I m getting MFA, you re getting MFA, we re ALL getting MFA. Richard Biever (richard.biever@duke.edu) Chuck Kesler (chuck.kesler@duke.

Size: px
Start display at page:

Download "I m getting MFA, you re getting MFA, we re ALL getting MFA. Richard Biever (richard.biever@duke.edu) Chuck Kesler (chuck.kesler@duke."

Transcription

1 I m getting MFA, you re getting MFA, we re ALL getting MFA Richard Biever (richard.biever@duke.edu) Chuck Kesler (chuck.kesler@duke.edu)

2 Durham, we have a problem

3 Passwords are the most used way to secure data, but People shared passwords People use and re- use weak passwords People fall for phishing messages

4 Cracking passwords is child s play 25 GPUs = 350 billion guesses per second (in 2013)

5 Phishing employees is even easier

6 Malicious vs. legitimate Malicious Spam Delivered Aug- 14 Sep- 14 Oct- 14 Nov- 14 Dec- 14 Jan- 15 Feb- 15 Mar- 15 Apr- 15 May- 15 Jun- 15 Jul- 15 Monthly Averages Blocked Malicious: 54% Delivered (includes unfiltered or targeted phishing messages): 23% Blocked Spam: 18%

7 Options? Hire these guys to watch our network Change password policy to 20 characters, changeable every 90 days Introduce multifactor authentication By the way, regular password changes and complex passwords don t solve the phishing problem

8 A New Hope

9 What should we use for 2 nd factors? (Technology)

10 Where should we apply it? (Integration)

11 How should we apply it? (Policy) Mandatory or Opt- in What applications Failure mode (open or closed) Get out of Jail Free Trusted devices or browsers

12 Tying it all together Policy Mandatory for IT staff Mandatory for Protected Network Mandatory for certain websites Temporary passcodes via challenge- response Fail open for websites Fail closed for SSH/RDP/VPN Remember me - 12 hours Integration Shibboleth RDP SSH VPN No integration for thick clients such as mail clients, employee systems, or student information systems Technology Duo Yubikey Phones

13 Who gets it first? (Rollout/Testing) Iterative process to improve the service Start with small group of IT personnel Expand to central IT and departmental IT volunteers Require for central IT By January 2014, ~600 people enrolled, primarily IT staff or early adopters. Focused on Shibboleth and SSH/RDP integration

14 I love the smell of napalm in the morning

15 Direct Deposit Phishing Scam Attack Resulting Measures

16

17 By Fall of Executive Memo Users enrolled in month Total users enrolled Phishing Incidents But even the nearly 1400% increase since February is only about 17% of the Duke faculty & staff population; extrapolating the 250/month rate since May would mean it would be October 2025 before we reach entire population

18 The secret of our success Duke Medicine Case Study

19 Getting the Board s attention: Healthcare under attack BCBS Tennessee 1M Stolen Hard Drives NYC Health & Hospitals 1.7M Stolen Backup Tapes TRICARE 4.9M Lost Backups Utah Dept. of Health 780K Hacking Advocate Medical 4M Computer Theft Community Health 4.5M Hacking Premera BCBS 11M Hacking Excellus BCBA 10M Hacking AvMed 1.2M Stolen Laptops Health Net 1.9M Lost Hard Drives Emory 315K Lost Backups Horizon BCBS 840K Laptop Theft Anthem BCBS 80M Hacking Source: Privacy Rights Clearinghouse, Nemours 1.6M Lost Backups Montana Public Health 1.3M Hacking CareFirst BCBS 1.1M Hacking

20 Making our case: recognizing users as the weak link By targeting Anthem employees with phishing s and luring them to the fake sites, it may have been possible for the attackers to collect the logins and passwords and eventually access the insurer's real systems. ThreatConnect, an Arlington, Virginia- based security company, found that Premera appears to have been targeted by the same style of attack. - ComputerWorld

21 The turning point: Leadership buys in Today, Multi- Factor Authentication should be considered table stakes for information security you just have to do it. (paraphrasing one Board member s comments) January 2015 Board formally endorses MFA initiative after a presentation on information security risks and strategy February 2015 Medical leadership approves MFA strategy and asks for a detailed roll- out plan March 2015 Pilot begins with requiring MFA for Duke Medicine IT staff April 2015 MFA policy and roll- out plan approved through governance; 9/1 established as target date for requiring MFA for remote access to clinical systems

22 Key provisions of the MFA policy System Scope User Scope Awareness Enforcement Exceptions Remote access to applications that house sensitive information All Duke Medicine workforce members required to enroll in MFA Ensure broad, multi- modal communications and training Managers track and enforce enrollment for their teams Managed through the Information Security Office

23 Challenges Manage Cost Manage Complexity Manage Timeline Piggybacked on theuniversity s contract with Duo Encouraged BYOD for MFA tokens Addressed hardship cases and other one- offs by centrally funding fallback solutions (e.g. Yubikeys) Goal was to minimize disruptions to clinical workflows Leveraged work already done by the University with Duo and Shibboleth Provided flexible options for MFA tokens to meet many needs Limited initial scope to highest risk areas, and build from there Needed to enroll and train 20,000+ users in 5 months Put our bosses to work! Executive support was crucial Communications: newsletters, memos, in- person outreach, direct s Created natural consequences for failing to enroll: no remote access

24 Turning up the heat on MFA in All staff memo Direct to user notifications All staff memo All staff memo Users enrolled in the given month Total users enrolled by the end of the current month

