN https
- Top 5 defenses
- Key takeaways
- UO Cybersecurity Briefing amp Awareness Training
- Slide Number 43
-
Key Message on Phishing
Dont get P his hed S mis hed Vis hed hellip
B y a
Dumb Hacker
Password game
123456LetmeinFootballIloveyouAdmin
WelcomeMonkeyAbc123
helloStarwars
- Time 2017
G ood Ones B ad Ones
Wr 15 bd 1wy5 Strong (76)
My 3y3s r3 p1nk Strong (70)
This is my story Strong (69)
What is fake news Strong (87)
My secret bucket list item is to sing in public
Very Strong (217)
I hate math but I totally dig chemistry
Very Strong (197)
Password GameORG ood One B ad One
toddbay Toddbay$Username Password
Password GameORG ood One B ad One
marys IloveyouUsername Password
Password GameORG ood One B ad One
samanp TheRt5atemydinnerUsername Password
Password GameORG ood One B ad One
samanp TheRt5atemydinner2Username Password
Password GameORG ood One B ad One
mandyt IwillgobcktoVTUsername Password
General password tipsbull Use password-phrase instead
bull Use 2-Factor Authentication
bull Use 5ub5t1tut10n5
bull Use more than 10 chars
bull Use different passwords for different domains (Yahoo Facebook S nap C hat UOR E G ONE DU)
bull C hange them regularly ndash at least every 6 months
bull Use a password manager (like K eyP ass or LastP ass)
bull Never use login as password
bull Never s tore them under keyboards desk drawers s ticky notes on monitor
bull S tore a clue in your walletpurse
bull Never s tore them on refrigerator
bull Never ever share passwords with anyone
bull Never send them in email
bull Never enter them with a ldquoshoulder surferrdquo present
TrojansViruses
BotsZombies
Ransomware
Dangers of malwarehellipto
YOUto
OTHERS
How do I get infected
social engineering via email instant messaging social media
malicious websites and drive-by downloads P2P file sharing
malvertising man-in-the-middle attacks exploit kits
General Malware Tips
bull Turn on automatic updates on youro P hones
o Home computers
o Tablets
o Work computers (s ee IT)
bull R un up-to-date antimalware toolo McAfee
o MalwareB ytes
o Windows Defender (free)
bull B ack up important files
bull Occas ionally try to restore something from backup
bull R eport suspicious computer activities
bull Never download from untrusted websites
bull B e careful of s ites you browse to
Social Media tips
bull No Internet delete button
bull Dont share secretsbull Trust then connectbull Use different passwords
for different personas
bull S ecure device ndash facial password fingerprint hellip
bull Setup 2 -factor authNbull Turn on privacy settingsbull S etup private accountsbull Limit who sees postsbull Limit who can find you
Insecure connection
Photos by Unknown author is licensed under CC BY-SA
Evil InternetEvil Wifi
intercepthelliphijackhellipmodify
VPN https
Photos by Unknown author is licensed under CC BY-SA
Evil InternetEvil Wifi
secure encrypted tunnel
Top 5 defenses
Awareness amp Vigilance
Key takeaways1 Dont get hished by a dumb hacker
2 Make strong passwords or phrases and never share them with anyone ever
3 Always use 2-factor login where available
Finally be vigilant but unafraid
UO Cybersecurity Briefing amp Awareness Training
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncom541-346-1732
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncomlfhowelluoregonedu541-346-1732
UO C ybersecurity B riefing amp Awareness Training
- Slide Number 1
- Slide Number 2
- Meet the adversary
- Common attack methods
- Slide Number 5
- Can you spot the phish
- Phishing-4-faculty withhellip
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-whales withhellip
- Phishing-4-whales withhellipsender impersonation bad link tone
- Gift card scam withhellip
- Gift card scamhellipfake domain context urgency
- Unable to display message phish
- Slide Number 15
- Unable to display message phish
- Slide Number 17
- Slide Number 18
- Slide Number 19
- Slide Number 20
- Key Message on Phishing
- UseSTRONG PASSWORDS
- Password game
- Password Game
- Password Game
- Password Game
- Password Game
- Password Game
- General password tips
- TrojansVirusesBotsZombiesRansomware
- Dangers of malwarehellip
- How do I get infected
- Slide Number 33
- General Malware Tips
- Protect yourSOCIAL BRAND
- Social Media tips
- Protect yourCOMMUNICATION
- Insecure connection
- VPN https
- Top 5 defenses
- Key takeaways
- UO Cybersecurity Briefing amp Awareness Training
- Slide Number 43
-
Password game
123456LetmeinFootballIloveyouAdmin
WelcomeMonkeyAbc123
helloStarwars
- Time 2017
G ood Ones B ad Ones
Wr 15 bd 1wy5 Strong (76)
My 3y3s r3 p1nk Strong (70)
This is my story Strong (69)
What is fake news Strong (87)
My secret bucket list item is to sing in public
Very Strong (217)
I hate math but I totally dig chemistry
Very Strong (197)
Password GameORG ood One B ad One
toddbay Toddbay$Username Password
Password GameORG ood One B ad One
marys IloveyouUsername Password
Password GameORG ood One B ad One
samanp TheRt5atemydinnerUsername Password
Password GameORG ood One B ad One
samanp TheRt5atemydinner2Username Password
Password GameORG ood One B ad One
mandyt IwillgobcktoVTUsername Password
General password tipsbull Use password-phrase instead
bull Use 2-Factor Authentication
bull Use 5ub5t1tut10n5
bull Use more than 10 chars
bull Use different passwords for different domains (Yahoo Facebook S nap C hat UOR E G ONE DU)
bull C hange them regularly ndash at least every 6 months
bull Use a password manager (like K eyP ass or LastP ass)
bull Never use login as password
bull Never s tore them under keyboards desk drawers s ticky notes on monitor
bull S tore a clue in your walletpurse
bull Never s tore them on refrigerator
bull Never ever share passwords with anyone
bull Never send them in email
bull Never enter them with a ldquoshoulder surferrdquo present
TrojansViruses
BotsZombies
Ransomware
Dangers of malwarehellipto
YOUto
OTHERS
How do I get infected
social engineering via email instant messaging social media
malicious websites and drive-by downloads P2P file sharing
malvertising man-in-the-middle attacks exploit kits
General Malware Tips
bull Turn on automatic updates on youro P hones
o Home computers
o Tablets
o Work computers (s ee IT)
bull R un up-to-date antimalware toolo McAfee
o MalwareB ytes
o Windows Defender (free)
bull B ack up important files
bull Occas ionally try to restore something from backup
bull R eport suspicious computer activities
bull Never download from untrusted websites
bull B e careful of s ites you browse to
Social Media tips
bull No Internet delete button
bull Dont share secretsbull Trust then connectbull Use different passwords
