personal cybersecurity
play

Personal CyberSecurity How to Better Protect Yourself Online Steve - PowerPoint PPT Presentation

Personal CyberSecurity How to Better Protect Yourself Online Steve McEvoy September 14 th , 2019 Fort Lauderdale, FL The Internet has some scary s**t going on This is a self defense course Poll Results - Ransomware Title The Dental Record


  1. Personal CyberSecurity How to Better Protect Yourself Online Steve McEvoy September 14 th , 2019 Fort Lauderdale, FL

  2. The Internet has some scary s**t going on This is a self defense course

  3. Poll Results - Ransomware

  4. Title

  5. The Dental Record

  6. How did it Happen? Dental Office

  7. How did it Happen? Over 400 !! Dental Office

  8. Discovered Monday Aug 26th

  9. 9 Days Later – Sept 3rd

  10. 17 Days Later – Sept 11th

  11. What Should You Do? • Have your own LOCAL backup strategy in addition to a Cloud based backup • Talk about this to your IT Person and ask them if this can happen to them/you • Care about this!

  12. Windows 7 End of Life

  13. Why Would You Care?

  14. WannaCry Ransomware

  15. WannaCry Ransomware

  16. Windows XP was full of Security Holes • Microsoft Discontinued Support of Windows XP in April 2014 • No Windows Updates after that time • WannaCry Ransomware deliberately exploited a newly found weakness built into Windows XP (May 2017) • NHS had opted to just keep using XP

  17. Why Would You Care?

  18. Windows 7 will be full of security holes Risk Time

  19. Your Options • Ignore it – Eventually the PCs will be replaced • “In Place” Upgrade to Windows 10 – For a while they had been giving it away • Upgrade to Windows 10 – Reload your existing PCs from scratch • Replace the PC – The new one will come with Windows 10

  20. In Place Upgrade • Windows 10 installs Overtop Windows 7 • Generally a BAD idea – Seen this go sideways many times – All your Applications and Drivers must be Windows 10 Compatible • Software like Dolphin, Carestream, Ortho2, etc. • Scanners, Printers, and other hardware • X-ray machine applications • Leaves behind a mess

  21. Fresh Install of Windows 10 • Updating your Existing PCs Fresh • Deletes everything and Installs Windows 10 from scratch (Clean install) • You have to setup everything again (just like if you had got a new PC) • If a computer is less than 4 years old you might consider this • If a computer is 5+, don’t waste the $$$

  22. New PC • Windows 10 has been out for 4 years • If your PC still runs Windows 7 it is likely 4+ years old. • Replace the old PC that probably has ‘personality’ with a new, much faster PC.

  23. Pay for Updates? • Microsoft is offering Extended Support Updates (ESU) for a fee • You can Pay for Windows Updates for the next 1, 2 or 3 years • The Fees double each year: – $50 year 1 – $100 year 2 – $200 year 3

  24. When ESU Makes Sense • For X-Ray PCs that cannot be upgraded to Windows 10 • Maybe for Mid-Life PCs (3-4 years old) that you want to stretch for 1 more year – It doesn’t make sense to dump $450 into an already 4 year old PC to try and make it live to 7 years old when a new PC is $600

  25. More Motivation…. • Software companies like Carestream, Dolphin, Ortho2, etc. will Stop Supporting their applications on Windows 7 – Ultimately this is reasonable • They usually transition over the first few months – Windows 7 will become “Not Recommended” – After a few months will be “Not Supported”

  26. What to do Next • Talk to your IT Person – Review your network can come up with a plan • Do this ASAP! – They are already super busy helping others that got started sooner than you.

  27. What about your Phone?

  28. Always Update Your Phone

  29. Help! Ransomw are

  30. Email Phishing Attacks

  31. Via email attachments

  32. What Should You Do? Best Practices for Emails: • Never click on a link in an email that you aren’t 100% sure of the sender and where its taking you • Never open an attachment on an email if you weren’t 100% expecting it • When in doubt, open on a cell phone • When in doubt, check with the sender

  33. Phishing Ransomw are

  34. Phishing Ransomw are Bitcoin

  35. Phishing Ransomw are Bitcoin

  36. Corporate Data Breaches

  37. Bulk Hacking • Hacking peoples accounts one at a time is a slow, resource intensive process • Hacking the websites full of user names AND passwords yields bulk results • They never targeted you personally, but the result is they have your information

