Cybersecurity for Small Businesses Dr. Debasis Bhattacharya, UH Maui College



Similar documents
Think Before You Click. UH Information Security Team

Management and Storage of Sensitive Information UH Information Security Team (InfoSec)

Malware & Botnets. Botnets

How to stay safe online

National Cyber Security Month 2015: Daily Security Awareness Tips

Infocomm Sec rity is incomplete without U Be aware,

Certified Secure Computer User

Impact of Cybersecurity Education in High Schools and Small Businesses in Hawaii. Challenges and Opportunities NICE Conference 2015

3 day Workshop on Cyber Security & Ethical Hacking

INTERNET & COMPUTER SECURITY March 20, Scoville Library. ccayne@biblio.org

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

Learn to protect yourself from Identity Theft. First National Bank can help.

NATIONAL CYBER SECURITY AWARENESS MONTH

Certified Secure Computer User

Protecting personally identifiable information: What data is at risk and what you can do about it

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

Computer Protection. Computer Protection. Computer Protection 5/1/2013. Classic Battle of Good vs Evil. David Watterson & Ross Cavazos

Fraud Prevention Tips

Safe Practices for Online Banking

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

BE SAFE ONLINE: Lesson Plan

Protection from Fraud and Identity Theft

Top tips for improved network security

October Is National Cyber Security Awareness Month!

ONLINE IDENTITY THEFT KEEP YOURSELF SAFE FROM BESTPRACTICES WHAT DO YOU NEED TO DO IF YOU SUSPECT YOUR WHAT DO YOU NEED TO DO IF YOU SUSPECT YOUR

BSHSI Security Awareness Training

Business Internet Banking / Cash Management Fraud Prevention Best Practices

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

Business ebanking Fraud Prevention Best Practices

General Security Best Practices

& INTERNET FRAUD

Advice about online security

When visiting online banking's sign-on page, your browser establishes a secure session with our server.

Protect yourself online

High Speed Internet - User Guide. Welcome to. your world.

10 Quick Tips to Mobile Security

Common Cyber Threats. Common cyber threats include:

Remote Deposit Quick Start Guide

Security Fort Mac

NC DPH: Computer Security Basic Awareness Training

What you need to know to keep your computer safe on the Internet

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

Protecting your business from fraud

Cybersecurity Best Practices

Cyber Security Awareness

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics

Information Security

CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere.

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Cyber Security. Maintaining Your Identity on the Net

The following information was provided by SANS and discusses IT Security Awareness. It was last updated in 2015.

Cyber Security. Securing Your Mobile and Online Banking Transactions

Network and Workstation Acceptable Use Policy

Tax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud

10 Things You Need to Know About Internet Security

OIG Fraud Alert Phishing

1. Any requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

PREVENTING HIGH-TECH IDENTITY THEFT

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS

STOP. THINK. CONNECT. Online Safety Quiz

and Security. U3A Radlett Computer Group Meeting 6-Oct-2014 V1.1

Loophole+ with Ethical Hacking and Penetration Testing

How to Encrypt Files Containing Sensitive Data (using 7zip software or Microsoft password protection) How to Create Strong Passwords

Cyber Security Awareness

4/20/2015. Fraud Watch Campaign. AARP is Fighting for You. AARP is Fighting for You. Campaign Tactics. AARP can help you Spot & Report Fraud

Internet Security. For Home Users

Marlon R Clarke, Ph. D., CISSP, CISM Director Network Operations and Services, NSU

Computer Security Maintenance Information and Self-Check Activities

Chapter 15: Computer Security and Privacy

+GAMES. Information Security Advisor. Be a Human Firewall! The Human Firewall' s Top Concerns in the Cyber, People & Physical Domains

Guide to INFORMATION SECURITY FOR THE HEALTH CARE SECTOR

Hint: Best actions: Find out more in videos and FAQ: Hint: Best actions: Find out more in videos and FAQ:

Deter, Detect, Defend

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers Your Interactive Guide to the Digital World

Identity Theft Protection

7 PRACTICES FOR SAFER COMPUTING

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0

Don t Fall Victim to Cybercrime:

Information Security. Louis Morgan, CISSP Information Security Officer

Recognizing Spam. IT Computer Technical Support Newsletter

Information Technology Acceptable Use Policy

Internet basics 2.3 Protecting your computer

How-To Guide: Cyber Security. Content Provided by

Transcription:

Cri Crime and Your Credit Union Workshop Cybersecurity for Small Businesses Dr. Debasis Bhattacharya, UH Maui College 6/5/15 Cybersecurity for Small Businesses 1

6/5/15 Cybersecurity for Small 2

6/5/15 Cybersecurity for Small Businesses 3

6/5/15 Cybersecurity for Small Businesses 4

Risks to Credit Unions Stealing Membership Lists Stealing Personal and Sensitive Info Spear Phishing Spamming Social Engineering Malware Botnets Loss of Reputation, Trust Lawsuits etc. 6/5/15 Cybersecurity for Small Businesses 5

6/5/15 Cybersecurity for Small Businesses 6

6/5/15 Cybersecurity for Small 7

6/5/15 Cybersecurity for Small 8

What about small businesses? In 2011, there were over 28.2 million small businesses Small businesses make up 99.7% of US employer firms 63% of net new private-sector jobs 48.5% of private-sector employment 42% of private-sector payroll 46% of private-sector output 37% of high-tech employment 98% of firms exporting goods, and 33% of exporting value Source: US SBA Office of Advocacy, www.sba.gov/advocacy/7540/42371 6/5/15 Cybersecurity for Small Businesses 9

6/5/15 Cybersecurity for Small Businesses 10

6/5/15 Cybersecurity for Small Businesses 11

Source: Infographics (June 2012). Small business security by Veracode 6/5/15 Cybersecurity for Small Businesses 12

Source: Infographics (June 2012). Small business security by Veracode 6/5/15 Cybersecurity for Small Businesses 13

Source: Infographics (June 2012). Small business security by Veracode 6/5/15 Cybersecurity for Small Businesses 14

Source: Infographics (June 2012). Small business security by Veracode 6/5/15 Cybersecurity for Small Businesses 15

Agenda What is so special about small businesses anyway? Laws related to sensitive information Management of sensitive information How to safely transfer to others Encryption Sensitive information best practices Posting sensitive information online Storage of sensitive information Where to keep it and where not to 6/5/15 Cybersecurity for Small Businesses 16

Agenda Web browsing safety Password Safety Phishing & Spam Mobile Security 6/5/15 Cybersecurity for Small Businesses 17

Partial credit for this presentation. University of Hawaii Information Security Team Jodi Ito - Information Security Officer Deanna Pasternak & Darryl Higa Information Security Specialists This entire presentation can be found at http://maui.hawaii.edu/cybersecurity 6/5/15 Cybersecurity for Small Businesses 18

Security in Small Businesses Small businesses have security issues just as large businesses Lack of policies/procedures, technology or leadership styles impacts the ability to fight security problems Small businesses display a general lack of concern about security issues understandable! Security? What security? 6/5/15 Cybersecurity for Small Businesses 19

Common Security Problems Delayed or no security fixes or patches Incorrect preventative measures Lack of focus on security Absence of training and policies Consumed by running the business Reliance on outsourcing, cloud storage Lack of technology savvy etc. These problems are prevalent in businesses of all sizes 6/5/15 Cybersecurity for Small Businesses 20

What about small businesses? Open access to data and networks by a wide range of users. Reliance on outsourcing, cloud computing. Proliferation of data on devices (ipad, phones) Very basic policies and procedures in place to ensure data recovery and information security Too much reliance on tech such as anti-virus, firewalls, surge protectors, backup storage Data corruption, lost data, virus, malicious software, employee abuse and reliability issues 6/5/15 Cybersecurity for Small Businesses 21

What about small businesses? Open access to data and networks by a wide range of users. Reliance on outsourcing, cloud computing. Proliferation of data on devices (ipad, phones) Very basic policies and procedures in place to ensure data recovery and information security Too much reliance on tech such as anti-virus, firewalls, surge protectors, backup storage Data corruption, lost data, virus, malicious software, employee abuse and reliability issues 6/5/15 Cybersecurity for Small Businesses 22

