SlideShare une entreprise Scribd logo
1  sur  33
Today’s Technology and You
Safe computing in a digital world
May 17, 2013
Eric A. Vanderburg, MBA, CISSP
Director, Cyber Security and Information Systems
© 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved
Who Are We?
JurInnov works with organizations that want to
more effectively manage matters involving
“Electronically Stored Information” (ESI).
– Computer Forensics
– Cyber Security
– Electronic Discovery
– Document and Case Management
© 2013 Property of JurInnov Ltd. All Rights Reserved4
What are Cybercriminals After?
Access to:
– Personal information
– Patent applications
– Financial information
– M&A documents
– Intellectual property
– Client correspondence
Business disruption of:
– Calendar system
– Billing system
– Website
© 2013 Property of JurInnov Ltd. All Rights Reserved
90/10 Rule
Process
Technology
People
10%
90%
© 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved
Starts with you
• Exercise safe computing practices
• Report suspicious activity
• Notify IT/information security of potential
security incidents
• Escort guests through facilities
• Challenge guests
© 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved
Passwords
• Passwords are the keys to many things: your bank
account, your computer, your email, a server on a
network.
• Your password gives others the power to:
– Access your account (financial, email, etc)
– Modify or destroy your files
– Send malicious e-mail such as spam or threats in your
name
– Commit fraud while masquerading as you
– Use your computer to distribute illegally files such as
movies, songs or worse (child pornography)
© 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved
Passwords and Accounts
• Creating a secure password
• Passphrase: Here24octopihad5legslike*fish
• Secondary logon
• Limit administrative accounts
• Lock the computer
• Autolock
• Change default passwords
• Change passwords that you suspect may have been
compromised
• Choose recovery hints and challenges wisely
© 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved
Passwords
• Do not store them in obvious places
• Do not let anyone observe you entering it
• Do not share your password
• Do not reveal a password
– on questionnaires or security forms
– to anyone over the phone, e-mail, or IM
• Do not use same password for different servers/services
• Do not use written examples of passwords
© 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved
Spotting password theft
• Email
– Large number of rejected messages
– Missing emails
– Messages in sent mail that you didn’t send
• Social media
– Posts you did not make
– Many unknown contacts
© 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved
When is data really gone?
• Deleting a file does not actually remove it from
your computer
• Files persist until they are overwritten
• Full or partial files may be recoverable
• Sensitive data should be wiped
• Drives should be wiped before being reused
© 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved
Browser security
• Cookies
• Block pop-ups
• HTTP vs. HTTPS
• Certificates
• Fake sites
– Swapped Characters yuotube.com
– Replaced Characters wschovia.com
– Inserted Characters Gooogle.com
– Deleted Character Facbook.com
– Missing dot wwwmicrosoft.com
© 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved
Working remotely
• Free Wi-Fi
• Encrypt and password protect mobile
devices
• VPN
• Enable computer firewall
• Disable shares or use a homegroup (if not
on a domain)
© 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved
Public computers
• Limit what you do
• Erase your tracks (clear history)
– IE (Tools, Internet Options, General tab, Delete Browsing
History)
– Firefox (Tools, Options, Privacy tab, clear private data)
– Use private browsing window
• Do not save files locally
• Don’t save passwords
• Watch for over the shoulder
• Delete temporary files
• Exit programs and close browser when you leave
© 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved
Social media
• Privacy settings
– Default
– Per-post
• Who should be your friend?
• Geolocation
• Watch out for social scams
– Mugged on vacation
– Free stuff
– Spammed content and links
© 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved
Social engineering
• Social engineering preys on qualities of human
nature:
 the desire to be helpful
 the tendency to trust people
 the fear of getting into trouble
© 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved
Malware
• Viruses
• Trojans
• Keyloggers
• Bots
• Spyware
• Adware
© 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved
Why malware?
• Revenge
• Sense of power
• To prove a point
• Bragging rights
• Profit
• To attack other systems
• Because they can
© 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved
Spyware
• Corrupts/alters the current
software
• Tracks browsing habits, sites
• Interferes with system settings
• (registry, startup)
• Steals passwords, information etc.
© 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved
Spyware
• How does it get there?
– Email
– Instant Messaging
– Internet Browsing
– P2P Software
• Don’t take downloads from strangers
– What else are you getting with the “free” stuff
– Be cautious with bundled installers
© 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved
Spyware
• Identifying it
– Sluggish computer
– Annoying pop-ups
– Changes to browser home pages
– Unwanted toolbars
– Unknown programs appear
© 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved
Preventing malware
• Safe browsing habits
• Up-to-date antivirus
• Antimalware software
• Computer firewall
• Windows updates
© 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved
Virus Hoax
© 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved
Phishing
• False Sense Of Urgency - Threatens to "close/suspend
your account”, charge a fee or talks about suspicious
logon attempts, etc.
• Suspicious-Looking Links - Links containing all or part of
a real company's name asking you to submit personal
information.
• Not personalized – does not address you by name or
include a masked version of the account number.
• Misspelled or Poorly Written – Helps fraudulent emails
avoid spam filters
© 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved
Phishing Examples
© 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved
Phishing examples
© 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved
Phishing examples
© 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved
Phishing examples
© 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved
Phishing
• Treat all email with suspicion
• Never use a link in an email to get to any web
page
• Never send personal or financial information to
any one via email
• Never give personal or financial information
solicited via email
© 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved
Spatial security
© 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved
Spatial security
• Computers or whiteboard placement
• Facing away from windows or public areas
• Monitor privacy screen
• One way window film
Questions
© 2013 Property of JurInnov Ltd. All Rights Reserved
Blogs & Podcasts
• 50,000 Medicaid providers’
data breached
• Data breach threats of 2013
• Ignorance of the breach is
no excuse
• Over processing of ESI and
the Microsoft letter
• Predictive coding gets a
glossary
• LegalTech 2013
© 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved
For assistance or additional information
• Phone: 216-664-1100
• Web: www.jurinnov.com
• Email: eric.vanderburg@jurinnov.com
JurInnov Ltd.
The Idea Center
1375 Euclid Avenue, Suite 400
Cleveland, Ohio 44115

