61
YOUR PRACTICE IS A TARGET FOR CYBERCRIMINALS THE FACT IS WE ALL ARE

YOUR PRACTICE IS A TARGET FOR CYBERCRIMINALS … · •For forced follows - This can involve your account being hacked as part of a wider plan to hack accounts and get them to follow

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: YOUR PRACTICE IS A TARGET FOR CYBERCRIMINALS … · •For forced follows - This can involve your account being hacked as part of a wider plan to hack accounts and get them to follow

YOUR PRACTICE IS A TARGET FOR CYBERCRIMINALS

THE FACT IS WE ALL ARE

Page 2: YOUR PRACTICE IS A TARGET FOR CYBERCRIMINALS … · •For forced follows - This can involve your account being hacked as part of a wider plan to hack accounts and get them to follow

YOUR PRESENTER

• Peter Verlezza,

Managing Partner, SMB Networks, LLC

• Best Selling Author

• Speaker

• Movie Maker

• Podcaster

• Infraguard, FBI/Private Sector

• Board member CMGMA

Page 3: YOUR PRACTICE IS A TARGET FOR CYBERCRIMINALS … · •For forced follows - This can involve your account being hacked as part of a wider plan to hack accounts and get them to follow

• Number 1 Security Threat to your Medical Practice

• Ways to Protect Against Ransomware

• Simple Practices to Minimize Your Risk Online

• Why “free mail” Comes with a Big Cost

• What is the Dark Web?

WHAT WE WILL COVER TODAY

Page 4: YOUR PRACTICE IS A TARGET FOR CYBERCRIMINALS … · •For forced follows - This can involve your account being hacked as part of a wider plan to hack accounts and get them to follow

WHEN YOU ARE AFFECTED BY A CYBERCRIME THROUGH NO FAULT

OF YOUR OWN WILL YOUR PROVIDERS, EMPLOYEES, PATIENTS, FAMILIES, PEERS CALL YOU STUPID,

IRRESPONSIBLE OR BOTH?

Page 5: YOUR PRACTICE IS A TARGET FOR CYBERCRIMINALS … · •For forced follows - This can involve your account being hacked as part of a wider plan to hack accounts and get them to follow

• Three primary issues/risks

• Legal/Compliance

• Operational

• Reputational

CYBER CRIME ISN’T ABOUT HIPAA

Page 6: YOUR PRACTICE IS A TARGET FOR CYBERCRIMINALS … · •For forced follows - This can involve your account being hacked as part of a wider plan to hack accounts and get them to follow

WHY CYBER CRIME

Cybercrime is a 2 trillion dollar a year industry.

If you had just .1% of a slice of that pie, you’d make a cool $2 mil/year

Better question: Why not?

Page 7: YOUR PRACTICE IS A TARGET FOR CYBERCRIMINALS … · •For forced follows - This can involve your account being hacked as part of a wider plan to hack accounts and get them to follow

CYBERCRIME BUSINESS

Page 8: YOUR PRACTICE IS A TARGET FOR CYBERCRIMINALS … · •For forced follows - This can involve your account being hacked as part of a wider plan to hack accounts and get them to follow

THE EVOLUTION OF CRIME

Page 9: YOUR PRACTICE IS A TARGET FOR CYBERCRIMINALS … · •For forced follows - This can involve your account being hacked as part of a wider plan to hack accounts and get them to follow

DUH!

Page 10: YOUR PRACTICE IS A TARGET FOR CYBERCRIMINALS … · •For forced follows - This can involve your account being hacked as part of a wider plan to hack accounts and get them to follow
Page 11: YOUR PRACTICE IS A TARGET FOR CYBERCRIMINALS … · •For forced follows - This can involve your account being hacked as part of a wider plan to hack accounts and get them to follow

1. Yahoo

Date: 2013-14

Impact: 3 billion user accounts

Details: In September 2016, the once dominant Internet giant, while in negotiations to sell itself to Verizon, announced it had been the victim of the biggest data breach in history, likely by “a state-sponsored actor,” in 2014. The attack compromised the real names, email addresses, dates of birth and telephone numbers of 500 million users.