Evolution of Security Issues 10 years ago after the dot-com bust - Low Internet penetration in Small Biz - Reliance on paper and the IT guy/gal - OK, if you did the basics - Windows Update - Virus Protection and Backups Today and the future - Phishing, social engineering, malware etc. - Cloud computing, HIPAA, devices etc. - Cyber breaches can ruin a small business 6/5/15 Cybersecurity for Small Businesses 23

Study Design Empirical, quantitative study Survey of 122 small businesses within Hawaii Over 80% of business in Hawaii have < 25 employees Study conducted in 2007 and 2008. Currently updated Tested for correlation between Information security problems and Leadership styles of business leaders 6/5/15 Cybersecurity for Small Businesses 24

14 Security Problems Insider abuse access Outsider access abuse Fraud Viruses Software problems Power failure Natural disaster Data integrity, data secrecy, data availability Data theft, data sabotage Transaction integrity User errors 6/5/15 Cybersecurity for Small Businesses 25

3 Leadership Styles Transformational Visionary, dynamic owner Transactional Focused on costs, control and boqom line benefits Passive-avoidant Absentee, unavailable 6/5/15 Cybersecurity for Small Businesses 26

Key Findings Policies and Procedures Computer Emergency Response Plan Computer Use and Misuse Policy Information Security Policy Cost-effective? Realistic? Proactive? 6/5/15 Cybersecurity for Small Businesses 27

Key Findings Technology Encryption Software Anti-virus Software Security Evaluation Systems Intrusion Detection Systems System Activity Monitors Cost-effective? Easy to install/update? Preventative? 6/5/15 Cybersecurity for Small Businesses 28

Key Findings Leadership Active Management by Exception Watch out for exceptons and abnormal behavior Idealized Influence ProacTve guidance, policies and training Contingent Reward Reward vigilance and safe computng practces Realistic? Achievable? Training? 6/5/15 Cybersecurity for Small Businesses 29

Proposed Solutions Level 1 - Basic Hygiene Train employees in security principles Provide firewall security for the entire business Make backup copies of important business data Secure your Wi-Fi networks and hide routers Limit employee access to data and information 6/5/15 Cybersecurity for Small Businesses 30

6/5/15 Cybersecurity for Small Businesses 31

6/5/15 Cybersecurity for Small Businesses 32

Proposed Solutions Level II - Active Defense Actively monitor your networks and property Proactive guidance, policies and training Reward vigilance and safe computing practices Watch out for exceptions and abnormal behavior 6/5/15 Cybersecurity for Small Businesses 33

Proposed Solutions Level III - Neighborhood Watch Share common tactics and strategies with others Obtain alerts from the crowd of small businesses Actively report information security issues and concerns to authorities and other small businesses 6/5/15 Cybersecurity for Small Businesses 34

Level I Basic Hygiene Sensitive Information Scanning Encryption Secure File Transfer Secure Web Links Secure Storage Information Security Policy Cloud Security Social Engineering 6/5/15 Cybersecurity for Small Businesses 35

Level I Basic Hygiene Back-ups Strong Passwords Web Browsing Safety URL Safety Email Spam Phishing Social Networking Mobile Safety 6/5/15 Cybersecurity for Small Businesses 36

Level I Sensitive Information Information is considered sensitive if it can be used to cause an adverse effect on the organization or individual if disclosed to unauthorized individuals Some examples are: Social Security Numbers, Customer records, Health information, credit card numbers, dates of birth, job applicant records, etc. State, Federal and Regulatory requirements provide standards for protecting sensitive information Question: Do you have a policy that defines your sensitive information? 6/5/15 Cybersecurity for Small Businesses 37

Know What to Protect A partial list of data considered sensitive Customer records Health information (HIPAA) Personal financial information Social Security Numbers Dates of birth Access codes, passwords and PINs Answers to "security questions" Confidential salary information 6/5/15 Cybersecurity for Small Businesses 38

How to Protect Information Know where it is stored Safeguard it with physical security Encrypt it Redact it Delete it 6/5/15 Cybersecurity for Small Businesses 39

Level I Scanning Identity Finder Windows and Macs Download at http://www.identityfinder.com/ Find Social Security Numbers Virginia Tech IT http://security.vt.edu/ resources_and_information/ find_ssns.html Scan for vulnerabilities OpenVAS Scan a single machine or a batch scan: http://www.openvas.org/ 6/5/15 Cybersecurity for Small Businesses 40

