CSUF Tech Day 2015. Security Awareness Overview Dale Coddington, Information Security Office dcoddington@fullerton.edu



Similar documents
I ve been breached! Now what?

Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014

Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services

Cybersecurity: A Growing Concern for All Businesses. RLI Design Professionals Design Professionals Learning Event DPLE 160 October 7, 2015

Basic Security Considerations for and Web Browsing

Internet threats: steps to security for your small business

EHS Privacy and Information Security

Information Security Field Guide to Identifying Phishing and Scams

White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks

RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123. Cybersecurity: A Growing Concern for Small Businesses

Protecting your business from fraud

Protecting against Mobile Attacks

DATA SECURITY HACKS, HIPAA AND HUMAN RISKS

Cyber Security Threats: What s Next and How Do We Reduce the Risks?

Secure Your Mobile Workplace

2009 Antispyware Coalition Public Workshop

DON T BE FOOLED BY SPAM FREE GUIDE. Provided by: Don t Be Fooled by Spam FREE GUIDE. December 2014 Oliver James Enterprise

Malware & Botnets. Botnets

White Paper - Crypto Virus. A guide to protecting your IT

BE SAFE ONLINE: Lesson Plan

NATIONAL CYBER SECURITY AWARENESS MONTH

Managing Web Security in an Increasingly Challenging Threat Landscape

Digital Consumer s Online Trends and Risks

Don t Fall Victim to Cybercrime:

10 Quick Tips to Mobile Security

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

UW-Madison. Tips to Avoid Phishing Scams

March 2010 Report #39

ES ET DE LA VIE PRIVÉE E 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS

Security Awareness. ITS Security Training. Fall 2015

The Onslaught of Cyber Security Threats and What that Means to You

Universities and Schools Under Cyber-Attack: How to Protect Your Institution of Excellence

Cybercrime and Identity Theft: Awareness and Protection 2015 HLC Conference

Business Identity Fraud Prevention Checklist

How To Help Protect Yourself From Identity Theft

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

Threat Events: Software Attacks (cont.)

Cyber Security. Securing Your Mobile and Online Banking Transactions

SPEAR-PHISHING ATTACKS

Surviving and operating services despite highly skilled and well-funded organised crime groups. Romain Wartel, CERN CHEP 2015, Okinawa

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

SPAM, VIRUSES AND PHISHING, OH MY! Michael Starks, CISSP, CISA ISSA Fellow 10/08/2015

How to Identify Phishing s

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO p f

Perception and knowledge of IT threats: the consumer s point of view

Visa CREDIT Card General Guidelines

Identity Theft. CHRISTOS TOPAKAS Head of Group IT Security and Control Office

IBM Endpoint Manager for Mobile Devices

Security Best Practices for Mobile Devices

Mobile Threat Intelligence Report

Security Fort Mac

Tips for Banking Online Safely

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe

2016 Trends in Cybersecurity: A Quick Guide to the Most Important Insights in Security

Information Security Addressing Your Advanced Threats

Cybersecurity Workshop

Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

Summary of the State of Security

Your Guide to Security

Third Party Components in Applications: Understanding Application Security

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

Security and Compliance challenges in Mobile environment

Cybersecurity Best Practices

White Paper. Data Security. The Top Threat Facing Enterprises Today

How to Recognize Phishing s Targeting the University of Mary

Dr. David Turahi Director for IT&IMS - MOICT Uganda

INTERNET & COMPUTER SECURITY March 20, Scoville Library. ccayne@biblio.org

Don t Click That Link and other security tips. Laura Perry Jennifer Speegle Mike Trice

Advanced Security Methods for efraud and Messaging

HFS DATA SECURITY TRAINING WITH TECHNOLOGY COMES RESPONSIBILITY

Practical guide for secure Christmas shopping. Navid

December 2010 Report #48

Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams. May TrustInAds.org. Keeping people safe from bad online ads

Cyber Security. John Leek Chief Strategist

Dissecting the Recent Cyber Security Breaches. Yu Cai School of Technology Michigan Technological University

SEC-GDL-005-Anatomy of a Phishing

STRONGER AUTHENTICATION for CA SiteMinder

Perspectives on Cybersecurity in Healthcare June 2015

Cyber Security. Maintaining Your Identity on the Net

Advanced Threat Detection: Necessary but Not Sufficient The First Installment in the Blinded By the Hype Series

Security for the Road Warrior

Building The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord

ecommercial SAT ecommercial Security Awareness Training Version 3.0

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

Cybersecurity Governance Update on New FFIEC Requirements

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

Best Practices for a BYOD World

Learning to Detect Spam and Phishing s Page 1 of 6

HSyE HIPAA Training. Summer 2015

Phoenix Information Technology Services. Julio Cardenas

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

G Data Mobile MalwareReport. Half-Year Report July December G Data SecurityLabs

Targeted Phishing. Trends and Solutions. The Growth and Payoff of Targeted Phishing

DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C

Countering Insider Threats Jeremy Ho

Global Security Report 2011

TechnoLabs Software Services Pvt Ltd. Enterprise Mobility - Mobile Device Security

Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking

Transcription:

CSUF Tech Day 2015 Security Awareness Overview Dale Coddington, Information Security Office dcoddington@fullerton.edu

Agenda Introduction Large scale data breaches: 2014 and beyond Email based attacks: What s old is new again Mobile device security: Protecting your data

