Security 101 for No- techies

Consultant - Digital Transformation (DX through CX) @ Uptake Digital à Uptake Digital
5 Mar 2017
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
Security 101 for No- techies
1 sur 114

Contenu connexe

En vedette

後期第八回ネットワークチーム講座資料後期第八回ネットワークチーム講座資料
後期第八回ネットワークチーム講座資料densan_teacher
JeopardyJeopardy
JeopardyPelon Gonar
Amarillo College Poverty InitiativeAmarillo College Poverty Initiative
Amarillo College Poverty InitiativeSam Smith
Ponemon Institute Data Breaches and Sensitive Data RiskPonemon Institute Data Breaches and Sensitive Data Risk
Ponemon Institute Data Breaches and Sensitive Data RiskFiona Lew
презентация вороновапрезентация воронова
презентация вороноваyuyukul
4 Rules for Successful Threat Intelligence Teams4 Rules for Successful Threat Intelligence Teams
4 Rules for Successful Threat Intelligence TeamsRecorded Future

Similaire à Security 101 for No- techies

Tackling data securityTackling data security
Tackling data securityPeter Bassill
Information Security in a Compliance WorldInformation Security in a Compliance World
Information Security in a Compliance WorldEvan Francen
Data Protection, Humans and Common SenseData Protection, Humans and Common Sense
Data Protection, Humans and Common Senseusbcopynotify
Privacy for tech startups Privacy for tech startups
Privacy for tech startups Marc Gallardo
Information security challenges in today’s banking environmentInformation security challenges in today’s banking environment
Information security challenges in today’s banking environmentEvan Francen
Cyber Security and the Impact on your BusinessCyber Security and the Impact on your Business
Cyber Security and the Impact on your BusinessLucy Denver

Dernier

Product Research Presentation-Maidy Veloso.pptxProduct Research Presentation-Maidy Veloso.pptx
Product Research Presentation-Maidy Veloso.pptxMaidyVeloso
Solving today’s Traffic Problems with Sustainable Ride Hailing SolutionSolving today’s Traffic Problems with Sustainable Ride Hailing Solution
Solving today’s Traffic Problems with Sustainable Ride Hailing SolutionOn Demand Clone
EuroBSDCon 2023 - (auto)Installing BSD Systems - Cases using pfSense, TrueNAS...EuroBSDCon 2023 - (auto)Installing BSD Systems - Cases using pfSense, TrueNAS...
EuroBSDCon 2023 - (auto)Installing BSD Systems - Cases using pfSense, TrueNAS...Vinícius Zavam
"Building Asynchronous SOA for Modern Applications", Sai Pragna Etikyala "Building Asynchronous SOA for Modern Applications", Sai Pragna Etikyala
"Building Asynchronous SOA for Modern Applications", Sai Pragna Etikyala Fwdays
Product Research PresentationProduct Research Presentation
Product Research PresentationDeahJadeArellano
Mule Meetup Calgary- API Governance & Conformance.pdfMule Meetup Calgary- API Governance & Conformance.pdf
Mule Meetup Calgary- API Governance & Conformance.pdfNithaJoseph4

Dernier(20)