Level I - Encryption Encrypting a Windows file, folder, and entire disk - BitLocker http://www.hawaii.edu/askus/1285 Encrypted disk images and full disk encryption for a Mac Secure Disk Image http://www.hawaii.edu/askus/676 6/5/15 Cybersecurity for Small Businesses 41

What Does An Encrypted File Look Like? 6/5/15 Cybersecurity for Small Businesses 42

DO NOT LOSE YOUR ENCRYPTION KEY When using encryption be careful to safeguard your encryption key. If lost ITS might not be able to help you recover your data. 6/5/15 Cybersecurity for Small Businesses 43

Ways To Securely Transfer Sensitive Information 6/5/15 Cybersecurity for Small Businesses 44

Level I - Secure File Transfer Providers such as SendThisFile https://www.sendthisfile.com/ solutions/overview.jsp Secure file transfer up to 100GB $19.95/mo, 10 day file access Security ends at transmission, you will still need to secure information on your computer 6/5/15 Cybersecurity for Small Businesses 45

Level I Spot Secure Links Look for the https:// encrypted) (the S means it is The S or the padlock means: That you have a secure (encrypted) link with this web site That this web site is a valid and legitimate organization or an accountable legal entity 19 6/5/15 Cybersecurity for Small Businesses 46

Level I - Do Not Use To Transfer Sensitive Information Unencrypted Email Third party cloud applications such as Dropbox Google Drive Unsecured USB drives or other external devices 6/5/15 Cybersecurity for Small Businesses 47

Level I - Where Should Sensitive Info Be Stored? Encrypted folders, partitions, or drives Secured servers Encrypted external drives Secure applications Locked file cabinets 21 6/5/15 Cybersecurity for Small Businesses 48

Level I - Where Not To Store Sensitive Information Your email Unsecured paper files Your hard drive unencrypted Social networking sites 6/5/15 Cybersecurity for Small Businesses 49

Level I Create and enforce an Information Security Policy Sample UH Policy - Following policies and laws to protect sensitive information will not only protect the consumer, but it protects you from possible disciplinary action as stated in the UH General Confidentiality Notice UH Form 92 I understand that failure to abide by this notice may result in disciplinary action in accordance with University policies and procedures, State and federal laws, and applicable collective bargaining agreement up to and including dismissal. 6/5/15 Cybersecurity for Small Businesses 50

Level I - The Cloud The Cloud is not secure Do not store information in the cloud unless it is encrypted 6/5/15 Cybersecurity for Small Businesses 51

Level I - Keep Sensitive Information Secure From Social Engineers Verify callers Do not respond to email scams, phishing, or suspicious phone calls requesting confidential company information or your own personal information. Remember the IRS will NEVER ask for your password over email. 6/5/15 Cybersecurity for Small Businesses 52

Level I - Back-Up Regularly backing up your data is critical in case of a computer failure Store your backup in a secure location Secure your backup, lock it up, encrypt it. Regularly verify you can restore from this backup. 6/5/15 Cybersecurity for Small Businesses 53

Level I - Securing Your Password Password keepers such as KeePass or Last Pass http://keepass.info/ or https://lastpass.com/ Do not store on your monitor or under keyboard Use something easy to remember but hard to guess Follow password generation guidelines CAPITALS lowercase numb3r5 $ymbols 6/5/15 Cybersecurity for Small Businesses 54

Use STRONG Passwords Not easily guessable Do not use dictionary words Use a combination of upper and lowercase letters, numbers, and special characters No less than 8 characters Check your password strength: https://www.microsoft.com/protect/fraud/passwords/ checker.aspx 6/5/15 Cybersecurity for Small Businesses 55

Creating a Strong Password Incorporate something memorable to you Replace letters with numbers or characters Example: First dog s name is Bingo You got him in 1965 Black spots Add special characters ==> B1NG01965bs! 6/5/15 Cybersecurity for Small Businesses 56

Level I - Web Browsing Safety Use anti-virus software on your computer Create and use strong passwords Beware of instant message links and e-mail attachments Protect yourself on all wireless networks Check the URL of a website to make sure it s legitimate Ensure your web browser software and all plugins are up to date 6/5/15 Cybersecurity for Small Businesses 57