25 Crunch time enrollment for Duke Medicine 100% 90% 80% 70% 60% 50% 40% 30% 20% 10% 0% 39% 39% 41% 43% 45% 46% 49% 01- Jun 08- Jun 15- Jun 22- Jun 29- Jun Newsletter article 06- Jul All staff memo 13- Jul 56% 61% Enrollment reports to leadership 20- Jul 27- Jul 67% 72% 76% 83% 90% 94% 03- Aug Newsletter article 10- Aug 17- Aug Direct user notifications 24- Aug 31- Aug 07- Sep Enrollment %

26 Support impact on Service Desk calls Sep 14- Sep 07- Sep 31- Aug 24- Aug 17- Aug 10- Aug 03- Aug 27- Jul 20- Jul 13- Jul 06- Jul 29- Jun 22- Jun 15- Jun 08- Jun 01- Jun Based off 30,000 Duke Medicine employees (faculty, staff, doctors and nurses)

27 Support impact on Service Desk calls 800 Go- Live Sep 14- Sep 07- Sep 31- Aug 24- Aug 17- Aug 10- Aug 03- Aug 27- Jul 20- Jul 13- Jul 06- Jul 29- Jun 22- Jun 15- Jun 08- Jun 01- Jun

28 Coming of age

29 What did we learn? Have a good communication plan and ACTIVE executive support Consider and document your policy Decide on an enrollment strategy (hands on sessions, and don t force- enroll) Set a date to complete enrollment and enforce on a service used by most people Focus on critical groups/assets first Think about other areas to add MFA it s not just a gateway service Think about edge cases that don t log into campus services regularly

AT&T Global Network Client for Windows Product Support Matrix January 29, 2015

AT&T Global Network Client for Windows Product Support Matrix January 29, 2015 AT&T Global Network Client for Windows Product Support Matrix January 29, 2015 Product Support Matrix Following is the Product Support Matrix for the AT&T Global Network Client. See the AT&T Global Network

More information

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS* COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) 2 Fixed Rates Variable Rates FIXED RATES OF THE PAST 25 YEARS AVERAGE RESIDENTIAL MORTGAGE LENDING RATE - 5 YEAR* (Per cent) Year Jan Feb Mar Apr May Jun

More information

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS* COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) 2 Fixed Rates Variable Rates FIXED RATES OF THE PAST 25 YEARS AVERAGE RESIDENTIAL MORTGAGE LENDING RATE - 5 YEAR* (Per cent) Year Jan Feb Mar Apr May Jun

More information

Computing & Telecommunications Services Monthly Report March 2015

Computing & Telecommunications Services Monthly Report March 2015 March 215 Monthly Report Computing & Telecommunications Services Monthly Report March 215 CaTS Help Desk (937) 775-4827 1-888-775-4827 25 Library Annex helpdesk@wright.edu www.wright.edu/cats/ Last Modified

More information

Multi-Factor Authentication FAQs

Multi-Factor Authentication FAQs General FAQs What is Multi-factor Authentication (MFA)? Multi-factor authentication (MFA) seeks to decrease the likelihood that others can access your data. Specifically, it enhances the security of your

More information

Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138. Exhibit 8

Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138. Exhibit 8 Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138 Exhibit 8 Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 2 of 138 Domain Name: CELLULARVERISON.COM Updated Date: 12-dec-2007

More information

Consumer ID Theft Total Costs

Consumer ID Theft Total Costs Billions Consumer and Business Identity Theft Statistics Business identity (ID) theft is a growing crime and is a growing concern for state filing offices. Similar to consumer ID theft, after initially

More information

Analysis One Code Desc. Transaction Amount. Fiscal Period

Analysis One Code Desc. Transaction Amount. Fiscal Period Analysis One Code Desc Transaction Amount Fiscal Period 57.63 Oct-12 12.13 Oct-12-38.90 Oct-12-773.00 Oct-12-800.00 Oct-12-187.00 Oct-12-82.00 Oct-12-82.00 Oct-12-110.00 Oct-12-1115.25 Oct-12-71.00 Oct-12-41.00

More information

Enhanced Vessel Traffic Management System Booking Slots Available and Vessels Booked per Day From 12-JAN-2016 To 30-JUN-2017

Enhanced Vessel Traffic Management System Booking Slots Available and Vessels Booked per Day From 12-JAN-2016 To 30-JUN-2017 From -JAN- To -JUN- -JAN- VIRP Page Period Period Period -JAN- 8 -JAN- 8 9 -JAN- 8 8 -JAN- -JAN- -JAN- 8-JAN- 9-JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- 8-JAN- 9-JAN- -JAN- -JAN- -FEB- : days

More information

IAMUCLA 2.0 SSO Updates

IAMUCLA 2.0 SSO Updates IAMUCLA 2.0 SSO Updates Common Systems Group Meeting July 27, 2015 IAMUCLA 2.0 Projects Password Security Concerns Technology Evolution Health Systems SSO Support Departmental/Service Accounts Testing

More information

DATA SECURITY HACKS, HIPAA AND HUMAN RISKS

DATA SECURITY HACKS, HIPAA AND HUMAN RISKS DATA SECURITY HACKS, HIPAA AND HUMAN RISKS MSCPA HEALTH CARE SERVICES SEMINAR Ken Miller, CPA, CIA, CRMA, CHC, CISA Senior Manager, Healthcare HORNE LLP September 25, 2015 AGENDA 2015 The Year of the Healthcare

More information

Reneaué Railton Sr. Informa2on Security Analyst, Duke Medicine Cyber Defense & Response

Reneaué Railton Sr. Informa2on Security Analyst, Duke Medicine Cyber Defense & Response Reneaué Railton Sr. Informa2on Security Analyst, Duke Medicine Cyber Defense & Response Incident Response What is the most importance component of an Incident Response Program? Tools? Processes? Governance?