for different personas
bull S ecure device ndash facial password fingerprint hellip
bull Setup 2 -factor authNbull Turn on privacy settingsbull S etup private accountsbull Limit who sees postsbull Limit who can find you
Insecure connection
Photos by Unknown author is licensed under CC BY-SA
Evil InternetEvil Wifi
intercepthelliphijackhellipmodify
VPN https
Photos by Unknown author is licensed under CC BY-SA
Evil InternetEvil Wifi
secure encrypted tunnel
Top 5 defenses
Awareness amp Vigilance
Key takeaways1 Dont get hished by a dumb hacker
2 Make strong passwords or phrases and never share them with anyone ever
3 Always use 2-factor login where available
Finally be vigilant but unafraid
UO Cybersecurity Briefing amp Awareness Training
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncom541-346-1732
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncomlfhowelluoregonedu541-346-1732
UO C ybersecurity B riefing amp Awareness Training
- Slide Number 1
- Slide Number 2
- Meet the adversary
- Common attack methods
- Slide Number 5
- Can you spot the phish
- Phishing-4-faculty withhellip
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-whales withhellip
- Phishing-4-whales withhellipsender impersonation bad link tone
- Gift card scam withhellip
- Gift card scamhellipfake domain context urgency
- Unable to display message phish
- Slide Number 15
- Unable to display message phish
- Slide Number 17
- Slide Number 18
- Slide Number 19
- Slide Number 20
- Key Message on Phishing
- UseSTRONG PASSWORDS
- Password game
- Password Game
- Password Game
- Password Game
- Password Game
- Password Game
- General password tips
- TrojansVirusesBotsZombiesRansomware
- Dangers of malwarehellip
- How do I get infected
- Slide Number 33
- General Malware Tips
- Protect yourSOCIAL BRAND
- Social Media tips
- Protect yourCOMMUNICATION
- Insecure connection
- VPN https
- Top 5 defenses
- Key takeaways
- UO Cybersecurity Briefing amp Awareness Training
- Slide Number 43
-
Password GameORG ood One B ad One
toddbay Toddbay$Username Password
Password GameORG ood One B ad One
marys IloveyouUsername Password
Password GameORG ood One B ad One
samanp TheRt5atemydinnerUsername Password
Password GameORG ood One B ad One
samanp TheRt5atemydinner2Username Password
Password GameORG ood One B ad One
mandyt IwillgobcktoVTUsername Password
General password tipsbull Use password-phrase instead
bull Use 2-Factor Authentication
bull Use 5ub5t1tut10n5
bull Use more than 10 chars
bull Use different passwords for different domains (Yahoo Facebook S nap C hat UOR E G ONE DU)
bull C hange them regularly ndash at least every 6 months
bull Use a password manager (like K eyP ass or LastP ass)
bull Never use login as password
bull Never s tore them under keyboards desk drawers s ticky notes on monitor
bull S tore a clue in your walletpurse
bull Never s tore them on refrigerator
bull Never ever share passwords with anyone
bull Never send them in email
bull Never enter them with a ldquoshoulder surferrdquo present
TrojansViruses
BotsZombies
Ransomware
Dangers of malwarehellipto
YOUto
OTHERS
How do I get infected
social engineering via email instant messaging social media
malicious websites and drive-by downloads P2P file sharing
malvertising man-in-the-middle attacks exploit kits
General Malware Tips
bull Turn on automatic updates on youro P hones
o Home computers
o Tablets
o Work computers (s ee IT)
bull R un up-to-date antimalware toolo McAfee
o MalwareB ytes
o Windows Defender (free)
bull B ack up important files
bull Occas ionally try to restore something from backup
bull R eport suspicious computer activities
bull Never download from untrusted websites
bull B e careful of s ites you browse to
Social Media tips
bull No Internet delete button
bull Dont share secretsbull Trust then connectbull Use different passwords
for different personas
bull S ecure device ndash facial password fingerprint hellip
bull Setup 2 -factor authNbull Turn on privacy settingsbull S etup private accountsbull Limit who sees postsbull Limit who can find you
Insecure connection
Photos by Unknown author is licensed under CC BY-SA
Evil InternetEvil Wifi
intercepthelliphijackhellipmodify
VPN https
Photos by Unknown author is licensed under CC BY-SA
Evil InternetEvil Wifi
secure encrypted tunnel
Top 5 defenses
Awareness amp Vigilance
Key takeaways1 Dont get hished by a dumb hacker
2 Make strong passwords or phrases and never share them with anyone ever
3 Always use 2-factor login where available
Finally be vigilant but unafraid
UO Cybersecurity Briefing amp Awareness Training
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncom541-346-1732
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncomlfhowelluoregonedu541-346-1732
UO C ybersecurity B riefing amp Awareness Training
- Slide Number 1
- Slide Number 2
- Meet the adversary
- Common attack methods
- Slide Number 5
- Can you spot the phish
- Phishing-4-faculty withhellip
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-whales withhellip
- Phishing-4-whales withhellipsender impersonation bad link tone
- Gift card scam withhellip
- Gift card scamhellipfake domain context urgency
- Unable to display message phish
- Slide Number 15
- Unable to display message phish
- Slide Number 17
- Slide Number 18
- Slide Number 19
- Slide Number 20
- Key Message on Phishing
- UseSTRONG PASSWORDS
- Password game
- Password Game
- Password Game
- Password Game
- Password Game
- Password Game
- General password tips
- TrojansVirusesBotsZombiesRansomware
- Dangers of malwarehellip
- How do I get infected
- Slide Number 33
- General Malware Tips
- Protect yourSOCIAL BRAND
- Social Media tips
- Protect yourCOMMUNICATION
- Insecure connection
- VPN https
- Top 5 defenses
- Key takeaways
- UO Cybersecurity Briefing amp Awareness Training
- Slide Number 43
-
Password GameORG ood One B ad One
marys IloveyouUsername Password
Password GameORG ood One B ad One
samanp TheRt5atemydinnerUsername Password
Password GameORG ood One B ad One
samanp TheRt5atemydinner2Username Password
Password GameORG ood One B ad One
mandyt IwillgobcktoVTUsername Password
General password tipsbull Use password-phrase instead
bull Use 2-Factor Authentication
bull Use 5ub5t1tut10n5
bull Use more than 10 chars
bull Use different passwords for different domains (Yahoo Facebook S nap C hat UOR E G ONE DU)
bull C hange them regularly ndash at least every 6 months
bull Use a password manager (like K eyP ass or LastP ass)
bull Never use login as password
