SlideShare une entreprise Scribd logo
1  sur  47
William Mann, CGCIO
Borough of West Chester
Training
William Mann, CGCIO
Borough of West Chester
October 3, 2019
2 Week Email Activity Snapshot
All organizations are under digital
attack – all the time.
Everyone should never forget this.
BRBL -Barracuda Reputation Block List
Spam-Inappropriate messages
BRTS -Messenger does not domain
Virus -Harmful or Corrupting Code
ATP -Advanced Threat Protection
1 Week Email Origination Snapshot
Training objectives
You are the first line of defense against cyber-attacks targeting information and
information systems.
The purpose of this training is to help you identify the information that must be protected,
common threats against information and information systems, best practices and policies to
safeguard information and information systems' confidentiality, integrity, and availability.
This training can also help you recognize and report cybersecurity incidents.
What is cybersecurity?
Borough of West Chester personnel must use cybersecurity
best practices listed in this training to safeguard our
organization’s information from cyber threats.
“Cybersecurity" is the action taken to protect information
and information systems from unauthorized access, use,
disclosure, disruption, modification, or destruction.
What is sensitive
information?
Sensitive information is information
that has a degree of confidentiality
such that its loss, misuse,
unauthorized access, or
modification could compromise
confidentiality and adversely affect
the Borough of West Chester’s
interests or the privacy of
individuals.
Importance of Cybersecurity
The top vectors for vulnerabilities available to a cybercriminals include:
Web Browser IM Clients Web Applications Excessive User Rights
Risks caused by poor security, knowledge and practice:
Identity Theft Monetary Theft
Legal Ramifications (for yourself
and your organization)
Sanctions or termination if
policies are not followed
The internet allows cyber criminals to work from anywhere on the planet.
Cybersecurity
is Safety
Security: We must protect our
computers and data in the same way
that we secure the doors to
our homes.
Safety: We must behave in ways that
protect us against risks and threats
that come with technology.
Leading
Threats
Viruses
Worms
Trojan Horses / Logic Bombs
Social Engineering
Rootkits
Botnets / Zombies
Ransomware
Viruses
A virus attaches itself to a program, file, or disk.
When the program is executed, the virus activates and
replicates itself.
The virus then executes its
payload at some point
(often upon contact).
Viruses can cause computer crashes
and loss of data.
In order to recover or
prevent virus attacks:
Avoid potentially unreliable
websites/emails.
System Restore.
Re-install operating system.
Use and maintain anti-virus software.
Worms
Independent program that replicates
itself and sends copies from computer to
computer across network connections.
Upon arrival, the worm may be activated
to replicate.
Logic Bombs & Trojan Horses
Trojan Horse: Masquerades as a benign program while quietly destroying
data or damaging your system.
Download a game: It may be fun but contains hidden code that gathers personal information
without your knowledge.
Logic Bomb: Malware executes upon certain conditions. There are ligament
and criminal uses of this.
Examples:
Software which malfunctions
if maintenance fee is not
paid.
Employee triggers a database
erase when he is fired.
Social
Engineering
Social engineering manipulates people into
performing actions or divulging confidential
information.
This is similar to fraud.
The term applies to the use of deception to gain
information, commit fraud, or access computer
systems.
Phishing:
Counterfeit Email
Phishing: A seemingly trustworthy entity asks for
sensitive information such as SSN, credit card
numbers, login IDs or passwords via e-mail.
Example of Phishing / Counterfeit Email
Pharming: Counterfeit Web Pages
The counterfeit web page looks like the real thing
Extracts account information
The link provided in the e-mail leads to a counterfeit
webpage which collects important information and
submits it to the owner.
Botnet
A botnet is a number of compromised computers used
to create and send spam or viruses or flood a network
with messages as a denial of service attack.
The compromised computers are called zombies.
Ransomware
Users are shown instructions for how to pay a fee to get the
decryption key. The costs can range from a few hundred
dollars to thousands, payable to cybercriminals in Bitcoin.
Ransomware encrypts a victim's files. The attacker then
demands a ransom from the victim to restore access to the
data upon payment.
How Ransomware Works
1. One of the most common methods today is through malicious spam. The email
might include booby-trapped attachments, such as PDFs or Word documents. It
might also contain links to malicious websites.
