+ All Categories
Home > Documents > Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security...

Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security...

Date post: 30-Aug-2020
Category:
Upload: others
View: 1 times
Download: 0 times
Share this document with a friend
104
Copyright Alpine Business Systems
Transcript
Page 1: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

Copyright Alpine Business Systems

Page 2: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

“The human factor is truly security’s weakest link.”

The Art of Deception

by

Kevin Mitnick, convicted CyberCriminal

Page 3: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM
Page 4: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM
Page 5: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM
Page 6: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

If “Hackers Inc.” was a company:

#1 on Fortune 500

74x the size of Walmart

Page 7: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

If “Hackers Inc.” was a company:

#1 on Fortune 500

74x the size of Walmart

In 2016, 51% of American adults had their personal information stolen by hackers, primarily through data breaches at large companies (CBS)

Page 8: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

If “Hackers Inc.” was a company:

#1 on Fortune 500

74x the size of Walmart

In 2016, 51% of American adults had their personal information stolen by hackers, primarily through data breaches at large companies (CBS)

Average total cost of a breach:

$3.8 million (IBM)

Page 9: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

If “Hackers Inc.” was a company:

#1 on Fortune 500

74x the size of Walmart

In 2016, 51% of American adults had their personal information stolen by hackers, primarily through data breaches at large companies (CBS)

Average total cost of a breach: $3.8 million (IBM)

90% of breaches in 2015 were caused by human error or carelessness (IBM)

Page 10: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

The FBI

Page 11: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

The FBI

The President

Page 12: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

The FBI

The President

The Joint Chiefs of Staff

Page 13: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

Job #1: Backups, Business Continuity, and Disaster Recovery

Page 14: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

Job #1: Backups, Business Continuity, and Disaster Recovery

There is no Privacy on the Internet

Page 15: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

Job #1: Backups, Business Continuity, and Disaster Recovery

There is no Privacy on the Internet

Information about you and your firm is easily accessible.

Page 16: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

Job #1: Backups, Business Continuity, and Disaster Recovery

There is no Privacy on the Internet

Information about you and your firm is easily accessible.

Nothing is free in life or on the Internet

Page 17: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

Job #1: Backups, Business Continuity, and Disaster Recovery

There is no Privacy on the Internet

Information about you and your firm is easily accessible.

Nothing is free in life or on the Internet

Be vigilant always

Page 18: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

What do Apple, Google, Microsoft, AOL,

Facebook, your Internet provider, and the

government know about you?

Page 19: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

What do Apple, Google, Microsoft, AOL, Facebook, your ISP, and the government know about you?

EVERYTHING!

Your IQ

Personal interests, likes, dislikes

Browsing history

Habits

When you access the Internet, check mail

Page 20: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

Forget this at your own risk

Page 21: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

Forget this at your own risk

Criminals want you to believe otherwise

Page 22: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

Forget this at your own risk

Criminals want you to believe otherwise

They make offers that are too good to be true

Free music, videos

Free money

Page 23: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

Forget this at your own risk

Criminals want you to believe otherwise

Cybercriminals make offers that are too good to be true

Free music, videos

Free money

What you give up for free technology

Page 24: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

The criminals never sleep – they have robots

Page 25: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

The criminals never sleep – they have robots

“Only the Paranoid Survive,” Andy GroveCo-founder and CEO of Intel

Page 26: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

The criminals never sleep – they have robots

“Only the Paranoid Survive,” Andy GroveCo-founder and CEO of Intel

Everyone and every company is under attack

Page 27: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

The criminals never sleep – they have robots

“Only the Paranoid Survive,” Andy GroveCo-founder and CEO of Intel

Everyone and every company is under attack

The old way of thinking

There are only 2 kinds of companies

Page 28: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

The criminals never sleep – they have robots

“Only the Paranoid Survive,” Andy GroveCo-founder and CEO of Intel

Everyone and every company is under attack

The old way of thinking

2 kinds of companies:

1. Those that know they are under attack

2. Those that don’t

Page 29: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

The criminals never sleep – they have robots

“Only the Paranoid Survive,” Andy GroveCo-founder and CEO of Intel

Everyone and every company is under attack

The current paradigm

2 kinds of companies:

1. Those that have been breached

2. Those that will be breached(the FBI and Lowell McAdam, Verizon CEO)

Page 30: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

2007 – Self morphing viruses

Page 31: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

2007 – Self morphing viruses

2009 – Zeus Virus – the man in the browser – NO browser is safe

Page 32: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

2007 – 2009 Self morphing viruses/Zeus Virus

2011 – 300% increase in cyber –attacks

Page 33: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

2007 – 2009 Self morphing viruses/Zeus Virus

2011 – 300% increase in cyber –attacks

2013 – Attacks targeted at contents of RAM (Target)

