powerpoint presentation€¦ · ppt file · web view2017-06-13 · vandalism. disgruntled...

25
envision, strategize and actua Cybersecurity Hygiene …because you might be picking your friend’s nose. Sam Sneed June 2017

Upload: duongcong

Post on 13-Jun-2018

213 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: PowerPoint Presentation€¦ · PPT file · Web view2017-06-13 · Vandalism. Disgruntled employees. New methods to commit old crimes. ... Use lock screens on mobile devices. Mind

envision, strategize and actualize

Cybersecurity Hygiene…because you might be picking your friend’s nose.

Sam SneedJune 2017

Page 2: PowerPoint Presentation€¦ · PPT file · Web view2017-06-13 · Vandalism. Disgruntled employees. New methods to commit old crimes. ... Use lock screens on mobile devices. Mind

DISCLAIMER

This document has been provided for informational purposes only and is not

intended and should not be construed to constitute legal advice.

Please consult an attorney if you have specific legal issues.

Copyright 2016 ES&A, Inc. All Rights Reserved Confidential and Proprietary May 9, 20232

Page 3: PowerPoint Presentation€¦ · PPT file · Web view2017-06-13 · Vandalism. Disgruntled employees. New methods to commit old crimes. ... Use lock screens on mobile devices. Mind

YES, IT IS YOUR PROBLEM

What you don’t know will hurt you.

May 9, 2023Copyright 2017 ES&A, Inc. All Rights Reserved Confidential and Proprietary3

Page 4: PowerPoint Presentation€¦ · PPT file · Web view2017-06-13 · Vandalism. Disgruntled employees. New methods to commit old crimes. ... Use lock screens on mobile devices. Mind

Why people hack

Money

• Organized online crime

• New methods to commit old crimes

Personal or Political Agenda

• State actors• “Hacktivists”• Disgruntled

employees

Lulz

• Vandalism• Curiosity

May 9, 2023Copyright 2017 ES&A, Inc. All Rights Reserved Confidential and Proprietary4

Page 5: PowerPoint Presentation€¦ · PPT file · Web view2017-06-13 · Vandalism. Disgruntled employees. New methods to commit old crimes. ... Use lock screens on mobile devices. Mind

Why everyone is a juicy target

Information

• Financial (banking, credit, etc.)• Health (medical records,

prescriptions, etc.)• Personnel files• Intellectual property• Critical business info

Access• Networks and devices• Physical location or things• Information or more access

May 9, 2023Copyright 2017 ES&A, Inc. All Rights Reserved Confidential and Proprietary5

Page 6: PowerPoint Presentation€¦ · PPT file · Web view2017-06-13 · Vandalism. Disgruntled employees. New methods to commit old crimes. ... Use lock screens on mobile devices. Mind

What could happen when you’re hit• Create backdoors, load additional

code• Loss of control of devices• Exfiltration of info• Encryption of files• Ask for ransom• Nothing (yet)

May 9, 2023Copyright 2017 ES&A, Inc. All Rights Reserved Confidential and Proprietary6

Page 7: PowerPoint Presentation€¦ · PPT file · Web view2017-06-13 · Vandalism. Disgruntled employees. New methods to commit old crimes. ... Use lock screens on mobile devices. Mind

FOLK WISDOM FOR THE DIGITAL AGE

May 9, 2023Copyright 2017 ES&A, Inc. All Rights Reserved Confidential and Proprietary7

Exploits and Current EventsPractical Tips

Page 8: PowerPoint Presentation€¦ · PPT file · Web view2017-06-13 · Vandalism. Disgruntled employees. New methods to commit old crimes. ... Use lock screens on mobile devices. Mind

Don’t take candy from strangers

• If in doubt, don’t click– Attachments may contain malware– Links can take you to compromised

websites• “Phishing” common method of attack– Can use spoofing, social engineering,

other methods to trick users into accessing infected files or websites

May 9, 2023Copyright 2016 ES&A, Inc. All Rights Reserved Confidential and Proprietary8

Page 9: PowerPoint Presentation€¦ · PPT file · Web view2017-06-13 · Vandalism. Disgruntled employees. New methods to commit old crimes. ... Use lock screens on mobile devices. Mind

Don’t take candy from strangers(If in doubt, don’t click)

• Scan email and attachments– Check with IT to see if this can be done

automatically• Use blacklists/ whitelists to control

access• Call and verify with the sender

May 9, 2023Copyright 2016 ES&A, Inc. All Rights Reserved Confidential and Proprietary9

Page 10: PowerPoint Presentation€¦ · PPT file · Web view2017-06-13 · Vandalism. Disgruntled employees. New methods to commit old crimes. ... Use lock screens on mobile devices. Mind

Don’t eat things off the ground• Think before you connect– How public is the network?– How secure is the device?