2. Then there is Malspam which uses social engineering in order to trick people into
opening attachments or clicking on links by appearing as legitimate—whether
that’s by seeming to be from a trusted institution or a friend. Cybercriminals use
social engineering in other types of ransomware attacks, such as posing as the FBI
in order to scare users into paying them a sum of money to unlock their files.
3. Another popular infection method is Malvertising. Malvertising, or malicious
advertising, is the use of online advertising to distribute malware with little to no
user interaction required. While browsing the web, users can be directed to
criminal servers without ever clicking on an ad. These servers catalog details
about victim computers and their locations, and then select the malware best
suited to deliver. Often, that malware is ransomware.
There are several ways ransomware can take control of your computer.
Types of
Ransomware
Scareware
 Scareware, as it turns out, is not that scary. It includes
rogue security software and tech support scams. You
might receive a pop-up message claiming that malware
was discovered and the only way to get rid of it is to
pay up. If you do nothing, you’ll likely continue to be
bombarded with pop-ups, but your files are essentially
safe.
Be aware: legitimate cybersecurity software programs
will not solicit customers in this way.
Types of
Ransomware
Screen lockers
 When lock-screen ransomware gets on your computer, it
means you’re frozen out of your PC entirely. Upon
starting up your computer, a full-size window will
appear, often accompanied by an official-looking FBI or
US Department of Justice seal saying illegal activity has
been detected on your computer and you must pay a
fine.
Be aware: The FBI would not freeze you out of your
computer or demand payment for illegal activity. If
they suspected you of a crime, they would go
through the appropriate legal channels.
Types of
Ransomware
Encrypting ransomware
 These are the guys who snatch up your files and encrypt
them, demanding payment in order to decrypt and
redeliver. The reason why this type of ransomware is so
dangerous is because once cybercriminals get ahold of
your files, no security software or system restore can
return them to you.
 Unless you pay the ransom—for the most part, they’re
gone.
 And even if you do pay up, there’s no guarantee the
cybercriminals will give you those files back.
Examples of Ransomware
Rootkit
Upon accessing a
computer, a hacker may
install a collection of
programs, called a rootkit.
•Easy access for the hacker (and others) into
the PC or network.
•Keystroke logger (what you type is logged).
The rootkit may enable:
Eliminates evidence of
break-in.
Modifies the operating
system.
Identifying
Security
Compromises
 Symptoms:
 Antivirus software detects a problem.
 Disk space disappears unexpectedly.
 Pop-ups suddenly appear, sometimes selling
security software.
 Files or transactions appear that should not be
there.
 The computer slows down to a crawl.
 Unusual messages, sounds, or displays on your
monitor.
 The mouse pointer moves by itself.
 The computer spontaneously shuts down or
reboots.
Malware Detection
• Spyware symptoms:
• Changes to your browser
homepage/start page.
• Ending up on a strange site when
conducting a search.
• System-based firewall is turned off
automatically.
• Lots of network activity while not
particularly active.
• Excessive pop-up windows.
• New icons, programs, favorites which
you did not add.
• Frequent firewall alerts about unknown
programs when trying to access the
Internet.
• Poor system performance.
Anti-Virus and
Anti-Spyware
Software
Anti-virus software detects certain types of malware
and can destroy it before any damage is done.
Install and maintain anti-virus and anti-spyware
software.
Be sure to keep anti-virus software updated.
Many free and commercial options exist.
Firewalls
A firewall acts as a barrier between
your computer/private network and
the internet. A firewall prevents many
hacker connections to your computer.
Firewalls filter network packets that
enter or leave your computer
Protect Your Operating System
Microsoft regularly issues
patches or updates to solve
security problems in their
software. If these are not
applied, it leaves your
computer vulnerable to
hackers.
The Windows Update feature
built into Windows can be set
up to automatically download
and install updates.
Avoid logging in as
administrator
Apple provides regular updates
to its operating system and
software applications.
Apply Apple updates using the
App Store application.
Use Strong Passwords!
Must not contain easily accessible or guessable personal information about the user or user’s family, such as
birthdays, children’s names, addresses, etc.
Must not contain the user’s name or part of the user’s name
Must contain characters from at least two of the following four types of characters:
