It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions



Similar documents
What you need to know to keep your computer safe on the Internet

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

Protecting your Data, Devices, and Digital Life in a BYOD World: A Security Primer GLENDA ROTVOLD AND SANDY BRAATHEN NBEA APRIL 2, 2015

Certified Secure Computer User

Certified Secure Computer User

Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014

The following information was provided by SANS and discusses IT Security Awareness. It was last updated in 2015.

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

PC/Tablet/Smartphone Security & Password Managers

10 Quick Tips to Mobile Security

Basic Computer Security Part 3

Cyber Security Presentation Cyber Security Month Curtis McNay, Director of IT Security

10 Simple Computer Maintenance Tips For The Laptop

White Paper. The Principles of Tokenless Two-Factor Authentication

Research Information Security Guideline

The SMB Cyber Security Survival Guide

SUBJECT: Effective Date Policy Number Security of Mobile Computing, Data Storage, and Communication Devices

M&T Web InfoPLU$ GETTING STARTED GUIDE

Why you need. McAfee. Multi Acess PARTNER SERVICES

SecuritySecuritySecurity!

Guideline on Safe BYOD Management

Tips for Banking Online Safely

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

Instructions for Configuring Your Browser Settings and Online Security FAQ s. ios8 Settings for iphone and ipad app

National Cyber Security Month 2015: Daily Security Awareness Tips

Defense Media Activity Guide To Keeping Your Social Media Accounts Secure

Perception and knowledge of IT threats: the consumer s point of view

Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services

Why is a strong password important?

Cybercrime Prevention and Awareness

Know the Risks. Protect Yourself. Protect Your Business.

Compliance series Guide to meeting requirements of the UK Government Cyber Essentials Scheme

FFIEC CONSUMER GUIDANCE

Basic Security Considerations for and Web Browsing

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

Cyber Security. Maintaining Your Identity on the Net

BLACKJACKING: SECURITY THREATS TO BLACKBERRY DEVICES, PDAS, AND CELL PHONES IN THE ENTERPRISE

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

2016 Digital Safety Class UNDERSTAND YOUR RISKS AND STAY TOTALLY SECURE JESSE ROBERTSON, TECH 4 LIFE

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

4/20/2015. Fraud Watch Campaign. AARP is Fighting for You. AARP is Fighting for You. Campaign Tactics. AARP can help you Spot & Report Fraud

Hesperbot. Analysts at IKARUS Security Software GmbH successfully removed a self-locking Android Malware from an infected smartphone

GUIDE TO KEEPING YOUR SOCIAL MEDIA ACCOUNTS SECURE

Protect Yourself in the Cloud Age

Cyber Security Awareness

ORU IT Oral Roberts University Information Technology Student Guide

and Security. U3A Radlett Computer Group Meeting 6-Oct-2014 V1.1

Northwestern IT Tech Talk

STOP. THINK. CONNECT. Online Safety Quiz

What Do You Mean My Cloud Data Isn t Secure?

CLEAR LAKE BANK & TRUST COMPANY Internet Banking Customer Awareness & Education Program For Businesses

Kaseya White Paper. Endpoint Security. Fighting Cyber Crime with Automated, Centralized Management.

McAfee Multi Access from ø. Step-by-step guide to protecting your devices. Always.

Report on Consumer Behaviors and Perceptions of Mobile Security. Presented by NQ Mobile & NCSA January 25, 2012

Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?

Cyber Security Awareness

Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM

Simplifying the Challenges of Mobile Device Security Three Steps to Reduce Mobile Device Security Risks

How to get Office 365 through your Student

Tracking Anti-Malware Protection 2015

1. Threat Types Express familiarity with different threat types such as Virus, Malware, Trojan, Spyware, and Downloaders.

[BRING YOUR OWN DEVICE POLICY]

COMPUTER SECURITY PRINCIPLES AND PRACTICES BY

Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication. Mobile App Activation

Send and receive encrypted s

Cybersecurity Practices of Ohio Investment Advisers; A Summary of Survey Responses

INTERNET & COMPUTER SECURITY March 20, Scoville Library. ccayne@biblio.org

Soonr Workplace Enterprise Plan Overview

Keeping Data Safe. Patients, Research Subjects, and You

Internet Security Priorities. Benenson Strategy Group and American Viewpoint December 20, 2013

Safe Practices for Online Banking

Cyber Security Best Practices

Secure Your Mobile Workplace

Presented by: Islanders Bank

Security in an Increasingly Threatened World. SMS: A better way of doing Two Factor Authentication (2FA)

Internet Security. For Home Users

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One

Property of Secure Network Technologies-Do Not Distribute or Post Without Written Permission-Copyrights and Trademark Apply

Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams. May TrustInAds.org. Keeping people safe from bad online ads

Security Best Practices for Mobile Devices

TOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY. Mark

SPEAR PHISHING UNDERSTANDING THE THREAT

Transcription:

It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions

Your home is your business and your farm is your network. But who has access to it? Can you protect it better? Do you have concerns about how these new data and information systems interact on your farm and their vulnerabilities? What about new systems?