bull Never s tore them under keyboards desk drawers s ticky notes on monitor
bull S tore a clue in your walletpurse
bull Never s tore them on refrigerator
bull Never ever share passwords with anyone
bull Never send them in email
bull Never enter them with a ldquoshoulder surferrdquo present
TrojansViruses
BotsZombies
Ransomware
Dangers of malwarehellipto
YOUto
OTHERS
How do I get infected
social engineering via email instant messaging social media
malicious websites and drive-by downloads P2P file sharing
malvertising man-in-the-middle attacks exploit kits
General Malware Tips
bull Turn on automatic updates on youro P hones
o Home computers
o Tablets
o Work computers (s ee IT)
bull R un up-to-date antimalware toolo McAfee
o MalwareB ytes
o Windows Defender (free)
bull B ack up important files
bull Occas ionally try to restore something from backup
bull R eport suspicious computer activities
bull Never download from untrusted websites
bull B e careful of s ites you browse to
Social Media tips
bull No Internet delete button
bull Dont share secretsbull Trust then connectbull Use different passwords
for different personas
bull S ecure device ndash facial password fingerprint hellip
bull Setup 2 -factor authNbull Turn on privacy settingsbull S etup private accountsbull Limit who sees postsbull Limit who can find you
Insecure connection
Photos by Unknown author is licensed under CC BY-SA
Evil InternetEvil Wifi
intercepthelliphijackhellipmodify
VPN https
Photos by Unknown author is licensed under CC BY-SA
Evil InternetEvil Wifi
secure encrypted tunnel
Top 5 defenses
Awareness amp Vigilance
Key takeaways1 Dont get hished by a dumb hacker
2 Make strong passwords or phrases and never share them with anyone ever
3 Always use 2-factor login where available
Finally be vigilant but unafraid
UO Cybersecurity Briefing amp Awareness Training
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncom541-346-1732
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncomlfhowelluoregonedu541-346-1732
UO C ybersecurity B riefing amp Awareness Training
- Slide Number 1
- Slide Number 2
- Meet the adversary
- Common attack methods
- Slide Number 5
- Can you spot the phish
- Phishing-4-faculty withhellip
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-whales withhellip
- Phishing-4-whales withhellipsender impersonation bad link tone
- Gift card scam withhellip
- Gift card scamhellipfake domain context urgency
- Unable to display message phish
- Slide Number 15
- Unable to display message phish
- Slide Number 17
- Slide Number 18
- Slide Number 19
- Slide Number 20
- Key Message on Phishing
- UseSTRONG PASSWORDS
- Password game
- Password Game
- Password Game
- Password Game
- Password Game
- Password Game
- General password tips
- TrojansVirusesBotsZombiesRansomware
- Dangers of malwarehellip
- How do I get infected
- Slide Number 33
- General Malware Tips
- Protect yourSOCIAL BRAND
- Social Media tips
- Protect yourCOMMUNICATION
- Insecure connection
- VPN https
- Top 5 defenses
- Key takeaways
- UO Cybersecurity Briefing amp Awareness Training
- Slide Number 43
-
Password GameORG ood One B ad One
samanp TheRt5atemydinnerUsername Password
Password GameORG ood One B ad One
samanp TheRt5atemydinner2Username Password
Password GameORG ood One B ad One
mandyt IwillgobcktoVTUsername Password
General password tipsbull Use password-phrase instead
bull Use 2-Factor Authentication
bull Use 5ub5t1tut10n5
bull Use more than 10 chars
bull Use different passwords for different domains (Yahoo Facebook S nap C hat UOR E G ONE DU)
bull C hange them regularly ndash at least every 6 months
bull Use a password manager (like K eyP ass or LastP ass)
bull Never use login as password
bull Never s tore them under keyboards desk drawers s ticky notes on monitor
bull S tore a clue in your walletpurse
bull Never s tore them on refrigerator
bull Never ever share passwords with anyone
bull Never send them in email
bull Never enter them with a ldquoshoulder surferrdquo present
TrojansViruses
BotsZombies
Ransomware
Dangers of malwarehellipto
YOUto
OTHERS
How do I get infected
social engineering via email instant messaging social media
malicious websites and drive-by downloads P2P file sharing
malvertising man-in-the-middle attacks exploit kits
General Malware Tips
bull Turn on automatic updates on youro P hones
o Home computers
o Tablets
o Work computers (s ee IT)
bull R un up-to-date antimalware toolo McAfee
o MalwareB ytes
o Windows Defender (free)
bull B ack up important files
bull Occas ionally try to restore something from backup
bull R eport suspicious computer activities
bull Never download from untrusted websites
bull B e careful of s ites you browse to
Social Media tips
bull No Internet delete button
bull Dont share secretsbull Trust then connectbull Use different passwords
for different personas
bull S ecure device ndash facial password fingerprint hellip
bull Setup 2 -factor authNbull Turn on privacy settingsbull S etup private accountsbull Limit who sees postsbull Limit who can find you
Insecure connection
Photos by Unknown author is licensed under CC BY-SA
Evil InternetEvil Wifi
intercepthelliphijackhellipmodify
VPN https
Photos by Unknown author is licensed under CC BY-SA
Evil InternetEvil Wifi
secure encrypted tunnel
Top 5 defenses
Awareness amp Vigilance
Key takeaways1 Dont get hished by a dumb hacker
2 Make strong passwords or phrases and never share them with anyone ever
3 Always use 2-factor login where available
Finally be vigilant but unafraid
UO Cybersecurity Briefing amp Awareness Training
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncom541-346-1732
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncomlfhowelluoregonedu541-346-1732
UO C ybersecurity B riefing amp Awareness Training
- Slide Number 1
- Slide Number 2
- Meet the adversary
- Common attack methods
- Slide Number 5
- Can you spot the phish
- Phishing-4-faculty withhellip
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-whales withhellip
- Phishing-4-whales withhellipsender impersonation bad link tone
- Gift card scam withhellip
- Gift card scamhellipfake domain context urgency
- Unable to display message phish
- Slide Number 15
- Unable to display message phish
- Slide Number 17
- Slide Number 18
- Slide Number 19
- Slide Number 20
- Key Message on Phishing
- UseSTRONG PASSWORDS
- Password game
- Password Game
- Password Game
- Password Game
- Password Game
- Password Game
- General password tips
- TrojansVirusesBotsZombiesRansomware
- Dangers of malwarehellip
- How do I get infected
- Slide Number 33
- General Malware Tips