English upper case (A-Z) English lower case (a-z) Numbers (0-9)
Non-alphanumeric special
characters ($, !, %, ^, …)
Passwords should be at least ten characters in length
Password Guidelines
Never use admin, root,
administrator, or a default
account or password for
administrative access.
•Private: Used by only one person.
•Secret: It is not stored in clear text anywhere,
•including on Post-It® notes!
•Easily Remembered: No need to write it down.
•Contains the complexity required by your organization.
•Not easy to guess by a person or a program in a reasonable time, such as several weeks.
•Changed regularly: Follow organization standards.
A good password is:
Avoid shoulder surfers and
enter your credentials
carefully!
Password
Managers
Using a password manager is an easy, quick way to make
your online life more secure. You won't need to remember
a unique, long, complex password for every online
account. The password manager remembers each
password for you, minimizing your risk next time there's a
massive data breach.
The only password you'll need to remember is the single
"master" password to the password manager itself.
Three Recommended Password Managers
LastPass
LastPass is recommended because of its ease of use, support for all major
platforms, wide range of features and variety of configurations. The free version
of LastPass syncs across an unlimited number of devices and has almost as many
features as the paid version.
You don't need to install an application on your computer to use LastPass.
Instead, the software lives entirely in browser extensions and in a full-featured
web interface.
dashlane
Dashlane's killer feature remains its bulk password changer, which can reset
hundreds of your passwords at once, saving you time and worry in the event of a
major data breach. There's also a scanner that goes through your email inbox on
iOS or Android to find online accounts you may have forgotten about. The
password manager is well designed, easy to use and possibly the best at filling
out your personal information in online forms.
Three Recommended Password Managers
Keeper
Keeper is fast and full-featured, has a robust web interface, stores files and
documents of any kind, offers perhaps the best security of any password
manager and is now cheaper than both Dashlane and LastPass.
The trade-off for that enhanced security is a bit of inconvenience: Keeper
chooses not to have a bulk password changer, and it won't let you create a PIN to
quickly access the mobile app. If you have an older phone that can't read your
fingerprint or your face, you'll have to enter the full master password every time.
Three Recommended Password Managers
Avoid Social Engineering and Malicious Software
DO NOT OPEN EMAIL
ATTACHMENTS UNLESS
YOU ARE EXPECTING
THE EMAIL WITH THE
ATTACHMENT AND YOU
TRUST THE SENDER.
01
DO NOT CLICK ON
LINKS IN EMAILS
UNLESS YOU ARE SURE
OF THEIR VALIDITY.
02
ONLY VISIT AND/OR
DOWNLOAD
SOFTWARE FROM WEB
PAGES YOU TRUST.
03
Avoid Hacker
Tricks
Be sure to have a good firewall or pop-up blocker
installed.
Pop-up blockers do not always block ALL pop-ups so
always close a pop-up window using the ‘X’ in the
upper corner.
Never click “yes,” “accept” or even “cancel.”
Infected USB drives are often left unattended by
hackers in public places.
Secure Business Transactions
ALWAYS USE SECURE BROWSER TO
DO ONLINE ACTIVITIES.
FREQUENTLY DELETE TEMP FILES,
COOKIES, HISTORY, SAVED
PASSWORDS ETC.
Backup
Important
Information
No security measure is 100% reliable.
Even the best hardware fails.
What information is important to you?
Is your backup:
• Recent?
• Off-site & Secure?
• Incremental and at least 2 weeks of versions?
• Encrypted?
• Tested?
What Defenses Do
We Have in Place?
 Axcient Local & Cloud Backup
 Bitdefender Antivirus
 Barracuda CloudGen Firewalls
 Barracuda Security Essentials
 Email Security
 Cloud Archiving Service
 Cloud-to-Cloud Backup
 Barracuda Advanced Threat
Protection
 Real Time AI
 Account Takeover
 Domain Fraud
 Forensics and Incident Response
Help Us Help You with the new Barracuda
Essentials for Email Security Outlook Add-In
Submit an Email Message as Suspicious
Click to flag messages that are potentially harmful or unwanted – including phishing, spear-phishing, spam, or impersonation emails.
Flagging suspicious emails can help protect other users in our organization. Flagged messages are:
•Submitted to Barracuda Networks for analysis and improving email protection.
•Sent to your organization’s administrator for review. (Requires Barracuda Forensics & Incident Response.)
To submit an email as suspicious:
1.Open the Actions panel as described above.
2.Click Submit as Suspicious . The currently selected message is submitted to Barracuda as suspicious
and is immediately moved to Deleted Items folder, or the folder specified in your Preferences, described below.
Monthly CIO Report – Security Activity for September 2019
Protect sensitive Borough data