Page 34: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

2007 – 2009 Self morphing viruses/Zeus Virus

2011 – 300% increase in cyber –attacks

2013 – Attacks targeted at contents of RAM (Target)

2014 – SSL Vulnerability (Heartbleed), Sony hack

Page 35: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

2007 – 2009 Self morphing viruses/Zeus Virus

2011 – 300% increase in cyber –attacks

2013 – Attacks targeted at contents of RAM (Target)

2014 – SSL Vulnerability (Heartbleed), Sony hack

2015 – Massive attack at U.S. Office of Personnel Management

Page 36: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

2007 – 2009 Self morphing viruses/Zeus Virus

2011 – 300% increase in cyber –attacks

2013 – Attacks targeted at contents of RAM (Target)

2014 – SSL Vulnerability (Heartbleed), Sony hack

2015 – Massive attack at U.S. Office of Personnel Management

2016 – Ukraine Power Grid Hack disclosed

Page 37: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

2007 – 2009 Self morphing viruses/Zeus Virus

2011 – 300% increase in cyber –attacks

2013 – Attacks targeted at contents of RAM (Target)

2014 – SSL Vulnerability (Heartbleed), Sony hack

2015 – Massive attack at U.S. Office of Personnel Management

2016 – Ukraine Power Grid Hack disclosed

2017 – Podesta, DNC, Yahoo, Swift, LinkedIn

Page 38: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM
Page 39: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

The same reason why Willie Sutton and John Dillinger said they robbed banks years ago

Page 40: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

The same reason why Willie Sutton and John Dillinger said they robbed banks years ago

That’s where the money is!

Page 41: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

Then: Pranksters, smart kids that were bored

Now: 5 Distinct Groups

Page 42: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

Insiders

Page 43: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

Individuals, Lone Wolves

Page 44: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

Hacktivists (Anonymous and others)

Infamous Estonia hack

Page 45: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

State-sponsored TerroristsChina, North Korea, Russia, Iran

Page 46: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

Well Organized Criminal Networks

Page 47: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM
Page 48: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

EVERYONE!

Page 49: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

EVERYONE!

90% of all attacks are against businesses with

< 1,000 employees

Page 50: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

EVERYONE!

90% of all attacks are against businesses with < 1,000 employees

1/3 of all breaches are against companies with < 100 employees

Page 51: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

EVERYONE!

90% of all attacks are against businesses with < 1,000 employees

1/3 of all breaches are against companies with < 100 employees

Retailers are attacked most.

3x more than the previous #1 targets,

financial institutions

Page 52: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

Our filter processes billions emails/month

98% are SPAM

Page 53: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

Our filter processes billions emails/month; 98% are SPAM

Easy to create, spoof addresses (impersonate someone)

Page 54: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

Our filter processes billions emails/month and 98% are SPAM

Easy to create, spoof addresses (impersonate someone else)

Designed to decrease productivity, spread malware

Page 55: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

Our filter processes billions emails/month; 98% are SPAM

Easy to create, spoof addresses (impersonate someone else)

Designed to decrease productivity, spread malware

Used by the spammers as a way to communicate

Page 56: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

Our filter processes billions emails/month and 98% are SPAM

Easy to create, spoof addresses (impersonate someone else)

Designed to decrease productivity, spread malware

Used by the spammers as a way to communicate

Hundreds of attempts foiled every week

Page 57: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

Our filter processes billions emails/month and 98% are SPAM

Easy to create, spoof addresses (impersonate someone else)

Designed to decrease productivity, spread malware

Used by the spammers as a way to communicate

Hundreds of attempts foiled every week

Designed to steal information

Page 58: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

Our filter processes billions emails/month and 98% are SPAM

Easy to create, spoof addresses (impersonate someone else)

Designed to decrease productivity, spread malware

Used by the spammers as a way to communicate

Hundreds of attempts foiled every week

Designed to steal information

Multiple methods of infection:

emails, web sites, music sharing sites

Page 59: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

1 in 8 web pages are infected.

9500 per day (Google statistic)

Page 60: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

1 in 8 web pages are infected. 9500 per day (Google statistic)

Be very suspicious

Page 61: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

1 in 8 web pages are infected. 9500 per day (Google

statistic)

Be very suspicious

NEVER click on a link unless you are absolutely sure it is safe!