• Man-in-the-middle attacks• Dyn attack, October 2016– IoT devices infected w/ malware*

became botnet (baby monitors, printers, cameras)

– DDoS attacks took down major online services and retailers

* The malware used, “Mirai,” is Japanese for “the future”May 9, 2023Copyright 2016 ES&A, Inc. All Rights Reserved Confidential and Proprietary10

Page 11: PowerPoint Presentation€¦ · PPT file · Web view2017-06-13 · Vandalism. Disgruntled employees. New methods to commit old crimes. ... Use lock screens on mobile devices. Mind

Don’t eat things off the ground(Beware of free lunch)

• Avoid public networks, especially open ones

• Avoid logging into sensitive services while on a public network

• Consider using a VPN or mobile network

• Do you really need an internet-connected teapot?

May 9, 2023Copyright 2016 ES&A, Inc. All Rights Reserved Confidential and Proprietary11

Page 12: PowerPoint Presentation€¦ · PPT file · Web view2017-06-13 · Vandalism. Disgruntled employees. New methods to commit old crimes. ... Use lock screens on mobile devices. Mind

Don’t share cooties

• Think about who and what you interact with–What is their cybersecurity hygiene like?–Where have their devices been?–Where have those thumb drives been?

May 9, 2023Copyright 2016 ES&A, Inc. All Rights Reserved Confidential and Proprietary12

Page 13: PowerPoint Presentation€¦ · PPT file · Web view2017-06-13 · Vandalism. Disgruntled employees. New methods to commit old crimes. ... Use lock screens on mobile devices. Mind

Don’t share cooties• Consider the terms of accessing your

company network–May employees connect personal

devices to the work network?– Do contractors have access?– Beware of “jailbroken” devices – Consider options like mobile device

management software• Scan media (e.g. thumb drives) if

they are coming in from unknown sources

May 9, 2023Copyright 2016 ES&A, Inc. All Rights Reserved Confidential and Proprietary13

Page 14: PowerPoint Presentation€¦ · PPT file · Web view2017-06-13 · Vandalism. Disgruntled employees. New methods to commit old crimes. ... Use lock screens on mobile devices. Mind

Pick up after yourself

• A place for every password and every password in its place–Where do you keep your credentials?–When’s the last time you cleaned them

out?– Are credentials doubled up?– How many devices across how many

networks have you used your credentials on?

May 9, 2023Copyright 2016 ES&A, Inc. All Rights Reserved Confidential and Proprietary14

Page 15: PowerPoint Presentation€¦ · PPT file · Web view2017-06-13 · Vandalism. Disgruntled employees. New methods to commit old crimes. ... Use lock screens on mobile devices. Mind

Pick up after yourself

• Info and credentials should have an expiration date

• Mind your passwords– Don’t double up on credential usage – How many post-its are you using?

• Consider using a password manager

May 9, 2023Copyright 2016 ES&A, Inc. All Rights Reserved Confidential and Proprietary15

Page 16: PowerPoint Presentation€¦ · PPT file · Web view2017-06-13 · Vandalism. Disgruntled employees. New methods to commit old crimes. ... Use lock screens on mobile devices. Mind

Lock your doors

• Are you taking full advantage of security tools?