More information

7/7/2014. Duke Medicine Security Awareness. The Information Security Tug-of-War...

7/7/2014. Duke Medicine Security Awareness. The Information Security Tug-of-War... Duke Medicine Security Awareness July 2014 Chuck Kesler, MBA, CISSP, CISM Chief Information Security Officer Duke Medicine Shelly Epps, MS Information Security Analyst Duke Medicine Page 1 The Information

More information

CHOOSE MY BEST PLAN OPTION (PLAN FINDER) INSTRUCTIONS

CHOOSE MY BEST PLAN OPTION (PLAN FINDER) INSTRUCTIONS CHOOSE MY BEST PLAN OPTION (PLAN FINDER) INSTRUCTIONS Anthem Medical Plan For Employees Working In the US February 10, 2012 Page 1 IMPORTANT NOTES YOU SHOULD CONSIDER BEFORE USING THE TOOL The Choose My

More information

Ashley Institute of Training Schedule of VET Tuition Fees 2015

Ashley Institute of Training Schedule of VET Tuition Fees 2015 Ashley Institute of Training Schedule of VET Fees Year of Study Group ID:DECE15G1 Total Course Fees $ 12,000 29-Aug- 17-Oct- 50 14-Sep- 0.167 blended various $2,000 CHC02 Best practice 24-Oct- 12-Dec-

More information

Multi- factor Authentication Initiative

Multi- factor Authentication Initiative Multi- factor Authentication Initiative "UCR s Multi- factor Authentication Initiative is an easy- to- use solution to our need to secure our campus community s credentials. The Duo Security system that

More information

P/T 2B: 2 nd Half of Term (8 weeks) Start: 25-AUG-2014 End: 19-OCT-2014 Start: 20-OCT-2014 End: 14-DEC-2014

P/T 2B: 2 nd Half of Term (8 weeks) Start: 25-AUG-2014 End: 19-OCT-2014 Start: 20-OCT-2014 End: 14-DEC-2014 2014-2015 SPECIAL TERM ACADEMIC CALENDAR FOR SCRANTON EDUCATION ONLINE (SEOL), MBA ONLINE, HUMAN RESOURCES ONLINE, NURSE ANESTHESIA and ERP PROGRAMS SPECIAL FALL 2014 TERM Key: P/T = Part of Term P/T Description

More information

P/T 2B: 2 nd Half of Term (8 weeks) Start: 26-AUG-2013 End: 20-OCT-2013 Start: 21-OCT-2013 End: 15-DEC-2013

P/T 2B: 2 nd Half of Term (8 weeks) Start: 26-AUG-2013 End: 20-OCT-2013 Start: 21-OCT-2013 End: 15-DEC-2013 2013-2014 SPECIAL TERM ACADEMIC CALENDAR FOR SCRANTON EDUCATION ONLINE (SEOL), MBA ONLINE, HUMAN RESOURCES ONLINE, NURSE ANESTHESIA and ERP PROGRAMS SPECIAL FALL 2013 TERM Key: P/T = Part of Term P/T Description

More information

Supervisor Instructions for Approving Web Time Entry

Supervisor Instructions for Approving Web Time Entry Supervisor Instructions for Approving Web Time Entry Time Approval Deadlines by Category Local 2110 Members members submit time by NOON on Monday of the pay week. Time should be approved no later than

More information

P/T 2B: 2 nd Half of Term (8 weeks) Start: 24-AUG-2015 End: 18-OCT-2015 Start: 19-OCT-2015 End: 13-DEC-2015

P/T 2B: 2 nd Half of Term (8 weeks) Start: 24-AUG-2015 End: 18-OCT-2015 Start: 19-OCT-2015 End: 13-DEC-2015 2015-2016 SPECIAL TERM ACADEMIC CALENDAR For Scranton Education Online (SEOL), Masters of Business Administration Online, Masters of Accountancy Online, Health Administration Online, Health Informatics

More information

Summary of the State of Security

Summary of the State of Security Summary of the State of Security Tram Jewett, CISA CliftonLarsonAllen LLP Virginia GFOA Annual Spring Conference, 2016 1 1 Summary of the State of Security Tram Jewett, MS., CISA, 11 years IT audit and

More information

MCU Online and MFA (Multi Factor Authentication)

MCU Online and MFA (Multi Factor Authentication) MCU Online and MFA (Multi Factor Authentication) Instructions for enrolling in MFA Security. 1. Type in your account number in the User ID box and press return or click on Log in. Figure A: 2. Enter your

More information

What does it take to deliver the most technologically advanced Games ever?

What does it take to deliver the most technologically advanced Games ever? What does it take to deliver the most technologically advanced Games ever? Enzo Sacco, Quang Tu October 20, 2015 Purpose of today s session To share our experiences and lessons learned in securing the

More information

Oregon s Experience Accepting Online Credit and Debit Payments

Oregon s Experience Accepting Online Credit and Debit Payments Oregon s Experience Accepting Online Credit and Debit Payments Statistical Charts and Examples Page 1 of 8 How Oregon s Case Validation Works Semi-Technical Speak As part of their process, a vendor using

More information

The Security Rule of The Health Insurance Portability and Accountability Act (HIPAA) Security Training

The Security Rule of The Health Insurance Portability and Accountability Act (HIPAA) Security Training The Security Rule of The Health Insurance Portability and Accountability Act (HIPAA) Security Training Introduction The HIPAA Security Rule specifically requires training of all members of the workforce.

