SlideShare a Scribd company logo
1 of 46
How to manage your client’s
data responsibly
Protect your clients from fraud, identity theft and
confidential information
Jeremiah Cruz
jeremy@cryptoaustralia.org.au
Nick Kavadias
nick@cryptoaustralia.org.au
Gabor Szathmari
gabor@cryptoaustralia.org.aucryptoaustralia.org.au
Who is CryptoAUSTRALIA
• A not-for-profit started by security and privacy enthusiasts.
• We have nothing to do with BitCoin, so please stop asking.
• We are for finding practical ways of dealing with the modern
privacy and security challenges.
• We are looking for sponsors in order to continue our work
and research.
• This may be a new concept to lawyers, but we are running
these events for free*.
* This presentation does not constitute cybersecurity advice.
Self Promotion..
Tonight’s speakers:
•Jeremy – Network Security Expert
•Nick – Solicitor and Technologist
•Gabor – Cybersecurity Expert
We know how to internet…
@CryptoAustralia
#cryptoaus
http://chat.cryptoaustralia.org.au
https://fb.me/CryptoStraya
Interact with us in the digital world…
What we are covering tonight…
1) Bad practices
2) Password security
(2FA and Password reuse)
3) Sharing documents securely
4) Storing documents securely
5) Prudent data disposal practices
6) Physical security (dos and don’ts)
7) What to do post-breach 🙏
Secret: “hackers” log into your webmail
Password hygiene
• Websites get hacked.
• People reuse same
email and password
across multiple online
accounts. D’oh!
Haveibeenpwned
Do you have leaked passwords? https://haveibeenpwned.com/
Haveibeenpwned Leaderboard
Today’s winner is …
Meanwhile on SpyCloud...
(an unrelated account)
Meanwhile on SpyCloud
Bad client document & personal
information management practices
• VOI checks
• Online document conversion
• Document sharing (e.g. Dropbox)
• Keeping emails forever
• Public Wifi
Bad practices - VOI checks
100 points ID checks – Leaks everywhere
• Scan-to-email printers (bonus: unencrypted
traffic)
• Documents sent/received over emails
• Emails are never deleted on the
sender/receiver side
Bad practices - VOI checks
• Don’t ask for scanned documents to be sent over
emails
• Rely on VOI providers instead
• Secure smartphone app and web portal
• https://www.dvs.gov.au/users/Pages/Identity-
service-providers.aspx
Bad practices
Bad practices - Online document conversion
Online2PDF.com, freepdfconvert.com...
• They provide a convenient service to
convert documents to PDF
Bad practices - Online document conversion
Online2PDF.com, freepdfconvert.com...
• Who’s behind the service?
• What happens to your documents?
• Why would you upload
sensitive documents to random
strangers?
Online document conversion
Convert documents offline with
Adobe Professional
Bad practices -
Document sharing over emails
Problem statement:
Your email file attachments and
embedder download links remain in
your ‘Sent’ email folder forever, waiting
for a hacker to login and download them
Bad practices -
Document sharing over cloud-based file
storage services
File sharing with Dropbox, OneDrive, random
service:
• Download links are valid forever
• Mailbox gets hacked → Links are still live
Transferring sensitive documents securely
• Send web links instead of file
attachments where appropriate
• Use expiring web links
Services:
Google Drive, Sync.com, Tresorit...
Bad practices
Transferring documents securely
Bad practices - Emails are kept forever
Keeping all emails for extended period
• Limit the damage if the mailbox gets hacked
• Set an archive and retention policy and archive
emails to a secure third-party service
(e.g. Spinbackup, Backupify)
• Office 365, G Suite support retention policies
Bad practices
Bad practices - Public Wifi
Lots of hacking wizardry:
• Password theft via fake login pages
• HTTP pages tampered on the fly
• Theft of unencrypted sensitive data
Just take our advice on the next slide
Public Wifi – Use VPN or a 4G dongle
Good security hygiene
What else you can do
Secret: “hackers” log into your webmail
Password hygiene
• Websites get hacked.
• People reuse same
email and password
across multiple online
accounts. D’oh!
Two-factor authentication
Most powerful defence from:
•Crappy passwords (Letmein1)
•Stolen passwords (phishing)
•Leaked passwords (reuse)
Two-factor authentication
Password hygiene – Wallets
Remember a single password only
• LastPass
• 1Password
• Dashlane
• RoboForm
• < Any random password wallet >
Storing documents securely
Cloud file storage – Who your adversary is
• Hackers? - Dropbox, G Drive, OneDrive + Two-factor
authentication turned on
• Government? - End-to-end encrypted service: Sync.com, Tresorit
• Encrypt your disks, USB flash drives and smartphones
• BitLocker - Windows 10 Professional
• FileVault – Mac
• Android supports disk encryption
• On iOS disk encryption is turned on by default
Prudent data disposal practices
Laptops, computers:
• Magnetic disks: overwrite
• DBAN (https://dban.org/)
• SSD: Physical destruction
• USB flash drives: Physical destruction
Prudent data disposal practices
iPhone: Factory reset
Android*:
1. Encrypt device
2. Remove storage and SIM cards
3. Factory reset
4. Remove from Google account
Phones (SD card): Physical destruction
* https://www.computerworld.com/article/3243253/android/how-to-securely-erase-your-android-device-in-4-steps.html
Physical security (dos and don’ts)
Physical security (dos and don’ts)
• Shredding documents
• Diamond cut shredder
• Secure document disposal service
• Can secure dispose digital media for you
• Digital certificates (e.g. PEXA key)
•Leave them unplugged when not in use
•Cut the built-in smart card in half to dispose
What to do when you get hacked 🙏
• Disconnect your computer from the
Internet and stop using it
• Notify LawCover - They have an
incident response team
• Checklist:
http://lca.lawcouncil.asn.au/lawcou
ncil/images/cyber/CP-What-to-
Do.pdf
Summary
1) Use a VOI provider for identity checks
2) Use 2FA and don’t reuse your password
3) Share documents with expiring links
4) Store documents in the cloud securely (2FA)
5) Dispose data securely
6) Shred documents & protect digital certificates
7) Notify LawCover when the house is on fire
Where to get help
• Law Council of Australia Cyber Precedent, great learning resource
• Law Council cyber-attack checklist
• Lawcover crisis management team can help you clean up the
mess.
• Victim of identity theft, you should contact IDCARE, NFP helping
people
• Have a conversation with your IT Service Provider, or staff. Use
these slides as a talking point!
@CryptoAustralia
#cryptoaus
http://chat.cryptoaustralia.org.au
https://fb.me/CryptoStraya
Get updates:
https://cryptoaustralia.org.au/newsletter
Next workshop:
https://www.meetup.com/Cybersecurity
-for-Lawyers-by-CryptoAUSTRALIA/

