It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions
Your home is your business and your farm is your network. But who has access to it? Can you protect it better? Do you have concerns about how these new data and information systems interact on your farm and their vulnerabilities? What about new systems?
Why You May Feel Safe No Problems to Date Have a Firewall / A Guy / Company /Kids You Don t Think It Will Happen To You
Theft Why Should You Care? Cash Production Data Equipment Identity Reputation Competitive Edge Productivity
Computer Security in the News New York Times hacked all employee passwords stolen Chinese attackers hit 141 US companies over the last year Microsoft, Apple, Twitter, Facebook, Coca-Cola, Lockheed Martin, oil, gas, & power grid operators, 90% of attacks came from a single building in China Run by Chinese military Unit 61398 US eyes sanctions for Chinese hacking NBC website distributes drive by download malware after being hacked java and adobe acrobat PDF bugs used to install Crimeware Zeus, Zbot, Citadel, ZeroAccess designed to steal digital information and sell things like online banking passwords Mac s targeted for malware because few people use antimalware programs on them Adobe Acrobat &Reader vulnerability infects your PC with malware by simply opening an infected PDF document Celebrity twitter accounts hacked (plus 250,000 regular folk twitter accounts) Burger King Twitter account hacked. Customers told that McDonalds bought them out. Blackberry Enterprise Server vulnerability allows a smartphone user to go to an infected TIFF site and allow malware to be installed on the server in the corporate office Bluetooth headset maker Jawbone all support accounts compromised Iphone 5 allows unlock trick to bypass PIN entry
What You Need to Know! Passwords Preparation People Patches
Passwords Most Common iphone PIN: 1234 Most Common Passwords: Street you live on Spouse s name Child s name Pet Name Password1 123456
Passwords Extremely Complex Password Policies can actually decrease your security because no one can remember them! Password Length Change frequency Special Characters Prevent re-use
Passwords
Passwords
Passwords
Passwords
Passwords The Weakest Link Source: http://xkcd.com/936
Consider risks Passwords Better security for your bank than for Facebook Consider employees Consider family member access Consider shared computers No more Post-It Notes!
Password Solutions Use a Password Manager to generate codes LastPass & KeePass are free Don t reuse the same password on all sites Use something better than passwords Two Factor Authentication Something you have, and something you know Key fob tokens, cell phone apps, fingerprint scanners, call back systems
http://youtu.be/f6ednfhcveo Preparation
Preparation What would happen if someone deleted data on your computer? How would you know if they changed it? Use an online backup service on your PC s Carbonite, Mozy, CrashPlan
Family PC and Tablet Do kids use the same computer used for farm business? Separate farm business PC from family PC Kid & family websites pose greatly increased risks to the farm business information Shared Tablets can also pose risks How much information is in your email? Does the family use social media sites like Facebook, Twitter, etc.?
Mobile Devices Be Prepared! What if a mobile device is lost or stolen? Use a PIN on mobile devices Backup your data/photos to icloud or Google Setup Find my iphone so you can find it and delete all the data, if needed google.com/android/devicemanager icloud.com/find Install Lookout for Android
People Family PC and Tablet Does the family use social media sites like Facebook, Twitter, etc.? Marketers and advertisers can track you through many methods: IP address, cookies, other sites you visit Don t leave yourself logged into websites or set them up for automatic login
People Do you have temporary employees? Access to production data Use a password protected screen saver on PC s Phishing emails Verify by calling the person if something seems suspicious or unsolicited
People Change Default Passwords on devices Use PassPhrases, not PassWords Don t click on email links Don t use the same password on multiple systems or websites Don t click on pop ups Practice safe computing at home
Patches
Patches Patches = Software bug fixes and updates Often to prevent serious security vulnerabilities Do NOT use Windows XP 3 rd Party Software/Security Updates Updating Microsoft Windows Updates is not enough anymore False sense of security
Patches Cyber Attacks by Exploits Cyber Attacks by Exploits: 2% 3% 4% 25% 11% 56% Java Adobe Acrobat Reader Microsoft Adobe Flash
Patches Unpatched Java & Adobe products represent the biggest security threat in companies today Uninstall Java completely Mac and PC 600,000 Mac s infected through Java in 2012 Antivirus is not enough, but it is still necessary Antimalware/antispyware is also needed Free: Malwarebytes free, Microsoft Security Essentials Paid: Eset antivirus, Kaspersky Antivirus Use a hardware firewall and software firewall
Questions to Ask Are You Protecting your Digital Assets with: Passwords Better Techniques, No Post-Its Preparation Separate Data, Stolen Devices People Education of Employees & Family Patches Update software frequently
Josh Krueger Vice President & Chief Technology Officer (309) 664-8141 jkrueger@integrityts.com