More information

2015-16 BCOE Payroll Calendar. Monday Tuesday Wednesday Thursday Friday Jun 29 30 Jul 1 2 3. Full Force Calc

2015-16 BCOE Payroll Calendar. Monday Tuesday Wednesday Thursday Friday Jun 29 30 Jul 1 2 3. Full Force Calc July 2015 CM Period 1501075 July 2015 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 August 2015 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26

More information

Medical Information Breaches: Are Your Records Safe?

Medical Information Breaches: Are Your Records Safe? Medical Information Breaches: Are Your Records Safe? Learning Objectives At the conclusion of this presentation the learner will be able to: Recognize the growing risk of data breaches Assess the potential

More information

Reverse Transfer on a National Scale: Why? How?

Reverse Transfer on a National Scale: Why? How? Reverse Transfer on a National Scale: Why? How? Registrars and Provosts Meeting Charleston, West Virginia March 11, 2015 3/17/2015 1 What is reverse transfer? 3/17/2015 2 It s a big issue 3/17/2015 3 How

More information

KELLER INDEPENDENT SCHOOL DISTRICT

KELLER INDEPENDENT SCHOOL DISTRICT BOARD OF SCHOOL TRUSTEES KELLER INDEPENDENT SCHOOL DISTRICT 12B. Report Date: January 17, 2013 SUBJECT: FUNCTION: DELL SERVICES Technology DISTRICT KEY STRATEGIC PRIORITY: Educational Excellence Excellence

More information

Multi-Factor Authentication Reference Guide

Multi-Factor Authentication Reference Guide Multi-Factor Authentication Reference Guide March 2011 Support: (800) 350-3557 www.pacificwesternbank.com Table of Contents Multi-Factor Authentication (MFA) Required for All Customers...page 2 Challenge

More information

Enhanced Security for Online Banking

Enhanced Security for Online Banking Enhanced Security for Online Banking MidSouth Bank is focused on protecting your personal and account information at all times. As instances of internet fraud increase, it is no longer sufficient to use

More information

CENTERPOINT ENERGY TEXARKANA SERVICE AREA GAS SUPPLY RATE (GSR) JULY 2015. Small Commercial Service (SCS-1) GSR

CENTERPOINT ENERGY TEXARKANA SERVICE AREA GAS SUPPLY RATE (GSR) JULY 2015. Small Commercial Service (SCS-1) GSR JULY 2015 Area (RS-1) GSR GSR (LCS-1) Texarkana Incorporated July-15 $0.50690/Ccf $0.45450/Ccf $0.00000/Ccf $2.85090/MMBtu $17.52070/MMBtu Texarkana Unincorporated July-15 $0.56370/Ccf $0.26110/Ccf $1.66900/Ccf

More information

Detailed guidance for employers

Detailed guidance for employers April 2015 3 Detailed guidance for employers Appendix A: Pay reference periods This document accompanies: Detailed guidance no. 3 Assessing the workforce Pay reference period calendars where the definition

More information

Accident & Emergency Department Clinical Quality Indicators

Accident & Emergency Department Clinical Quality Indicators Overview This dashboard presents our performance in the new A&E clinical quality indicators. These 8 indicators will allow you to see the quality of care being delivered by our A&E department, and reflect

More information

South Dakota Board of Regents. Web Time Entry. Student. Training Manual & User s Guide

South Dakota Board of Regents. Web Time Entry. Student. Training Manual & User s Guide South Dakota Board of Regents Web Time Entry Student Training Manual & User s Guide Web Time Entry Self Service Web Time Entry is a web-based time entry system designed to improve accuracy and eliminate

More information

Modern two-factor authentication: Easy. Affordable. Secure.

Modern two-factor authentication: Easy. Affordable. Secure. Modern two-factor authentication: Easy. Affordable. Secure. www.duosecurity.com Your systems and users are under attack like never before The last few years have seen an unprecedented number of attacks

More information

Presentation Objectives

Presentation Objectives Get On-Board with New Employee On-Boarding Aaron Austin, MBA VP of Administration & Chief Human Resources Officer, Saint Joseph Regional Medical Center (South Bend, IN) Jennifer Straw Director of Compensation

More information

Admissions from A to Z NursingCAS & Admissions Workshop August 6, 2015. Best Practices, Challenges and Strategies with NursingCAS

Admissions from A to Z NursingCAS & Admissions Workshop August 6, 2015. Best Practices, Challenges and Strategies with NursingCAS Admissions from A to Z NursingCAS & Admissions Workshop August 6, 2015 Best Practices, Challenges and Strategies with NursingCAS Tuition-driven institutions Competitive environment An institution needs

More information

PowerSteering Product Roadmap Your Success Is Our Bottom Line

PowerSteering Product Roadmap Your Success Is Our Bottom Line Drive strategy. Accelerate results. cloud-based program & portfolio management software PowerSteering Product Roadmap Your Success Is Our Bottom Line Jay Hoskins Director of Product Management PowerSteering

More information

Multi-Factor Authentication (FMA) A new security feature for Home Banking. Frequently Asked Questions 8/17/2006

Multi-Factor Authentication (FMA) A new security feature for Home Banking. Frequently Asked Questions 8/17/2006 Multi-Factor Authentication (FMA) A new security feature for Home Banking Frequently Asked Questions 8/17/2006 1. Why is MFA being added? We take our obligation to protect our members seriously. To make