Contenu connexe

Tendances

Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
mulikaa
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber Law
Poonam Bhasin
 

Tendances (20)

Hackers Cracker Network Intruder
Hackers Cracker Network IntruderHackers Cracker Network Intruder
Hackers Cracker Network Intruder
 
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
 
Health Data Encryption: The Seven Principals of Privacy
Health Data Encryption: The Seven Principals of PrivacyHealth Data Encryption: The Seven Principals of Privacy
Health Data Encryption: The Seven Principals of Privacy
 
Untangled Conference - November 8, 2014 - Security Awareness
Untangled Conference - November 8, 2014 - Security AwarenessUntangled Conference - November 8, 2014 - Security Awareness
Untangled Conference - November 8, 2014 - Security Awareness
 
St. Mark Lutheran Cyber safety seminar - JurInnov - Eric Vanderburg
St. Mark Lutheran Cyber safety seminar - JurInnov - Eric VanderburgSt. Mark Lutheran Cyber safety seminar - JurInnov - Eric Vanderburg
St. Mark Lutheran Cyber safety seminar - JurInnov - Eric Vanderburg
 
Preventing Fraud from Top to Bottom - Vanderburg, Gaddamanugu - Information S...
Preventing Fraud from Top to Bottom - Vanderburg, Gaddamanugu - Information S...Preventing Fraud from Top to Bottom - Vanderburg, Gaddamanugu - Information S...
Preventing Fraud from Top to Bottom - Vanderburg, Gaddamanugu - Information S...
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
Visual hacking (ec)
Visual hacking (ec)Visual hacking (ec)
Visual hacking (ec)
 
Security Awareness: 360 empowerment for cyber defense - JurInnov - Eric Vande...
Security Awareness: 360 empowerment for cyber defense - JurInnov - Eric Vande...Security Awareness: 360 empowerment for cyber defense - JurInnov - Eric Vande...
Security Awareness: 360 empowerment for cyber defense - JurInnov - Eric Vande...
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
 
Uc14 chap09
Uc14 chap09Uc14 chap09
Uc14 chap09
 
Cybersecurity and Legal lessons after Apple v FBI
Cybersecurity and Legal lessons after Apple v FBICybersecurity and Legal lessons after Apple v FBI
Cybersecurity and Legal lessons after Apple v FBI
 