More Related Content

What's hot

Your Digital Afterlife: What happens to your digital memories when you die? ...
Your Digital Afterlife: What happens to your digital memories when you die?  ...Your Digital Afterlife: What happens to your digital memories when you die?  ...
Your Digital Afterlife: What happens to your digital memories when you die? ...
Evan Carroll
 

What's hot (16)

The dark web
The dark webThe dark web
The dark web
 
Dark web presentation
Dark web presentationDark web presentation
Dark web presentation
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
The deepweb
The deepwebThe deepweb
The deepweb
 
SecuredBox - Secure your privacy
SecuredBox - Secure your privacySecuredBox - Secure your privacy
SecuredBox - Secure your privacy
 
Deep web
Deep webDeep web
Deep web
 
Darknet
DarknetDarknet
Darknet
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and Privacy
 
Gripla slides 09 2011
Gripla slides 09 2011Gripla slides 09 2011
Gripla slides 09 2011
 
Deep web
Deep webDeep web
Deep web
 
Deep web
Deep webDeep web
Deep web
 
Dark and Deep web
Dark and Deep webDark and Deep web
Dark and Deep web
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
Dark web by Claudine Impas
Dark web by Claudine ImpasDark web by Claudine Impas
Dark web by Claudine Impas
 
Your Digital Afterlife: What happens to your digital memories when you die? ...
Your Digital Afterlife: What happens to your digital memories when you die?  ...Your Digital Afterlife: What happens to your digital memories when you die?  ...
Your Digital Afterlife: What happens to your digital memories when you die? ...
 
Internet Security is an Oxymoron
Internet Security is an OxymoronInternet Security is an Oxymoron
Internet Security is an Oxymoron
 

Similar to How to manage your client's data responsibly

Similar to How to manage your client's data responsibly (20)

Iron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyIron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data Responsibly
 
How to protect your clients and your law firm from money transfer scams
How to protect your clients and your law firm from money transfer scamsHow to protect your clients and your law firm from money transfer scams
How to protect your clients and your law firm from money transfer scams
 
Learning about Security and Compliance in Office 365
Learning about Security and Compliance in Office 365Learning about Security and Compliance in Office 365
Learning about Security and Compliance in Office 365
 
Protecting Customer Confidential Information
Protecting Customer Confidential InformationProtecting Customer Confidential Information
Protecting Customer Confidential Information
 
