Cybersecurity Protecting Yourself, Your Business, Your Clients



Similar documents
Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

STOP. THINK. CONNECT. Online Safety Quiz

National Cyber Security Awareness Month Kicks Off Today with Official Launch Event, Business Summit and Release of Online Safety Survey

2012 NCSA / McAfee Online Safety Survey

National Cyber Security Month 2015: Daily Security Awareness Tips

Malware & Botnets. Botnets

HEADS up. stop think connect

Safe Practices for Online Banking

10 Quick Tips to Mobile Security

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

2012 NCSA / Symantec. National Small Business Study

Cyber Security Awareness. Internet Safety Intro.

National Cybersecurity Awareness Campaign. Kids Presentation

CYBER INFORMATION SECURITY AWARENESS AND PROTECTION PRACTICES. Strengthening Your Community at the Organizational Level

Marlon R Clarke, Ph. D., CISSP, CISM Director Network Operations and Services, NSU

BEHIND OUR DIGITAL DOORS: CYBERSECURITY & THE CONNECTED HOME. Executive Summary

EADS up. stop think connect

October Is National Cyber Security Awareness Month!

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

How To Prevent Cybercrime

How-To Guide: Cyber Security. Content Provided by

Internet Security Priorities. Benenson Strategy Group and American Viewpoint December 20, 2013

NORTON CYBERSECURITY INSIGHTS REPORT

SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics

Report on Consumer Behaviors and Perceptions of Mobile Security. Presented by NQ Mobile & NCSA January 25, 2012

4/20/2015. Fraud Watch Campaign. AARP is Fighting for You. AARP is Fighting for You. Campaign Tactics. AARP can help you Spot & Report Fraud

Top 10 Tips to Keep Your Small Business Safe

Protect yourself online

Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness

Cybersecurity Best Practices

2011 NATIONAL SMALL BUSINESS STUDY

Security Guide. for electronic transactions. UniBank is a division of Teachers Mutual Bank Limited

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:

SMALL BUSINESS PRESENTATION

A Parents' Guide to Cybersecurity

National Cybersecurity Awareness Campaign Families Presentation

Activities for Protecting Your Identity and Computer for Middle and High School Students

IS-906: Awareness. Visual 1 IS-906: Workplace Security Awareness

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One

Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions

2012 NORTON CYBERCRIME REPORT

PROTECTING HIGH NET WORTH FAMILIES FROM CYBER CRIME

Cyber Security. John Leek Chief Strategist

Senaca Shield Presents 10 Top Tip For Small Business Cyber Security

2015 MDRT Annual Meeting e Handout Material. What is Your Smartphone Leaking?

Everyone s online, but not everyone s secure. It s up to you to make sure that your family is.

10 Smart Ideas for. Keeping Data Safe. From Hackers

Identity Theft: A Growing Problem. presented by Melissa Elson Agency Liaison Office of Privacy Protection - Bureau of Consumer Protection

Digital Citizenship Lesson Plan

Cybercrime Prevention and Awareness

ENISA s ten security awareness good practices July 09

Kaseya White Paper. Endpoint Security. Fighting Cyber Crime with Automated, Centralized Management.

Special Eurobarometer 423 CYBER SECURITY SUMMARY

The SMB Cyber Security Survival Guide

OPSEC and Safe Social Networking

WHITE PAPER: Cyber Crime and the Critical Need for Endpoint Security

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

Digital Consumer s Online Trends and Risks

Anthony J. Keane, MSc, PhD and Jason Flood, MSc Information Security & Digital Forensics Research Group Institute of Technology Blanchardstown

NATIONAL CYBER SECURITY AWARENESS MONTH

SMALL BUSINESS PRESENTATION

Security & SMEs. An Introduction by Jan Gessin. Introduction to the problem

Cybersecurity. Are you prepared?

Identity Theft PROTECT YOUR INFORMATION AND YOUR IDENTITY HIGHLIGHTS

Norton 360. Benefits. Our ultimate protection, now even more so. Introducing the new Norton 360.

Shop Online with Confidence

Preparing Millennials to Lead in Cyberspace October 2014

Special Eurobarometer 423 CYBER SECURITY REPORT

Microsoft s cybersecurity commitment

SMALL BUSINESS IT SECURITY PRACTICAL GUIDE

Learn to protect yourself from Identity Theft. First National Bank can help.