Introduction to null villupuram community
Introduction to null villupuram communityIntroduction to null villupuram community
Introduction to null villupuram community
 
Judy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 PresentationJudy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 Presentation
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
 
An introduction to cyber law
An introduction to cyber lawAn introduction to cyber law
An introduction to cyber law
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber Law
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
 
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
 
Societal impacts PART2
Societal impacts PART2Societal impacts PART2
Societal impacts PART2
 

En vedette

Bruna l. e Gabrielle
Bruna l. e Gabrielle Bruna l. e Gabrielle
Bruna l. e Gabrielle
Nute Jpa
 
Informativo n° 11 1º básico a- viernes 17 de mayo
Informativo n° 11  1º básico a- viernes 17 de mayoInformativo n° 11  1º básico a- viernes 17 de mayo
Informativo n° 11 1º básico a- viernes 17 de mayo
Colegio Camilo Henríquez
 
Contessa Pierluigi resume 1 v2
Contessa Pierluigi resume 1 v2Contessa Pierluigi resume 1 v2
Contessa Pierluigi resume 1 v2
pierluigi contessa
 
Data mining introduction
Data mining introductionData mining introduction
Data mining introduction
ignacio_alberdi
 
About the line
About the lineAbout the line
About the line
hitbfitw
 
Minnie mouse
Minnie mouseMinnie mouse
Minnie mouse
nicoolele
 

En vedette (16)

Estrategias ingreso merc. exter.
Estrategias ingreso merc. exter.Estrategias ingreso merc. exter.
Estrategias ingreso merc. exter.
 
Bruna l. e Gabrielle
Bruna l. e Gabrielle Bruna l. e Gabrielle
Bruna l. e Gabrielle
 
Rozario
RozarioRozario
Rozario
 
CV ERON 2016
CV ERON 2016CV ERON 2016
CV ERON 2016
 
Cris
CrisCris
Cris
 
Informativo n° 11 1º básico a- viernes 17 de mayo
Informativo n° 11  1º básico a- viernes 17 de mayoInformativo n° 11  1º básico a- viernes 17 de mayo
Informativo n° 11 1º básico a- viernes 17 de mayo
 
CV ARQ. PAHOLA APARICIO[ESPAÑOL]
CV ARQ. PAHOLA APARICIO[ESPAÑOL]CV ARQ. PAHOLA APARICIO[ESPAÑOL]
CV ARQ. PAHOLA APARICIO[ESPAÑOL]
 
Contessa Pierluigi resume 1 v2
Contessa Pierluigi resume 1 v2Contessa Pierluigi resume 1 v2
Contessa Pierluigi resume 1 v2
 
“A sentença é bem clara”, diz juiz ao negar recurso de Cassol
“A sentença é bem clara”, diz juiz ao negar recurso de Cassol “A sentença é bem clara”, diz juiz ao negar recurso de Cassol
“A sentença é bem clara”, diz juiz ao negar recurso de Cassol
 
Data mining introduction
Data mining introductionData mining introduction
Data mining introduction
 
About the line
About the lineAbout the line
About the line
 
Things to consider while designing mobile app
Things to consider while designing mobile appThings to consider while designing mobile app
Things to consider while designing mobile app
 
Moagem de torta de cacau
Moagem de torta de cacauMoagem de torta de cacau
Moagem de torta de cacau
 
Minnie mouse
Minnie mouseMinnie mouse
Minnie mouse
 
Dreams and visions seminar module 2
Dreams and visions seminar   module 2Dreams and visions seminar   module 2
Dreams and visions seminar module 2
 
Communicating With Millenials
Communicating With MillenialsCommunicating With Millenials
Communicating With Millenials
 

Similaire à Today's technology and you: Safe computing in a digital world - Eric Vanderburg - JurInnov

Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
Randy Bowman
 

Similaire à Today's technology and you: Safe computing in a digital world - Eric Vanderburg - JurInnov (20)

Understanding the need for security measures
Understanding the need for security measuresUnderstanding the need for security measures
Understanding the need for security measures
 
Cyber Forensics: Collecting evidence for today’s data breaches - Eric Vanderb...
Cyber Forensics: Collecting evidence for today’s data breaches - Eric Vanderb...Cyber Forensics: Collecting evidence for today’s data breaches - Eric Vanderb...
Cyber Forensics: Collecting evidence for today’s data breaches - Eric Vanderb...
 
