Stop Cyber-Bullying in its Tracks Protect Schools and the Workplace Presenter: Matthew See, Systems Engineer WatchGuard Technologies



Similar documents
How To Stop Cyberbullying

WatchGuard Technologies WatchGuard Technologies

Cyber-bullying. Cyber-bullying: A Digital Epidemic White Paper

Firewall and UTM Solutions Guide

E-Safety Issues and Online Safety. Parents Evening

Configuration Example

E-Safety Issues and Online Safety

WatchGuard: Your Security Partner of Choice. Carlos Vieira

WatchGuard Gateway AntiVirus

How To Control Your Computer With Watchguard Application Control

Comprehensive security solution provides reliable connectivity and faster VPN throughput with unprecedented visibility from WatchGuard Dimension

Top tips for improved network security

Simple security is better security Or: How complexity became the biggest security threat

Choose Your Own - Fighting the Battle Against Zero Day Virus Threats

How Traditional Firewalls Fail Today s Networks And Why Next-Generation Firewalls Will Prevail

E-Safety Issues and Online Safety

How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link)

WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8

KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT. Kaspersky Open Space Security

Executive Brief on Enterprise Next-Generation Firewalls

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences

Cisco ASA 5500 Series Anti-X Edition for the Enterprise

Astaro Gateway Software Applications

Networking for Caribbean Development

Guideline on Windows 7 Parental Controls

Copyright 2013 WatchGuard Technologies, Inc. All rights reserved. Introducción a Watchguard DLP Data Loss Prevention

Advantages of Managed Security Services

NetDefend Firewall UTM Services

Move over, TMG! Replacing TMG with Sophos UTM

IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business

WATCHGUARD BARRACUDA KEY SALES PITCH TRUTH BEHIND THE PITCH

Take Back Control: Increase Security, Empower Employees, Protect the Business

DOWNTIME CAN SPELL DISASTER

Reviewer s Guide. PureMessage for Windows/Exchange Product tour 1

11 THINGS YOUR FIREWALL SHOULD DO. a publication of 2012 INVENIO IT A SMALL BUSINESS WHITEPAPER

Thexyz Premium Webmail

The Next Step in Outbound Protection. By Robert Mannal, CIPP, CISSP

How To Protect From The Internet With Mailmarshal Smt And Mailmper For Exchange

Kaseya White Paper. Endpoint Security. Fighting Cyber Crime with Automated, Centralized Management.

Configuration Example

Digital Citizenship Lesson Plan

Configuration Information

Enabling Secure BYOD How Fortinet Provides a Secure Environment for BYOD

Cisco ASA 5500 Series Content Security Edition for the Enterprise

Enabling Business Beyond the Corporate Network. Secure solutions for mobility, cloud and social media

White Paper. How to Effectively Provide Safe and Productive Web. Environment for Today's Businesses

AVG AntiVirus. How does this benefit you?

1110 Cool Things Your Firewall Should Do. Extending beyond blocking network threats to protect, manage and control application traffic

Leading Telecom Provider Ensures Customers Have Proper Network Protection with WatchGuard

Why it's time to upgrade to a Next Generation Firewall. Dickens Lee Technical Manager

Your Security Partner of Choice

provides several new features and enhancements, and resolves several issues reported by WatchGuard customers.

How To Control Your Network With A Firewall On A Network With An Internet Security Policy On A Pc Or Ipad (For A Web Browser)

Unified Threat Management, Managed Security, and the Cloud Services Model

Next Gen Firewall and UTM Buyers Guide

Symantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure

Defining, Evaluating, and Designing Best-in-Class Network Security

NetDefend Firewall UTM Services

The Advantages of Security as a Service versus On-Premise Security

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Stop advanced targeted attacks, identify high risk users and control Insider Threats

Data Loss Prevention: Keep Sensitive Data-In-Motion Safe

Top 10 Features: Clearswift SECURE Gateway

Buyers Guide to Web Protection

A Websense White Paper Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway

Powerful and reliable virus and spam protection for your GMS installation

Cloud-based Web Security Isn t Hype: It s Here and It Works

FortiMail Filtering Course 221-v2.2 Course Overview

Network protection and UTM Buyers Guide

DLP Quick Start

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

Proxy Blocking: Preventing Tunnels Around Your Web Filter. Information Paper August 2009

EMERSON PARK ACADEMY

Guideline on Auditing and Log Management

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

Cisco ASA 5500 Series Content Security Edition for the Enterprise

SafeNet Content Security Product Overview. Protecting the Network Edge

WatchGuard Certified Training Partner (WCTP) Program

SafeNet Content Security. esafe SmartSuite - Security that Thinks. Real-time, Smart and Simple Web and Mail Security Solutions.