• Weak passwords are easy to crack– Brute force– Password dictionaries

• Access controls frequently have publicly-accessible control panels and/or default admin passwords

May 9, 2023Copyright 2016 ES&A, Inc. All Rights Reserved Confidential and Proprietary16

Page 17: PowerPoint Presentation€¦ · PPT file · Web view2017-06-13 · Vandalism. Disgruntled employees. New methods to commit old crimes. ... Use lock screens on mobile devices. Mind

Lock your doors

• Use lock screens on mobile devices• Mind your passwords– Length (8+) – Complexity (Upper case, lower case,

number, special character)• Don’t forget about physical security• Change your factory default

passwords• Consider multi-factor

authenticationMay 9, 2023Copyright 2016 ES&A, Inc. All Rights Reserved Confidential and Proprietary17

Page 18: PowerPoint Presentation€¦ · PPT file · Web view2017-06-13 · Vandalism. Disgruntled employees. New methods to commit old crimes. ... Use lock screens on mobile devices. Mind

Wash your hands and take your vitamins• How often does your computer get a

checkup?– Automated scans?– Software updated?

• WannaCry, May 2017– Affected unpatched Microsoft operating

systems• Supported OS could patch in March 2017

(Windows Vista, 7, 8.1, 10) • Unsupported OS had no patch (XP, others)

May 9, 2023Copyright 2016 ES&A, Inc. All Rights Reserved Confidential and Proprietary18

Page 19: PowerPoint Presentation€¦ · PPT file · Web view2017-06-13 · Vandalism. Disgruntled employees. New methods to commit old crimes. ... Use lock screens on mobile devices. Mind

Wash your hands and take your vitamins

• Keep your software updated – Consider SaaS models

• Get regular checkups– Schedule regular scans

• Don’t ignore warning signs– Error messages sometimes have

important things to say

May 9, 2023Copyright 2016 ES&A, Inc. All Rights Reserved Confidential and Proprietary19

Page 20: PowerPoint Presentation€¦ · PPT file · Web view2017-06-13 · Vandalism. Disgruntled employees. New methods to commit old crimes. ... Use lock screens on mobile devices. Mind

MAKING IT WORK FOR YOUR ORGANIZATION

TrainingProcessesDocumentation

May 9, 2023Copyright 2017 ES&A, Inc. All Rights Reserved Confidential and Proprietary20

Page 21: PowerPoint Presentation€¦ · PPT file · Web view2017-06-13 · Vandalism. Disgruntled employees. New methods to commit old crimes. ... Use lock screens on mobile devices. Mind

Take stock of your operations

PEOPLE• Categories of

users• Employee

lifecycle

THINGS• Function

(Access control? Critical asset?)

• Mobile?• Owner?

PEOPLE + THINGS

• Inside - workflows and data lifecycle

• Outside - access and transfer

May 9, 2023Copyright 2017 ES&A, Inc. All Rights Reserved Confidential and Proprietary21

Page 22: PowerPoint Presentation€¦ · PPT file · Web view2017-06-13 · Vandalism. Disgruntled employees. New methods to commit old crimes. ... Use lock screens on mobile devices. Mind

What is your risk tolerance?

• Liability for protected information– Health– Financial– Info re children– Security-related

• Relationship to customers and vendors

• Business continuity

May 9, 2023Copyright 2017 ES&A, Inc. All Rights Reserved Confidential and Proprietary22

Page 23: PowerPoint Presentation€¦ · PPT file · Web view2017-06-13 · Vandalism. Disgruntled employees. New methods to commit old crimes. ... Use lock screens on mobile devices. Mind

Formalize, document, and train!

• Policies and agreements– IP and employment– Data classification– Data retention (lifecycle handling)– BYOD and network access

• Training and documentation– Onboarding and offboarding– Periodic training, changes in access

rights

May 9, 2023Copyright 2017 ES&A, Inc. All Rights Reserved Confidential and Proprietary23

Page 24: PowerPoint Presentation€¦ · PPT file · Web view2017-06-13 · Vandalism. Disgruntled employees. New methods to commit old crimes. ... Use lock screens on mobile devices. Mind

Find Expertise and Help

• Inside your organization– Departments – IT, HR, Legal– Levels – Executive, front-line– Generations – consider reverse

mentoring• Outside your organization– Technical expertise– Insurance– Incident response

May 9, 2023Copyright 2017 ES&A, Inc. All Rights Reserved Confidential and Proprietary24

Page 25: PowerPoint Presentation€¦ · PPT file · Web view2017-06-13 · Vandalism. Disgruntled employees. New methods to commit old crimes. ... Use lock screens on mobile devices. Mind

QUESTIONS?

May 9, 2023Copyright 2017 ES&A, Inc. All Rights Reserved Confidential and Proprietary25