THE 5 BIGGEST DATA BREACHES OF THE 21ST CENTURY

Page 12: YOUR PRACTICE IS A TARGET FOR CYBERCRIMINALS … · •For forced follows - This can involve your account being hacked as part of a wider plan to hack accounts and get them to follow

2. Adult Friend Finder

Date: October 2016

Impact: More than 412.2 million accounts

Details: The Friend Finder Network, which included casual hookup and adult content websites like Adult Friend Finder, Penthouse.com, Cams.com, iCams.com and Stripshow.com, was breached sometime in mid-October 2016. Hackers collected 20 years of data on six databases that included names, email addresses and passwords.

Page 13: YOUR PRACTICE IS A TARGET FOR CYBERCRIMINALS … · •For forced follows - This can involve your account being hacked as part of a wider plan to hack accounts and get them to follow

3. eBay

Date: May 2014

Impact: 145 million users compromised

Details: The online auction giant reported a cyberattack in May 2014 that it said exposed names, addresses, dates of birth and encrypted passwords of all of its 145 million users. The company said hackers got into the company network using the credentials of three corporate employees, and had complete inside access for 229 days, during which time they were able to make their way to the user database.

Page 14: YOUR PRACTICE IS A TARGET FOR CYBERCRIMINALS … · •For forced follows - This can involve your account being hacked as part of a wider plan to hack accounts and get them to follow

4. Equifax

Date: July 29 2017

Impact: Personal information (including Social Security Numbers, birth dates, addresses, and in some cases drivers' license numbers) of 143 million consumers; 209,000 consumers also had their credit card data exposed.

Details: Equifax, one of the largest credit bureaus in the U.S., said on Sept. 7, 2017 that an application vulnerability on one of their websites led to a data breach that exposed about 143 million consumers. The breach was discovered on July 29, but the company says that it likely started in mid-May.

Page 15: YOUR PRACTICE IS A TARGET FOR CYBERCRIMINALS … · •For forced follows - This can involve your account being hacked as part of a wider plan to hack accounts and get them to follow

5. Heartland Payment Systems

Date: March 2008

Impact: 134 million credit cards exposed through SQL injection to install spyware on Heartland's data systems.

Details: At the time of the breach, Heartland was processing 100 million payment card transactions per month for 175,000 merchants – most small- to mid-sized retailers. It wasn’t discovered until January 2009, when Visa and MasterCard notified Heartland of suspicious transactions from accounts it had processed.

Page 16: YOUR PRACTICE IS A TARGET FOR CYBERCRIMINALS … · •For forced follows - This can involve your account being hacked as part of a wider plan to hack accounts and get them to follow

• Accepting without reading

• Downloading any infected software

• Inserting or connecting an infected disk, disc, or drive

• Visiting unknown links

• Not running the latest updates

• Pirating software, music, or movies

• No antivirus spyware

HOW DOES A COMPUTER GET INFECTED WITH A VIRUS OR SPYWARE?

Page 17: YOUR PRACTICE IS A TARGET FOR CYBERCRIMINALS … · •For forced follows - This can involve your account being hacked as part of a wider plan to hack accounts and get them to follow

E-mail As a general rule, do not open e-mail you were not expecting to receive. Computers can become infected when users open e-mail attachments that contain malicious code. Even if the message is from a co-worker, friend, or family member, always use caution before opening a link or downloading an attachment.

THE NUMBER 1 SECURITY THREAT

Page 18: YOUR PRACTICE IS A TARGET FOR CYBERCRIMINALS … · •For forced follows - This can involve your account being hacked as part of a wider plan to hack accounts and get them to follow

• In short, they provide email services for free so that they can learn more about people and show more specifically targeted ads on their other services.

WHY IS EMAIL FREE?

