Were glad you decided to join us. IT Forum, October 30, 2019 - - PowerPoint PPT Presentation

we re glad you decided to join us
SMART_READER_LITE
LIVE PREVIEW

Were glad you decided to join us. IT Forum, October 30, 2019 - - PowerPoint PPT Presentation

October is Cyber Security Month. Were glad you decided to join us. IT Forum, October 30, 2019 Division of Information Technology Team & Agenda Susan Bowen; Chief Information Officer and Associate Vice President for IT Carl Hurst;


slide-1
SLIDE 1

October is Cyber Security Month. We’re glad you decided to join us.

IT Forum, October 30, 2019 Division of Information Technology

slide-2
SLIDE 2

Team & Agenda

  • Susan Bowen; Chief Information Officer and Associate Vice President for IT
  • Carl Hurst; Associate CIO
  • Ikram Muhammad; Information Security Engineer
  • Thomas Kern; Information Security Analyst

Agenda

  • Why Cyber Security
  • Don't Fall For a Phish
  • Passwords
  • What’s Next
slide-3
SLIDE 3

What is Cyber Security

Cyber security focuses on protecting computers, networks, programs and data, from unintended or unauthorized access, change or destruction.

slide-4
SLIDE 4

Why Cyber Security

  • Cyber Security affects everyone
  • Your computer, tablet, cellphone and social media probably contain

information that hackers and other criminals would love to have

  • When you are aware of the risks, it may be much easier to protect

yourself A strong cyber security system relies on cyber defense technology &

  • n people making smart cyber defense choices
slide-5
SLIDE 5

One Technique: Phishing

  • What: Specialized email attack

against a specific target

  • Goal: collect information or gain

access to systems

  • Technique: disguising oneself as a

trustworthy entity in an electronic communication

slide-6
SLIDE 6

Spot a Phish

Review the email samples on your tables.

  • 1. Is it a phish?
  • 2. Why or why not?
  • 3. If it is a phish - what is your next step? What do you do or

not do?

slide-7
SLIDE 7

Dear Colleagues: Our aim is to provide guidance and align our behaviors as we make great decisions that impact our daily operations. We rely on our values and this code as guidelines, as a breach of the Policy may result in disciplinary action against the Employee concerned. All employees, including all individuals on full-time or part-time employment with the institution are required to go through the guidelines attached in this email. It is important that we all adhere to these guidelines so you will be helping to ensure a future success of this great institution Thank you for your ongoing commitment to delivering a better and reliable service. Sincerely Scott R. Pilarz

slide-8
SLIDE 8

Dear Colleagues: Our aim is to provide guidance and align our behaviors as we make great decisions that impact our daily operations. We rely on our values and this code as guidelines, as a breach of the Policy may result in disciplinary action against the Employee concerned. All employees, including all individuals on full-time or part-time employment with the institution are required to go through the guidelines attached in this email. It is important that we all adhere to these guidelines so you will be helping to ensure a future success of this great institution Thank you for your ongoing commitment to delivering a better and reliable service. Sincerely Scott R. Pilarz

Phish

Malware was detected in one or more attachments included with this email message. Action: All attachments have been deleted.

slide-9
SLIDE 9

I want you to get some Gift cards available. We have some clients we would like to give some as gifts. Let me know if it is possible for you to make arrangements for the gift cards, so I can tell you which product we would need and what denomination they would be. Kindly confirm this to me now. Thank you I need you to get a task done for me now. I am in a meeting can't take calls or text just reply my email. What do you need.

slide-10
SLIDE 10

Social Engineering/Scam

I want you to get some Gift cards available. We have some clients we would like to give some as gifts. Let me know if it is possible for you to make arrangements for the gift cards, so I can tell you which product we would need and what denomination they would be. Kindly confirm this to me now. Thank you I need you to get a task done for me now. I am in a meeting can't take calls or text just reply my email. What do you need.

slide-11
SLIDE 11
slide-12
SLIDE 12

Social Engineering/Scam

slide-13
SLIDE 13

Hello! I am a hacker who has access to your operating system. I also have full access to your account. I've been watching you for a few months now. The fact is that you were infected with malware through an adult site that you visited. If you are not familiar with this, I will explain. Trojan Virus gives me full access and control over a computer or other device. This means that I can see everything on your screen, turn on the camera and microphone, but you do not know about it. I also have access to all your contacts and all your correspondence. Why your antivirus did not detect malware? Answer: My malware uses the driver, I update its signatures every 4 hours so that your antivirus is silent. I made a video showing how you satisfy yourself in the left half of the screen, and in the right half you see the video that you watched. With one click of the mouse, I can send this video to all your emails and contacts on social networks. I can also post access to all your e-mail correspondence and messengers that you use. If you want to prevent this, transfer the amount of $545 to my bitcoin address (if you do not know how to do this, write to Google: "Buy Bitcoin"). My bitcoin address (BTC Wallet) is: 1ELKdWgfedTJ9FV4U5W2JVXFzTpKSqcCjM After receiving the payment, I will delete the video and you will never hear me again. I give you 50 hours (more than 2 days) to pay. I have a notice reading this letter, and the timer will work when you see this letter. Filing a complaint somewhere does not make sense because this email cannot be tracked like my bitcoin address. I do not make any mistakes. If I find that you have shared this message with someone else, the video will be immediately distributed. Best regards!

slide-14
SLIDE 14

Extortion and using passwords from other breaches.

Hello! I am a hacker who has access to your operating system. I also have full access to your account. I've been watching you for a few months now. The fact is that you were infected with malware through an adult site that you visited. If you are not familiar with this, I will explain. Trojan Virus gives me full access and control over a computer or other device. This means that I can see everything on your screen, turn on the camera and microphone, but you do not know about it. I also have access to all your contacts and all your correspondence. Why your antivirus did not detect malware? Answer: My malware uses the driver, I update its signatures every 4 hours so that your antivirus is silent. I made a video showing how you satisfy yourself in the left half of the screen, and in the right half you see the video that you watched. With one click of the mouse, I can send this video to all your emails and contacts on social networks. I can also post access to all your e-mail correspondence and messengers that you use. If you want to prevent this, transfer the amount of $545 to my bitcoin address (if you do not know how to do this, write to Google: "Buy Bitcoin"). My bitcoin address (BTC Wallet) is: 1ELKdWgfedTJ9FV4U5W2JVXFzTpKSqcCjM After receiving the payment, I will delete the video and you will never hear me again. I give you 50 hours (more than 2 days) to pay. I have a notice reading this letter, and the timer will work when you see this letter. Filing a complaint somewhere does not make sense because this email cannot be tracked like my bitcoin address. I do not make any mistakes. If I find that you have shared this message with someone else, the video will be immediately distributed. Best regards!

slide-15
SLIDE 15
slide-16
SLIDE 16

Spear phishing - Faculty and Deans

slide-17
SLIDE 17
slide-18
SLIDE 18

Legitimate

slide-19
SLIDE 19
slide-20
SLIDE 20

Legitimate

slide-21
SLIDE 21
slide-22
SLIDE 22

Legitimate

https://livescranton- my.sharepoint.com/:f:/g/p ersonal/ikram_muhamma d_scranton_edu/EvD_Cl6k r6JPg8jcFyTg78ABcvl2e- imqOv4M1h4F_jVQg?e=5 %3aKXDB4I&at=9

slide-23
SLIDE 23

The Anatomy of a Phish

Read all communications carefully, and look for:

  • Unofficial or odd “From” address
  • Links to a questionable website
  • Misspellings or incorrect grammar
  • Urgent action
  • Claim to have compromised your account
  • A request to send funds

Hover over these to review

  • Keep personal information secure
  • Do not click on any links
  • Do not open any attachments
  • Forward the phishing attempt as an

attachment to infosec@scranton.edu

  • Mark the email as Junk
slide-24
SLIDE 24

Questions

  • Is Duo Mobile worth the effort? Please update us on its value, as it is a genuine pain in the ass.
  • Is there any way to stop those awful Robo calls? Also, if I answer or call them back, does that
  • pen me up to security breaches?
  • Do your smartphones need apps for to check for anti-virus / malware / etc?
slide-25
SLIDE 25

What’s in a password?