Why You May Feel Safe No Problems to Date Have a Firewall / A Guy / Company /Kids You Don t Think It Will Happen To You

Theft Why Should You Care? Cash Production Data Equipment Identity Reputation Competitive Edge Productivity

Computer Security in the News New York Times hacked all employee passwords stolen Chinese attackers hit 141 US companies over the last year Microsoft, Apple, Twitter, Facebook, Coca-Cola, Lockheed Martin, oil, gas, & power grid operators, 90% of attacks came from a single building in China Run by Chinese military Unit 61398 US eyes sanctions for Chinese hacking NBC website distributes drive by download malware after being hacked java and adobe acrobat PDF bugs used to install Crimeware Zeus, Zbot, Citadel, ZeroAccess designed to steal digital information and sell things like online banking passwords Mac s targeted for malware because few people use antimalware programs on them Adobe Acrobat &Reader vulnerability infects your PC with malware by simply opening an infected PDF document Celebrity twitter accounts hacked (plus 250,000 regular folk twitter accounts) Burger King Twitter account hacked. Customers told that McDonalds bought them out. Blackberry Enterprise Server vulnerability allows a smartphone user to go to an infected TIFF site and allow malware to be installed on the server in the corporate office Bluetooth headset maker Jawbone all support accounts compromised Iphone 5 allows unlock trick to bypass PIN entry

What You Need to Know! Passwords Preparation People Patches

Passwords Most Common iphone PIN: 1234 Most Common Passwords: Street you live on Spouse s name Child s name Pet Name Password1 123456

Passwords Extremely Complex Password Policies can actually decrease your security because no one can remember them! Password Length Change frequency Special Characters Prevent re-use

Passwords

Passwords

Passwords

Passwords

Passwords The Weakest Link Source: http://xkcd.com/936

Consider risks Passwords Better security for your bank than for Facebook Consider employees Consider family member access Consider shared computers No more Post-It Notes!

Password Solutions Use a Password Manager to generate codes LastPass & KeePass are free Don t reuse the same password on all sites Use something better than passwords Two Factor Authentication Something you have, and something you know Key fob tokens, cell phone apps, fingerprint scanners, call back systems

http://youtu.be/f6ednfhcveo Preparation

Preparation What would happen if someone deleted data on your computer? How would you know if they changed it? Use an online backup service on your PC s Carbonite, Mozy, CrashPlan

Family PC and Tablet Do kids use the same computer used for farm business? Separate farm business PC from family PC Kid & family websites pose greatly increased risks to the farm business information Shared Tablets can also pose risks How much information is in your email? Does the family use social media sites like Facebook, Twitter, etc.?

Mobile Devices Be Prepared! What if a mobile device is lost or stolen? Use a PIN on mobile devices Backup your data/photos to icloud or Google Setup Find my iphone so you can find it and delete all the data, if needed google.com/android/devicemanager icloud.com/find Install Lookout for Android

People Family PC and Tablet Does the family use social media sites like Facebook, Twitter, etc.? Marketers and advertisers can track you through many methods: IP address, cookies, other sites you visit Don t leave yourself logged into websites or set them up for automatic login

People Do you have temporary employees? Access to production data Use a password protected screen saver on PC s Phishing emails Verify by calling the person if something seems suspicious or unsolicited

People Change Default Passwords on devices Use PassPhrases, not PassWords Don t click on email links Don t use the same password on multiple systems or websites Don t click on pop ups Practice safe computing at home

Patches

Patches Patches = Software bug fixes and updates Often to prevent serious security vulnerabilities Do NOT use Windows XP 3 rd Party Software/Security Updates Updating Microsoft Windows Updates is not enough anymore False sense of security

Patches Cyber Attacks by Exploits Cyber Attacks by Exploits: 2% 3% 4% 25% 11% 56% Java Adobe Acrobat Reader Microsoft Adobe Flash

Patches Unpatched Java & Adobe products represent the biggest security threat in companies today Uninstall Java completely Mac and PC 600,000 Mac s infected through Java in 2012 Antivirus is not enough, but it is still necessary Antimalware/antispyware is also needed Free: Malwarebytes free, Microsoft Security Essentials Paid: Eset antivirus, Kaspersky Antivirus Use a hardware firewall and software firewall

Questions to Ask Are You Protecting your Digital Assets with: Passwords Better Techniques, No Post-Its Preparation Separate Data, Stolen Devices People Education of Employees & Family Patches Update software frequently

Josh Krueger Vice President & Chief Technology Officer (309) 664-8141 jkrueger@integrityts.com