Contenu connexe

Tendances

Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness TrainingRandy Bowman
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness TrainingDave Monahan
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101mateenzero
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityAtlantic Training, LLC.
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness ProgramBill Gardner
 
Information Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanInformation Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanAhmed Musaad
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee TrainingPaige Rasid
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeAtlantic Training, LLC.
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Programdavidcurriecia
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training OpenFred Beck MBA, CPA
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness PresentationCristian Mihai
 
Cyber Security Awareness Training
Cyber Security Awareness TrainingCyber Security Awareness Training
Cyber Security Awareness TrainingBuy Custom Papers
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingDaniel P Wallace
 
Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08DallasHaselhorst
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness TrainingDenis kisina
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness SnapComms
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness trainingAbdalrhmanTHassan
 

Tendances (20)

Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness Program
 
Information Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanInformation Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing Sudan
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
 
Cyber Security Awareness Training
Cyber Security Awareness TrainingCyber Security Awareness Training
Cyber Security Awareness Training
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness training
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
 

Similaire à Protect sensitive Borough data

Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsDrPraveenKumar37
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptxSibyJames1
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfMArshad35
 
Cyber Security-Foundation.ppt
Cyber Security-Foundation.pptCyber Security-Foundation.ppt
Cyber Security-Foundation.pptErAdityaSingh1
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGudipudiDayanandam
 
Amenazas Informática
Amenazas InformáticaAmenazas Informática
Amenazas InformáticaDani Díaz
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
Cyber-Security.ppt
Cyber-Security.pptCyber-Security.ppt
Cyber-Security.pptSeniorGaming
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security9784
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for LawyersMark Lanterman
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptAnoop Mishra
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptfaadu1
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptHArshMangasuli
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptmohan jena
 
Cyber-Security-.ppt
Cyber-Security-.pptCyber-Security-.ppt
Cyber-Security-.pptmabiratu
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptssuser77bda9
 

Similaire à Protect sensitive Borough data (20)

Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdf
 
Cyber Security-Foundation.ppt
Cyber Security-Foundation.pptCyber Security-Foundation.ppt
Cyber Security-Foundation.ppt
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
 
Amenazas Informática
Amenazas InformáticaAmenazas Informática
Amenazas Informática
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Cyber-Security.ppt
Cyber-Security.pptCyber-Security.ppt
Cyber-Security.ppt
 
Malware Infections
Malware InfectionsMalware Infections
Malware Infections
 
Cyber-Security-.ppt
Cyber-Security-.pptCyber-Security-.ppt
Cyber-Security-.ppt
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
cs0123.ppt
cs0123.pptcs0123.ppt
cs0123.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security-.ppt
Cyber-Security-.pptCyber-Security-.ppt
Cyber-Security-.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security.ppt
Cyber-Security.pptCyber-Security.ppt
Cyber-Security.ppt
 

Plus de William Mann

Technology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreTechnology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreWilliam Mann
 
Technology Training for Staff - April 6, 2017
Technology Training for Staff - April 6, 2017Technology Training for Staff - April 6, 2017
Technology Training for Staff - April 6, 2017William Mann
 
Why Digital Document Management?
Why Digital Document Management?Why Digital Document Management?
Why Digital Document Management?William Mann
 
Technology Training 11-10-2016
Technology Training  11-10-2016Technology Training  11-10-2016
Technology Training 11-10-2016William Mann
 
Tech training 19 Skype for Business
Tech training 19   Skype for BusinessTech training 19   Skype for Business
Tech training 19 Skype for BusinessWilliam Mann
 
Introducing Microsoft's Cloud - Session 16
Introducing Microsoft's Cloud - Session 16Introducing Microsoft's Cloud - Session 16
Introducing Microsoft's Cloud - Session 16William Mann
 
Technology Training - Session 15
Technology Training - Session 15Technology Training - Session 15
Technology Training - Session 15William Mann
 
West Chester Staff Technology Training - Website,LastPass and Tips!
West Chester Staff Technology Training   - Website,LastPass and Tips!West Chester Staff Technology Training   - Website,LastPass and Tips!
West Chester Staff Technology Training - Website,LastPass and Tips!William Mann
 