More information

BOARD OF DIRECTORS PAPER COVER SHEET. Meeting date: 29 November 2006 Agenda item: 7.4

BOARD OF DIRECTORS PAPER COVER SHEET. Meeting date: 29 November 2006 Agenda item: 7.4 BOARD OF DIRECTORS PAPER COVER SHEET Meeting date: 9 November 6 Agenda item: 7. Title: COMPLAINTS REPORT QUARTER 6/7 (1 July 6 3 September 6) Purpose: To update the board on the number and type of complaints

More information

Banner Employee Self-Service Web Time Entry. Student Workers User s Guide

Banner Employee Self-Service Web Time Entry. Student Workers User s Guide Banner Employee Self-Service Web Time Entry Student Workers User s Guide Table of Contents Introduction to Web Time Entry (WTE)... 1 Timeframe and Deadlines...1 Logging On....3 Access Time Sheet...5 Time

More information

BOARD OF REGENTS AUDIT/COMPLIANCE AND INVESTMENT COMMITTEE 2 STATE OF IOWA FEBRUARY 3-4, 2010 INTERNAL AUDIT REPORTS ISSUED

BOARD OF REGENTS AUDIT/COMPLIANCE AND INVESTMENT COMMITTEE 2 STATE OF IOWA FEBRUARY 3-4, 2010 INTERNAL AUDIT REPORTS ISSUED STATE OF IOWA FEBRUARY 3-4, 2010 Contact: Todd Stewart INTERNAL AUDIT REPORTS ISSUED Action Requested: Receive the original and follow-up internal audit reports. Executive Summary: Completed institutional

More information

Protect Yourself in the Cloud Age

Protect Yourself in the Cloud Age Protect Yourself in the Cloud Age Matthew Wu Consultant Hong Kong Computer Emergency Response Team Coordination Centre About HKCERT HKCERT ( 香 港 電 腦 保 安 事 故 協 調 中 心 ) Established in 2001 Funding & Operation

More information

How To Get Rid Of A Phish Locker On A Computer (For A Bank)

How To Get Rid Of A Phish Locker On A Computer (For A Bank) PHISH LOCKERS OUT IN THE WILD August 2013 RSA researchers have been increasingly witnessing the activity of highly targeted Trojans, dubbed Phish Lockers, used at the hands of cybercriminals to steal credentials.

More information

University of Wisconsin System Strategic Initiatives

University of Wisconsin System Strategic Initiatives University of Wisconsin System Strategic Initiatives April 27,2015 Sasi K. Pillay UWSA CIO 1 Principles Mission Enablement Reduction of Risk Cost-effective Operations 2 The Four Tenets A. Elevate the Professionalism

More information

Evolving Strong Authentication at The University of Arizona

Evolving Strong Authentication at The University of Arizona Evolving Strong Authentication at The University of Arizona Gary Windham Senior Enterprise Systems Architect The University of Arizona, UITS gary.windham@arizona.edu Where are we today? credential strength

More information

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out

More information

Computer Security Self-Test: Questions & Scenarios

Computer Security Self-Test: Questions & Scenarios Computer Security Self-Test: Questions & Scenarios Rev. Sept 2015 Scenario #1: Your supervisor is very busy and asks you to log into the HR Server using her user-id and password to retrieve some reports.

More information

CPSC ITDS/RAM Pilot System: PGA Message Set

CPSC ITDS/RAM Pilot System: PGA Message Set CPSC ITDS/RAM Pilot System: PGA Message Set Electronic Certificate Filing Test March 27, 2015 This presentation has not been reviewed or approved by the Commission and may not reflect its views CPSC Background

More information

2011 2012 Aug. Sept. Oct. Nov. Dec. Jan. Feb. March April May-Dec.

2011 2012 Aug. Sept. Oct. Nov. Dec. Jan. Feb. March April May-Dec. The OCR Auditors are coming - Are you next? What to Expect and How to Prepare On June 10, 2011, the U.S. Department of Health and Human Services Office for Civil Rights ( OCR ) awarded KPMG a $9.2 million

More information

Domain Name Abuse Detection. Liming Wang

Domain Name Abuse Detection. Liming Wang Domain Name Abuse Detection Liming Wang Outline 1 Domain Name Abuse Work Overview 2 Anti-phishing Research Work 3 Chinese Domain Similarity Detection 4 Other Abuse detection ti 5 System Information 2 Why?

More information

Important Dates Calendar 2014-2015 FALL

Important Dates Calendar 2014-2015 FALL Important Dates Calendar 204-205 FALL Rev. 6-8-4 st 8 H st 0 2nd 0 st 5 2nd 5 3rd 5 LSC Advanced Registration Begins May 27 May 27 May 27 May 27 May 27 May 27 May 27 May 27 May 27 Returning Students Advanced

More information

Executive Summary. McAfee Labs Threats Report: Third Quarter 2013

Executive Summary. McAfee Labs Threats Report: Third Quarter 2013 Executive Summary McAfee Labs Threats Report: Third Quarter Although summer can be a relatively slow season for cybercriminal activity (even the bad guys need a break occasionally), the third quarter of

More information

Using big data analytics to identify malicious content: a case study on spam emails

Using big data analytics to identify malicious content: a case study on spam emails Using big data analytics to identify malicious content: a case study on spam emails Mamoun Alazab & Roderic Broadhurst Mamoun.alazab@anu.edu.au http://cybercrime.anu.edu.au 2 Outline Background Cybercrime

More information

North Carolina Health Information Management Association February 20, 2013 Chris Apgar, CISSP