  • Use Scranton or Royals
  • End in numerals 123 or 1234
  • End with a year, i.e. 2019 or 1888
  • Same for multiple accounts
  • Minimum 9 characters
  • No password change in the past 6 months
slide-26
SLIDE 26

Passwords: Good, better & best practices

Good

  • Use the longest password or passphrase permissible
  • Always remember to log out
  • Avoid common phrases, famous quotes, and lyrics
slide-27
SLIDE 27

Passwords: Good, better & best practices

  • Use different passwords on different systems and accounts
  • Use a password manager to store multiple passwords
  • Common freeware solutions include:
  • Sticky Password (mobile fingerprint scan, form autofill)
  • Roboform (one-click logins, offline access)
  • Dashlane (security alerts for breaches, password generator)
  • Lastpass (Syncing across devices) - How secure is your password?
  • Don’t save passwords in browsers
  • Modify passwords every 6 months
  • Do not reuse old passwords

Better

slide-28
SLIDE 28

Passwords: Good, better & best practices

  • Avoid using real words (in any language)
  • Don’t use passwords based on personal information
  • Update security questions
  • Use 2FA/MFA when possible
  • Mnemonics!

Best

Mnemonic Example I Can Never Remember A Password For The Life Of Me!

1cnr@Pftl0m!

slide-29
SLIDE 29

Questions

  • How to keep track of multiple passwords - I usually end up using a few different ones, but know

that is not what I am supposed to do! And I keep different ones in a file in my Documents on my home computer. Also wrong, I think. Help!

slide-30
SLIDE 30

The Future of Cyber Security at the University

Microsoft Office 365 Security Initiatives

  • Email Encryption & Data Loss Prevention (DLP)
  • Exchange Online Protection (EOP)
  • Advanced Threat Protection (ATP)
slide-31
SLIDE 31

Email Encryption & Data Loss Prevention

Sensitive Data Detection in Email, One Drive, SharePoint and Teams

  • U.S Social Security Number
  • U.S /U.K Passport Number
  • Credit Card Number
  • U.S Driver License Number
  • U.S Bank Account Number

Sensitive Data can be sent via an encrypted email

slide-32
SLIDE 32

Office 365 Exchange Online Protection

Anti-spam

  • This current policy protects our organization from spam and move

emails to Junk folder.

Anti-malware

  • This policy protects our organization from known Malware.
slide-33
SLIDE 33

Office 365 Advanced Threat Protection Testing

ATP anti-phishing

  • This feature helps protect users from phishing attacks (like impersonation

and spoofing) and use safety tips to warn users about potentially harmful messages.

ATP safe attachments

  • This feature helps protect our organization from malicious content in email

attachments and files in SharePoint, OneDrive and Teams.

ATP Safe Links

  • This feature helps protect our users form opening and sharing malicious

links in email messages and office 2016 desktop application.

slide-34
SLIDE 34

Questions

  • Is it important to secure our own home wifi, if so what is suggested? Are we at risk when

using various smart technology in the home? (light switches, plugs, cameras, etc.)

  • Is Windows Defender our only Virus\Trojan\Malware protection service? How do we

remove these files from the quarantined space (asks for admin)?

  • Do you recommend any particular antivirus software for home computers? What

recommendations do you have for our personal computers related to privacy and security?

slide-35
SLIDE 35

Resources

  • Office of Information Security at infosec@scranton.edu
  • Online resources with videos and tips: Scranton.edu/infosec