2014: The Year of the Large-Scale Data Breach March 26. 2014: Hackivists attacked Forbes.com Stole 1 million users emails and passwords Posted fake news stories

2014: The Year of the Large-Scale Data Breach April 28, 2014: Michaels Stores Credit Card Breach Planted malware on POS systems Stole 3 million credit card/debit cards

2014: The Year of the Large-Scale Data Breach August 16, 2014: JP Morgan Customer Account Breach Stole credentials for approximately 100 servers Had access to records for: 76 million households 7 million small businesses

2014: The Year of the Large-Scale Data Breach November 10, 2014: Home Depot Customer Account Breach Attackers planted custom-built malware on POS systems 56 million credit cards were compromised

2015: The Bad Guys are Off to a Good Start February 5, 2015: Anthem Health Care Data Breach External attack resulted in the compromise of as many as 80 million customer records March 17, 2015: Premera Blue Cross Data Breach 11 million records exposed

Healthcare Industry as an Attractive Target In August of 2014 the FBI warned the healthcare industry of targeted attacks, why? Security of systems containing healthcare data are lax as opposed to other sectors (soft targets) Personally Identifiable Information (PII) Leverage to break into other accounts Fraudulently obtain health care services Intellectual property (medical device development data) / research data

Large-Scale Data Breaches: Overview 2013: Approximately 800,000,000 records containing PII were stolen in online attacks 2014: Attackers stole approximately 1 billion records containing PII IBM X-Force Threat Intelligence Quarterly 1Q 2015

Large-Scale Data Breaches: What Can We Do? Use one low-limit credit card for all online purchases (this will not protect you from brick-and-mortar store compromises) Actively monitor your bank accounts Stolen credit/debit cards are often used to make small purchases online to verify they are legitimate When data is breached take advantage of free credit monitoring Approximately 10% of consumers take advantage of free credit monitoring Pay for everything with cash

CSUF Tech Day 2015 Email Based Attacks

Email-based Attacks: Some History Early email-based attacks contained malicious attachments Melissa Virus in 1999 Macro virus included in rigged MS Word document Disabled built-in protections Propagated virus to first 50 people in address books (Outlook) The industry caught on

Email-based Attacks: Malicious Attachments Can result in malware: RansomWare Data theft Adware Not as prevalent as in the past Email security appliances Better email client security No system is perfect, it can still get through

Email-based Attacks: Spam Spam-based attacks trick users into clicking on a malicious link Sender address is usually unknown to sender and may be spoofed Message often contains no reply address Typically contains eye-catching content Often written in poor English Contains advertising content Get rich quick! Miracle products Special offers

Email-based Attacks: Phishing Non-targeted and targeted Appear to come from a legitimate source Typically attempt to trick you into divulging information: Banking / credit card accounts and numbers Credentials Other PII

Email-based Attacks: Phishing Helpdesk emails are a popular for of targeted phishing Appear to come from your organizations helpdesk Indicates that your password is about to expire or something similar Typically contains an unusual From address or Reply-To address Embedded URL doesn t match the name of the institution it claims to come from NOTE: CSUF helpdesk personnel will never ask for your password via email

Email-based Attacks: Sample Phishing Email From: Help Desk <helpdesk@453455.net> Date: June 20, 2014 at 7:57:55 AM PDT To: jdoe@fullerton.edu Subject: update It had been detected that your CSUF email account has been affected with virus. Your email account had been sending virus included with your mail to recipient's account and as such a threat to our database. You'll need to update the settings on your CSUF account by clicking on this link: http://forms.logiforms.com/formdata/user_forms/66949_9366478/321793 From CSUF Fullerton Helpdesk

Email-based Attacks: Sample Phishing Email

Email-based Attacks: Sample Phishing Email

Email-based attacks: What can we do? Be cautious about opening attachments Attachments from known senders may still contain malware! Be cautious about following embedded email links Hover over the link (in Outlook) to ensure that it matches the text of email Avoid becoming victim to phishing attacks Never respond to emails requesting personal or financial information

Email-based Attacks: Some Statistics CSUF Incoming Email March 14, 2015 April 13, 2015

CSUF Tech Day 2015 Mobile Device Security

Mobile Device Security Mobile devices are increasingly becoming more powerful Generally contain a wide array of PII As with all things connected to the Internet, security seems to be an afterthought

Mobile Device Security: What Platforms are Being Targeted? 99% of mobile-based malware targets Google s Android Operating System Documented vulnerabilities targeting Apple ios increased 82% in 2013 according to a report released by Symantec Why the disparity? Open vs. closed ecosystem

Mobile Device Security: What Kind of Attacks are Being Seen in the Wild? Mobile phishing and ransom-ware Infected mobile device as a springboard Cross-platform banking attacks Crypto-currency mining attacks We are our own worst enemy

Mobile Device Security: What Can be Done? Use a basic cellphone with no smart-phone features (yeah right) Use a strong passcode Do you leave your house and car unlocked? Don t jailbreak or root mobile devices Overrides built in protection features Vet all applications prior to downloading and installing them

Mobile Device Security: What Can be Done? Refrain from storing email messages/notes containing PII on mobile devices Only connect to trusted networks Encrypt your mobile devices Use features to remotely wipe lost/stolen devices It s too late to set this up after it s been stolen

Questions?

Thank You We hope you enjoyed this session. Please help us to improve and turn in your evaluation. Visit our vendor partners at the Exhibit Hall on the 2 nd floor of Pollak Library South. 29