Heartbleed Explained & LastPass Demo
Heartbleed Explained & LastPass DemoHeartbleed Explained & LastPass Demo
Heartbleed Explained & LastPass DemoWilliam Mann
 
West Chester - Tech Training Session 11
West Chester - Tech Training Session 11West Chester - Tech Training Session 11
West Chester - Tech Training Session 11William Mann
 
What is West Chester Connect?
What is West Chester Connect?What is West Chester Connect?
What is West Chester Connect?William Mann
 
West Chester Tech Blog - Training Class - Session 10
West Chester Tech Blog - Training Class - Session 10West Chester Tech Blog - Training Class - Session 10
West Chester Tech Blog - Training Class - Session 10William Mann
 
Tech Training - Session 9
Tech Training - Session 9Tech Training - Session 9
Tech Training - Session 9William Mann
 
Tech Training - Session 8
Tech Training - Session 8Tech Training - Session 8
Tech Training - Session 8William Mann
 
Session 5 - Managing Microsoft Outlook and More
Session 5 - Managing Microsoft Outlook and MoreSession 5 - Managing Microsoft Outlook and More
Session 5 - Managing Microsoft Outlook and MoreWilliam Mann
 
Cloud computing 102711 - ccap
Cloud computing   102711 - ccapCloud computing   102711 - ccap
Cloud computing 102711 - ccapWilliam Mann
 
Cloud computing presentation
Cloud computing   presentationCloud computing   presentation
Cloud computing presentationWilliam Mann
 

Plus de William Mann (20)

Ransomware 101
Ransomware 101Ransomware 101
Ransomware 101
 
Technology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreTechnology Training - Security, Passwords & More
Technology Training - Security, Passwords & More
 
Technology Training for Staff - April 6, 2017
Technology Training for Staff - April 6, 2017Technology Training for Staff - April 6, 2017
Technology Training for Staff - April 6, 2017
 
Why Digital Document Management?
Why Digital Document Management?Why Digital Document Management?
Why Digital Document Management?
 
Technology Training 11-10-2016
Technology Training  11-10-2016Technology Training  11-10-2016
Technology Training 11-10-2016
 
Tech training 19 Skype for Business
Tech training 19   Skype for BusinessTech training 19   Skype for Business
Tech training 19 Skype for Business
 
Introducing Microsoft's Cloud - Session 16
Introducing Microsoft's Cloud - Session 16Introducing Microsoft's Cloud - Session 16
Introducing Microsoft's Cloud - Session 16
 
Technology Training - Session 15
Technology Training - Session 15Technology Training - Session 15
Technology Training - Session 15
 
West Chester Staff Technology Training - Website,LastPass and Tips!
West Chester Staff Technology Training   - Website,LastPass and Tips!West Chester Staff Technology Training   - Website,LastPass and Tips!
West Chester Staff Technology Training - Website,LastPass and Tips!
 
Heartbleed Explained & LastPass Demo
Heartbleed Explained & LastPass DemoHeartbleed Explained & LastPass Demo
Heartbleed Explained & LastPass Demo
 
West Chester - Tech Training Session 11
West Chester - Tech Training Session 11West Chester - Tech Training Session 11
West Chester - Tech Training Session 11
 
What is West Chester Connect?
What is West Chester Connect?What is West Chester Connect?
What is West Chester Connect?
 
West Chester Tech Blog - Training Class - Session 10
West Chester Tech Blog - Training Class - Session 10West Chester Tech Blog - Training Class - Session 10
West Chester Tech Blog - Training Class - Session 10
 
Tech Training - Session 9
Tech Training - Session 9Tech Training - Session 9
Tech Training - Session 9
 
Tech Training - Session 8
Tech Training - Session 8Tech Training - Session 8
Tech Training - Session 8
 
SharePoint & More
SharePoint & MoreSharePoint & More
SharePoint & More
 
Session 5 - Managing Microsoft Outlook and More
Session 5 - Managing Microsoft Outlook and MoreSession 5 - Managing Microsoft Outlook and More
Session 5 - Managing Microsoft Outlook and More
 
Holiday scams
Holiday scamsHoliday scams
Holiday scams
 
Cloud computing 102711 - ccap
Cloud computing   102711 - ccapCloud computing   102711 - ccap
Cloud computing 102711 - ccap
 