Page 19: YOUR PRACTICE IS A TARGET FOR CYBERCRIMINALS … · •For forced follows - This can involve your account being hacked as part of a wider plan to hack accounts and get them to follow

the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as

passwords and credit card numbers.

PHISHING

Page 20: YOUR PRACTICE IS A TARGET FOR CYBERCRIMINALS … · •For forced follows - This can involve your account being hacked as part of a wider plan to hack accounts and get them to follow

139 MILLION SUBSCRIBERS

Page 21: YOUR PRACTICE IS A TARGET FOR CYBERCRIMINALS … · •For forced follows - This can involve your account being hacked as part of a wider plan to hack accounts and get them to follow
Page 22: YOUR PRACTICE IS A TARGET FOR CYBERCRIMINALS … · •For forced follows - This can involve your account being hacked as part of a wider plan to hack accounts and get them to follow

28 MILLION PACKAGES

A YEAR

Page 23: YOUR PRACTICE IS A TARGET FOR CYBERCRIMINALS … · •For forced follows - This can involve your account being hacked as part of a wider plan to hack accounts and get them to follow

67 MILLION CONSUMERS AND SMALL

BUSINESS

Page 24: YOUR PRACTICE IS A TARGET FOR CYBERCRIMINALS … · •For forced follows - This can involve your account being hacked as part of a wider plan to hack accounts and get them to follow

277 MILLION ACCOUNTS

WORLDWIDE

Page 25: YOUR PRACTICE IS A TARGET FOR CYBERCRIMINALS … · •For forced follows - This can involve your account being hacked as part of a wider plan to hack accounts and get them to follow

122 MILLION USERS

WORLDWIDE

Page 26: YOUR PRACTICE IS A TARGET FOR CYBERCRIMINALS … · •For forced follows - This can involve your account being hacked as part of a wider plan to hack accounts and get them to follow
Page 27: YOUR PRACTICE IS A TARGET FOR CYBERCRIMINALS … · •For forced follows - This can involve your account being hacked as part of a wider plan to hack accounts and get them to follow

70 MILLIONS CUSTOMERS

GLOBALLY

Page 28: YOUR PRACTICE IS A TARGET FOR CYBERCRIMINALS … · •For forced follows - This can involve your account being hacked as part of a wider plan to hack accounts and get them to follow
Page 29: YOUR PRACTICE IS A TARGET FOR CYBERCRIMINALS … · •For forced follows - This can involve your account being hacked as part of a wider plan to hack accounts and get them to follow

the fraudulent practice of sending emails ostensibly from a known or trusted sender in order to induce

targeted individuals to reveal confidential information.

SPEAR PHISHINGPHISHING BASED ON RESEARCH

Page 30: YOUR PRACTICE IS A TARGET FOR CYBERCRIMINALS … · •For forced follows - This can involve your account being hacked as part of a wider plan to hack accounts and get them to follow
Page 31: YOUR PRACTICE IS A TARGET FOR CYBERCRIMINALS … · •For forced follows - This can involve your account being hacked as part of a wider plan to hack accounts and get them to follow
Page 32: YOUR PRACTICE IS A TARGET FOR CYBERCRIMINALS … · •For forced follows - This can involve your account being hacked as part of a wider plan to hack accounts and get them to follow
Page 33: YOUR PRACTICE IS A TARGET FOR CYBERCRIMINALS … · •For forced follows - This can involve your account being hacked as part of a wider plan to hack accounts and get them to follow
Page 34: YOUR PRACTICE IS A TARGET FOR CYBERCRIMINALS … · •For forced follows - This can involve your account being hacked as part of a wider plan to hack accounts and get them to follow
Page 35: YOUR PRACTICE IS A TARGET FOR CYBERCRIMINALS … · •For forced follows - This can involve your account being hacked as part of a wider plan to hack accounts and get them to follow

RANSOMWARERANSOMWARE IS A TYPE OF MALICIOUS

SOFTWARE, OR MALWARE, DESIGNED TO DENY ACCESS TO A COMPUTER SYSTEM OR DATA UNTIL

A RANSOM IS PAID. RANSOMWARE TYPICALLY SPREADS THROUGH PHISHING EMAILS OR BY

UNKNOWINGLY VISITING AN INFECTED WEBSITE.