Page 62: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

1 in 8 web pages are infected. 9500 per day (Google statistic)

Be very suspicious

NEVER click on a link unless you are absolutely sure it is safe!

Mouse over a link to see the REAL URL

Page 63: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

1 in 8 web pages are infected. 9500 per day (Google statistic)

Be very suspicious

NEVER click on a link unless you are absolutely sure it is safe!

Mouse over a link to see the REAL URL

Look for the name right before .com, .org, etc. in the URL

Page 64: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

1 in 8 web pages are infected. 9500 per day (Google statistic)

Be very suspicious

NEVER click on a link unless you are absolutely sure it is safe!

Mouse over a link to see the REAL URL

Look for the name right before .com, .org, etc. in the URL

If requested to change your password for a site – DO NOT CLICK ON THE LINK! Delete the email, open your browser, log into the site manually, and change your password.

Page 65: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

1 in 8 web pages are infected. 9500 per day (Google statistic)

Be very suspicious

NEVER click on a link unless you are absolutely sure it is safe!Mouse over a link to see the REAL URL

Look for the name right before .com, .org, etc. in the URL

If requested to change your password for a site – DO NOT CLICK ON THE LINK! Delete the email, open your browser, log into the site manually, and change the password.

Confirm the identity of anyone that sends you a link or attachment – Right click on the email address to see who it really is!

Page 66: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

Facebook, Twitter, Google+, Pinterest, thousands of them

The good, the bad, and the ugly

Page 67: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

Facebook, Twitter, Google+, Pinterest, thousands of them

The good, the bad, and the ugly

Once it is on the Internet –it never goes away!

Page 68: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

Facebook, Twitter, Google+, Pinterest, thousands of them

The good, the bad, and the ugly

Once it is on the Internet – it never goes away!

Be careful what you post.Don’t be stupid!

Page 69: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

Delete the ones you do not use

Wipe your phone before discarding it

Location services – the good and bad

The microphone and camera

More than 50% take your personal info

(Wall Street Journal)

Page 70: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

Great technology if they are secured.

Hacker’s paradise if not.

Page 71: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

Great technology if they are secured. Hacker’s paradise if not.

Beware. Hackers can spoof an access point.

Page 72: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

Great technology if they are secured. Hacker’s paradise if not.

Beware. Hackers can spoof an access point.

If it does not require a password it is OPEN and is less secure!

Page 73: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

Great technology if they are secured. Hacker’s paradise if not.

Beware. Hackers can spoof an access point.

If it does not require a password it is OPEN and is less secure!

Be sure you only access HTTPS:// sites on OPEN WiFi Networks

Page 74: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

Great technology if they are secured. Hacker’s paradise if not.

Beware. Hackers can spoof an access point.

If it does not require a password it is OPEN and it is less secure!

Be sure you only access HTTPS:// sites on open WiFi networks

At home: Use encryption.

WPA-PSK or stronger.

Page 75: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

Powerful tools for a hacker

Easy to embed with a virus

Page 76: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

Powerful tools for a hacker

Easy to embed with a virus

The Iranian nuclear program put back 2-3 years

Page 77: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

Powerful tools for a hacker

Easy to embed with a virus

The Iranian nuclear program put back 2-3 years

U.S. nuclear secrets stolen

Page 78: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

Powerful tools for a hacker

Easy to embed with a virus

The Iranian nuclear program put back 2-3 years

U.S. nuclear secrets stolen

Only use brand names

Never use one you “found”

Page 79: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

Powerful tools for a hacker

Easy to embed with a virus

The Iranian nuclear program put back 2-3 years

U.S. nuclear secrets stolen

Only use brand names

Never use one you “found”

Always be sure your anti-virus is up to date and configured to scan anything that is plugged into your computer

Page 80: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

Powerful tools for a hackerEasy to embed with a virusThe Iranian nuclear program put back 2-3 yearsU.S. nuclear secrets stolenOnly use brand namesNever use one you “found”Always be sure your anti-virus is up to date and configured to scan anything that is plugged into your computer

What companies are doing to protect themselves – No USB, no DVD

Page 81: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

“Psychological manipulation of people into performing actions or divulging confidential information.” – Wikipedia

The latest and most effective tool

Page 82: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

“Psychological manipulation of people into performing actions or divulging confidential information.” – Wikipedia

The latest and often the most effective tool

Some scenarios – the help desk, the acquaintance, the researcher

Page 83: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

“Psychological manipulation of people into performing actions or divulging confidential information.” – Wikipedia

The latest and often the most effective tool

Some scenarios – the help desk, the acquaintance, the researcher

How Snowden did it

Page 84: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

Criminals do their research

Page 85: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

Criminals do their research

They may register a domain name that has 1 character different from yours

Page 86: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

Criminals do their research

They may register a domain name that has 1 character different from yours

Email comes from a principal to a finance employee requesting a wire transfer

Page 87: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

Criminals do their research

They may register a domain name that has 1 character different from yours

Email comes from a principal to a finance employee requesting a wire transfer

This has worked MANY times!