- Protect yourSOCIAL BRAND
- Social Media tips
- Protect yourCOMMUNICATION
- Insecure connection
- VPN https
- Top 5 defenses
- Key takeaways
- UO Cybersecurity Briefing amp Awareness Training
- Slide Number 43
-
Password GameORG ood One B ad One
samanp TheRt5atemydinner2Username Password
Password GameORG ood One B ad One
mandyt IwillgobcktoVTUsername Password
General password tipsbull Use password-phrase instead
bull Use 2-Factor Authentication
bull Use 5ub5t1tut10n5
bull Use more than 10 chars
bull Use different passwords for different domains (Yahoo Facebook S nap C hat UOR E G ONE DU)
bull C hange them regularly ndash at least every 6 months
bull Use a password manager (like K eyP ass or LastP ass)
bull Never use login as password
bull Never s tore them under keyboards desk drawers s ticky notes on monitor
bull S tore a clue in your walletpurse
bull Never s tore them on refrigerator
bull Never ever share passwords with anyone
bull Never send them in email
bull Never enter them with a ldquoshoulder surferrdquo present
TrojansViruses
BotsZombies
Ransomware
Dangers of malwarehellipto
YOUto
OTHERS
How do I get infected
social engineering via email instant messaging social media
malicious websites and drive-by downloads P2P file sharing
malvertising man-in-the-middle attacks exploit kits
General Malware Tips
bull Turn on automatic updates on youro P hones
o Home computers
o Tablets
o Work computers (s ee IT)
bull R un up-to-date antimalware toolo McAfee
o MalwareB ytes
o Windows Defender (free)
bull B ack up important files
bull Occas ionally try to restore something from backup
bull R eport suspicious computer activities
bull Never download from untrusted websites
bull B e careful of s ites you browse to
Social Media tips
bull No Internet delete button
bull Dont share secretsbull Trust then connectbull Use different passwords
for different personas
bull S ecure device ndash facial password fingerprint hellip
bull Setup 2 -factor authNbull Turn on privacy settingsbull S etup private accountsbull Limit who sees postsbull Limit who can find you
Insecure connection
Photos by Unknown author is licensed under CC BY-SA
Evil InternetEvil Wifi
intercepthelliphijackhellipmodify
VPN https
Photos by Unknown author is licensed under CC BY-SA
Evil InternetEvil Wifi
secure encrypted tunnel
Top 5 defenses
Awareness amp Vigilance
Key takeaways1 Dont get hished by a dumb hacker
2 Make strong passwords or phrases and never share them with anyone ever
3 Always use 2-factor login where available
Finally be vigilant but unafraid
UO Cybersecurity Briefing amp Awareness Training
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncom541-346-1732
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncomlfhowelluoregonedu541-346-1732
UO C ybersecurity B riefing amp Awareness Training
- Slide Number 1
- Slide Number 2
- Meet the adversary
- Common attack methods
- Slide Number 5
- Can you spot the phish
- Phishing-4-faculty withhellip
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-whales withhellip
- Phishing-4-whales withhellipsender impersonation bad link tone
- Gift card scam withhellip
- Gift card scamhellipfake domain context urgency
- Unable to display message phish
- Slide Number 15
- Unable to display message phish
- Slide Number 17
- Slide Number 18
- Slide Number 19
- Slide Number 20
- Key Message on Phishing
- UseSTRONG PASSWORDS
- Password game
- Password Game
- Password Game
- Password Game
- Password Game
- Password Game
- General password tips
- TrojansVirusesBotsZombiesRansomware
- Dangers of malwarehellip
- How do I get infected
- Slide Number 33
- General Malware Tips
- Protect yourSOCIAL BRAND
- Social Media tips
- Protect yourCOMMUNICATION
- Insecure connection
- VPN https
- Top 5 defenses
- Key takeaways
- UO Cybersecurity Briefing amp Awareness Training
- Slide Number 43
-
Password GameORG ood One B ad One
mandyt IwillgobcktoVTUsername Password
General password tipsbull Use password-phrase instead
bull Use 2-Factor Authentication
bull Use 5ub5t1tut10n5
bull Use more than 10 chars
bull Use different passwords for different domains (Yahoo Facebook S nap C hat UOR E G ONE DU)
bull C hange them regularly ndash at least every 6 months
bull Use a password manager (like K eyP ass or LastP ass)
bull Never use login as password
bull Never s tore them under keyboards desk drawers s ticky notes on monitor
bull S tore a clue in your walletpurse
bull Never s tore them on refrigerator
bull Never ever share passwords with anyone
bull Never send them in email
bull Never enter them with a ldquoshoulder surferrdquo present
TrojansViruses
BotsZombies
Ransomware
Dangers of malwarehellipto
YOUto
OTHERS
How do I get infected
social engineering via email instant messaging social media
malicious websites and drive-by downloads P2P file sharing
malvertising man-in-the-middle attacks exploit kits
General Malware Tips
bull Turn on automatic updates on youro P hones
o Home computers
o Tablets
o Work computers (s ee IT)
bull R un up-to-date antimalware toolo McAfee
o MalwareB ytes
o Windows Defender (free)
bull B ack up important files
bull Occas ionally try to restore something from backup
bull R eport suspicious computer activities
bull Never download from untrusted websites
bull B e careful of s ites you browse to
Social Media tips
bull No Internet delete button
bull Dont share secretsbull Trust then connectbull Use different passwords
for different personas
bull S ecure device ndash facial password fingerprint hellip
bull Setup 2 -factor authNbull Turn on privacy settingsbull S etup private accountsbull Limit who sees postsbull Limit who can find you
Insecure connection
Photos by Unknown author is licensed under CC BY-SA
Evil InternetEvil Wifi
intercepthelliphijackhellipmodify
VPN https
Photos by Unknown author is licensed under CC BY-SA
Evil InternetEvil Wifi
secure encrypted tunnel
Top 5 defenses
Awareness amp Vigilance
Key takeaways1 Dont get hished by a dumb hacker
2 Make strong passwords or phrases and never share them with anyone ever
3 Always use 2-factor login where available
Finally be vigilant but unafraid
UO Cybersecurity Briefing amp Awareness Training
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncom541-346-1732
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncomlfhowelluoregonedu541-346-1732
UO C ybersecurity B riefing amp Awareness Training
- Slide Number 1
- Slide Number 2
- Meet the adversary
- Common attack methods
- Slide Number 5
- Can you spot the phish
- Phishing-4-faculty withhellip
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-whales withhellip
