Welcome to Security Awareness Month
Hosted by the Office of Information Technology
October 2018
1
WELCOME Welcome to Security Awareness Month Hosted by the Office of - - PowerPoint PPT Presentation
WELCOME Welcome to Security Awareness Month Hosted by the Office of Information Technology October 2018 1 What is Prevent, Plan, and Prepare National We live in a world that is more connected than ever before. The Internet touches Cyber
Welcome to Security Awareness Month
Hosted by the Office of Information Technology
October 2018
1Prevent, Plan, and Prepare
We live in a world that is more connected than ever before. The Internet touches almost all aspects of everyone’s daily life.
National Cyber Security Awareness Month (NCSAM) is designed to raise awareness in all of us, about cyber security and increase the resiliency of the Nation in the event of a cyber incident. Cyber security is critically important to us as a University with massive amounts of sensitive information to protect. And…cyber security is important anyone who uses a device that connects them to the internet. That might be your phone or your computer…but it also includes your bank, your medical provider, and the grocery store.
2What is National Cyber Security Awareness Month?
Cyber Security
Cybersecurity Awareness Month
What is cyber security. Why is it important to you?
About the Speaker and Topic
Who is he and why do I care about this topic?
PHISHING!
This is not your normal Fishing trip!
PASSWORDS
How do I respond after infection?
Continue the Discussion
Where do I go from here?
3Today’s Agenda
Jeff Squibb
Information Security Analyst
4Let’s Go on a Phishing Trip
This is not your normal Fishing Trip!
Job History
About Me
Education
Information Systems Technology
Instructional Technology
6About Me
Lets go on a Phishing Trip This is not your normal Fishing Trip!
7PHISHING
Cyber Security Touches Everyone
information of importance?
8Prevention
Response
Computer / E-mail Scams
Use Best Judgement! NEVER Click the Link
9Scams
Cybersecurity Touches Everyone
Access to your machine:
Access to your information:
Personal information includes:
What are cyber criminals after?
For Sale!
Cybercrime Facts
drug trafficking as a criminal money- maker.
3.1 seconds as a result of cybercrime.
committed against small businesses.
records had been stolen.
12Lets Go Phishing
Limit what you share online
14The less you share about yourself, the smaller the target you are for a phishing
post online to learn how to gain your trust.
Protect your credentials
15No legitimate company or
username and password or
e-mail.
Contact the SalukiTech Helpdesk.
E-mail attachments are the most common vector for malicious software.
attachment, delete it—unless you are expecting it and are absolutely certain it is legitimate.
Beware of Attachments
Phishing messages can look official.
and company identities, including logos and URLs that are close to the links they're trying to imitate.
impersonating schools, financial institutions, retailers, and a wide range of other service providers.
Confirm Identities
Do not reply using information in a suspicious message that claims to be from an agency or service provider.
the organization online.
Trust your instincts
Check the sender's e-mail address.
University is unlikely to come from [email protected].
Check the sender
If a message states that you must act immediately
comply.
threaten a loss of service unless you do something.
without thinking; an urgent call to action makes you more likely to cooperate.
Take your time
If you don't trust the e-mail (or text message), don't trust the links in it either.
shorteners or text like "Click Here."
form designed to steal your username and password.
Don't click links in suspicious messages
Do not open unexpected attachments!
choice for spreading malicious software…
E-mail attachments
Avoid getting phished— no hook for you!
their true URL.
Hover to discover
Does that e-mail feel off? It probably is.
Trust your instincts
Cybercriminals want you to do what you're told, when you're told.
Is it urgent?
Posting personal info online creates bait for scams and #phishing.
Manage social media carefully
#Phishing is social engineering and it's not just for e-mail! You can get phished by phone or text message.
Remember
Passwords
https://youtu.be/opRMrEfAIiI
288 characters long and… …can be cracked in under 24 hours!
Passwords
Top 10 Passwords 2017
301. 123456 2. Password 3. 12345678 4. qwerty 5. 12345 6. 123456789 7. letmein 8. 1234567 9. football
Survey Says!
PASSWORD MANAGERS
31Password Manager
from an e-mail message that attempts to convince the reader to take some sort of action
here!
Reminder
So…What is pwned?
https://haveibeenpwned.com/
35Have I been pwned?
Passwords
https://www.youtube.com/watch?v=Srh_TV_J144
36combination of numbers, symbols, and letters (uppercase and lowercase).
(every 45 to 90 days).
passwords, or other computer/ website access codes to anyone.
attachments from strangers.
Reminder
Prevention
you
program
_________ Infection(s)
Next Steps
Stay Vigilant
Don’t let it grip you, but…
WWW.StaySafeOnline.ORG StopThinkConnect.org SecureIt.SIU.EDU
Stay Up to Date
Other training, webinar, ask friends.
What Can IT Do To Help?
What to do now…in the future.
39What Should Your Do Now?
Coming Up…
Please invite users in your department to register and join us. Contact (olindahubbs@siu.edu).
October 11th (tomorrow) Don’t Be Out Smarted By Your Smart Phone with Abby Razer, SalukiTech Call Center Manager and Melissa Pierce, SalukiTech Desktop Support Bring your Smartphone (Android or iPhone) and learn and practice steps to avoid phishing and other malicious phone scams. And learn to keep your identity safe when using social media. October 18th Let's go on a Phishing Trip--This is not your usual Fishing Trip! with Jeff Squibb, Information Security Analyst at SIUC Phishing is still a state-of-the-art cybersecurity threat and you have to be careful not to take the bait! Learn what lurks in the virtual depths and how to protectOctober Security Events
Thank You!
41We have a new look To make it easier to find what you need. Visit us at:
http://oit.siu.edu/infosec urity/
Professional Assistance for End User Needs
Visit the SalukiTech Service Center on the first floor of Morris Library. https://oit.siu.edu/salukitech/walk-in/
To Contact Our Experts
Office of Information Technology, Security website http://infosecurity.siu.edu/ SalukiTech 618-453-5155 salukitech@siu.edu SalukiTech Service Center, Morris Library—First Floor Mon - Thu: 8 AM - 9 PM Friday: 8 AM - 6 PM Saturday: 10 AM - 6 PM Sunday: 1 PM - 9 PM Steve Aldridge
Office of Information Technology, Security sa.sec@siu.edu
Jeff Squibb
Office of Information Technology, Security Js.sec@siu.edu
SIU Carbondale Security Experts and Information