Cloud computing presentation
Cloud computing   presentationCloud computing   presentation
Cloud computing presentation
 

Dernier

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Dernier (20)

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

Protect sensitive Borough data

  • 1. William Mann, CGCIO Borough of West Chester Training William Mann, CGCIO Borough of West Chester October 3, 2019
  • 2.
  • 3.
  • 4.
  • 5. 2 Week Email Activity Snapshot All organizations are under digital attack – all the time. Everyone should never forget this. BRBL -Barracuda Reputation Block List Spam-Inappropriate messages BRTS -Messenger does not domain Virus -Harmful or Corrupting Code ATP -Advanced Threat Protection
  • 6. 1 Week Email Origination Snapshot
  • 7. Training objectives You are the first line of defense against cyber-attacks targeting information and information systems. The purpose of this training is to help you identify the information that must be protected, common threats against information and information systems, best practices and policies to safeguard information and information systems' confidentiality, integrity, and availability. This training can also help you recognize and report cybersecurity incidents.
  • 8. What is cybersecurity? Borough of West Chester personnel must use cybersecurity best practices listed in this training to safeguard our organization’s information from cyber threats. “Cybersecurity" is the action taken to protect information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
  • 9. What is sensitive information? Sensitive information is information that has a degree of confidentiality such that its loss, misuse, unauthorized access, or modification could compromise confidentiality and adversely affect the Borough of West Chester’s interests or the privacy of individuals.
  • 10. Importance of Cybersecurity The top vectors for vulnerabilities available to a cybercriminals include: Web Browser IM Clients Web Applications Excessive User Rights Risks caused by poor security, knowledge and practice: Identity Theft Monetary Theft Legal Ramifications (for yourself and your organization) Sanctions or termination if policies are not followed The internet allows cyber criminals to work from anywhere on the planet.
  • 11. Cybersecurity is Safety Security: We must protect our computers and data in the same way that we secure the doors to our homes. Safety: We must behave in ways that protect us against risks and threats that come with technology.
  • 12. Leading Threats Viruses Worms Trojan Horses / Logic Bombs Social Engineering Rootkits Botnets / Zombies Ransomware
  • 13. Viruses A virus attaches itself to a program, file, or disk. When the program is executed, the virus activates and replicates itself. The virus then executes its payload at some point (often upon contact). Viruses can cause computer crashes and loss of data. In order to recover or prevent virus attacks: Avoid potentially unreliable websites/emails. System Restore. Re-install operating system. Use and maintain anti-virus software.
  • 14. Worms Independent program that replicates itself and sends copies from computer to computer across network connections. Upon arrival, the worm may be activated to replicate.
  • 15. Logic Bombs & Trojan Horses Trojan Horse: Masquerades as a benign program while quietly destroying data or damaging your system. Download a game: It may be fun but contains hidden code that gathers personal information without your knowledge. Logic Bomb: Malware executes upon certain conditions. There are ligament and criminal uses of this. Examples: Software which malfunctions if maintenance fee is not paid. Employee triggers a database erase when he is fired.
  • 16. Social Engineering Social engineering manipulates people into performing actions or divulging confidential information. This is similar to fraud. The term applies to the use of deception to gain information, commit fraud, or access computer systems.
  • 17.
  • 18. Phishing: Counterfeit Email Phishing: A seemingly trustworthy entity asks for sensitive information such as SSN, credit card numbers, login IDs or passwords via e-mail.
  • 19. Example of Phishing / Counterfeit Email
  • 20. Pharming: Counterfeit Web Pages The counterfeit web page looks like the real thing Extracts account information The link provided in the e-mail leads to a counterfeit webpage which collects important information and submits it to the owner.
  • 21. Botnet A botnet is a number of compromised computers used to create and send spam or viruses or flood a network with messages as a denial of service attack. The compromised computers are called zombies.
  • 22. Ransomware Users are shown instructions for how to pay a fee to get the decryption key. The costs can range from a few hundred dollars to thousands, payable to cybercriminals in Bitcoin. Ransomware encrypts a victim's files. The attacker then demands a ransom from the victim to restore access to the data upon payment.