- Phishing-4-whales withhellipsender impersonation bad link tone
- Gift card scam withhellip
- Gift card scamhellipfake domain context urgency
- Unable to display message phish
- Slide Number 15
- Unable to display message phish
- Slide Number 17
- Slide Number 18
- Slide Number 19
- Slide Number 20
- Key Message on Phishing
- UseSTRONG PASSWORDS
- Password game
- Password Game
- Password Game
- Password Game
- Password Game
- Password Game
- General password tips
- TrojansVirusesBotsZombiesRansomware
- Dangers of malwarehellip
- How do I get infected
- Slide Number 33
- General Malware Tips
- Protect yourSOCIAL BRAND
- Social Media tips
- Protect yourCOMMUNICATION
- Insecure connection
- VPN https
- Top 5 defenses
- Key takeaways
- UO Cybersecurity Briefing amp Awareness Training
- Slide Number 43
-
General password tipsbull Use password-phrase instead
bull Use 2-Factor Authentication
bull Use 5ub5t1tut10n5
bull Use more than 10 chars
bull Use different passwords for different domains (Yahoo Facebook S nap C hat UOR E G ONE DU)
bull C hange them regularly ndash at least every 6 months
bull Use a password manager (like K eyP ass or LastP ass)
bull Never use login as password
bull Never s tore them under keyboards desk drawers s ticky notes on monitor
bull S tore a clue in your walletpurse
bull Never s tore them on refrigerator
bull Never ever share passwords with anyone
bull Never send them in email
bull Never enter them with a ldquoshoulder surferrdquo present
TrojansViruses
BotsZombies
Ransomware
Dangers of malwarehellipto
YOUto
OTHERS
How do I get infected
social engineering via email instant messaging social media
malicious websites and drive-by downloads P2P file sharing
malvertising man-in-the-middle attacks exploit kits
General Malware Tips
bull Turn on automatic updates on youro P hones
o Home computers
o Tablets
o Work computers (s ee IT)
bull R un up-to-date antimalware toolo McAfee
o MalwareB ytes
o Windows Defender (free)
bull B ack up important files
bull Occas ionally try to restore something from backup
bull R eport suspicious computer activities
bull Never download from untrusted websites
bull B e careful of s ites you browse to
Social Media tips
bull No Internet delete button
bull Dont share secretsbull Trust then connectbull Use different passwords
for different personas
bull S ecure device ndash facial password fingerprint hellip
bull Setup 2 -factor authNbull Turn on privacy settingsbull S etup private accountsbull Limit who sees postsbull Limit who can find you
Insecure connection
Photos by Unknown author is licensed under CC BY-SA
Evil InternetEvil Wifi
intercepthelliphijackhellipmodify
VPN https
Photos by Unknown author is licensed under CC BY-SA
Evil InternetEvil Wifi
secure encrypted tunnel
Top 5 defenses
Awareness amp Vigilance
Key takeaways1 Dont get hished by a dumb hacker
2 Make strong passwords or phrases and never share them with anyone ever
3 Always use 2-factor login where available
Finally be vigilant but unafraid
UO Cybersecurity Briefing amp Awareness Training
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncom541-346-1732
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncomlfhowelluoregonedu541-346-1732
UO C ybersecurity B riefing amp Awareness Training
- Slide Number 1
- Slide Number 2
- Meet the adversary
- Common attack methods
- Slide Number 5
- Can you spot the phish
- Phishing-4-faculty withhellip
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-whales withhellip
- Phishing-4-whales withhellipsender impersonation bad link tone
- Gift card scam withhellip
- Gift card scamhellipfake domain context urgency
- Unable to display message phish
- Slide Number 15
- Unable to display message phish
- Slide Number 17
- Slide Number 18
- Slide Number 19
- Slide Number 20
- Key Message on Phishing
- UseSTRONG PASSWORDS
- Password game
- Password Game
- Password Game
- Password Game
- Password Game
- Password Game
- General password tips
- TrojansVirusesBotsZombiesRansomware
- Dangers of malwarehellip
- How do I get infected
- Slide Number 33
- General Malware Tips
- Protect yourSOCIAL BRAND
- Social Media tips
- Protect yourCOMMUNICATION
- Insecure connection
- VPN https
- Top 5 defenses
- Key takeaways
- UO Cybersecurity Briefing amp Awareness Training
- Slide Number 43
-
TrojansViruses
BotsZombies
Ransomware
Dangers of malwarehellipto
YOUto
OTHERS
How do I get infected
social engineering via email instant messaging social media
malicious websites and drive-by downloads P2P file sharing
malvertising man-in-the-middle attacks exploit kits
General Malware Tips
bull Turn on automatic updates on youro P hones
o Home computers
o Tablets
o Work computers (s ee IT)
bull R un up-to-date antimalware toolo McAfee
o MalwareB ytes
o Windows Defender (free)
bull B ack up important files
bull Occas ionally try to restore something from backup
bull R eport suspicious computer activities
bull Never download from untrusted websites
bull B e careful of s ites you browse to
Social Media tips
bull No Internet delete button
bull Dont share secretsbull Trust then connectbull Use different passwords
for different personas
bull S ecure device ndash facial password fingerprint hellip
bull Setup 2 -factor authNbull Turn on privacy settingsbull S etup private accountsbull Limit who sees postsbull Limit who can find you
Insecure connection
Photos by Unknown author is licensed under CC BY-SA
Evil InternetEvil Wifi
intercepthelliphijackhellipmodify
VPN https
Photos by Unknown author is licensed under CC BY-SA
Evil InternetEvil Wifi
secure encrypted tunnel
Top 5 defenses
Awareness amp Vigilance
Key takeaways1 Dont get hished by a dumb hacker
2 Make strong passwords or phrases and never share them with anyone ever
3 Always use 2-factor login where available
Finally be vigilant but unafraid
UO Cybersecurity Briefing amp Awareness Training
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncom541-346-1732
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncomlfhowelluoregonedu541-346-1732
UO C ybersecurity B riefing amp Awareness Training
- Slide Number 1
- Slide Number 2
- Meet the adversary
- Common attack methods
- Slide Number 5
- Can you spot the phish
- Phishing-4-faculty withhellip
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-whales withhellip
- Phishing-4-whales withhellipsender impersonation bad link tone
- Gift card scam withhellip
- Gift card scamhellipfake domain context urgency
- Unable to display message phish
- Slide Number 15
- Unable to display message phish
- Slide Number 17