Tresorit intro - Europas 2014
Tresorit intro - Europas 2014Tresorit intro - Europas 2014
Tresorit intro - Europas 2014
 
Secure Yourself, Practice what we preach - BSides Austin 2015
Secure Yourself, Practice what we preach - BSides Austin 2015Secure Yourself, Practice what we preach - BSides Austin 2015
Secure Yourself, Practice what we preach - BSides Austin 2015
 
Law Practice Management - Organization, Cloud, Social Media and Ethics
Law Practice Management - Organization, Cloud, Social Media and EthicsLaw Practice Management - Organization, Cloud, Social Media and Ethics
Law Practice Management - Organization, Cloud, Social Media and Ethics
 
Data protection in Practice
Data protection in PracticeData protection in Practice
Data protection in Practice
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security Practice
 
Presentation cyber forensics & ethical hacking
Presentation   cyber forensics & ethical hackingPresentation   cyber forensics & ethical hacking
Presentation cyber forensics & ethical hacking
 
Computer Forensics – What Every Lawyer Needs to Know
Computer Forensics – What Every Lawyer Needs to KnowComputer Forensics – What Every Lawyer Needs to Know
Computer Forensics – What Every Lawyer Needs to Know
 
001 ho basic computer
001 ho basic computer001 ho basic computer
001 ho basic computer
 
Harbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidHarbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vid
 
Sara Day Thomson, 'Personal Digital Archiving: Storing, Organising and Protec...
Sara Day Thomson, 'Personal Digital Archiving: Storing, Organising and Protec...Sara Day Thomson, 'Personal Digital Archiving: Storing, Organising and Protec...
Sara Day Thomson, 'Personal Digital Archiving: Storing, Organising and Protec...
 
Security Best Practices for Regular Users
Security Best Practices for Regular UsersSecurity Best Practices for Regular Users
Security Best Practices for Regular Users
 
Security best practices for regular users
Security best practices for regular usersSecurity best practices for regular users
Security best practices for regular users
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self Defense
 
Better to Ask Permission? Best Practices for Privacy and Security
Better to Ask Permission? Best Practices for Privacy and SecurityBetter to Ask Permission? Best Practices for Privacy and Security
Better to Ask Permission? Best Practices for Privacy and Security
 
Computer / Internet Security WHPL
Computer / Internet Security WHPLComputer / Internet Security WHPL
Computer / Internet Security WHPL
 

More from Gabor Szathmari

More from Gabor Szathmari (11)

Iron Bastion: Preventing business email compromise fraud at your firm
Iron Bastion: Preventing business email compromise fraud at your firmIron Bastion: Preventing business email compromise fraud at your firm
Iron Bastion: Preventing business email compromise fraud at your firm
 
Hacking law firms with abandoned domain names
Hacking law firms with abandoned domain namesHacking law firms with abandoned domain names
Hacking law firms with abandoned domain names
 
Phishing stories from the trenches
Phishing stories from the trenchesPhishing stories from the trenches
Phishing stories from the trenches
 
Help! I am an Investigative Journalist in 2017
Help! I am an Investigative Journalist in 2017Help! I am an Investigative Journalist in 2017
Help! I am an Investigative Journalist in 2017
 
CryptoParty Tor Relay Workshop
CryptoParty Tor Relay WorkshopCryptoParty Tor Relay Workshop
CryptoParty Tor Relay Workshop
 
Privacy for journalists introduction
Privacy for journalists introductionPrivacy for journalists introduction
Privacy for journalists introduction
 
Threat Modeling for Journalists
Threat Modeling for JournalistsThreat Modeling for Journalists
Threat Modeling for Journalists
 
Privacy for Journalists Introduction
Privacy for Journalists IntroductionPrivacy for Journalists Introduction
Privacy for Journalists Introduction
 
Safe Browsing in 2016
Safe Browsing in 2016Safe Browsing in 2016
Safe Browsing in 2016
 
When the CDN goes bananas
When the CDN goes bananasWhen the CDN goes bananas
When the CDN goes bananas
 
PGP and Keybase (CryptoParty Belfast)
PGP and Keybase (CryptoParty Belfast)PGP and Keybase (CryptoParty Belfast)
PGP and Keybase (CryptoParty Belfast)
 

Recently uploaded

一比一原版(Cranfield毕业证书)克兰菲尔德大学毕业证如何办理
一比一原版(Cranfield毕业证书)克兰菲尔德大学毕业证如何办理一比一原版(Cranfield毕业证书)克兰菲尔德大学毕业证如何办理
一比一原版(Cranfield毕业证书)克兰菲尔德大学毕业证如何办理
F La
 
