OSAC: Personal Digital Security Presentation

Preview:

Citation preview

Personal Digital SecurityImplications for the home and the office

Sponsored by

Lydia Kostopoulos, PhD @LKCYBERJune 4, 2015

Personal Digital SecurityWhat it entails.

What it means for you:• As an individual• As an employee for your company

What you can do about it

Personal Digital Security

• Protection of your identity, communications, accounts, assets and technology from malicious intruders.

• Protection of personal tools: SIM cards, contactless credit cards, health and digital security devices, biometric data, IOTs, etc.

• Read Terms of Service (ToS) and Privacy Policies before agreeing.

• Update and patch software often.

• Don’t share personal information unless absolutely necessary.

• Don’t click on suspicious links and do not open email attachments from people you don’t know.

• Be conscious of meta-data.

• Read Terms of Service (ToS) and Privacy Policies before agreeing.

• Pay attention to the site link at the top and make sure it is a secure connection.

• Avoid being a phishing victim and pay attention to email headers to make sure they are legit.

HOME

Leakage awareness!

Personal Digital Security

• Read Terms of Service (ToS) and Privacy Policies before agreeing.

• Update and patch software often.

• Don’t share personal information unless absolutely necessary.

• Don’t click on suspicious links and do not open email attachments from people you don’t know.

• Be conscious of meta-data.

• Read Terms of Service (ToS) and Privacy Policies before agreeing.

• Pay attention to the site link at the top and make sure it is a secure connection.

• Avoid being a phishing victim and pay attention to email headers to make sure they are legit.

OFFICE

Policies!

Data Loss Prevention (DLP)

Source: COMSEC Consulting: Information Security

What measures have you taken to secure the following?

Security is an evolving process.

Keep an open mind to learning!

Awareness is key.

Stress Reduction Kit

BangHeadHere

Directions:1. Place kit on FIRM surface.2. Follow directions in circle of kit.3. Repeat step 2 as necessary, or until unconscious.4. If unconscious, cease stress reduction activity.

“Digital equivalent of locking the front door to your home and not leaving your car keys in the ignition”. – Marc Goodman

Avoid 85% of common digital

threats.

Government

Cyber Security Evaluation Tool(self-assessment)

FBI and Private Sector PartnershipAssociation of persons who represent businesses, academic institutions, state and local law enforcement agencies, and others dedicated to sharing information and intelligence to prevent hostile acts against the U.S.

• Meetings• Newsletters• Briefs

https://ics-cert.us-cert.gov/Assessments

https://www.infragard.org

http://www.stopthinkconnect.org/

https://www.fcc.gov/cyberforsmallbiz

• Cyber Security Tips for Small Businesses

Guide Keeping Your Social Media Accounts Secure

Defense Media Activity

• Protective Measures • Checklist• Social Media Tips

Government

Private Sector

https://www.social-engineer.com

• Social Engineering• Physical Security• Information Security

https://www.securingthehuman.org

• Awareness Posters/Presentations• Newsletter• Security Awareness Guidance• Internet Security for Kids

Newsletter on latest phishing trendshttps://www.knowbe4.com

Non-Profit

http://www.antiphishing.org/

• In association with CyLab at Carnegie Mellon• Education Initiative• Phishing landing page example

• HTTPS Everywhere Add-Onhttps://www.eff.org/https-everywhere

https://www.staysafeonline.org/business-safe-online/

Resources for businesses• Risk Assessment• Threat monitoring strategies• Reporting cyber attacks• Implementing a cybersecurity plan• Protecting customers• Training employees

• Training & Videos• Guides• Newsletters & Tips

Everyone plays a role in corporate security.

Recommended