6/5/15 Cybersecurity for Small Businesses 58

Level I - URL Safety Avoid clicking on links in pop-up ads or links in emails that seem to be phony or suspicious. A good general rule is to type the Web site address in your address bar directly, rather than use a link in an email message You can check the URL in any email or on another Web site by simply holding your mouse above the link. The URL will appear in your browser or status bar (the bar that is usually at the bottom of your screen) and you can see what the name of the site is before you actually click on it. 6/5/15 Cybersecurity for Small Businesses 59

Common Signs of a Fake URL A fairly sure sign that a URL is fake is if the URL contains the "@" sign in the middle of the address. If a URL contains the "@" sign, the browser ignores everything to the left of the link. For example, if you go to a Web site that is www.paypal@150.44.134.189, you are not going to the Paypal site at all. A dead giveaway for a fake URL or a fake Web site is basic spelling mistakes in the Web address itself. Some URLs look very much like the name of a well-known company, but there may be letters transposed or left out. An example might be "mircosoft.com" instead of "microsoft.com." These slight differences can be easy to miss, and that's what phishers are counting on. 6/5/15 Cybersecurity for Small Businesses 60

Level I - Public Computers Remember to Logoff of any password protected webpage instead of just closing your browser Clear the browser s cache and web cookies When logging into password protected sites, do not use the Save my username and password option Do not log into banking or other sensitive sites over public or unsecured wireless hotspots Use private browsing 6/5/15 Cybersecurity for Small Businesses 61

Private Browsing Private Browsing allows you to browse the Internet without saving any information about which sites and pages you ve visited. Warning: Private Browsing doesn't make you anonymous on the Internet. Your Internet service provider, employer, or the sites themselves can still track what pages you visit. Private Browsing also doesn't protect you from keyloggers or spyware that may be installed on your computer. 6/5/15 Cybersecurity for Small Businesses 62

Level I - Email Don t click on attachments that you weren t expecting Do not reply to Phishing emails, even to say that you aren t interested in or to ask them to stop contacting you Use spam filters Be wary of emails that have misspellings or don t use your correct name Type in the URLS of your bank or other sensitive websites instead of clicking on the URL in emails 6/5/15 Cybersecurity for Small Businesses 63

Level I - Spam Email Spam is the electronic version of junk mail. It involves sending unwanted messages, often unsolicited advertising, to a large number of recipients. Spam is a serious security concern as it can be used to deliver Trojan horses, viruses, worms, spyware, and targeted phishing attacks According to Symantec s latest State of Spam report, spam now accounts for 72% of all email messages http://us.norton.com/security_response/spam.jsp 6/5/15 Cybersecurity for Small Businesses 64

How Do You Know it s Spam? Messages that do not include your email address in the TO: or CC: fields are common forms of Spam Some Spam can contain offensive language or links to Web sites with inappropriate content Spam also includes many misspellings or poor sentence structure 6/5/15 Cybersecurity for Small Businesses 65

Reporting Spam Report to FTC or ISP: report suspicious activity to the Federal Trade Commission (FTC) at http://www.ftc.gov or 1-877-382-4357. If you get spam that is phishing for information, forward it to spam@uce.gov. If you believe you've been scammed, file your complaint at http://www.ftc.gov and then visit the FTC's Identity Theft Web site at http://www.consumer.gov/idtheft to learn how to minimize your risk of damage from ID theft. If you receive a porn spam (pornography), you can report it at http://www.obscenitycrimes.org/. It should also be reported back to the ISP (Internet Service Provider) where the email originated from. 6/5/15 Cybersecurity for Small Businesses 66

Level I - Phishing Agencies such as the IRS will NEVER ask you for your password over email Social engineers will combine emails with phone calls Subscribe to Phishing Alerts FraudWatch International at http://www.fraudwatchinternational.com/phishingalerts 6/5/15 Cybersecurity for Small Businesses 67

Don t Fall For This 6/5/15 Cybersecurity for Small Businesses 68

Digital Millennium Copyright Act (DMCA) 6/5/15 Cybersecurity for Small Businesses 69