Don't Diligence Information Security for Lawyers
Don't Diligence Information Security for LawyersDon't Diligence Information Security for Lawyers
Don't Diligence Information Security for Lawyers
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
Why Depending On Malware Prevention Alone Is No Longer An Option
Why Depending On Malware Prevention Alone Is No Longer An Option Why Depending On Malware Prevention Alone Is No Longer An Option
Why Depending On Malware Prevention Alone Is No Longer An Option
 
Chapter 13 security and ethical challenges
Chapter 13  security and ethical challengesChapter 13  security and ethical challenges
Chapter 13 security and ethical challenges
 
Information security & data security | Chandan Singh Ghodela
Information security & data security | Chandan Singh GhodelaInformation security & data security | Chandan Singh Ghodela
Information security & data security | Chandan Singh Ghodela
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
 
Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptx
 
MySQL Manchester TT - Security
MySQL Manchester TT  - SecurityMySQL Manchester TT  - Security
MySQL Manchester TT - Security
 
Security Best Practices for Regular Users
Security Best Practices for Regular UsersSecurity Best Practices for Regular Users
Security Best Practices for Regular Users
 
Security best practices for regular users
Security best practices for regular usersSecurity best practices for regular users
Security best practices for regular users
 
Personal Threat Models
Personal Threat ModelsPersonal Threat Models
Personal Threat Models
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
 
Are you at risk on the World Wide Web?
Are you at risk on the World Wide Web? Are you at risk on the World Wide Web?
Are you at risk on the World Wide Web?
 
Internet of Things Security
Internet of Things SecurityInternet of Things Security
Internet of Things Security
 
Attack and Defence in Mobile Apps
Attack and Defence in Mobile AppsAttack and Defence in Mobile Apps
Attack and Defence in Mobile Apps
 
001 ho basic computer
001 ho basic computer001 ho basic computer
001 ho basic computer
 
Digital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteDigital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online Netiquette
 

Plus de Eric Vanderburg

Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgCorrect the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
Eric Vanderburg
 

Plus de Eric Vanderburg (20)

GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumGDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT Symposium
 
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveModern Security the way Equifax Should Have
Modern Security the way Equifax Should Have
 
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgCybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
 
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
 
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
 
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatRansomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware Threat
 
Emerging Technologies: Japan’s Position
Emerging Technologies: Japan’s PositionEmerging Technologies: Japan’s Position
Emerging Technologies: Japan’s Position
 
Principles of technology management
Principles of technology managementPrinciples of technology management
Principles of technology management
 
Japanese railway technology
Japanese railway technologyJapanese railway technology
Japanese railway technology
 
Evaluating japanese technological competitiveness
Evaluating japanese technological competitivenessEvaluating japanese technological competitiveness
Evaluating japanese technological competitiveness
 
Japanese current and future technology management challenges
Japanese current and future technology management challengesJapanese current and future technology management challenges
Japanese current and future technology management challenges
 
Technology management in Japan: Robotics
Technology management in Japan: RoboticsTechnology management in Japan: Robotics
Technology management in Japan: Robotics
 
Incident response table top exercises
Incident response table top exercisesIncident response table top exercises
Incident response table top exercises
 
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemThe Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
 
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsHacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and Threats
 
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgCorrect the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
 
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgDeconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
 
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgCountering malware threats - Eric Vanderburg
Countering malware threats - Eric Vanderburg
 

Dernier

Navsari Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girl...
Navsari Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girl...Navsari Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girl...
Navsari Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girl...
mriyagarg453
 
Beautiful 😋 Call girls in Lahore 03210033448
Beautiful 😋 Call girls in Lahore 03210033448Beautiful 😋 Call girls in Lahore 03210033448
Beautiful 😋 Call girls in Lahore 03210033448
ont65320
 

Dernier (20)

Navsari Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girl...
Navsari Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girl...Navsari Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girl...
Navsari Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girl...
 