Page 88: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

Lock the doors!

Page 89: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

Lock the doors!

Lock your computer: CTRL-ALT-DEL – Lock Computer

Page 90: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

Lock the doors!

Lock your computer: CTRL-ALT-DEL – Lock Computer

Logoff your computer: Start – Shutdown – Logoff

Page 91: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

Lock the doors!

Lock your computer: CTRL-ALT-DEL – Lock Computer

Logoff your computer: Start – Shutdown – Logoff

Do not leave passwords written next to computer

Page 92: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

Lock the doors!

Lock your computer: CTRL-ALT-DEL – Lock Computer

Logoff your computer: Start – Shutdown – Logoff

Do not leave passwords next to your computer

USB Flash Drives & Smartphones: Use caution!

Page 93: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

Lock the doors!

Lock your computer: CTRL-ALT-DEL – Lock Computer

Logoff your computer: Start – Shutdown – Logoff

Do not leave passwords written next to computer

USB Flash Drives & Smartphones: Use caution!

Notebook computers – one of the largest data theft targets

Page 94: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

Change your password regularly – CTRL-ALT-DEL –Change Password

Page 95: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

Change your password regularly – CTRL-ALT-DEL – Change Password

Minimum 8 characters; 3 of these: Upper, Lower, Numbers, Symbols

Page 96: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

Change your password regularly – CTRL-ALT-DEL – Change Password

Minimum 8 characters; 3 of these: Upper, Lower, Numbers, Symbols

Don’t give it to anyone – no matter what they say!

Page 97: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

Change your password regularly – CTRL-ALT-DEL – Change Password

Minimum 8 characters; 3 of these: Upper, Lower, Numbers, Symbols

Don’t give it to anyone – no matter what they say!

Never e-mail work products to your personal e-mail account

Page 98: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

Change your password regularly – CTRL-ALT-DEL – Change Password

Minimum 8 characters; 3 of these: Upper, Lower, Numbers, Symbols

Don’t give it to anyone – no matter what they say!

Never e-mail work products to your personal e-mail account

Meta-data- What it is, what is the risk

Page 99: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

http://www.alpinebiz.comBill Blum [email protected]

Here’s the Good News!

Page 100: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

http://www.alpinebiz.comBill Blum [email protected]

Here’s the Good News!

Bad guys are lazy.

Page 101: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

http://www.alpinebiz.comBill Blum [email protected]

Here’s the Good News!

Bad guys are lazy.

They like easy ‘soft’ targets and there are

plenty of them.

Page 102: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

http://www.alpinebiz.comBill Blum [email protected]

Here’s the Good News!

Bad guys are lazy.

They like easy ‘soft’ targets and there are plenty of them.

Be a HARD target!

Page 103: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

1. Keep Anti-Virus, Operating System, Flash & Java up to date. Configure Anti-Virus to scan anything that is plugged in to your computer.

2. Backup your data!

3. Change your passwords, make them strong, protect them

4. Lock or logoff your computer

5. Never e-mail work products to your personal email account

6. Never use Flash Drives you “found” or ones given to you. Buy and use brand names only

7. Wipe your Smart Phone before discarding it

8. Never divulge any information to anyone you don’t know, including “market research firms”

9. Always convert sensitive files to PDF before sending them to strip out metadata.

10. Only use secure portals (https://) when transmitting personal information.

11. Never use “free” music/video sharing sites

12. Protect your wireless networks with passwords.

13. Beware of unsolicited links or attachments. Never open a link or attachment unless you are ABSOLUTELY sure it is safe. Report anything that is suspicious – DO NOT CLICK ON IT!

14. Check your bank accounts daily and credit cards at least monthly

15. Download and configure Trusteer Rapport https://www.trusteer.com/ProtectYourMoney

http://www.alpinebiz.comBill Blum [email protected]

Page 104: Cyber Security Training Seminar - Alpine Business Systems · 2017. 1. 12. · Title: Cyber Security Training Seminar Author: jd'angelo Created Date: 1/12/2017 11:04:32 AM

Copyright Alpine Business Systems

[email protected]


Recommended