North Carolina Health Information Management Association February 20, 2013 Chris Apgar, CISSP Mobile Device Management Risky Business in Healthcare North Carolina Health Information Management Association February 20, 2013 Chris Apgar, CISSP Agenda HIPAA/HITECH & Mobile Devices Breaches Federal

More information

Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services

Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services Real World Healthcare Security Exposures Brian Selfridge, Partner, Meditology Services 2 Agenda Introduction Background and Industry Context Anatomy of a Pen Test Top 10 Healthcare Security Exposures Lessons

More information

CAFIS REPORT 2015.10

CAFIS REPORT 2015.10 CAFIS REPORT 2015.10 INDEX Message CAFIS Inbound 03-06 07-08 CAFIS Arch 09-10 CAFIS Brain 11-12 CAFIS Global 13-14 What We Do 15-16 About CAFIS 17-18 Services for Member Stores 19-34 Services for Card

More information

HIPAA MYTHS: DON T ALWAYS BELIEVE WHAT YOU HEAR. Chris Apgar, CISSP

HIPAA MYTHS: DON T ALWAYS BELIEVE WHAT YOU HEAR. Chris Apgar, CISSP HIPAA MYTHS: DON T ALWAYS BELIEVE WHAT YOU HEAR Chris Apgar, CISSP 2015 OVERVIEW Missed Regulatory Requirements Common HIPAA Privacy Myths Common HIPAA Security Myths Other Related Myths Finding the Right

More information

mbank Introduces Personal Security Image MFA* for Consumer on-line banking *Multi-Factor Authentication

mbank Introduces Personal Security Image MFA* for Consumer on-line banking *Multi-Factor Authentication mbank Introduces Personal Security Image MFA* for Consumer on-line banking *Multi-Factor Authentication Enhanced security for your on-line banking activities. Beginning 24 January 2007 all mbank clients

More information

Remote Access Securing Your Employees Out of the Office

Remote Access Securing Your Employees Out of the Office Remote Access Securing Your Employees Out of the Office HSTE-NB0011-RV 1.0 Hypersecu Information Systems, Inc. #200-6191 Westminster Hwy Richmond BC V7C 4V4 Canada 1 (855) 497-3700 www.hypersecu.com Introduction

More information

Council, 6 February 2014. IT Report. Executive summary and recommendations. Introduction

Council, 6 February 2014. IT Report. Executive summary and recommendations. Introduction Council, 6 February 2014 IT Report Executive summary and recommendations Introduction The report sets out the main activities of the IT Department since the last meeting of Council. It includes statistical

More information

Department of Public Welfare (DPW)

Department of Public Welfare (DPW) Department of Public Welfare (DPW) Office of Income Maintenance Electronic Benefits Transfer Card Risk Management Report Out-of-State Residency Review FISCAL YEAR 2012-2013 June 2013 (March, April and

More information

AgriLife Information Technology IT General Session January 2010

AgriLife Information Technology IT General Session January 2010 AgriLife Information Technology IT General Session January 2010 Agenda Topics Year in Review Enterprise IT Services Update FirstCall Overview and Next Steps Sophos Antivirus Initiative Update Information/

More information

Understanding Your Credit Report

Understanding Your Credit Report Understanding Your Credit Report Personal Information This guide uses a fictitious character, Joe Citizen, to provide examples of the features of the Experian Credit Report. Joe Citizen Gender Male Other

More information

Employers Compliance with the Health Insurance Act Annual Report 2015

Employers Compliance with the Health Insurance Act Annual Report 2015 Employers Compliance with the Health Insurance Act Annual Report 2015 ea Health Council Health Council: Employers Compliance with the Health Insurance Act 1970 Annual Report 2015 Contact us: If you would

More information

How do I contact someone if my question is not answered in this FAQ?

How do I contact someone if my question is not answered in this FAQ? Help Where may I find the answers to my Internet Banking questions? How do I contact someone if my question is not answered in this FAQ? Enrolling How do I enroll in Internet Banking? Logging In How do

More information

Health Insurance Exchange Finance Work Group Meeting August 22, 2012 Wakely Consulting Model Table Summaries - Updated

Health Insurance Exchange Finance Work Group Meeting August 22, 2012 Wakely Consulting Model Table Summaries - Updated Table 3 Model Take up rate estimates 2014 Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec Revised 25.0% 25.0% 18.0% 3.6% 3.6% 3.6% 3.6% 3.6% 3.6% 3.6% 3.6% 3.6% Fast 12.0% 18.0% 20.0% 18.0% 6.0% 4.0% 4.0%

More information

CLARK ATLANTA UNIVERSITY

CLARK ATLANTA UNIVERSITY CLARK ATLANTA UNIVERSITY Policy 9.1.32: Timely Submission of Payroll Documents CLARK ATLANTA UNIVERSITY POLICY and PROCEDURE Subject: Timely Submission of Payroll Documents Department: and Salary Administration

More information

Committee of the Whole. January 22, 2014

Committee of the Whole. January 22, 2014 Committee of the Whole January 22, 2014 Drivers for 2003 IT Outsourcing Cost savings - privatization model ($2- $3MM/year) Cost avoidance Data center lease with County expiring ($3.5MM) Disaster recovery

More information

Vulnerability Assessment & Compliance

Vulnerability Assessment & Compliance www.pwc.com Vulnerability Assessment & Compliance August 3 rd, 2011 Building trust through Information security* Citizen-Centric egovernment state Consultantion workshop Agenda VAPT What and Why Threats

More information

Don t Click That Link and other security tips. Laura Perry Jennifer Speegle Mike Trice