Small businesses: What you need to know about cyber security

The European Response to the rising Cyber Threat

White Paper - Crypto Virus. A guide to protecting your IT

SMALL BUSINESS IT SECURITY PRACTICAL GUIDE

National Cyber Crime Unit

Transcription:

Cybersecurity Protecting Yourself, Your Business, Your Clients Global Summit of Women June 7, 2014 Celina B. Realuyo Professor of Practice of National Security Affairs William J. Perry Center for Hemispheric Defense Studies National Defense University professorcelina@gmail.com Disclaimer: The views expressed in this presentation are those of the speaker and do not reflect the official policy or position of the Center for Hemispheric Defense Studies, the National Defense University, the Department of Defense, or the U.S. Government.

The Drivers in an Age of Globalization Population International Trade/Finance Race for Resources Information CYBERSPACE ENABLES ALL Environment DRIVERS Communications Climate Change OF GLOBALIZATION Intellectual Capital Technology Source: Celina B. Realuyo, WJPC RealuyoC@ndu.edu

The Universe of Cybersecurity Threats Cybercrime Hactivism Cyberterrorism Nation States CYBER SECURITY Source: Celina B. Realuyo, WJPC RealuyoC@ndu.edu

Targets and Types of Cybercrime Targets Against individuals (identity theft or harassment) Against property (attacks on or theft of property IPR) Against the nation state Cyberspace Domain for Criminal Activities Financial Crime/Identity Theft Child Pornography Counterfeit Online Gambling IPR theft Source: Celina B. Realuyo, WJPC RealuyoC@ndu.edu

Increasing Risk of Cybercrime The Reasons Outdated legal framework against cybercrime Private sector reluctance to report incidents Inadequate cybersecurity systems Lack of awareness of threats Strong economic development Attractive targets: banks, energy sector, critical infrastructure, tourism, international businesses Source:Trend Micro Source: Celina B. Realuyo, WJPC RealuyoC@ndu.edu

The Cost of Cybercrime by Country 2013 Source:2013 Norton Cybercrime Report Source: Celina B. Realuyo, WJPC RealuyoC@ndu.edu

CYBERSECURITY: HOW VULNERABLE ARE YOU? Yourself Your Business Your Clients Source: Celina B. Realuyo, WJPC RealuyoC@ndu.edu

SOCIAL MEDIA ARE WE SHARING TOO MUCH? Source: Celina B. Realuyo, WJPC RealuyoC@ndu.edu

ADVANTAGES AND RISKS OF GPS PHONE LOCATION SERVICES Source: Celina B. Realuyo, WJPC RealuyoC@ndu.edu

Large Personal Data Breaches and Reputational Risk Source: Celina B. Realuyo, WJPC RealuyoC@ndu.edu

Five Recommendations to Enhance Cybersecurity 1. Beware of disclosing too much information online 2. Monitor your personal and business transactions regularly 3. Invest in protecting your business operations in cyberspace 4. Safeguard your personal, business, and client data 5. Address any cyber breach immediately and transparently Source: Celina B. Realuyo, WJPC RealuyoC@ndu.edu

CYBERSECURITY IS EVERYONE S RESPONSIBILITY Private Sector Public Sector Civic Sector Source: Celina B. Realuyo, WJPC RealuyoC@ndu.edu

CyberWatch: Febelfin Belgium Federation of Financial Sector: http://youtu.be/f7pyhn9ic9i https://www.youtube.com/watch?annotation_id=annotation_2 02513&feature=iv&src_vid=F7pYHN9iC9I&v=Rn4Rupla11M A Hacker in action: http://www.liveleak.com/view?i=807_1383224319 Some rouge data about cyber war, cyber losses, etc. http://www.youtube.com/watch?v=pielvmqhvxc

How many of you have more than one device to conect to Internet? How many of you know how to protect it?