Networking and Social Media Policy

Protecting Your Network Against Risky SSL Traffic ABSTRACT

MESSAGING SECURITY GATEWAY. Detect attacks before they enter your network

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World

UTM-Enabled Network Protection

WatchGuard Certified Training Partner (WCTP) Program

Comprehensive real-time protection against Advanced Threats and data theft

Getting Started Guide

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109

How Web Security Improves Productivity and Compliance

overview Enterprise Security Solutions

White Paper: Ensuring HIPAA Compliance by Implementing the Right Security Strategy

Top 10 Tips to Keep Your Small Business Safe

WatchGuard XCSv Setup Guide

Technology Blueprint. Protecting Intellectual Property in . Guarding against information-stealing malware and outbound data loss

WEBSENSE SECURITY SOLUTIONS OVERVIEW

Securing enterprise collaboration through and file sharing on a unified platform

(Internet) for students, staff and, if requested, members of the Board of Education. All computer

Configuration Example

Providing Secure IT Management & Partnering Solution for Bendigo South East College

Transcription:

Stop Cyber-Bullying in its Tracks Protect Schools and the Workplace Presenter: Matthew See, Systems Engineer WatchGuard Technologies 2010 WatchGuard Technologies

Cyber-Bullying Stopcyberbullying.org, an expert organization dedicated to Internet safety, security and privacy, defines cyber-bullying as:... when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child, preteen or teen using the Internet, interactive and digital technologies or mobile phones. But its also in the workplace! Less attention is paid to cyber-bullying in the workplace but it does happen. Companies typically manage situations internally, so there are less statistics available.

Cyber-Bullying Bullies are everywhere the playground, at school, on sports teams, in business and today, they re online. During the past six years, cyber-bullying has become more mainstream. Schools, parents, workplaces and society now need to address this issue proactively. Cyber-bullying opens the door to 24-hour harassment through email, instant messaging, social networking sites, chat rooms, mobile phones, gaming consoles and other Internet enabled-devices.

Cyber-Bullying Why is cyber-bullying different to traditional harassment? Because humiliating rumours, threats and vicious taunts can be viewed by millions and can be devastating to youth and their families. Most common virtual locations for cyber-bullying are chat rooms, social networking web sites, email and instant message systems. Social networking sites such as Facebook are growing fast, and so are the cyber-bullying incidents originating from them. Experts believe that they will soon overtake chat rooms as the top source of cyber-bullying problems worldwide.

Statistics from the National Crime Prevention Centre More than 40% of all teenagers with Internet access have reported being bullied online. Girls are more likely than boys to be the target of cyber-bullying. Only 10% of those bullied told their parents about the incident, and only 18% of the cases were reported to a law enforcement agency. Only 15% of parents are in the know about their kids social networking habits, and how these behaviours can lead to cyber-bullying. 58% of 4th through 8th graders reported having mean or cruel things said to them online; 53% said that they have said mean or hurtful things to others while online; 42% of those studied said that they had been bullied online.

Fastest growing Cyber-Bullying tactics Stealing an individual s name and password to a social networking site, then using their profile to post rumours, gossip or other damaging information. Altering photographs using PhotoShop or other photo editing software in order to humiliate the individual. Recording conversations without the individual s knowledge or consent, then posting the call online. Creating confrontational and mean-spirited online polls about the individual and posting them on different web sites. Using web sites and blogs to post hurtful, embarrassing information about another individual.

Homes, Phones and Consoles Although a lot of work can be done in schools, at home, and in the workplace to educate and counsel individuals about cyber-bullying and its effects, its an issue powered by technology that can be controlled with technology. For example: For home-based computers: there are parental control software that parents can install For phones: parents can simply ask the phone company to block features, callers, texting, etc or for very advanced phones there are parental control apps to install For gaming devices: many of the newer games come with some type of parental controls built right in parents just need to turn them on.

Schools and Business Can you afford to ignore these types of activities? Are messaging threats from email and web usage posing a threat to students, faculty and/or staff? What are the legal implications? How much network bandwidth is wasted? How much lost productivity for students and staff? How much time is spent battling viruses, spam, phishing, and malware?

Schools and Business As students increasingly use Internet communications in school, they are exposing themselves, and the school district, to malicious and unacceptable content as well as safety concerns surrounding threatening and dangerous abuse of messaging vehicles for harassment purposes. IT departments are increasingly providing support and network services to growing student bodies and faculty users, offering both inschool and at-home access to email, the Internet, network user folders and coursework via district networks.

Today, cyber-bullying doesn t affect just parents, schools and children, but it has become a problem for IT departments, particularly in Education. With the increased use of social networking sites, such as Facebook, and the chance of slanderous comments being posted, IT departments need ways to prevent cyber-bullying. Most email and web security solutions focus on content coming in from the Internet to protect the internal environment and do not focus on what is being sent out of the network. Some believe the solution is to entirely block student access to these technologies, however, with the wealth of knowledge available to students on the Internet this could prove to be counterproductive to the learning process. With the advancement in messaging security technology, however, there are ways to fight cyber-bullying before it escalates, and without the need to completely block student access to email and web protocols via school networks.