- Slide Number 18
- Slide Number 19
- Slide Number 20
- Key Message on Phishing
- UseSTRONG PASSWORDS
- Password game
- Password Game
- Password Game
- Password Game
- Password Game
- Password Game
- General password tips
- TrojansVirusesBotsZombiesRansomware
- Dangers of malwarehellip
- How do I get infected
- Slide Number 33
- General Malware Tips
- Protect yourSOCIAL BRAND
- Social Media tips
- Protect yourCOMMUNICATION
- Insecure connection
- VPN https
- Top 5 defenses
- Key takeaways
- UO Cybersecurity Briefing amp Awareness Training
- Slide Number 43
-
Dangers of malwarehellipto
YOUto
OTHERS
How do I get infected
social engineering via email instant messaging social media
malicious websites and drive-by downloads P2P file sharing
malvertising man-in-the-middle attacks exploit kits
General Malware Tips
bull Turn on automatic updates on youro P hones
o Home computers
o Tablets
o Work computers (s ee IT)
bull R un up-to-date antimalware toolo McAfee
o MalwareB ytes
o Windows Defender (free)
bull B ack up important files
bull Occas ionally try to restore something from backup
bull R eport suspicious computer activities
bull Never download from untrusted websites
bull B e careful of s ites you browse to
Social Media tips
bull No Internet delete button
bull Dont share secretsbull Trust then connectbull Use different passwords
for different personas
bull S ecure device ndash facial password fingerprint hellip
bull Setup 2 -factor authNbull Turn on privacy settingsbull S etup private accountsbull Limit who sees postsbull Limit who can find you
Insecure connection
Photos by Unknown author is licensed under CC BY-SA
Evil InternetEvil Wifi
intercepthelliphijackhellipmodify
VPN https
Photos by Unknown author is licensed under CC BY-SA
Evil InternetEvil Wifi
secure encrypted tunnel
Top 5 defenses
Awareness amp Vigilance
Key takeaways1 Dont get hished by a dumb hacker
2 Make strong passwords or phrases and never share them with anyone ever
3 Always use 2-factor login where available
Finally be vigilant but unafraid
UO Cybersecurity Briefing amp Awareness Training
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncom541-346-1732
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncomlfhowelluoregonedu541-346-1732
UO C ybersecurity B riefing amp Awareness Training
- Slide Number 1
- Slide Number 2
- Meet the adversary
- Common attack methods
- Slide Number 5
- Can you spot the phish
- Phishing-4-faculty withhellip
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-whales withhellip
- Phishing-4-whales withhellipsender impersonation bad link tone
- Gift card scam withhellip
- Gift card scamhellipfake domain context urgency
- Unable to display message phish
- Slide Number 15
- Unable to display message phish
- Slide Number 17
- Slide Number 18
- Slide Number 19
- Slide Number 20
- Key Message on Phishing
- UseSTRONG PASSWORDS
- Password game
- Password Game
- Password Game
- Password Game
- Password Game
- Password Game
- General password tips
- TrojansVirusesBotsZombiesRansomware
- Dangers of malwarehellip
- How do I get infected
- Slide Number 33
- General Malware Tips
- Protect yourSOCIAL BRAND
- Social Media tips
- Protect yourCOMMUNICATION
- Insecure connection
- VPN https
- Top 5 defenses
- Key takeaways
- UO Cybersecurity Briefing amp Awareness Training
- Slide Number 43
-
How do I get infected
social engineering via email instant messaging social media
malicious websites and drive-by downloads P2P file sharing
malvertising man-in-the-middle attacks exploit kits
General Malware Tips
bull Turn on automatic updates on youro P hones
o Home computers
o Tablets
o Work computers (s ee IT)
bull R un up-to-date antimalware toolo McAfee
o MalwareB ytes
o Windows Defender (free)
bull B ack up important files
bull Occas ionally try to restore something from backup
bull R eport suspicious computer activities
bull Never download from untrusted websites
bull B e careful of s ites you browse to
Social Media tips
bull No Internet delete button
bull Dont share secretsbull Trust then connectbull Use different passwords
for different personas
bull S ecure device ndash facial password fingerprint hellip
bull Setup 2 -factor authNbull Turn on privacy settingsbull S etup private accountsbull Limit who sees postsbull Limit who can find you
Insecure connection
Photos by Unknown author is licensed under CC BY-SA
Evil InternetEvil Wifi
intercepthelliphijackhellipmodify
VPN https
Photos by Unknown author is licensed under CC BY-SA
Evil InternetEvil Wifi
secure encrypted tunnel
Top 5 defenses
Awareness amp Vigilance
Key takeaways1 Dont get hished by a dumb hacker
2 Make strong passwords or phrases and never share them with anyone ever
3 Always use 2-factor login where available
Finally be vigilant but unafraid
UO Cybersecurity Briefing amp Awareness Training
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncom541-346-1732
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncomlfhowelluoregonedu541-346-1732
UO C ybersecurity B riefing amp Awareness Training
- Slide Number 1
- Slide Number 2
- Meet the adversary
- Common attack methods
- Slide Number 5
- Can you spot the phish
- Phishing-4-faculty withhellip
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-whales withhellip
- Phishing-4-whales withhellipsender impersonation bad link tone
- Gift card scam withhellip
- Gift card scamhellipfake domain context urgency
- Unable to display message phish
- Slide Number 15
- Unable to display message phish
- Slide Number 17
- Slide Number 18
- Slide Number 19
- Slide Number 20
- Key Message on Phishing
- UseSTRONG PASSWORDS
- Password game
- Password Game
- Password Game
- Password Game
- Password Game
- Password Game
- General password tips
- TrojansVirusesBotsZombiesRansomware
- Dangers of malwarehellip
- How do I get infected
- Slide Number 33
- General Malware Tips
- Protect yourSOCIAL BRAND
- Social Media tips
- Protect yourCOMMUNICATION
- Insecure connection
- VPN https
- Top 5 defenses
- Key takeaways
- UO Cybersecurity Briefing amp Awareness Training
- Slide Number 43
-
General Malware Tips
bull Turn on automatic updates on youro P hones
o Home computers
o Tablets
o Work computers (s ee IT)
bull R un up-to-date antimalware toolo McAfee
o MalwareB ytes
o Windows Defender (free)
bull B ack up important files
bull Occas ionally try to restore something from backup
bull R eport suspicious computer activities
bull Never download from untrusted websites
bull B e careful of s ites you browse to
Social Media tips
bull No Internet delete button
bull Dont share secretsbull Trust then connectbull Use different passwords
for different personas
bull S ecure device ndash facial password fingerprint hellip
bull Setup 2 -factor authNbull Turn on privacy settingsbull S etup private accountsbull Limit who sees postsbull Limit who can find you
Insecure connection
Photos by Unknown author is licensed under CC BY-SA
Evil InternetEvil Wifi
intercepthelliphijackhellipmodify
VPN https
Photos by Unknown author is licensed under CC BY-SA
Evil InternetEvil Wifi
secure encrypted tunnel
Top 5 defenses
Awareness amp Vigilance
Key takeaways1 Dont get hished by a dumb hacker
2 Make strong passwords or phrases and never share them with anyone ever
3 Always use 2-factor login where available
Finally be vigilant but unafraid
UO Cybersecurity Briefing amp Awareness Training
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncom541-346-1732
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncomlfhowelluoregonedu541-346-1732
UO C ybersecurity B riefing amp Awareness Training
- Slide Number 1
- Slide Number 2
- Meet the adversary
- Common attack methods
- Slide Number 5
- Can you spot the phish
- Phishing-4-faculty withhellip
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-whales withhellip
- Phishing-4-whales withhellipsender impersonation bad link tone
- Gift card scam withhellip
- Gift card scamhellipfake domain context urgency
- Unable to display message phish
- Slide Number 15
- Unable to display message phish
- Slide Number 17
- Slide Number 18
- Slide Number 19
- Slide Number 20
- Key Message on Phishing
- UseSTRONG PASSWORDS
- Password game
- Password Game
- Password Game
- Password Game
- Password Game
- Password Game
- General password tips
- TrojansVirusesBotsZombiesRansomware
- Dangers of malwarehellip
- How do I get infected
- Slide Number 33
- General Malware Tips
- Protect yourSOCIAL BRAND
- Social Media tips
- Protect yourCOMMUNICATION
- Insecure connection
- VPN https
- Top 5 defenses
- Key takeaways
- UO Cybersecurity Briefing amp Awareness Training
- Slide Number 43
-
Social Media tips
bull No Internet delete button
bull Dont share secretsbull Trust then connectbull Use different passwords
for different personas
bull S ecure device ndash facial password fingerprint hellip
bull Setup 2 -factor authNbull Turn on privacy settingsbull S etup private accountsbull Limit who sees postsbull Limit who can find you
Insecure connection
Photos by Unknown author is licensed under CC BY-SA
Evil InternetEvil Wifi
intercepthelliphijackhellipmodify
VPN https
Photos by Unknown author is licensed under CC BY-SA
Evil InternetEvil Wifi
secure encrypted tunnel
Top 5 defenses
Awareness amp Vigilance
Key takeaways1 Dont get hished by a dumb hacker
2 Make strong passwords or phrases and never share them with anyone ever
3 Always use 2-factor login where available
Finally be vigilant but unafraid
UO Cybersecurity Briefing amp Awareness Training
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncom541-346-1732
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncomlfhowelluoregonedu541-346-1732
UO C ybersecurity B riefing amp Awareness Training
- Slide Number 1
- Slide Number 2
- Meet the adversary
- Common attack methods
- Slide Number 5
- Can you spot the phish
- Phishing-4-faculty withhellip
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-whales withhellip
- Phishing-4-whales withhellipsender impersonation bad link tone
- Gift card scam withhellip
- Gift card scamhellipfake domain context urgency
- Unable to display message phish
- Slide Number 15
- Unable to display message phish
- Slide Number 17
- Slide Number 18
- Slide Number 19
- Slide Number 20
- Key Message on Phishing
- UseSTRONG PASSWORDS
- Password game
- Password Game
- Password Game
- Password Game
- Password Game
- Password Game
- General password tips
- TrojansVirusesBotsZombiesRansomware
- Dangers of malwarehellip
- How do I get infected
- Slide Number 33
- General Malware Tips
- Protect yourSOCIAL BRAND
- Social Media tips
- Protect yourCOMMUNICATION
- Insecure connection
- VPN https
- Top 5 defenses
- Key takeaways
- UO Cybersecurity Briefing amp Awareness Training
- Slide Number 43
-
Insecure connection
Photos by Unknown author is licensed under CC BY-SA
Evil InternetEvil Wifi
intercepthelliphijackhellipmodify
VPN https
Photos by Unknown author is licensed under CC BY-SA
Evil InternetEvil Wifi
secure encrypted tunnel
Top 5 defenses
Awareness amp Vigilance
Key takeaways1 Dont get hished by a dumb hacker
2 Make strong passwords or phrases and never share them with anyone ever
3 Always use 2-factor login where available
Finally be vigilant but unafraid
UO Cybersecurity Briefing amp Awareness Training
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncom541-346-1732
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncomlfhowelluoregonedu541-346-1732
UO C ybersecurity B riefing amp Awareness Training
- Slide Number 1
- Slide Number 2
- Meet the adversary
- Common attack methods
- Slide Number 5
- Can you spot the phish
- Phishing-4-faculty withhellip
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-whales withhellip
- Phishing-4-whales withhellipsender impersonation bad link tone
- Gift card scam withhellip
- Gift card scamhellipfake domain context urgency
- Unable to display message phish
- Slide Number 15
- Unable to display message phish
- Slide Number 17
- Slide Number 18
- Slide Number 19
- Slide Number 20
- Key Message on Phishing
- UseSTRONG PASSWORDS
- Password game
- Password Game
- Password Game
- Password Game
- Password Game
- Password Game
- General password tips
- TrojansVirusesBotsZombiesRansomware
- Dangers of malwarehellip
- How do I get infected
- Slide Number 33
- General Malware Tips
- Protect yourSOCIAL BRAND
- Social Media tips
- Protect yourCOMMUNICATION
- Insecure connection
- VPN https
- Top 5 defenses
- Key takeaways
- UO Cybersecurity Briefing amp Awareness Training
- Slide Number 43
-
VPN https
Photos by Unknown author is licensed under CC BY-SA
Evil InternetEvil Wifi
secure encrypted tunnel
Top 5 defenses
Awareness amp Vigilance
Key takeaways1 Dont get hished by a dumb hacker
2 Make strong passwords or phrases and never share them with anyone ever
3 Always use 2-factor login where available
Finally be vigilant but unafraid
UO Cybersecurity Briefing amp Awareness Training
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncom541-346-1732
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncomlfhowelluoregonedu541-346-1732
UO C ybersecurity B riefing amp Awareness Training
- Slide Number 1
- Slide Number 2