  • 23. How Ransomware Works 1. One of the most common methods today is through malicious spam. The email might include booby-trapped attachments, such as PDFs or Word documents. It might also contain links to malicious websites. 2. Then there is Malspam which uses social engineering in order to trick people into opening attachments or clicking on links by appearing as legitimate—whether that’s by seeming to be from a trusted institution or a friend. Cybercriminals use social engineering in other types of ransomware attacks, such as posing as the FBI in order to scare users into paying them a sum of money to unlock their files. 3. Another popular infection method is Malvertising. Malvertising, or malicious advertising, is the use of online advertising to distribute malware with little to no user interaction required. While browsing the web, users can be directed to criminal servers without ever clicking on an ad. These servers catalog details about victim computers and their locations, and then select the malware best suited to deliver. Often, that malware is ransomware. There are several ways ransomware can take control of your computer.
  • 24. Types of Ransomware Scareware  Scareware, as it turns out, is not that scary. It includes rogue security software and tech support scams. You might receive a pop-up message claiming that malware was discovered and the only way to get rid of it is to pay up. If you do nothing, you’ll likely continue to be bombarded with pop-ups, but your files are essentially safe. Be aware: legitimate cybersecurity software programs will not solicit customers in this way.
  • 25. Types of Ransomware Screen lockers  When lock-screen ransomware gets on your computer, it means you’re frozen out of your PC entirely. Upon starting up your computer, a full-size window will appear, often accompanied by an official-looking FBI or US Department of Justice seal saying illegal activity has been detected on your computer and you must pay a fine. Be aware: The FBI would not freeze you out of your computer or demand payment for illegal activity. If they suspected you of a crime, they would go through the appropriate legal channels.
  • 26. Types of Ransomware Encrypting ransomware  These are the guys who snatch up your files and encrypt them, demanding payment in order to decrypt and redeliver. The reason why this type of ransomware is so dangerous is because once cybercriminals get ahold of your files, no security software or system restore can return them to you.  Unless you pay the ransom—for the most part, they’re gone.  And even if you do pay up, there’s no guarantee the cybercriminals will give you those files back.
  • 28. Rootkit Upon accessing a computer, a hacker may install a collection of programs, called a rootkit. •Easy access for the hacker (and others) into the PC or network. •Keystroke logger (what you type is logged). The rootkit may enable: Eliminates evidence of break-in. Modifies the operating system.
  • 29. Identifying Security Compromises  Symptoms:  Antivirus software detects a problem.  Disk space disappears unexpectedly.  Pop-ups suddenly appear, sometimes selling security software.  Files or transactions appear that should not be there.  The computer slows down to a crawl.  Unusual messages, sounds, or displays on your monitor.  The mouse pointer moves by itself.  The computer spontaneously shuts down or reboots.
  • 30. Malware Detection • Spyware symptoms: • Changes to your browser homepage/start page. • Ending up on a strange site when conducting a search. • System-based firewall is turned off automatically. • Lots of network activity while not particularly active. • Excessive pop-up windows. • New icons, programs, favorites which you did not add. • Frequent firewall alerts about unknown programs when trying to access the Internet. • Poor system performance.
  • 31. Anti-Virus and Anti-Spyware Software Anti-virus software detects certain types of malware and can destroy it before any damage is done. Install and maintain anti-virus and anti-spyware software. Be sure to keep anti-virus software updated. Many free and commercial options exist.
  • 32. Firewalls A firewall acts as a barrier between your computer/private network and the internet. A firewall prevents many hacker connections to your computer. Firewalls filter network packets that enter or leave your computer
  • 33. Protect Your Operating System Microsoft regularly issues patches or updates to solve security problems in their software. If these are not applied, it leaves your computer vulnerable to hackers. The Windows Update feature built into Windows can be set up to automatically download and install updates. Avoid logging in as administrator Apple provides regular updates to its operating system and software applications. Apply Apple updates using the App Store application.
  • 34. Use Strong Passwords! Must not contain easily accessible or guessable personal information about the user or user’s family, such as birthdays, children’s names, addresses, etc. Must not contain the user’s name or part of the user’s name Must contain characters from at least two of the following four types of characters: English upper case (A-Z) English lower case (a-z) Numbers (0-9) Non-alphanumeric special characters ($, !, %, ^, …) Passwords should be at least ten characters in length