Model Call Girls In Velappanchavadi WhatsApp Booking 7427069034 call girl ser...
Model Call Girls In Velappanchavadi WhatsApp Booking 7427069034 call girl ser...Model Call Girls In Velappanchavadi WhatsApp Booking 7427069034 call girl ser...
Model Call Girls In Velappanchavadi WhatsApp Booking 7427069034 call girl ser...
 
Call Girls Manjri Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Manjri Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Manjri Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Manjri Call Me 7737669865 Budget Friendly No Advance Booking
 
Beautiful 😋 Call girls in Lahore 03210033448
Beautiful 😋 Call girls in Lahore 03210033448Beautiful 😋 Call girls in Lahore 03210033448
Beautiful 😋 Call girls in Lahore 03210033448
 
Hotel And Home Service Available Kolkata Call Girls Dum Dum ✔ 6297143586 ✔Cal...
Hotel And Home Service Available Kolkata Call Girls Dum Dum ✔ 6297143586 ✔Cal...Hotel And Home Service Available Kolkata Call Girls Dum Dum ✔ 6297143586 ✔Cal...
Hotel And Home Service Available Kolkata Call Girls Dum Dum ✔ 6297143586 ✔Cal...
 
Book Sex Workers Available Kolkata Call Girls Service Airport Kolkata ✔ 62971...
Book Sex Workers Available Kolkata Call Girls Service Airport Kolkata ✔ 62971...Book Sex Workers Available Kolkata Call Girls Service Airport Kolkata ✔ 62971...
Book Sex Workers Available Kolkata Call Girls Service Airport Kolkata ✔ 62971...
 
Sonagachi ( Call Girls ) Kolkata ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Rea...
Sonagachi ( Call Girls ) Kolkata ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Rea...Sonagachi ( Call Girls ) Kolkata ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Rea...
Sonagachi ( Call Girls ) Kolkata ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Rea...
 
Almora call girls 📞 8617697112 At Low Cost Cash Payment Booking
Almora call girls 📞 8617697112 At Low Cost Cash Payment BookingAlmora call girls 📞 8617697112 At Low Cost Cash Payment Booking
Almora call girls 📞 8617697112 At Low Cost Cash Payment Booking
 
College Call Girls Pune 8617697112 Short 1500 Night 6000 Best call girls Service
College Call Girls Pune 8617697112 Short 1500 Night 6000 Best call girls ServiceCollege Call Girls Pune 8617697112 Short 1500 Night 6000 Best call girls Service
College Call Girls Pune 8617697112 Short 1500 Night 6000 Best call girls Service
 
Hire 💕 8617697112 North Sikkim Call Girls Service Call Girls Agency
Hire 💕 8617697112 North Sikkim Call Girls Service Call Girls AgencyHire 💕 8617697112 North Sikkim Call Girls Service Call Girls Agency
Hire 💕 8617697112 North Sikkim Call Girls Service Call Girls Agency
 
Hotel And Home Service Available Kolkata Call Girls Park Street ✔ 6297143586 ...
Hotel And Home Service Available Kolkata Call Girls Park Street ✔ 6297143586 ...Hotel And Home Service Available Kolkata Call Girls Park Street ✔ 6297143586 ...
Hotel And Home Service Available Kolkata Call Girls Park Street ✔ 6297143586 ...
 
Model Call Girls In Pazhavanthangal WhatsApp Booking 7427069034 call girl ser...
Model Call Girls In Pazhavanthangal WhatsApp Booking 7427069034 call girl ser...Model Call Girls In Pazhavanthangal WhatsApp Booking 7427069034 call girl ser...
Model Call Girls In Pazhavanthangal WhatsApp Booking 7427069034 call girl ser...
 
📞 Contact Number 8617697112 VIP Ganderbal Call Girls
📞 Contact Number 8617697112 VIP Ganderbal Call Girls📞 Contact Number 8617697112 VIP Ganderbal Call Girls
📞 Contact Number 8617697112 VIP Ganderbal Call Girls
 
(TOP CLASS) Call Girls In Chengalpattu Phone 7427069034 Call Girls Model With...
(TOP CLASS) Call Girls In Chengalpattu Phone 7427069034 Call Girls Model With...(TOP CLASS) Call Girls In Chengalpattu Phone 7427069034 Call Girls Model With...
(TOP CLASS) Call Girls In Chengalpattu Phone 7427069034 Call Girls Model With...
 