WatchGuard XCS Stops Cyber-bullying In Its Tracks WatchGuard Extensible Content Security (XCS) features the ability to block or flag cyber-bullying, slander and comments related to depression and suicide through traditional email, webmail (such as Gmail) and Internet sites including Facebook and Twitter. XCS also offers best-of-breed anti-spam, anti-malware, URL filtering, outbound content control, data loss prevention, and detailed diagnostic tools for email and web traffic.

Eliminate Cyber-bullying Posts to Social Network Sites with XCS Content Control Rules Below is an attempted post to Facebook has been blocked by WatchGuard XCS due to the nature of the words used in the post. The user only sees an error message, and would believe that either Facebook has blocked the post, or Facebook is currently down.

What the Administrator Sees Below is what the administrator will see on the WatchGuard XCS dashboard. Due to the Content Control Rule, the administrator knows something was blocked. Also, based on policy, an administrator can trigger an email regarding the breach. For example, to an HR Manager, a School Principal, or any other individual or group.

What the Administrator Sees By looking at the activity page under Recent Web Activity (Figure 3), the administrator can see that the breach in question was an intended post to www.facebook.com that was blocked by the WatchGuard XCS Content Control Rules.

What the Administrator Sees By clicking on the entry, a drill down shows more details about the incident, including the URL.

What the Administrator Sees By clicking on Show Log the administrator is able to determine exactly why the posting was blocked.

Block Malicious and Slanderous Emails When sending an email from Gmail (or any other web-based email) that contains inappropriate or disallowed content such as obscenities or content that may be deemed to be considered slanderous or a form of cyber-bullying, an error pop-up screen would appear for the sender as below.

Block Malicious and Slanderous Emails Traditional emails are blocked or quarantined as they try and leave the Mail Server, such as Exchange or Domino. They will appear to be sent, and remain in the user s Sent Items. WatchGuard XCS can place the email into quarantine or block the email altogether based on policies defined by the administrator. It can also blind-copy or reroute the message as another form of transparent remediation.

Objectionable Content Filter The key technology is an objectionable content filter rule on the XCS appliance, using a weighted dictionary of commonly used slanderous words and phrases. The list is maintained by WatchGuard, but can be customised by the XCS administrator (be warned, the list is highly offensive). XCS is unique in the market: a single appliance that looks at both email and web traffic, and applies common rules across both. Flexible deployment options: transparent proxy, explicit proxy, inline, DMZ or LAN Integrated reporting

Best-In-Class Security: XCS Standard AV LiveSecurity AV Alternative Email Encryption Reputation Enabled defense URL Filtering

Defense-in-Depth XCS Wa t c hgu ard E x t ensible C o n t ent M a n a gement ConnectionLevel Protection Content Security Threat Protection Layered Security Reputation Enabled Defense Anti-Spam Data Loss Prevention Anti-Virus Email Encryption Anti-Malware Privacy & Compliance Threat Outbreak Control Attachment Control Message Quarantine Objectionable Content Control Centralized Management Rich Reporting URL Filtering Real-Time Monitoring On-Demand Clustering Queue Reporting Multi-Layers of Duplication Document Fingerprinting Acceptable Web Content Consolidated Content Security for Email & Web

Defense-in-Depth for Email Security Rejected Email Messages

Defense-in-Depth for Web Security WatchGuard Uniqueness Rejected Web Messages

Best-In-Class Security: XTM LiveSecurity Application Control IPS Reputation Enables Defense WebBlocker spamblocker Gateway AnitVirus

Defense-in-Depth XTM Wa t c hgu ard E x t ensible T h r eat M a n a gemen t VPN Stateful Firewall Content Security Layered Security SSL IPSEC Deep Packet Inspection Reputation Enabled Defense Gateway Antivirus Intrusion Prevention Spam Protection URL Filtering Centralized Management Rich Reporting Real-Time Monitoring Application Control

Great Performance at Every Price Point XTM XTM 1050 XTM 8 Series XCS 1170 Performance XCS 970 XTM 5 Series XTM 2 Series XCS 770 XCS 570 XCS XCS 370 XCS 170 Small Business/Branch Offices 10-500 Users Small to Medium Business 500-1,000 Users Medium Enterprises Up to 4,000 Users Enterprises Up to 7,000 Users Large Enterprises, MSSPs Up to 10,000 Users Industry s best price/performance for gateway anti-virus throughput

Target Markets WatchGuard XCS 170, 370 SME 10-500 users (starting at ~$2700) Any company needing strong anti-spam and data loss prevention Optional email encryption subscriptions Cyber bullying protection WatchGuard XCS 570, 770, 970, 1170 Medium to large enterprise: 5,000 to 10,000+ users (up to $65k) Strong anti-spam and DLP Optional web security and email encryption

Special Free XCS Cyber Bullying Offer Viewers of this webinar can test the XCS in your environment now to stop Cyber Bullying it its tracks. If you re interested in testing XCS technology free of charge then please contact: NSW, QLD, NT, ACT, NZ Jolene.Goh@WatchGuard.com VIC, TAS, SA, WA John.Bellarts@WatchGuard.com