STOP.THINK. CONNECT. STOP. THINK. CONNECT. is the global cybersecurity awareness campaign to help all digital citizens stay safer and more secure online. The message was created by a coalition of private companies, non-profits and government organizations with leadership provided by the National Cyber Security Alliance (NCSA) and the Anti-Phishing Working Group (APWG). STOP: Before you use the Internet, take time to understand the risks and learn how to spot potential problems. THINK: Take a moment to be certain the path ahead is clear. Watch for warning signs and consider how your actions online could impact your safety, or your family s. CONNECT: Enjoy the Internet with greater confidence, knowing you ve taken the right steps to safeguard yourself and your computer. Visit http://www.stopthinkconnect.org information for more

TIPS & ADVICE: Good Online safety habits 1.- Keep a Clean Machine On computers /laptops and tablets: Keep security software current Automate software update Plug & scan On Smartphones: Take the same precautions on your mobile device as you do on your computer with regard to messaging and online safety. Mobile devices are computers with software that need to be kept up-to-date (just like your PC, laptop or tablet). Keep security software current. On all: Protect all devices that connect to the Internet from viruses and malware.

TIPS & ADVICE: Good Online safety habits 2.- Protect your personal information On computers /tablets and Internet: Secure your accounts: Ask for protection beyond passwords. Make passwords long and strong Unique account, unique password Write it down and keep it safe Own your online presence On Smartphones: Phones can contain tremendous amounts of personal information. Protect your phone like you would your computer. Secure your phone Think before you app Only give your mobile number out to people you know and trust Learn how to disable the geotagging feature on your phone at http://icanstalku.com/how.php#disable

TIPS & ADVICE: Good Online safety habits 3.- Connect with Care Use common sense when you connect. If you're online through an unsecured or unprotected network, be cautious about the sites you visit and the information you release. On computers /tablets and Internet: When in doubt, throw it out Get savvy about Wi-Fi hotspots Protect your $$: When banking and shopping, check to be sure the sites is security enabled. On smartphones: Get savvy about Wi-Fi hotspots. When in doubt, don't respond

TIPS & ADVICE: Good Online safety habits 4.- Be Web Wise Stay informed of the latest updates on your device. Know what to do if something goes wrong. On computers /tablets and Internet: Stay current. Keep pace with new ways to stay safe online. Think before you act. Back it up On smartphones: Know how to cell block others: Use caller ID. Use caution when meeting face-to-face with someone who you only "know" through text messaging

TIPS & ADVICE: Good Online safety habits 5.- Be a Good Online Citizen Remind you and your kids to maintain the same level of courtesy online as they would in the real world. On computers /tablets and Internet: Safer for me more secure for all Post only about others as you have them post about you. Help the authorities fight cyber crime: Report stolen finances or identities and other cybercrime. On smartphones: It is easy to say things via phone or text message that you would never say face to face. Text to others only as you would have them text to you. Only give your mobile number out to people you know and trust and never give anyone else's number out without their permission. Get permission before taking pictures or videos of others with your phone.

How many of you use Social Nets? How many of your kids are very active in social Nets?

Social Networking Tips Social networks are a great way to stay connected with others, but you should be wary about how much personal information you post and take basic precautions before going online. Own your Online Presence: When available, set the privacy and security settings on websites to your comfort level for information sharing Once Posted, Always Posted: Protect your reputation on social networks. Post Only about Others as You Have Them Post about You. It s the golden rule online. When in Doubt, Throw it Out Make Passwords Long, Strong and Unique Your Online Reputation can be a Good Thing Be Honest if you re Uncomfortable. Keep Personal Information Personal. Know and Manage your Friends

Some advices to minimize risks For parents Awareness about not to reveal information to unknown people. Stay alert to cyber news and show them to the kids when they happen (continuous alert). Show contact ways in the social nets with protection authorities. Implement parental control applications in the kids computers, laptops and mobiles for kids between 12-15 years old. For Kids Everybody lie on the web, less or much, but everybody does it. Do not trust social nets users for the photos you see. Do not date physically with some one that is not of your real friends environment. If a friend introduce you someone in a social net, this is not your friend, is only an unknown guy. Check your mobile configuration and disconnect the GeoTag. Complex password https://www.youtube.com/watch?v=47vtdpcu14o

IDOIA MATEO CISO & IT RISK MANAGING DIRECTOR Santander Group idmateo@gruposantander.com