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
e9733fc35af6
 
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
bd2c5966a56d
 
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
bd2c5966a56d
 
一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理
Airst S
 
Interpretation of statute topics for project
Interpretation of statute topics for projectInterpretation of statute topics for project
Interpretation of statute topics for project
VarshRR
 
一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理
e9733fc35af6
 
一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理
Airst S
 
Corporate Governance (Indian Scenario, Legal frame work in India ) - PPT.ppt
Corporate Governance (Indian Scenario, Legal frame work in India ) - PPT.pptCorporate Governance (Indian Scenario, Legal frame work in India ) - PPT.ppt
Corporate Governance (Indian Scenario, Legal frame work in India ) - PPT.ppt
RRR Chambers
 
一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理
Airst S
 
Code_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptCode_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.ppt
JosephCanama
 

Recently uploaded (20)

一比一原版(Cranfield毕业证书)克兰菲尔德大学毕业证如何办理
一比一原版(Cranfield毕业证书)克兰菲尔德大学毕业证如何办理一比一原版(Cranfield毕业证书)克兰菲尔德大学毕业证如何办理
一比一原版(Cranfield毕业证书)克兰菲尔德大学毕业证如何办理
 
ARTICLE 370 PDF about the indian constitution.
ARTICLE 370 PDF about the  indian constitution.ARTICLE 370 PDF about the  indian constitution.
ARTICLE 370 PDF about the indian constitution.
 
Hely-Hutchinson v. Brayhead Ltd .pdf
Hely-Hutchinson v. Brayhead Ltd         .pdfHely-Hutchinson v. Brayhead Ltd         .pdf
Hely-Hutchinson v. Brayhead Ltd .pdf
 
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
 
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
 
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
 
一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理
 
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
 
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
 
Interpretation of statute topics for project
Interpretation of statute topics for projectInterpretation of statute topics for project
Interpretation of statute topics for project
 
3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt
 
一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理
 
一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptx
 
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam TakersPhilippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
 
Corporate Governance (Indian Scenario, Legal frame work in India ) - PPT.ppt
Corporate Governance (Indian Scenario, Legal frame work in India ) - PPT.pptCorporate Governance (Indian Scenario, Legal frame work in India ) - PPT.ppt
Corporate Governance (Indian Scenario, Legal frame work in India ) - PPT.ppt
 
The Main Steps on Starting a Business in Spain
The Main Steps on Starting a Business in SpainThe Main Steps on Starting a Business in Spain
The Main Steps on Starting a Business in Spain
 
CAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsCAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction Fails
 
一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理
 
Code_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptCode_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.ppt
 

How to manage your client's data responsibly

  • 1. How to manage your client’s data responsibly Protect your clients from fraud, identity theft and confidential information Jeremiah Cruz jeremy@cryptoaustralia.org.au Nick Kavadias nick@cryptoaustralia.org.au Gabor Szathmari gabor@cryptoaustralia.org.aucryptoaustralia.org.au
  • 2. Who is CryptoAUSTRALIA • A not-for-profit started by security and privacy enthusiasts. • We have nothing to do with BitCoin, so please stop asking. • We are for finding practical ways of dealing with the modern privacy and security challenges. • We are looking for sponsors in order to continue our work and research. • This may be a new concept to lawyers, but we are running these events for free*. * This presentation does not constitute cybersecurity advice.
  • 3. Self Promotion.. Tonight’s speakers: •Jeremy – Network Security Expert •Nick – Solicitor and Technologist •Gabor – Cybersecurity Expert
  • 4. We know how to internet… @CryptoAustralia #cryptoaus http://chat.cryptoaustralia.org.au https://fb.me/CryptoStraya Interact with us in the digital world…
  • 5. What we are covering tonight… 1) Bad practices 2) Password security (2FA and Password reuse) 3) Sharing documents securely 4) Storing documents securely 5) Prudent data disposal practices 6) Physical security (dos and don’ts) 7) What to do post-breach 🙏
  • 6. Secret: “hackers” log into your webmail
  • 7. Password hygiene • Websites get hacked. • People reuse same email and password across multiple online accounts. D’oh!
  • 8. Haveibeenpwned Do you have leaked passwords? https://haveibeenpwned.com/
  • 10.
  • 11.
  • 12.
  • 13. Meanwhile on SpyCloud... (an unrelated account)
  • 15. Bad client document & personal information management practices • VOI checks • Online document conversion • Document sharing (e.g. Dropbox) • Keeping emails forever • Public Wifi
  • 16. Bad practices - VOI checks 100 points ID checks – Leaks everywhere • Scan-to-email printers (bonus: unencrypted traffic) • Documents sent/received over emails • Emails are never deleted on the sender/receiver side
  • 17. Bad practices - VOI checks • Don’t ask for scanned documents to be sent over emails • Rely on VOI providers instead • Secure smartphone app and web portal • https://www.dvs.gov.au/users/Pages/Identity- service-providers.aspx
  • 19. Bad practices - Online document conversion Online2PDF.com, freepdfconvert.com... • They provide a convenient service to convert documents to PDF
  • 20.
  • 21. Bad practices - Online document conversion Online2PDF.com, freepdfconvert.com... • Who’s behind the service? • What happens to your documents? • Why would you upload sensitive documents to random strangers?
  • 22. Online document conversion Convert documents offline with Adobe Professional
  • 23. Bad practices - Document sharing over emails Problem statement: Your email file attachments and embedder download links remain in your ‘Sent’ email folder forever, waiting for a hacker to login and download them
  • 24. Bad practices - Document sharing over cloud-based file storage services File sharing with Dropbox, OneDrive, random service: • Download links are valid forever • Mailbox gets hacked → Links are still live
  • 25. Transferring sensitive documents securely • Send web links instead of file attachments where appropriate • Use expiring web links Services: Google Drive, Sync.com, Tresorit...
  • 28. Bad practices - Emails are kept forever Keeping all emails for extended period • Limit the damage if the mailbox gets hacked • Set an archive and retention policy and archive emails to a secure third-party service (e.g. Spinbackup, Backupify) • Office 365, G Suite support retention policies
  • 30. Bad practices - Public Wifi Lots of hacking wizardry: • Password theft via fake login pages • HTTP pages tampered on the fly • Theft of unencrypted sensitive data Just take our advice on the next slide
  • 31. Public Wifi – Use VPN or a 4G dongle
  • 32. Good security hygiene What else you can do
  • 33. Secret: “hackers” log into your webmail
  • 34. Password hygiene • Websites get hacked. • People reuse same email and password across multiple online accounts. D’oh!
  • 35. Two-factor authentication Most powerful defence from: •Crappy passwords (Letmein1) •Stolen passwords (phishing) •Leaked passwords (reuse)
  • 37. Password hygiene – Wallets Remember a single password only • LastPass • 1Password • Dashlane • RoboForm • < Any random password wallet >
  • 38. Storing documents securely Cloud file storage – Who your adversary is • Hackers? - Dropbox, G Drive, OneDrive + Two-factor authentication turned on • Government? - End-to-end encrypted service: Sync.com, Tresorit • Encrypt your disks, USB flash drives and smartphones • BitLocker - Windows 10 Professional • FileVault – Mac • Android supports disk encryption • On iOS disk encryption is turned on by default
  • 39. Prudent data disposal practices Laptops, computers: • Magnetic disks: overwrite • DBAN (https://dban.org/) • SSD: Physical destruction • USB flash drives: Physical destruction
  • 40. Prudent data disposal practices iPhone: Factory reset Android*: 1. Encrypt device 2. Remove storage and SIM cards 3. Factory reset 4. Remove from Google account Phones (SD card): Physical destruction * https://www.computerworld.com/article/3243253/android/how-to-securely-erase-your-android-device-in-4-steps.html
  • 41. Physical security (dos and don’ts)
  • 42. Physical security (dos and don’ts) • Shredding documents • Diamond cut shredder • Secure document disposal service • Can secure dispose digital media for you • Digital certificates (e.g. PEXA key) •Leave them unplugged when not in use •Cut the built-in smart card in half to dispose
  • 43. What to do when you get hacked 🙏 • Disconnect your computer from the Internet and stop using it • Notify LawCover - They have an incident response team • Checklist: http://lca.lawcouncil.asn.au/lawcou ncil/images/cyber/CP-What-to- Do.pdf
  • 44. Summary 1) Use a VOI provider for identity checks 2) Use 2FA and don’t reuse your password 3) Share documents with expiring links 4) Store documents in the cloud securely (2FA) 5) Dispose data securely 6) Shred documents & protect digital certificates 7) Notify LawCover when the house is on fire
  • 45. Where to get help • Law Council of Australia Cyber Precedent, great learning resource • Law Council cyber-attack checklist • Lawcover crisis management team can help you clean up the mess. • Victim of identity theft, you should contact IDCARE, NFP helping people • Have a conversation with your IT Service Provider, or staff. Use these slides as a talking point!