Security 101 for No- techies

Notes de l'éditeur

  1. With all of the recent security breaches in the news, it's easy to get caught up in the "technical" side of information security. Sure, there is a lot of work to be done to keep your information safe from hackers and malicious software programs, however, there's another side to the coin, and that's physical security. Many offices don't enforce best practices for physical information security, and frankly may just not be aware of them. As their MSP, your job is to educate them on these best practices, both from a technology standpoint and from a physical standpoint. So, time to put your knowledge to the test. Can you find the 13 security flaws in this picture?
  2. Understanding the Modern Business Landscape Understanding the core principles of IT Security Where IT Leaders are focusing
  3. Ask Questions, Challenge Assumptions, Be Brave
  4. This is a Non Technical Workshop – No Techno Gibber Gabber Allowed!
  5. If anyone shares anything, its important you keep that confidential.
  6. Over 90% of you feel SMB's are more or less vulnerable to risk today than it was five years ago. Why?
  7. Almost all customer information and interactions are digitally recorded. - 1 billion messages are sent between people and businesses each month on Facebook Disruption has forced companies to go digital or go home. This has introduced new challenges around security
  8. How do we protect users inside and outside the office? How do we streamline processes to allow organisations to move faster than they do now? Agility and Mobility bring new challenges security challenges we haven’t had to deal with before. Example Setting up an instant publishing account within 60 seconds (twitter) Users working outside of the office where a firewall won’t protect them
  9. IT security used to be owned and controlled by IT. Now it requires a whole organisational approach and relies more on the literacy of the users than the expertise of the techs. There are more potential access points into a organisation making it more difficult than every to manage and lock down. There are no silver bullets, everything is constantly changing and evolving and orgs need to keep up.
  10. https://www.spiceworks.com/it-articles/it-security/
  11. Top security challenges are related to end users. More specifically, IT pros are worried about the vulnerabilities created when employees don’t understand or aren’t invested in avoiding risky behavior around company data. They’re muscling up security measures. IT pros expect to increase security in 2016, with plans to implement even some of the newer security solutions such as intrusion detection, penetration testing, and advanced threat protection. IT pros believe their role is key in maintaining security. According to our survey respondents, it takes the entire organization—not just the latest technology—to keep sensitive data and people safe. That said, they ultimately feel that the responsibility for their organization’s security is in the hands of IT. LAYER 8
  12. They’re muscling up security measures. IT pros expect to increase security in 2016, with plans to implement even some of the newer security solutions such as; intrusion detection, penetration testing, and advanced threat protection. For example. MFA grow from 1bn to 13bn in 5 years.
  13. IT pros believe their role is key in maintaining security. According to our survey respondents, it takes the entire organization—not just the latest technology—to keep sensitive data and people safe. That said, they ultimately feel that the responsibility for their organization’s security is in the hands of IT. Technology is not a Panacea
  14. Write these two things down, this is what you must remember.
  15. Does anyone know how bulletproof glass works?
  16. Simply, who has access to what and why? Customer Lockbox – Microsoft Knowing and making purposeful decisons
  17. Who has heard of ransomware, crypolocker etc?
  18. Polls are suggesting 50% of hospitals have been hit. – Open DNS
  19. Ransomware as a Service, or RaaS, where affiliates can join in order to distribute the ransomware, while the Cerber developers earn a commission from each ransom payment. http://www.bleepingcomputer.com/news/security/the-cerber-ransomware-not-only-encrypts-your-data-but-also-speaks-to-you/ Swiss Ransomware Awareness Day https://www.melani.admin.ch/melani/en/home/dokumentation/newsletter/ransomwareday.html
  20. http://www.itnews.com.au/news/the-3-billion-it-security-problem-420126?eid=1&edate=20160527&utm_source=20160527_AM&utm_medium=newsletter&utm_campaign=daily_newsletter
  21. Massive growth is pretty much all ransomware related Who is being targeted
  22. Antivirs
  23. Over 20 seconds you will see ransomware at work
  24. The CryptoWall gang is well known for its excellent customer service, such as giving victims deadline extensions to gather the ransom, providing information on how to obtain bitcoins (the preferred method of payment), and promptly decrypting the files upon payment. Other malware families, such as TeslaCrypt, Reveton, and CTB-Locker, have less reliable reputations. Which can really be trusted? Paying to find out is not the best strategy. http://www.crn.com.au/news/cyber-criminals-offer-live-chat-support-for-victims-420713
