2017 Spring Tech Conference - UTSA STC... · 2017 Spring Tech Conference . Digital Media:...

Post on 27-May-2020

2 views 0 download

transcript

2017 Spring Tech Conference

Digital Media:Protecting Your Data and Yourself

Presenters: Brad CooperSenior Information Security Analyst

Lance PritchardSenior Information Security Analyst

Overview

Session Topic- Overview

Introduction:• This session will cover guidelines to protect your data

when visiting websites, using your mobile devices and when using your email.

Why it matters?• Data breaches don’t only happen to large

corporations. Malicious websites, mobile device hacking and phishing emails are prevalent throughout society and you are the target.

Take Away

1. Know what to watch for when using your digital devices

2. Know the telltale signs you’re being targeted

3. Know how to reduce your chance of being a victim

Email

• What is Phishing?• Deceptive, Spear, Whaling, Pharming, Vishing…

• Have you ever received an unsolicited offer via email?

Phishing

EmailPhishing

Link= https://t.co/7KSjYg8c2H

EmailPhishing

Link= http://www.agrar-dippe.de/media/client/autolink2/AccountSettings.htm?email=jane.doe@utsa.edu

EmailPhishing

What’s wrong with this?

EmailPhishing

What’s wrong with this?

EmailPhishing

What’s wrong with this?

Websites & Online

• Computer• Admin accounts• Guest accounts• Non-admin accounts

• Use different password/PIN for each account

• Change default passwords

Accounts

Websites & OnlineDefault Passwords

Websites & Online

• Don’t assume a public Wi-Fi network is secure

• Look for the padlock

• Turn on your firewall, block all incoming traffic

• Check the network name• Use two-factor authentication

Public Wi-Fi

Websites & Online

• Three credit report a year (free)• TransUnion• Equifax• Experian

• Monitor account especially when fraud is suspected

• https://www.annualcreditreport.com

Identity Theft

Websites & OnlineSACU

Websites & OnlineUSAA

Websites & OnlineWebsites

• Hover over links http://www.utsa.edu

http://www.utsa.comhttp://www.google.com/

Websites & OnlineDownloading Software

Websites & OnlineAdware

Mobile Devices

• There are over 4,700,000,000 mobile phones in the world.

https://www.statista.com/statistics/274774/forecast-of-mobile-phone-users-worldwide/

• There are over 265,000,000 mobile phone in the U.S.

https://www.statista.com/statistics/222306/forecast-of-smartphone-users-in-the-us/

• Time spent per adult user per day on a mobile device has increased from 2.37 hours in 2014 to 3.15 hours today.

http://www.geomarketing.com/us-mobile-usage-in-2017-stats-you-need-to-know

Mobile Devices

• Mobile device users spend 90% of their time on mobile apps compared to mobile sites.

http://www.smartinsights.com/mobile-marketing/mobile-marketing-analytics/mobile-marketing-statistics/

• $4.72B (20.8%) of all digital commerce spending was on mobile devices (2016).

https://www.statista.com/statistics/268439/quarterly-us-mobile-e-commerce-spending/

Mobile Devices

Average number of mobile devices per person (Global)

• About 3.64https://www.globalwebindex.net/blog/digital-consumers-own-3.64-connected-devices

• Estimated 4.3 in 2020Sources: 2013, SOPHOS, “How do you compare to Steve Wozniak?”; 2012, NetworkWorld, “BYOD is a user-driven movement, not a secure mobile device strategy”

How many do you have?

How Important Is Your Device?

• Can you go without it for a day? A week?

• Why is it important to you?

• What do you do with it?

• What do you have on your mobile devices?

• Do you protect your data and devices?

How to Protect

• Password protect your devices

• Choose the strongest password allowed

• Enable auto lock• Use recovery apps (Find My iPhone, Google

Device Manager, etc.)• Enable remote wipe capabilities

• Update OS and software/apps regularly

How to Protect

• Install and run Anti-Virus/Anti-Malware software (McAfee, Kaspersky, Bitdefender, etc.)

• Know your apps and the permissions they need

• Uninstall/disable unnecessary or unused apps and services

• Keep sensitive data off your device• Use ‘vaults’ for a second layer of password

protection

How to Physically Secure

• Keep a firm grip on your device

• Keep device in a hard-to-access place• Tight front pocket• Deep pocket in bag

• Don’t advertise you have a new “Amazing” device

http://www.cnet.com/pictures/best-practices-for-smartphone-security/7/

Questions?

Brad CooperSenior Information Security Analystbrad.cooper@utsa.edu

Lance PritchardSenior Information Security Analystlance.pritchard@utsa.edu

Thank you!

Please complete the session survey before leaving