Level I - What is DMCA? An act created to protect intellectual property in digital form Downloading / Distribution of copyrighted work without authority constitutes an infringement Examples of copyrighted materials are songs, movies, TV Shows, software, and games Violations are subject to civil and criminal liabilities 6/5/15 Cybersecurity for Small Businesses 70

Downloading Downloading and sharing of copyrighted materials via peer-to-peer file sharing software / networks WITHOUT LEGAL PERMISSION from the copyright owner or agent BitTorrent, LimeWire, and Gnutella are examples of methods used for downloading large amounts of data from the Internet 6/5/15 Cybersecurity for Small Businesses 71

UH Requirements for DMCA Notify the copyright infringer of the infringement Require them to remove the infringing material Provide education on Copyright Infringement 6/5/15 Cybersecurity for Small Businesses 72

DMCA Violation Consequences UH complies with all copyright legal obligations When presented with a subpoena UH will provide the violators information The individual can be sued Penalties include civil and criminal penalties Civil penalties may be actual damages at not less than $750 and not more than $30,000 per work infringed Criminal penalties include imprisonment of up to five years and fines up to $250,000 per offense 6/5/15 Cybersecurity for Small Businesses 73

Safe Social Networking Practices 6/5/15 Cybersecurity for Small Businesses 74

Level I - Safe Social Networking Practices Limit personal information online Ensure information you post does not answer security questions (dog s name, mothers maiden name) Check privacy settings to see who has access to online info Google yourself to see what people can piece together about you 6/5/15 Cybersecurity for Small Businesses 75

Social Networking Do not post TOO MUCH INFORMATION! The Internet is FOREVER! Whatever you post may circulate even AFTER you delete it New scams use social networking sites to get background personal information 6/5/15 Cybersecurity for Small Businesses 76

Facebook Security https://www.facebook.com/security

Mobile Device Security 6/5/15 Cybersecurity for Small Businesses 78

Level I - Mobile Best Practices Secure your mobile devices Use accounts and complex passwords Don t leave your devices unattended Enable auto-wipe Encrypt sensitive information Be aware when using location-aware services 6/5/15 Cybersecurity for Small Businesses 79

Mobile Malware How does a mobile device get infected? Crafted malicious URL Malicious Apps What can mobile malware do? Sends out SMS messages Destroys data on device Can spread to computers to infect them when synced 6/5/15 Cybersecurity for Small Businesses 80

Geotagging Pictures taken w/ a GPS-enabled smartphone tags each picture with the longitude & latitude of the location of the picture 6/5/15 Cybersecurity for Small Businesses 81

Turning off Location Services iphone Settings > Location Services 6/5/15 Cybersecurity for Small Businesses 82

Location-Aware Services www.groupon.com 6/5/15 Cybersecurity for Small Businesses 83

Level I - Keep Your Computers Safe Update the software on your computer weekly (or more frequently) Install anti-virus and anti-spyware software and keep it up-to- date Scan your computer for vulnerabilities and PII Use accounts and strong passwords Encrypt sensitive information Don t install unknown software from unknown sites DO NOT SHARE your accounts/passwords Use password protected screen savers 6/5/15 Cybersecurity for Small Businesses 84

Level I - Wireless & Public Computers Be cautious when using open wireless networks Others using the network may be sniffing the network If you must use a public computer, change the password on the account accessed using a secure computer ASAP 6/5/15 Cybersecurity for Small Businesses 85

Level II and III Level II - Active Defense AcTvely monitor your networks and property ProacTve guidance, policies and training Reward vigilance and safe computng practces Watch out for exceptons and abnormal behavior Level III - Neighborhood Watch Share common tactcs and strategies with others Obtain alerts from the crowd of small businesses AcTvely report informaton security issues and concerns to authorites and other small businesses 6/5/15 Cybersecurity for Small Businesses 86

6/5/15 Cybersecurity for Small Businesses 87

What They Got Right 6/5/15 Cybersecurity for Small Businesses 88

Lessons Learned 6/5/15 Cybersecurity for Small Businesses 89

Conclusion Small businesses have security issues just as large businesses Lack of policies/procedures, technology or leadership style impacts the ability to fight security problems Level I precautions can be done today. Level II and III require work! For further information email debasisb@hawaii.edu or http://maui.hawaii.edu/cybersecurity 6/5/15 Cybersecurity for Small Businesses 90