  25. 1. You become a bigger target As they saying goes: Do not feed the trolls -- otherwise, they'll keep making provocative statements to get a reaction. Ransomware is a little like that; paying ransom simply encourages the attackers. Criminals talk; they will tell others who paid the ransom and who didn’t. Once a victim is identified for paying up, there's nothing stopping others from jockeying for a piece of the ransom pie. Another danger looms: The same attackers can come back. Since you paid once, why not again? 2. You can't trust criminals Relying on a criminals to keep their word is a risky endeavor. It seems like a simple exchange -- money for a decryption key -- but there's no way to tell the ransomware gang can be trusted to hold up their half of the bargain. Many victims have paid the ransom and failed to regain access to files. [ ALSO ON CSO: Ransomware isn't a serious threat says threat intelligence firm ] This cuts both ways: Why pay up if you don't expect to get your data back? Reputation matters, even in the criminal world. The CryptoWall gang is well known for its excellent customer service, such as giving victims deadline extensions to gather the ransom, providing information on how to obtain bitcoins (the preferred method of payment), and promptly decrypting the files upon payment. Other malware families, such as TeslaCrypt, Reveton, and CTB-Locker, have less reliable reputations. Which can really be trusted? Paying to find out is not the best strategy. 3. Your next ransom will be higher 4. You encourage the criminals
  26. Separating different networks from one another Not using the admin accounts on PCs Installing better anti-virus, anti-malware, email filtering, etc. Educate users Penetration Testing as intrusion detection advanced threat protection Can you prevent it? no.
  27. Schodingers backup
  28. a cat imagined as being enclosed in a box with a radioactive source and a poison that will be released when the source (unpredictably) emits radiation, the cat being considered (according to quantum mechanics) to be simultaneously both dead and alive until the box is opened and the cat observed. Erwin Schrödinger
  29. https://blog.dashlane.com/dashlane-business-enterprise-identity-password-management/ According to a research, it is found that over 23 % of desk-based employees wish to share their passwords with their colleagues
  30. Two or Three Passwords One for Banking One for Government One for everything else What are the most important passwords though? All is not lost, you can reform.
  31. Lets start with Strong Passwords. I’m going to break them into two categories.
  32. If you analyse any of the large password leaks of the last few years you will notice that people tend to use the name of the service as part of their passwords.
  33. http://www.darkreading.com/risk/how-hackers-will-crack-your-password/d/d-id/1130217
  34. https://diogomonica.com/posts/password-security-why-the-horse-battery-staple-is-not-correct/
  35. PM = Password Manager
  36. Lastpass – Better for enterprise with tighter controls and a need for SSO
  37. Dashlane – Better for small businesses with basic requires. Offers easier onboarding and user experience.
  38. Multi-Factor Authentication Market Will Be Worth US$13.2 Billion in 2020; Driven By Demand for One-Time-Passwords, Tokens, and Security Certificates https://www.uptakedigital.com.au/mfa-multi-factor-authentication/
  39. Something you have – phone, 2FA device Something you know – Password Something you are - Biometrics
  40. Login Once Access Everything. Not the same as having the same password for every service Automated Provisioning – Turn user account provisioning into a HR process Rapidly off-board or disable access. Advantages: Implementation of Single Sign-On solution reduces the chances of forgetting username and password. Only having one ID credential, you don’t need to remember tons of passwords. One of the major problem faced by the IT department is a getting number of calls regarding the loss of password. SSO plays a vital role to solved out this problem. Implementation of SSO reduces the cost of IT help desk by allowing users to access multiple websites using single ID credentials and reduces the chances of password fatigue. The SSO’s advanced technology helps in detection of attempts made to hack a particular system and it would lock out the hacker from remaining systems. Single Sign-On is very beneficial in health care industry. If a doctor wants to login to the database for accessing patient’s file then he/she can also access to the other related data that would be on other  application. Disadvantages: One of the biggest problem faced by SSO is that it is a very critical tool and always need to keep up.  If it goes down then the user will lose access to all related websites. To have a good and strong password for SSO is very important because once your SSO account is hacked, all the other sites that are under the same authentication are also hacked as well. SSO lacks strong authentication backups like one-time passwords or smart cards etc. http://nomadder.tumblr.com/post/142835291941/advantages-and-disadvantages-of-single-sign-on