Page 36: YOUR PRACTICE IS A TARGET FOR CYBERCRIMINALS … · •For forced follows - This can involve your account being hacked as part of a wider plan to hack accounts and get them to follow

• On May 7th 2019, hackers seized parts of the computer systems that run Baltimore’s government. It could take months of work to get the disrupted technology back online.

• Systems Affected

• Voice Mail

• Email

• Parking Fines Database

• Water Bill Payment System

• Property Tax Payment System

• Vehicle Citation System

• More Than 1500 Homes Sales Have Been Delayed

CITY OF BALTIMORE

Page 37: YOUR PRACTICE IS A TARGET FOR CYBERCRIMINALS … · •For forced follows - This can involve your account being hacked as part of a wider plan to hack accounts and get them to follow

• The attackers are demanding 13 Bitcoins

• On the day of the attack, the ransom would have cost about $75,000. Today the attack will cost about $102,000.

• The city has not described how the attack was executed, but experts don’t believe that hackers sought the city out. It is believed it was purely an opportunistic attack.

CITY OF BALTIMORE

Page 38: YOUR PRACTICE IS A TARGET FOR CYBERCRIMINALS … · •For forced follows - This can involve your account being hacked as part of a wider plan to hack accounts and get them to follow
Page 39: YOUR PRACTICE IS A TARGET FOR CYBERCRIMINALS … · •For forced follows - This can involve your account being hacked as part of a wider plan to hack accounts and get them to follow
Page 40: YOUR PRACTICE IS A TARGET FOR CYBERCRIMINALS … · •For forced follows - This can involve your account being hacked as part of a wider plan to hack accounts and get them to follow
Page 41: YOUR PRACTICE IS A TARGET FOR CYBERCRIMINALS … · •For forced follows - This can involve your account being hacked as part of a wider plan to hack accounts and get them to follow

POPULAR SITES

Page 42: YOUR PRACTICE IS A TARGET FOR CYBERCRIMINALS … · •For forced follows - This can involve your account being hacked as part of a wider plan to hack accounts and get them to follow

• It can be estimated that 1.2 million accounts are being compromised on a daily basis.

• Social Media hacks can happen to everyone for several purposes:

• Just For fun - Not much harm can happen besides a prank that can be embarrassing.

• For forced shares - These types of hacks can be more harmful than you think.

• For forced follows - This can involve your account being hacked as part of a wider plan to hack accounts and get them to follow a specific account.

• For information - This can be your password itself so that they can steal it and use it to try and sign into accounts you have with banks and online retailers.

POPULAR SITES HACKING STATISTICS

Page 43: YOUR PRACTICE IS A TARGET FOR CYBERCRIMINALS … · •For forced follows - This can involve your account being hacked as part of a wider plan to hack accounts and get them to follow

WHY GET INTO YOUR ACCOUNT?

1. Name

2. Address

3. Phone

4. DOB

5. Education (College/High School)

6. Mother’s Maiden Name?

7. Mothers fathers name

8. Friends names

9. Children’s names

10. Children's school

11. Children's DOB

12. Pets name

13. Browsing habits (websites, services, hobbies,

likes, etc…

14. And on, and on and on…)

Page 44: YOUR PRACTICE IS A TARGET FOR CYBERCRIMINALS … · •For forced follows - This can involve your account being hacked as part of a wider plan to hack accounts and get them to follow

• Social networking services from Twitter and Foursquare to Yelp and Buzz encourage users to log in and share their location.

• Girls Around Me –Girls Around Me allowed you to identify girls who have checked into venues near your location, based on publicly available data from Facebook and Foursquare.