Borum Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Borum Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceBorum Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Borum Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
 
❤Personal Whatsapp Number Keylong Call Girls 8617697112 💦✅.
❤Personal Whatsapp Number Keylong Call Girls 8617697112 💦✅.❤Personal Whatsapp Number Keylong Call Girls 8617697112 💦✅.
❤Personal Whatsapp Number Keylong Call Girls 8617697112 💦✅.
 
Top Rated Pune Call Girls Dhayari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated  Pune Call Girls Dhayari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...Top Rated  Pune Call Girls Dhayari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated Pune Call Girls Dhayari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
 
Science City Kolkata ( Call Girls ) Kolkata ✔ 6297143586 ✔ Hot Model With Sex...
Science City Kolkata ( Call Girls ) Kolkata ✔ 6297143586 ✔ Hot Model With Sex...Science City Kolkata ( Call Girls ) Kolkata ✔ 6297143586 ✔ Hot Model With Sex...
Science City Kolkata ( Call Girls ) Kolkata ✔ 6297143586 ✔ Hot Model With Sex...
 
Hotel And Home Service Available Kolkata Call Girls Diamond Harbour ✔ 6297143...
Hotel And Home Service Available Kolkata Call Girls Diamond Harbour ✔ 6297143...Hotel And Home Service Available Kolkata Call Girls Diamond Harbour ✔ 6297143...
Hotel And Home Service Available Kolkata Call Girls Diamond Harbour ✔ 6297143...
 
Top Rated Kolkata Call Girls Khardah ⟟ 6297143586 ⟟ Call Me For Genuine Sex S...
Top Rated Kolkata Call Girls Khardah ⟟ 6297143586 ⟟ Call Me For Genuine Sex S...Top Rated Kolkata Call Girls Khardah ⟟ 6297143586 ⟟ Call Me For Genuine Sex S...
Top Rated Kolkata Call Girls Khardah ⟟ 6297143586 ⟟ Call Me For Genuine Sex S...
 

Today's technology and you: Safe computing in a digital world - Eric Vanderburg - JurInnov