Don t Click That Link and other security tips. Laura Perry Jennifer Speegle Mike Trice Don t Click That Link and other security tips Laura Perry Jennifer Speegle Mike Trice About Us Laura Perry Information Security Jennifer Speegle Firewall Administrator Mike Trice Network Engineer Mail

More information

EMAIL ACCOUNT TAKEOVER TO IDENTITY TAKEOVER

EMAIL ACCOUNT TAKEOVER TO IDENTITY TAKEOVER EMAIL ACCOUNT TAKEOVER TO IDENTITY TAKEOVER March 2013 Phishing attacks are notorious for their potential harm to online banking and credit card users who may fall prey to phishers looking to steal information

More information

Evolving Threats and Attacks: A Cloud Service Provider s viewpoint. John Howie Senior Director Online Services Security and Compliance

Evolving Threats and Attacks: A Cloud Service Provider s viewpoint. John Howie Senior Director Online Services Security and Compliance Evolving Threats and Attacks: A Cloud Service Provider s viewpoint John Howie Senior Director Online Services Security and Compliance Introduction Microsoft s Cloud Infrastructure Evolution of Threats

More information

ADDING STRONGER AUTHENTICATION for VPN Access Control

ADDING STRONGER AUTHENTICATION for VPN Access Control ADDING STRONGER AUTHENTICATION for VPN Access Control Adding Stronger Authentication for VPN Access Control 1 ADDING STRONGER AUTHENTICATION for VPN Access Control A VIRTUAL PRIVATE NETWORK (VPN) allows

More information

SD Monthly Report Period : August 2013

SD Monthly Report Period : August 2013 SD Monthly Report Period : 213 SD KPI Dashboard The role of this report is to capture both quantitative and qualitative data that reflects how Service Delivery and DIT services are performing against agreed

More information

AUTHENTICATION AND ACCESS CONTROL BEST PRACTICES FOR HEALTHCARE SYSTEMS

AUTHENTICATION AND ACCESS CONTROL BEST PRACTICES FOR HEALTHCARE SYSTEMS AUTHENTICATION AND ACCESS CONTROL BEST PRACTICES FOR HEALTHCARE SYSTEMS Lamaris Davis ICTN6865 East Carolina University Abstract Securing EHR s continue to be a huge problem for all health care organizations.

More information

Internet threats: steps to security for your small business

Internet threats: steps to security for your small business Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential

More information

Remote Access End User Reference Guide for F5 Edge VPN Client Access

Remote Access End User Reference Guide for F5 Edge VPN Client Access Remote Access End User Reference Guide for F5 Edge VPN Client Access Version 2.1 3/2/2015 This remote access end user reference guide provides an overview of how to download and install the F5 Edge VPN

More information

Benefits of Latest Innovations in Campus Planning

Benefits of Latest Innovations in Campus Planning Exempt Employee Association 01/29/13 Agenda icat Objectives CedarCrestone Overview Project Scope and Timeline Project Methodology What is Changing and Your Involvement Change Management Overview Closing

More information

How To Write A Health Care Security Rule For A University

How To Write A Health Care Security Rule For A University INTRODUCTION HIPAA Security Rule Safeguards Recommended Standards Developed by: USF HIPAA Security Team May 12, 2005 The Health Insurance Portability and Accountability Act (HIPAA) Security Rule, as a

More information

When you are prompted to enroll, you will be asked to enter a Security Phrase and select/answer three different Challenge Questions.

When you are prompted to enroll, you will be asked to enter a Security Phrase and select/answer three different Challenge Questions. IMPORTANT SECURITY INFORMATION We take your online security seriously. Your online banking site contains a security feature called Enhanced Authentication. Everyone will be required to enroll in Enhanced

More information

How Do I Log Into Mobile Banking?

How Do I Log Into Mobile Banking? 1 How Do I Log Into Mobile Banking? In order to use any of Connex Mobile Banking service, you must register for Online Banking via a computer and browser. This is necessary to set-up all security settings

More information

MODERN THREATS DRIVE DEMAND FOR NEW GENERATION MULTI-FACTOR AUTHENTICATION

MODERN THREATS DRIVE DEMAND FOR NEW GENERATION MULTI-FACTOR AUTHENTICATION Whitepaper MODERN THREATS DRIVE DEMAND FOR NEW GENERATION MULTI-FACTOR AUTHENTICATION A SURVEY SHOWS THAT 90% OF ALL COMPANIES HAD BEEN BREACHED IN THE LAST 12 MONTHS. THIS PAIRED WITH THE FACT THAT THREATS

More information

Member FAQ. General Information: Security:

Member FAQ. General Information: Security: General Information: Security: Why did you change Robins Federal Online Banking? Great question! We listened to an overwhelming response from you, our members that we needed to make these changes. We are

More information

Reacting to the Challenges: Business Strategies for Future Success. Todd S. Adams, Chief Executive Officer Adams Bank & Trust Ogallala, Nebraska

Reacting to the Challenges: Business Strategies for Future Success. Todd S. Adams, Chief Executive Officer Adams Bank & Trust Ogallala, Nebraska Reacting to the Challenges: Business Strategies for Future Success Todd S. Adams, Chief Executive Officer Adams Bank & Trust Ogallala, Nebraska Adams Bank & Trust Family Owned for 95 Years $525 Million

More information

The SMB Cyber Security Survival Guide

The SMB Cyber Security Survival Guide The SMB Cyber Security Survival Guide Stephen Cobb, CISSP Security Evangelist The challenge A data security breach can put a business out of business or create serious unbudgeted costs To survive in today

More information

Walton Centre. Document History Date Version Author Changes 01/10/2004 1.0 A Cobain L Wyatt. Monitoring & Audit

Walton Centre. Document History Date Version Author Changes 01/10/2004 1.0 A Cobain L Wyatt. Monitoring & Audit Page 1 Walton Centre Monitoring & Audit Document History Date Version Author Changes 01/10/2004 1.0 A Cobain L Wyatt Page 2 Table of Contents Section Contents 1 Introduction 2 Responsibilities Within This

More information

A!Team!Cymru!EIS!Report:!Growing!Exploitation!of!Small! OfCice!Routers!Creating!Serious!Risks!