• Please Rob Me – ‘Please Rob Me’ aggregates and streams location check-ins into a list of ‘all those empty homes out there,’ and describes the recently-shared locations as ‘new opportunities.’

• Scene Tap – Cameras In Bars

• Facial recognition, m/f/a/counting

SOCIAL APPS AND DATA AGGREGATION

Page 45: YOUR PRACTICE IS A TARGET FOR CYBERCRIMINALS … · •For forced follows - This can involve your account being hacked as part of a wider plan to hack accounts and get them to follow

• The deep web, invisible web, or hidden web are parts of the World Wide Web whose contents are not indexed by standard search engines for any reason.

THE DEEP WEB

Page 46: YOUR PRACTICE IS A TARGET FOR CYBERCRIMINALS … · •For forced follows - This can involve your account being hacked as part of a wider plan to hack accounts and get them to follow

Organic weed from the Netherlands.

Weapons can be purchased online.

Journalists in heavily censored countries use the deep web to communicate and exchange information.

Fake identification.

Human/child trafficking

There’s no cash or check exchanged over the deep web. To exchange goods, you need to use crypto currency. BitCoin most popular.

THINGS YOU DIDN’T KNOW ABOUT THE DEEP WEB

Page 47: YOUR PRACTICE IS A TARGET FOR CYBERCRIMINALS … · •For forced follows - This can involve your account being hacked as part of a wider plan to hack accounts and get them to follow

Bitcoin is a cryptocurrency and a digital payment system. It is the most popular and largest block chain network. There are currently over 2000 cryptocurrency markets. The system is peer-to-peer, and transactions take place between users directly, without an intermediary.

WHAT IS BITCOIN

Page 48: YOUR PRACTICE IS A TARGET FOR CYBERCRIMINALS … · •For forced follows - This can involve your account being hacked as part of a wider plan to hack accounts and get them to follow

DIGITAL UNDERGROUND DATA BAZAAR

• Credit card details - $2-$90 per record

• iTunes accounts - $8

• Fedex.com, Continental.com and United.com accounts - $6

• For just $4 you can buy hacked credentials at registrar, hosting, or wireless providers like GoDaddy.com, att.com, Sprint.com, and verizonwireless.com

• Active accounts on Facebook or Twitter - $2.50

• Physical credit cards - $190 per card

• EMR Record - $50

• Also sell services for the design and publishing of fake online stores and Crimeware as a Service (CaaS)

Page 49: YOUR PRACTICE IS A TARGET FOR CYBERCRIMINALS … · •For forced follows - This can involve your account being hacked as part of a wider plan to hack accounts and get them to follow

THAT MEANS…

If criminals are going to just keep getting smarter, YOU have to

keep getting smarter.

Page 50: YOUR PRACTICE IS A TARGET FOR CYBERCRIMINALS … · •For forced follows - This can involve your account being hacked as part of a wider plan to hack accounts and get them to follow

COMMON RATIONALES

• There’s nothing a hacker would want on my PC

• I don’t store sensitive information on my PC

• I only use my computer for checking email

• BTW, why is email free from Google, Yahoo, etc?

• In short, they provide email services for free so that they can learn more about people and show more specifically targeted ads on their other services.

Page 51: YOUR PRACTICE IS A TARGET FOR CYBERCRIMINALS … · •For forced follows - This can involve your account being hacked as part of a wider plan to hack accounts and get them to follow

HOW VALUABLE IS A HACKED COMPUTER?

Email Attacks

•Webmail Spam

•Stranded Abroad

•Harvesting Email Contacts

•Harvesting Associated Accounts

•Access to Corporate Email

Web Server

•Phishing Site

•Malware Download Site

•Warez/Piracy Server

•Child Porn Server

•Spam Site

Virtual Goods

•Online Gaming Characters

•Online Gaming Goods/Currency

•PC Game License Keys

•OS License Keys

Reputation Hijacking

•Facebook

•Twitter

•LinkedIn

•Google+

Bot Activity

•Spam Zombie

•DDoS Extortion Zombie

•Click Fraud Zombie

•Anonymization Proxy

•CAPTCHA Solving Zombie

Account Credentials

•eBay/PayPal Fake Auctions

•Online Gaming Credentials

•Website FTP Credentials

•Skype/VoIP Credentials

•Client Side Encryption Certifications

Financial Credentials

•Bank Account Data

•Credit Card Data

•Stock Trading Account

•Mutual Fund/401K Account

I GIVE

UP!