  • 1. Today’s Technology and You Safe computing in a digital world May 17, 2013 Eric A. Vanderburg, MBA, CISSP Director, Cyber Security and Information Systems
  • 2. © 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved Who Are We? JurInnov works with organizations that want to more effectively manage matters involving “Electronically Stored Information” (ESI). – Computer Forensics – Cyber Security – Electronic Discovery – Document and Case Management
  • 3. © 2013 Property of JurInnov Ltd. All Rights Reserved4 What are Cybercriminals After? Access to: – Personal information – Patent applications – Financial information – M&A documents – Intellectual property – Client correspondence Business disruption of: – Calendar system – Billing system – Website
  • 4. © 2013 Property of JurInnov Ltd. All Rights Reserved 90/10 Rule Process Technology People 10% 90%
  • 5. © 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved Starts with you • Exercise safe computing practices • Report suspicious activity • Notify IT/information security of potential security incidents • Escort guests through facilities • Challenge guests
  • 6. © 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved Passwords • Passwords are the keys to many things: your bank account, your computer, your email, a server on a network. • Your password gives others the power to: – Access your account (financial, email, etc) – Modify or destroy your files – Send malicious e-mail such as spam or threats in your name – Commit fraud while masquerading as you – Use your computer to distribute illegally files such as movies, songs or worse (child pornography)
  • 7. © 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved Passwords and Accounts • Creating a secure password • Passphrase: Here24octopihad5legslike*fish • Secondary logon • Limit administrative accounts • Lock the computer • Autolock • Change default passwords • Change passwords that you suspect may have been compromised • Choose recovery hints and challenges wisely
  • 8. © 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved Passwords • Do not store them in obvious places • Do not let anyone observe you entering it • Do not share your password • Do not reveal a password – on questionnaires or security forms – to anyone over the phone, e-mail, or IM • Do not use same password for different servers/services • Do not use written examples of passwords
  • 9. © 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved Spotting password theft • Email – Large number of rejected messages – Missing emails – Messages in sent mail that you didn’t send • Social media – Posts you did not make – Many unknown contacts
  • 10. © 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved When is data really gone? • Deleting a file does not actually remove it from your computer • Files persist until they are overwritten • Full or partial files may be recoverable • Sensitive data should be wiped • Drives should be wiped before being reused
  • 11. © 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved Browser security • Cookies • Block pop-ups • HTTP vs. HTTPS • Certificates • Fake sites – Swapped Characters yuotube.com – Replaced Characters wschovia.com – Inserted Characters Gooogle.com – Deleted Character Facbook.com – Missing dot wwwmicrosoft.com
  • 12. © 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved Working remotely • Free Wi-Fi • Encrypt and password protect mobile devices • VPN • Enable computer firewall • Disable shares or use a homegroup (if not on a domain)
  • 13. © 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved Public computers • Limit what you do • Erase your tracks (clear history) – IE (Tools, Internet Options, General tab, Delete Browsing History) – Firefox (Tools, Options, Privacy tab, clear private data) – Use private browsing window • Do not save files locally • Don’t save passwords • Watch for over the shoulder • Delete temporary files • Exit programs and close browser when you leave
  • 14. © 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved Social media • Privacy settings – Default – Per-post • Who should be your friend? • Geolocation • Watch out for social scams – Mugged on vacation – Free stuff – Spammed content and links
  • 15. © 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved Social engineering • Social engineering preys on qualities of human nature:  the desire to be helpful  the tendency to trust people  the fear of getting into trouble
  • 16. © 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved Malware • Viruses • Trojans • Keyloggers • Bots • Spyware • Adware
  • 17. © 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved Why malware? • Revenge • Sense of power • To prove a point • Bragging rights • Profit • To attack other systems • Because they can
  • 18. © 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved Spyware • Corrupts/alters the current software • Tracks browsing habits, sites • Interferes with system settings • (registry, startup) • Steals passwords, information etc.
  • 19. © 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved Spyware • How does it get there? – Email – Instant Messaging – Internet Browsing – P2P Software • Don’t take downloads from strangers – What else are you getting with the “free” stuff – Be cautious with bundled installers
  • 20. © 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved Spyware • Identifying it – Sluggish computer – Annoying pop-ups – Changes to browser home pages – Unwanted toolbars – Unknown programs appear
  • 21. © 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved Preventing malware • Safe browsing habits • Up-to-date antivirus • Antimalware software • Computer firewall • Windows updates
  • 22. © 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved Virus Hoax
  • 23. © 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved Phishing • False Sense Of Urgency - Threatens to "close/suspend your account”, charge a fee or talks about suspicious logon attempts, etc. • Suspicious-Looking Links - Links containing all or part of a real company's name asking you to submit personal information. • Not personalized – does not address you by name or include a masked version of the account number. • Misspelled or Poorly Written – Helps fraudulent emails avoid spam filters
  • 24. © 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved Phishing Examples
  • 25. © 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved Phishing examples
  • 26. © 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved Phishing examples
  • 27. © 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved Phishing examples
  • 28. © 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved Phishing • Treat all email with suspicion • Never use a link in an email to get to any web page • Never send personal or financial information to any one via email • Never give personal or financial information solicited via email
  • 29. © 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved Spatial security
  • 30. © 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved Spatial security • Computers or whiteboard placement • Facing away from windows or public areas • Monitor privacy screen • One way window film
  • 32. © 2013 Property of JurInnov Ltd. All Rights Reserved Blogs & Podcasts • 50,000 Medicaid providers’ data breached • Data breach threats of 2013 • Ignorance of the breach is no excuse • Over processing of ESI and the Microsoft letter • Predictive coding gets a glossary • LegalTech 2013
  • 33. © 2013 Property of JurInnov Ltd. All Rights Reserved© 2013 Property of JurInnov Ltd. All Rights Reserved For assistance or additional information • Phone: 216-664-1100 • Web: www.jurinnov.com • Email: eric.vanderburg@jurinnov.com JurInnov Ltd. The Idea Center 1375 Euclid Avenue, Suite 400 Cleveland, Ohio 44115

Notes de l'éditeur

  1. AP