  • 35. Password Guidelines Never use admin, root, administrator, or a default account or password for administrative access. •Private: Used by only one person. •Secret: It is not stored in clear text anywhere, •including on Post-It® notes! •Easily Remembered: No need to write it down. •Contains the complexity required by your organization. •Not easy to guess by a person or a program in a reasonable time, such as several weeks. •Changed regularly: Follow organization standards. A good password is: Avoid shoulder surfers and enter your credentials carefully!
  • 36. Password Managers Using a password manager is an easy, quick way to make your online life more secure. You won't need to remember a unique, long, complex password for every online account. The password manager remembers each password for you, minimizing your risk next time there's a massive data breach. The only password you'll need to remember is the single "master" password to the password manager itself.
  • 37. Three Recommended Password Managers LastPass LastPass is recommended because of its ease of use, support for all major platforms, wide range of features and variety of configurations. The free version of LastPass syncs across an unlimited number of devices and has almost as many features as the paid version. You don't need to install an application on your computer to use LastPass. Instead, the software lives entirely in browser extensions and in a full-featured web interface.
  • 38. dashlane Dashlane's killer feature remains its bulk password changer, which can reset hundreds of your passwords at once, saving you time and worry in the event of a major data breach. There's also a scanner that goes through your email inbox on iOS or Android to find online accounts you may have forgotten about. The password manager is well designed, easy to use and possibly the best at filling out your personal information in online forms. Three Recommended Password Managers
  • 39. Keeper Keeper is fast and full-featured, has a robust web interface, stores files and documents of any kind, offers perhaps the best security of any password manager and is now cheaper than both Dashlane and LastPass. The trade-off for that enhanced security is a bit of inconvenience: Keeper chooses not to have a bulk password changer, and it won't let you create a PIN to quickly access the mobile app. If you have an older phone that can't read your fingerprint or your face, you'll have to enter the full master password every time. Three Recommended Password Managers
  • 40. Avoid Social Engineering and Malicious Software DO NOT OPEN EMAIL ATTACHMENTS UNLESS YOU ARE EXPECTING THE EMAIL WITH THE ATTACHMENT AND YOU TRUST THE SENDER. 01 DO NOT CLICK ON LINKS IN EMAILS UNLESS YOU ARE SURE OF THEIR VALIDITY. 02 ONLY VISIT AND/OR DOWNLOAD SOFTWARE FROM WEB PAGES YOU TRUST. 03
  • 41. Avoid Hacker Tricks Be sure to have a good firewall or pop-up blocker installed. Pop-up blockers do not always block ALL pop-ups so always close a pop-up window using the ‘X’ in the upper corner. Never click “yes,” “accept” or even “cancel.” Infected USB drives are often left unattended by hackers in public places.
  • 42. Secure Business Transactions ALWAYS USE SECURE BROWSER TO DO ONLINE ACTIVITIES. FREQUENTLY DELETE TEMP FILES, COOKIES, HISTORY, SAVED PASSWORDS ETC.
  • 43. Backup Important Information No security measure is 100% reliable. Even the best hardware fails. What information is important to you? Is your backup: • Recent? • Off-site & Secure? • Incremental and at least 2 weeks of versions? • Encrypted? • Tested?
  • 44. What Defenses Do We Have in Place?  Axcient Local & Cloud Backup  Bitdefender Antivirus  Barracuda CloudGen Firewalls  Barracuda Security Essentials  Email Security  Cloud Archiving Service  Cloud-to-Cloud Backup  Barracuda Advanced Threat Protection  Real Time AI  Account Takeover  Domain Fraud  Forensics and Incident Response
  • 45. Help Us Help You with the new Barracuda Essentials for Email Security Outlook Add-In Submit an Email Message as Suspicious Click to flag messages that are potentially harmful or unwanted – including phishing, spear-phishing, spam, or impersonation emails. Flagging suspicious emails can help protect other users in our organization. Flagged messages are: •Submitted to Barracuda Networks for analysis and improving email protection. •Sent to your organization’s administrator for review. (Requires Barracuda Forensics & Incident Response.) To submit an email as suspicious: 1.Open the Actions panel as described above. 2.Click Submit as Suspicious . The currently selected message is submitted to Barracuda as suspicious and is immediately moved to Deleted Items folder, or the folder specified in your Preferences, described below.
  • 46. Monthly CIO Report – Security Activity for September 2019