A!Team!Cymru!EIS!Report:!Growing!Exploitation!of!Small! OfCice!Routers!Creating!Serious!Risks! ATeamCymruEISReport:GrowingExploitationofSmall OfCiceRoutersCreatingSeriousRisks PoweredbyTeamCymru sthreatintelligencegroup Page 1of 14www.team-cymru.com www.team-cymru.com Threat'Intelligence'Group EXECUTIVE

More information

10 Smart Ideas for. Keeping Data Safe. From Hackers

10 Smart Ideas for. Keeping Data Safe. From Hackers 0100101001001010010001010010101001010101001000000100101001010101010010101010010100 0100101001001010010001010010101001010101001000000100101001010101010010101010010100000 0100101001001010010001010010101001010101001000000100101001010101010010101010010100000

More information

Keeping Data Safe. Patients, Research Subjects, and You

Keeping Data Safe. Patients, Research Subjects, and You Keeping Data Safe Patients, Research Subjects, and You How do hackers access a system Hackers Lurking in Vents and Soda Machines By NICOLE PERLROTH APRIL 7, 2014 New York Times SAN FRANCISCO They came

More information

Current counter-measures and responses by CERTs

Current counter-measures and responses by CERTs Current counter-measures and responses by CERTs Jeong, Hyun Cheol hcjung@kisa.or.kr April. 2007 Contents I. Malware Trends in Korea II. Malware from compromised Web sites III. Case Study : Malware countermeasure

More information

Oakland Family Services - Was Your Email Hacked?

Oakland Family Services - Was Your Email Hacked? Oakland Family Services Information Breach FAQs 1. What happened? An unauthorized individual remotely gained access to the email account of one Oakland Family Services employee July 14, 2015 resulting

More information

The dramatic growth in mobile device malware. continues to escalate at an ever-accelerating. pace. These threats continue to become more

The dramatic growth in mobile device malware. continues to escalate at an ever-accelerating. pace. These threats continue to become more The dramatic growth in mobile device malware continues to escalate at an ever-accelerating pace. These threats continue to become more sophisticated while the barrier to entry remains low. As specific

More information

How to Prepare for a Data Breach

How to Prepare for a Data Breach IT Forum How to Prepare for a Data Breach Expediting Response and Minimizing Losses Presentation for SURA IT Committee November 5,,2014 Laura Whitaker, Senior Research Director eab.com Getting to Know

More information

ACCESS Nursing Programs Session 1 Center Valley Campus Only 8 Weeks Academic Calendar 8 Weeks

ACCESS Nursing Programs Session 1 Center Valley Campus Only 8 Weeks Academic Calendar 8 Weeks Session 1 Academic Calendar August 24, 2015 to October 17, 2015 Tuesday / Thursday, 5:30 pm to 8:30 pm M/W T/TH T/W TH S Saturday lab as scheduled Classes Begin 24-Aug 25-Aug 25-Aug 27-Aug 29-Aug NU205

More information

ACCESS Nursing Programs Session 1 Center Valley Campus Only 8 Weeks Academic Calendar 8 Weeks

ACCESS Nursing Programs Session 1 Center Valley Campus Only 8 Weeks Academic Calendar 8 Weeks Session 1 Academic Calendar August 24, 2015 to October 17, 2015 Tuesday / Thursday, 5:30 pm to 8:30 pm M/W T/TH T/W TH S Saturday lab as scheduled Classes Begin 24-Aug 25-Aug 25-Aug 27-Aug 29-Aug NU205

More information

HIPAA Myths. WEDI Regional Affiliates. Chris Apgar, CISSP Apgar & Associates

HIPAA Myths. WEDI Regional Affiliates. Chris Apgar, CISSP Apgar & Associates HIPAA Myths WEDI Regional Affiliates Chris Apgar, CISSP Apgar & Associates Overview Missed Regulatory Requirements Common HIPAA Privacy Myths Common HIPAA Security Myths Other Related Myths Finding the

More information

Representative Ann Pugh, Chair, Vermont House Committee on Human Services. Thank you for your consideration of our concerns regarding H.98.

Representative Ann Pugh, Chair, Vermont House Committee on Human Services. Thank you for your consideration of our concerns regarding H.98. March 13, 2015 Representative Ann Pugh, Chair, Vermont House Committee on Human Services Testimony ~ H.98 Dear Honorable Representative Pugh, The Vermont Coalition for Vaccine Choice (VCVC) is a volunteer

More information

Back to Basics. Office of Operations 2013 Fall Conference November 6-7 STATE OF NEW YORK OFFICE OF THE STATE COMPTROLLER

Back to Basics. Office of Operations 2013 Fall Conference November 6-7 STATE OF NEW YORK OFFICE OF THE STATE COMPTROLLER Office of Operations 2013 Fall Conference November 6-7 Back to Basics epay Self-Service Service New York State Office of the State Comptroller Thomas P. DiNapoli, Comptroller Office of Operations John

More information