Page 52: YOUR PRACTICE IS A TARGET FOR CYBERCRIMINALS … · •For forced follows - This can involve your account being hacked as part of a wider plan to hack accounts and get them to follow

I PAY FOR ANTIVIRUS. WHY DO I GET INFECTED?

• 2 million unique pieces of unique pieces of

malware identified monthly (McAfee)

• Over 250,000 new exploits discovered every

single day (Sophos)

• Think about the R&D to combat that!

Page 53: YOUR PRACTICE IS A TARGET FOR CYBERCRIMINALS … · •For forced follows - This can involve your account being hacked as part of a wider plan to hack accounts and get them to follow

HELPFUL TIP #1:

• Use Antivirus

• Plenty of free AV around

• Is there a difference between paid and free

Page 54: YOUR PRACTICE IS A TARGET FOR CYBERCRIMINALS … · •For forced follows - This can involve your account being hacked as part of a wider plan to hack accounts and get them to follow

HELPFUL TIP #2:

• Backup your Data

• Check/Test your data backups at a MINIMUM Monthly

• Assure all critical data is saved in the backed up location

• Ransomware

Page 55: YOUR PRACTICE IS A TARGET FOR CYBERCRIMINALS … · •For forced follows - This can involve your account being hacked as part of a wider plan to hack accounts and get them to follow

GETTING TO ‘STRONG PASSWORD’

• DON’T SHARE PASSWORDS

• Change Passwords at least once a year. Shoot for every 60 days if possible

• No Passwords on POST-IT Notes!

• Use a phrase or a long password with numbers and characters.

• Think: Length, Complexity, Variation, Variety

Page 56: YOUR PRACTICE IS A TARGET FOR CYBERCRIMINALS … · •For forced follows - This can involve your account being hacked as part of a wider plan to hack accounts and get them to follow

• Strong Passwords

• Try a phrase that you will remember

• My dog Spot is 5 years old! MdSi5yo!

• Abbreviate the website name to make it unique

• Amazon would be AMMdSi5yo!

• Pay Pal would be PPMdSi5yo!

HELPFUL TIP #3:

Page 57: YOUR PRACTICE IS A TARGET FOR CYBERCRIMINALS … · •For forced follows - This can involve your account being hacked as part of a wider plan to hack accounts and get them to follow

• Enable Multi Factor Authentication where you can

• User names and passwords are something you know

• MFA adds something you have or have access to

HELPFUL TIP #4:

Page 58: YOUR PRACTICE IS A TARGET FOR CYBERCRIMINALS … · •For forced follows - This can involve your account being hacked as part of a wider plan to hack accounts and get them to follow

HELPFUL TIP #5:SECURE YOUR DEVICES

• Install current antivirus software (and keep it current!)

• Enable User Account Control (UAC)

• User Account Control (UAC) can prevent unauthorized changes to your computer

• Do updates, manually

Page 59: YOUR PRACTICE IS A TARGET FOR CYBERCRIMINALS … · •For forced follows - This can involve your account being hacked as part of a wider plan to hack accounts and get them to follow

• Microsoft will be ending support for Windows 7 and Server 2008 on January 14, 2020. This means no more security patching and no

more support from Microsoft. Windows 7 will go the way of Windows XP.

WINDOWS 7/SERVER 2008

Page 61: YOUR PRACTICE IS A TARGET FOR CYBERCRIMINALS … · •For forced follows - This can involve your account being hacked as part of a wider plan to hack accounts and get them to follow

[email protected]

203.815.1685

QUESTIONS