  41. Move quickly through this section.
  42. bars or public transport
  43. Have you every used public free Wi-Fi for sensitive business use?
  44. Packet Sniffing, Access Point Telco Metadata retention scheme
  45. Give your staff 3G Set up a VPN to protect traffic on unowned networks Or consider your own 3G/4G device Preference websites with SSL (Green lock) Malicious Hotspots – can you trust it? https://www.onguardonline.gov/articles/0014-tips-using-public-wi-fi-networks
  46. What happens when your network isn’t secure
  47. Guest Wifi Set up a Guest network for other stakeholders This allows you to separate your network from your work network -pokies machine story This stops staff from giving out your wi-fi password
  48. Radius Server PreShared Key
  49. Good or Bad?
  50. BAD! Log in and turn it off! Change default passwords as well!
  51. Does anyone know how bulletproof glass works?
  52. Simply, who has access to what and why? Customer Lockbox – Microsoft Knowing and making purposeful decisons
  53. The number one thing I want you to take away from tonight is the adoption of a Security Mindset.
  54. These are guidelines only
  55. Understanding the Modern Business Landscape Understanding the core principles of IT Security Where IT Leaders are focusing
  56. 13 possible breaches
  57. Computer screen left on with no password protection - passerby has access to information on the device Unshredded files in trash could contain sensitive information File cabinet open - easy for someone to steal sensitive information Cell phone left out in the open - may display sensitive information and/or can be easily stolen Notes left on whiteboard - could contain confidential product updates, information or ideas Backpack left out and open Usernames and passwords left out in the open Key to locked drawer left out in the open - easy access to confidential files Calendar out in the open - could contain sensitive dates and/or information Credit card left out on desk Documents left out on desk that could contatin sensitive information USB drive left out in the open Wallet left on desk
  58. Data collected from more than 20,000 volunteers found that 87% of Android devices are exposed to at least one of 11 known critical vulnerabilities. The study places the blame for Android devices' high risk on the manufacturers themselves, noting that all large software companies today uncover security risks and then release software updates to protect users. Why IOS is safer https://www.sophos.com/en-us/security-news-trends/security-trends/malware-goes-mobile/why-ios-is-safer-than-android.aspx
  59. Also people need to realise you're only as strong as your own security level, Using random passwords lying on password reset information questions and other reset methods is also important. (I like to use random chunks of text [for security questions] as well as standard fake information [for Birthdates.]) Using a Password Manager is also a good option and it goes without saying a different password for each site is definitely important. Regarding Hosting and Domains Accounts and Domain Name Registration. It's normally recommended not to use an email address at your domain name as the primary email address. As in the case of Hosting and Domains Accounts if your account is suspended you most likely will lose access to that email address. and in the case of Domain Name Registration it can be possible that you will not receive important information regarding renewals on your domain name.
  60. You should set up your laptop so that you have to enter a password every time you boot up, or whenever you come back to it after it has switched to the screensaver. Skilled computer users may be able to bypass this feature, but it will protect your data from common thieves.
  61. https://www.theguardian.com/technology/2015/jan/20/laptop-stolen-what-i-learned
  62. Data Encryption Standard AES
  63. RC4 Key derivation is performed using 50,000 iterations[source] of SHA-1 (increased to 100k in SP2). Uses a 16-byte (128-bit) random salt. AES is the block cipher used to encrypt the document. By default, 128-bit key are used. There is a registry tweak to change this to 256-bit. The AES block cipher is implemented in Microsoft's CSP / CryptoAPI.
  64. The end of Security Through Obscurity
  65. 33 percent of employees have personally purchased a SaaS application without their IT department’s knowledge. Of those who purchased a SaaS app, 49 percent did it “because it was “faster without IT”. https://blog.dashlane.com/dashlane-business-enterprise-identity-password-management/
  66. This video is telling a different story about the productivity challenges of point solutions, rather than security concerns of shadow IT.