- Meet the adversary
- Common attack methods
- Slide Number 5
- Can you spot the phish
- Phishing-4-faculty withhellip
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-whales withhellip
- Phishing-4-whales withhellipsender impersonation bad link tone
- Gift card scam withhellip
- Gift card scamhellipfake domain context urgency
- Unable to display message phish
- Slide Number 15
- Unable to display message phish
- Slide Number 17
- Slide Number 18
- Slide Number 19
- Slide Number 20
- Key Message on Phishing
- UseSTRONG PASSWORDS
- Password game
- Password Game
- Password Game
- Password Game
- Password Game
- Password Game
- General password tips
- TrojansVirusesBotsZombiesRansomware
- Dangers of malwarehellip
- How do I get infected
- Slide Number 33
- General Malware Tips
- Protect yourSOCIAL BRAND
- Social Media tips
- Protect yourCOMMUNICATION
- Insecure connection
- VPN https
- Top 5 defenses
- Key takeaways
- UO Cybersecurity Briefing amp Awareness Training
- Slide Number 43
-
Top 5 defenses
Awareness amp Vigilance
Key takeaways1 Dont get hished by a dumb hacker
2 Make strong passwords or phrases and never share them with anyone ever
3 Always use 2-factor login where available
Finally be vigilant but unafraid
UO Cybersecurity Briefing amp Awareness Training
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncom541-346-1732
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncomlfhowelluoregonedu541-346-1732
UO C ybersecurity B riefing amp Awareness Training
- Slide Number 1
- Slide Number 2
- Meet the adversary
- Common attack methods
- Slide Number 5
- Can you spot the phish
- Phishing-4-faculty withhellip
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-whales withhellip
- Phishing-4-whales withhellipsender impersonation bad link tone
- Gift card scam withhellip
- Gift card scamhellipfake domain context urgency
- Unable to display message phish
- Slide Number 15
- Unable to display message phish
- Slide Number 17
- Slide Number 18
- Slide Number 19
- Slide Number 20
- Key Message on Phishing
- UseSTRONG PASSWORDS
- Password game
- Password Game
- Password Game
- Password Game
- Password Game
- Password Game
- General password tips
- TrojansVirusesBotsZombiesRansomware
- Dangers of malwarehellip
- How do I get infected
- Slide Number 33
- General Malware Tips
- Protect yourSOCIAL BRAND
- Social Media tips
- Protect yourCOMMUNICATION
- Insecure connection
- VPN https
- Top 5 defenses
- Key takeaways
- UO Cybersecurity Briefing amp Awareness Training
- Slide Number 43
-
Key takeaways1 Dont get hished by a dumb hacker
2 Make strong passwords or phrases and never share them with anyone ever
3 Always use 2-factor login where available
Finally be vigilant but unafraid
UO Cybersecurity Briefing amp Awareness Training
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncom541-346-1732
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncomlfhowelluoregonedu541-346-1732
UO C ybersecurity B riefing amp Awareness Training
- Slide Number 1
- Slide Number 2
- Meet the adversary
- Common attack methods
- Slide Number 5
- Can you spot the phish
- Phishing-4-faculty withhellip
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-whales withhellip
- Phishing-4-whales withhellipsender impersonation bad link tone
- Gift card scam withhellip
- Gift card scamhellipfake domain context urgency
- Unable to display message phish
- Slide Number 15
- Unable to display message phish
- Slide Number 17
- Slide Number 18
- Slide Number 19
- Slide Number 20
- Key Message on Phishing
- UseSTRONG PASSWORDS
- Password game
- Password Game
- Password Game
- Password Game
- Password Game
- Password Game
- General password tips
- TrojansVirusesBotsZombiesRansomware
- Dangers of malwarehellip
- How do I get infected
- Slide Number 33
- General Malware Tips
- Protect yourSOCIAL BRAND
- Social Media tips
- Protect yourCOMMUNICATION
- Insecure connection
- VPN https
- Top 5 defenses
- Key takeaways
- UO Cybersecurity Briefing amp Awareness Training
- Slide Number 43
-
UO Cybersecurity Briefing amp Awareness Training
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncom541-346-1732
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncomlfhowelluoregonedu541-346-1732
UO C ybersecurity B riefing amp Awareness Training
- Slide Number 1
- Slide Number 2
- Meet the adversary
- Common attack methods
- Slide Number 5
- Can you spot the phish
- Phishing-4-faculty withhellip
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-whales withhellip
- Phishing-4-whales withhellipsender impersonation bad link tone
- Gift card scam withhellip
- Gift card scamhellipfake domain context urgency
- Unable to display message phish
- Slide Number 15
- Unable to display message phish
- Slide Number 17
- Slide Number 18
- Slide Number 19
- Slide Number 20
- Key Message on Phishing
- UseSTRONG PASSWORDS
- Password game
- Password Game
- Password Game
- Password Game
- Password Game
- Password Game
- General password tips
- TrojansVirusesBotsZombiesRansomware
- Dangers of malwarehellip
- How do I get infected
- Slide Number 33
- General Malware Tips
- Protect yourSOCIAL BRAND
- Social Media tips
- Protect yourCOMMUNICATION
- Insecure connection
- VPN https
- Top 5 defenses
- Key takeaways
- UO Cybersecurity Briefing amp Awareness Training
- Slide Number 43
-
Leo F HowellC hief Information S ecurity Officerlfhowelluoreqoncomlfhowelluoregonedu541-346-1732
UO C ybersecurity B riefing amp Awareness Training
- Slide Number 1
- Slide Number 2
- Meet the adversary
- Common attack methods
- Slide Number 5
- Can you spot the phish
- Phishing-4-faculty withhellip
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-faculty withhellipflattery grammar fake domain urgency
- Phishing-4-whales withhellip
- Phishing-4-whales withhellipsender impersonation bad link tone
- Gift card scam withhellip
- Gift card scamhellipfake domain context urgency
- Unable to display message phish
- Slide Number 15
- Unable to display message phish
- Slide Number 17
- Slide Number 18
- Slide Number 19
- Slide Number 20
- Key Message on Phishing
- UseSTRONG PASSWORDS
- Password game
- Password Game
- Password Game
- Password Game
- Password Game
- Password Game
- General password tips
- TrojansVirusesBotsZombiesRansomware
- Dangers of malwarehellip
- How do I get infected
- Slide Number 33
- General Malware Tips
- Protect yourSOCIAL BRAND
- Social Media tips
- Protect yourCOMMUNICATION
- Insecure connection
- VPN https
- Top 5 defenses
- Key takeaways
- UO Cybersecurity Briefing amp Awareness Training
- Slide Number 43
-