  38. How can you know if your username & password have been leaked into the wild?

  39. Troy Hunt • Security Expert from Microsoft • Searched the Dark Web • Compiled a list of 5 ~Billion hacked accounts • Created “Have I been pwned?” website – ‘Pwned’ is a slang term • Securely check if your username and passwords has been stolen

  40. www.HaveIBeenPwned.com

  41. Is your Password Pwn’d? (starwars)

  42. Pre-check your new passwords (MyReallyHardPassword)

  43. Get Notified of pwnage • Get notified if your email(s) show up in the future

  44. I was Notified of pwnage

  45. How long will it take for a Hacker to break through my password?

  46. www.howsecureismypassword.net

  47. What makes a GOOD Password??

  48. • Recently updated their recommended digital identity standard (SP 800-63) • Troy Hunt canvased NIST and others to derive what the collective wisdom is thinking

  49. Length Matters • 12 or more characters • We can use short dictionary words • 3 or 4 random words

  50. dog bill red beer hat tree head

  51. Nothing Personal address spouse movie food kids date birthday phone pets

  52. 3 or 4 Short Random Words bill dog red beer hat tree head doghatbeerhead

  53. Make ‘em Memorable • Think up something about the site • i.e. Wells Fargo – dumb wagon horses – ripping off clients – stashing my cash

  54. But what is wrong with this? • dumbwagonhorses – 15 characters – 3 random words – dumbwagonhorses is better than Sj7$qq#56

  55. Standards Don’t Change Overnight • They ‘Evolve’ • Websites, banks, etc. will need to learn and adopt these standards • dumbwagonhorses wouldn’t meet their current ‘complexity checker’

  56. Steve’s Recommendation (Simple Complexity) Starting TODAY! (2019 and on) – Three or Four unassociated dictionary words – At LEAST 12 characters in length – Capitalize First Letters – Add a 2 digit year to the end (reminder) DumbWagonHorses19

  57. Simple Complexity Works • DumbWagonHorses19 – 2 Trillion Years to Hack – Should meet the Banks requirements – Much easier to remember

  58. (Public WiFi in Particular)

  59. Up Close and Personal • To hack you while on WiFi the hacker needs to be within range

  60. The Good Guy Hacker • White Hat Hackers that you hire to ‘PenTest’ your own business to find the weaknesses • Toolkits are available online to purchase • Of course, who are the biggest customers?

  61. Hak5

  62. Hak5

  63. Hacker Hobbiest • You don’t need to be an expert • Anyone with a Hobbyist level of computer skills can use these tools effectively • (and get into trouble fast)

  64. Where do we use WiFi? Typical places we rely on WiFi include: • Home • Office • Coffee Shops • Hotels • Conferences ….

  65. Remembered Connections • The convenience of our devices is their undoing • It can be set to remember WiFi’s its been connected to and automatically reconnect • They are constantly ‘beaconing’ out looking for those memorized zones

  66. Hello?? Home WiFi Zone Named “ Steve’s WiFi ” are you there??

  67. Why Yes I am! “ Steve’s WiFi ” is ready to connect, please do Thanks! All Connected

  68. Phishing you with a Freebie • Fool you into connecting to a ‘Open’ Free WiFi zone • They advertise a convincing name: – Starbucks Free WiFi – Detroit Airport Free WiFi – UofM Free WiFi

  69. Cool! They Free WiFi! Come and arranged get your Free WiFi Free WiFi for the ‘ AAO Free WiFi ’ meeting

  70. Secure Surfing • HTTP vs. HTTP S – http://www.google.com is unsecure – http S ://www.google.com is encrypted • HTTP web surfing is like shouting across a room - ANYONE can listen in

  71. Secure Surfing • HTTP S web surfing is an encrypted connection • When you access the website they hand you an encryption key • Your device goes through a process to verify the key is legitimate through a 3 rd party verification • If it checks out you see a Lock symbol

  72. Where would you expect it? • Banks • Retailers • Any place you have to ‘Login’ – They should be in HTTPS mode by the time you are on the login page.

  73. Pay Attention to the Lock • This is your key defense to knowing if you are potentially being hacked • An HTTP S website with a BROKEN lock symbol means you are at risk

  74. Have you ever seen this?

  75. Have you ever just Continued?

  76. Hackers count on our Reaction • “Damn computer is acting up again. I just need to get my work done” • … and you click on Proceed Anyway …

  77. What to do? • Do not proceed* • Close your Browser session and try again SOMEWHERE else safer • Ask your IT person if it persists

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend