SlideShare a Scribd company logo
1 of 20
Personal Digital Security
Implications for the home and the office
Sponsored by
Lydia Kostopoulos, PhD
@LKCYBER
June 4, 2015
Personal Digital Security
What it entails.
What it means for you:
• As an individual
• As an employee for your company
What you can do about it
Personal Digital Security
• Protection of your identity,
communications, accounts,
assets and technology
from malicious intruders.
• Protection of personal
tools: SIM cards,
contactless credit cards,
health and digital security
devices, biometric data,
IOTs, etc.
• Read Terms of Service (ToS) and Privacy Policies before agreeing.
• Update and patch software often.
• Don’t share personal information unless absolutely necessary.
• Don’t click on suspicious links and do not open email attachments from people you don’t know.
• Be conscious of meta-data.
• Read Terms of Service (ToS) and Privacy Policies before agreeing.
• Pay attention to the site link at the top and make sure it is a secure connection.
• Avoid being a phishing victim and pay attention to email headers to make sure they are legit.
HOME
Leakage awareness!
Personal Digital Security
• Read Terms of Service (ToS) and Privacy Policies before agreeing.
• Update and patch software often.
• Don’t share personal information unless absolutely necessary.
• Don’t click on suspicious links and do not open email attachments from people you don’t know.
• Be conscious of meta-data.
• Read Terms of Service (ToS) and Privacy Policies before agreeing.
• Pay attention to the site link at the top and make sure it is a secure connection.
• Avoid being a phishing victim and pay attention to email headers to make sure they are legit.
OFFICE
Policies!
Data Loss Prevention (DLP)
Source: COMSEC Consulting: Information Security
What measures have you taken to secure the following?
Security is an evolving process.
Keep an open mind
to learning!
Awareness
is key.
Stress Reduction Kit
Bang
Head
Here
Directions:
1. Place kit on FIRM surface.
2. Follow directions in circle of kit.
3. Repeat step 2 as necessary, or until unconscious.
4. If unconscious, cease stress reduction activity.
“Digital equivalent of locking
the front door to your home and
not leaving your car keys in the
ignition”. – Marc Goodman
Avoid 85% of
common digital
threats.
Government
Cyber Security Evaluation Tool
(self-assessment)
FBI and Private Sector Partnership
Association of persons who represent businesses,
academic institutions, state and local law enforcement
agencies, and others dedicated to sharing information
and intelligence to prevent hostile acts against the U.S.
• Meetings
• Newsletters
• Briefs
https://ics-cert.us-cert.gov/Assessments
https://www.infragard.org
http://www.stopthinkconnect.org/
https://www.fcc.gov/cyberforsmallbiz
• Cyber Security Tips for Small Businesses
Guide
Keeping Your Social Media Accounts Secure
Defense Media Activity
• Protective Measures
• Checklist
• Social Media Tips
Government
Private Sector
https://www.social-engineer.com
• Social Engineering
• Physical Security
• Information Security
https://www.securingthehuman.org
• Awareness Posters/Presentations
• Newsletter
• Security Awareness Guidance
• Internet Security for Kids
Newsletter on latest phishing trendshttps://www.knowbe4.com
Non-Profit
http://www.antiphishing.org/
• In association with CyLab at Carnegie Mellon
• Education Initiative
• Phishing landing page example
• HTTPS Everywhere Add-On
https://www.eff.org/https-everywhere
https://www.staysafeonline.org/business-safe-online/
Resources for businesses
• Risk Assessment
• Threat monitoring strategies
• Reporting cyber attacks
• Implementing a cybersecurity plan
• Protecting customers
• Training employees
• Training & Videos
• Guides
• Newsletters & Tips
Everyone plays a role in corporate security.
OSAC: Personal Digital Security Presentation

More Related Content

What's hot

Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
mlw32785
 

What's hot (20)

Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
 
Cyber warfare
Cyber warfareCyber warfare
Cyber warfare
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Information Assurance And Security - Chapter 1 - Lesson 1
Information Assurance And Security - Chapter 1 - Lesson 1Information Assurance And Security - Chapter 1 - Lesson 1
Information Assurance And Security - Chapter 1 - Lesson 1
 
Introduction to Social engineering | Techniques of Social engineering
Introduction to Social engineering | Techniques of Social engineeringIntroduction to Social engineering | Techniques of Social engineering
Introduction to Social engineering | Techniques of Social engineering
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
Data security
Data securityData security
Data security
 
Aruba 3810M 16SFP+ 2-slot Switch - JL075A Datasheet
Aruba 3810M 16SFP+ 2-slot Switch - JL075A DatasheetAruba 3810M 16SFP+ 2-slot Switch - JL075A Datasheet
Aruba 3810M 16SFP+ 2-slot Switch - JL075A Datasheet
 
COPPA
COPPACOPPA
COPPA
 
Social Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionageSocial Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionage
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation
 
Cyber safety by Lorraine Flores
Cyber safety by Lorraine FloresCyber safety by Lorraine Flores
Cyber safety by Lorraine Flores
 
Discovering Computers: Chapter 01
Discovering Computers: Chapter 01Discovering Computers: Chapter 01
Discovering Computers: Chapter 01
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentation
 
Cyberstalking ppt 02.18.19
Cyberstalking ppt   02.18.19Cyberstalking ppt   02.18.19
Cyberstalking ppt 02.18.19
 
Phishing attack seminar presentation
Phishing attack seminar presentation Phishing attack seminar presentation
Phishing attack seminar presentation
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
Cyber safety and cyber security
Cyber safety and cyber securityCyber safety and cyber security
Cyber safety and cyber security
 

Viewers also liked

Student organization president and vice president training
Student organization president and vice president trainingStudent organization president and vice president training
Student organization president and vice president training
BelmontSELD
 
Pasquale & ulisses gramática da língua portuguesa - nova edição
Pasquale & ulisses   gramática da língua portuguesa - nova ediçãoPasquale & ulisses   gramática da língua portuguesa - nova edição
Pasquale & ulisses gramática da língua portuguesa - nova edição
pardal' silva
 
Ecology of the Mind
Ecology of the MindEcology of the Mind
Ecology of the Mind
paulla86
 
Metric measurement conversions review
Metric measurement conversions reviewMetric measurement conversions review
Metric measurement conversions review
Aubrey14
 

Viewers also liked (16)

Student organization president and vice president training
Student organization president and vice president trainingStudent organization president and vice president training
Student organization president and vice president training
 
กำเนิด
กำเนิดกำเนิด
กำเนิด
 
ฟิสิกส์พื้นฐาน
ฟิสิกส์พื้นฐานฟิสิกส์พื้นฐาน
ฟิสิกส์พื้นฐาน
 
Pasquale & ulisses gramática da língua portuguesa - nova edição
Pasquale & ulisses   gramática da língua portuguesa - nova ediçãoPasquale & ulisses   gramática da língua portuguesa - nova edição
Pasquale & ulisses gramática da língua portuguesa - nova edição
 
O Urbanismo - de Françoise Choay
O Urbanismo - de Françoise ChoayO Urbanismo - de Françoise Choay
O Urbanismo - de Françoise Choay
 
الشروط والضوابط العامة للمشاركة في المؤتمر الطلابي السابع
الشروط والضوابط العامة للمشاركة في المؤتمر الطلابي السابعالشروط والضوابط العامة للمشاركة في المؤتمر الطلابي السابع
الشروط والضوابط العامة للمشاركة في المؤتمر الطلابي السابع
 
A&a v2
A&a v2A&a v2
A&a v2
 
Lecture 9
Lecture 9Lecture 9
Lecture 9
 
สถิติอ้าง
สถิติอ้างสถิติอ้าง
สถิติอ้าง
 
Proactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and ResiliencyProactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and Resiliency
 
Ecology of the Mind
Ecology of the MindEcology of the Mind
Ecology of the Mind
 
Presentation1
Presentation1Presentation1
Presentation1
 
Presentation1
Presentation1Presentation1
Presentation1
 
Metric measurement conversions review
Metric measurement conversions reviewMetric measurement conversions review
Metric measurement conversions review
 
Gym registration - 2014 Apps for Good Entry
Gym registration - 2014 Apps for Good EntryGym registration - 2014 Apps for Good Entry
Gym registration - 2014 Apps for Good Entry
 
สารเคมีในเกษตรกรรมและอุตสาหกรรม
สารเคมีในเกษตรกรรมและอุตสาหกรรมสารเคมีในเกษตรกรรมและอุตสาหกรรม
สารเคมีในเกษตรกรรมและอุตสาหกรรม
 

Similar to OSAC: Personal Digital Security Presentation

Internet Safety & Privacy
Internet Safety & PrivacyInternet Safety & Privacy
Internet Safety & Privacy
Alexine Marier
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
Fred Beck MBA, CPA
 
Roadshow2013 revised 2 - miis
Roadshow2013 revised 2 - miisRoadshow2013 revised 2 - miis
Roadshow2013 revised 2 - miis
mcgilla
 

Similar to OSAC: Personal Digital Security Presentation (20)

Data Privacy
Data PrivacyData Privacy
Data Privacy
 
How Much Do You Trust Email?
How Much Do You Trust Email?How Much Do You Trust Email?
How Much Do You Trust Email?
 
Security Awareness Presentation Fall 2013
Security Awareness Presentation Fall 2013Security Awareness Presentation Fall 2013
Security Awareness Presentation Fall 2013
 
ISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptxISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptx
 
Personal Threat Models
Personal Threat ModelsPersonal Threat Models
Personal Threat Models
 
Internet Safety & Privacy
Internet Safety & PrivacyInternet Safety & Privacy
Internet Safety & Privacy
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
 
Recommending information security measures
Recommending information security measuresRecommending information security measures
Recommending information security measures
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
 
Cybersecurity and data privacy
Cybersecurity and data privacyCybersecurity and data privacy
Cybersecurity and data privacy
 
Roadshow2013 revised 2 - miis
Roadshow2013 revised 2 - miisRoadshow2013 revised 2 - miis
Roadshow2013 revised 2 - miis
 
protecting your digital personal life
protecting your digital personal lifeprotecting your digital personal life
protecting your digital personal life
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity posture
 
Idenity Theft
Idenity TheftIdenity Theft
Idenity Theft
 
Cybersecurity - Webinar Session
Cybersecurity - Webinar SessionCybersecurity - Webinar Session
Cybersecurity - Webinar Session
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptx
 
E commerce
E commerce E commerce
E commerce
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
 

More from Dr. Lydia Kostopoulos

Micro Journaling - Intermediate Cycle Tracker
Micro Journaling - Intermediate Cycle TrackerMicro Journaling - Intermediate Cycle Tracker
Micro Journaling - Intermediate Cycle Tracker
Dr. Lydia Kostopoulos
 

More from Dr. Lydia Kostopoulos (20)

Versatility at the Tip of the Spear: Food Security and the Utility of SOF
Versatility at the  Tip of the Spear:  Food Security and  the Utility of SOFVersatility at the  Tip of the Spear:  Food Security and  the Utility of SOF
Versatility at the Tip of the Spear: Food Security and the Utility of SOF
 
The Corporate Social Responsibility of Artificial Intelligence
The Corporate Social Responsibility  of Artificial IntelligenceThe Corporate Social Responsibility  of Artificial Intelligence
The Corporate Social Responsibility of Artificial Intelligence
 
The Longevity Dividend: What advancements in longevity science mean for indiv...
The Longevity Dividend: What advancements in longevity science mean for indiv...The Longevity Dividend: What advancements in longevity science mean for indiv...
The Longevity Dividend: What advancements in longevity science mean for indiv...
 
Letter from the Frontline in 2050
Letter from the Frontline in 2050Letter from the Frontline in 2050
Letter from the Frontline in 2050
 
Concept: Metaverse Center for Women's Human Performance, Healthy Aging and Lo...
Concept: Metaverse Center for Women's Human Performance, Healthy Aging and Lo...Concept: Metaverse Center for Women's Human Performance, Healthy Aging and Lo...
Concept: Metaverse Center for Women's Human Performance, Healthy Aging and Lo...
 
Imagination Performance: Thinking Beyond GPT
Imagination Performance: Thinking Beyond GPT Imagination Performance: Thinking Beyond GPT
Imagination Performance: Thinking Beyond GPT
 
Decoupling Human Characteristics from Algorithmic Capabilities
Decoupling Human Characteristics from Algorithmic CapabilitiesDecoupling Human Characteristics from Algorithmic Capabilities
Decoupling Human Characteristics from Algorithmic Capabilities
 
Micro Journaling - Intermediate Cycle Tracker
Micro Journaling - Intermediate Cycle TrackerMicro Journaling - Intermediate Cycle Tracker
Micro Journaling - Intermediate Cycle Tracker
 
Decoupling Human Characteristics from Algorithmic Capabilities
Decoupling Human Characteristics from Algorithmic CapabilitiesDecoupling Human Characteristics from Algorithmic Capabilities
Decoupling Human Characteristics from Algorithmic Capabilities
 
Strategic Foresight: Sense-making in an Era of Rapid Change
Strategic Foresight: Sense-making in an Era of Rapid ChangeStrategic Foresight: Sense-making in an Era of Rapid Change
Strategic Foresight: Sense-making in an Era of Rapid Change
 
Technological Surrogacy & Predictive Powers
Technological Surrogacy & Predictive PowersTechnological Surrogacy & Predictive Powers
Technological Surrogacy & Predictive Powers
 
Humans over Hardware: Posturing SOF for the Future
Humans over Hardware:  Posturing SOF for the FutureHumans over Hardware:  Posturing SOF for the Future
Humans over Hardware: Posturing SOF for the Future
 
The Mindset to Thrive in Uncertain, Turbulent & Exponential Times
The Mindset to Thrive in Uncertain, Turbulent & Exponential TimesThe Mindset to Thrive in Uncertain, Turbulent & Exponential Times
The Mindset to Thrive in Uncertain, Turbulent & Exponential Times
 
Leadx: Public-Private Partnership Exercise Handout
Leadx: Public-Private Partnership Exercise HandoutLeadx: Public-Private Partnership Exercise Handout
Leadx: Public-Private Partnership Exercise Handout
 
Due Diligence Considerations for Scientists, Commanders, and Politicians As T...
Due Diligence Considerations for Scientists, Commanders, and Politicians As T...Due Diligence Considerations for Scientists, Commanders, and Politicians As T...
Due Diligence Considerations for Scientists, Commanders, and Politicians As T...
 
Part IV: Workwear Fashion, Human Anatomy, Transparency & Technology
Part IV: Workwear Fashion, Human Anatomy, Transparency & TechnologyPart IV: Workwear Fashion, Human Anatomy, Transparency & Technology
Part IV: Workwear Fashion, Human Anatomy, Transparency & Technology
 
Part III: Workwear Fashion, Human Anatomy, Transparency & Technology
Part III: Workwear Fashion, Human Anatomy, Transparency & TechnologyPart III: Workwear Fashion, Human Anatomy, Transparency & Technology
Part III: Workwear Fashion, Human Anatomy, Transparency & Technology
 
Part II: Workwear Fashion, Human Anatomy, Transparency & Technology
Part II: Workwear Fashion, Human Anatomy, Transparency & TechnologyPart II: Workwear Fashion, Human Anatomy, Transparency & Technology
Part II: Workwear Fashion, Human Anatomy, Transparency & Technology
 
Part I: Workwear Fashion, Human Anatomy, Transparency & Technology
Part I: Workwear Fashion, Human Anatomy, Transparency & TechnologyPart I: Workwear Fashion, Human Anatomy, Transparency & Technology
Part I: Workwear Fashion, Human Anatomy, Transparency & Technology
 
#ArtAboutAI - The First Pieces [Digital Exhibit]
#ArtAboutAI - The First Pieces [Digital Exhibit]#ArtAboutAI - The First Pieces [Digital Exhibit]
#ArtAboutAI - The First Pieces [Digital Exhibit]
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 

OSAC: Personal Digital Security Presentation

  • 1. Personal Digital Security Implications for the home and the office Sponsored by Lydia Kostopoulos, PhD @LKCYBER June 4, 2015
  • 2. Personal Digital Security What it entails. What it means for you: • As an individual • As an employee for your company What you can do about it
  • 3. Personal Digital Security • Protection of your identity, communications, accounts, assets and technology from malicious intruders. • Protection of personal tools: SIM cards, contactless credit cards, health and digital security devices, biometric data, IOTs, etc.
  • 4.
  • 5. • Read Terms of Service (ToS) and Privacy Policies before agreeing. • Update and patch software often. • Don’t share personal information unless absolutely necessary. • Don’t click on suspicious links and do not open email attachments from people you don’t know. • Be conscious of meta-data. • Read Terms of Service (ToS) and Privacy Policies before agreeing. • Pay attention to the site link at the top and make sure it is a secure connection. • Avoid being a phishing victim and pay attention to email headers to make sure they are legit. HOME Leakage awareness!
  • 7. • Read Terms of Service (ToS) and Privacy Policies before agreeing. • Update and patch software often. • Don’t share personal information unless absolutely necessary. • Don’t click on suspicious links and do not open email attachments from people you don’t know. • Be conscious of meta-data. • Read Terms of Service (ToS) and Privacy Policies before agreeing. • Pay attention to the site link at the top and make sure it is a secure connection. • Avoid being a phishing victim and pay attention to email headers to make sure they are legit. OFFICE Policies!
  • 9. Source: COMSEC Consulting: Information Security
  • 10. What measures have you taken to secure the following?
  • 11.
  • 12.
  • 13. Security is an evolving process. Keep an open mind to learning! Awareness is key. Stress Reduction Kit Bang Head Here Directions: 1. Place kit on FIRM surface. 2. Follow directions in circle of kit. 3. Repeat step 2 as necessary, or until unconscious. 4. If unconscious, cease stress reduction activity.
  • 14. “Digital equivalent of locking the front door to your home and not leaving your car keys in the ignition”. – Marc Goodman Avoid 85% of common digital threats.
  • 15. Government Cyber Security Evaluation Tool (self-assessment) FBI and Private Sector Partnership Association of persons who represent businesses, academic institutions, state and local law enforcement agencies, and others dedicated to sharing information and intelligence to prevent hostile acts against the U.S. • Meetings • Newsletters • Briefs https://ics-cert.us-cert.gov/Assessments https://www.infragard.org http://www.stopthinkconnect.org/ https://www.fcc.gov/cyberforsmallbiz • Cyber Security Tips for Small Businesses Guide Keeping Your Social Media Accounts Secure Defense Media Activity • Protective Measures • Checklist • Social Media Tips
  • 17. Private Sector https://www.social-engineer.com • Social Engineering • Physical Security • Information Security https://www.securingthehuman.org • Awareness Posters/Presentations • Newsletter • Security Awareness Guidance • Internet Security for Kids Newsletter on latest phishing trendshttps://www.knowbe4.com
  • 18. Non-Profit http://www.antiphishing.org/ • In association with CyLab at Carnegie Mellon • Education Initiative • Phishing landing page example • HTTPS Everywhere Add-On https://www.eff.org/https-everywhere https://www.staysafeonline.org/business-safe-online/ Resources for businesses • Risk Assessment • Threat monitoring strategies • Reporting cyber attacks • Implementing a cybersecurity plan • Protecting customers • Training employees • Training & Videos • Guides • Newsletters & Tips
  • 19. Everyone plays a role in corporate security.

Editor's Notes

  1. Image source: http://blockandnation.com/office/cms/wp-content/uploads/presentation.png
  2. Image source: https://ec.europa.eu/digital-agenda/sites/digital-agenda/files/cybersecurity.jpg
  3. Image source: http://deloitteblog.co.za.www102.cpt1.host-h.net/wp-content/uploads/2012/11/Cyber-Crime-Security.png http://utc.fsu.edu/images/memlog.png http://icons.iconarchive.com/icons/icons-land/vista-people/256/Office-Customer-Female-Dark-icon.png http://www2.psd100.com/ppp/2013/11/2801/Women-business-users-1128025128.png http://i.kinja-img.com/gawker-media/image/upload/s--bscpo9YZ--/c_fit,fl_progressive,q_80,w_320/187xkwy3ipvo4png.png https://securitycentric.com.au/images/articles/byod.png http://www.thearcnlc.org/images/WAI/ss-card.png http://www.trinitychristian.info/sites/default/files/calendar_icon.png http://shoppingdarbar.com/images/credit-card.png https://e2e.ti.com/cfs-file/__key/communityserver-blogs-components-weblogfiles/00-00-00-04-89/2248.Remote-home-control-shutterstock_5F00_143542750.jpg https://cdn1.iconfinder.com/data/icons/credit-card-icons/512/cards.png http://jerryching.no-ip.org/Software/Photo/Icon/Windows%207%20Blue%20Icons%20&%20Cursors/PNG/Folders/Documents.png http://icons.iconarchive.com/icons/visualpharm/finance/256/credit-card-icon.png http://images.sodahead.com/polls/002325777/5831125244_game_consoles_h_xlarge.png http://icons.iconarchive.com/icons/itzikgur/my-seven/512/Pictures-Canon-icon.png http://www.outsideline.co.uk/blog/wp-content/uploads/2012/10/newsletterOSL_13.101258.jpg
  4. Image source: http://i.dailymail.co.uk/i/pix/2013/03/29/article-2300976-18FD128D000005DC-500_634x631.jpg http://buttehumane.org/page/_files/dog_cat.png https://blogs.sans.org/securingthehuman/files/2011/06/STH-BinaryFamily1.png http://gallery.yopriceville.com/var/albums/Free-Clipart-Pictures/Happy-Birthday-PNG/Happy_BirthdayCake_PNG_Clipart_Picture.png?m=1421925579
  5. Image source: http://www.computerexpressohio.com/images/Computer_Security.png http://atoztolet.com/images/privacypolicy.png http://www.computing.co.uk/IMG/830/208830/362-ca-03-phishing-emails-illo.jpg https://www.hallaminternet.com/assets/https.jpg https://cdn.tutsplus.com/psd/uploads/legacy/psdtutsarticles/roundup_2009_12_1/5.jpg
  6. Image source: http://www.proximex.com/sites/default/files/header_sol_corpsecurity.png http://cdn2.hubspot.net/hub/30658/file-25638968-jpg/images/corporate_security-resized-600.jpg https://newpagedigital.files.wordpress.com/2013/04/pdf-jpg-word-icons2.jpg http://www.verypdf.com/wordpress/wp-content/uploads/2014/04/image_thumb21.png
  7. Image source: http://www.computerexpressohio.com/images/Computer_Security.png http://atoztolet.com/images/privacypolicy.png http://www.computing.co.uk/IMG/830/208830/362-ca-03-phishing-emails-illo.jpg https://www.hallaminternet.com/assets/https.jpg http://policytool.net/images/privacy-policy-graphic.jpg
  8. Image source: http://cdn.socialh.com/wp-content/uploads/2013/03/data-leakage.jpg
  9. Source: http://blog.comsecglobal.com/2011/02/evolution-of-data-loss-prevention.html Image source: Image source: http://i.i.cbsi.com/cnwk.1d/i/tim2/2013/08/30/TrashIconX.png http://www.wpclipart.com/office/trash/paper_shredder.png http://totaltechnology.ae/totaltechnology/mob-site-total/services/icons_services/socialmedia.png https://billmullins.files.wordpress.com/2010/08/image11.png http://now.symassets.com/now/en/GB_SITE/pu/images/Non-Product/Misc/img_cyber_criminal_283x229.png
  10. Image source: http://corporateserver.cortado.com/portals/24/images/ProductTour/MDM/mc_controlpanel_circles.png
  11. Image source: http://res.cloudinary.com/hacksurfer/image/upload/v1399329154/wd9nwlfy9nekmgrtavkt.png
  12. Image source: http://3.bp.blogspot.com/-5-JrXm4uhTU/T4cd_4M14CI/AAAAAAAAAh0/3uIyohJ8Qns/s1600/9240672-a-metal-toggle-switch-with-plate-reading-open-mind-and-closed-mind-flipped-into-the-open-minded-posi.jpg https://badgeville.com/sites/default/files/styles/612x336_blog/public/blog/plants.jpg?itok=hfY1jId8 http://previewcf.turbosquid.com/Preview/2014/05/25__23_00_00/skelton_key2.pnga6f30a1e-9692-4e91-8ca9-2ad6e7da364eLarger.jpg
  13. http://www.futurecrimesbook.com/protect-yourself-the-update-protocol http://www.futurecrimesbook.com/wp-content/uploads/2015/02/futurecrimes_bookshot2.png
  14. DHS – CSET https://ics-cert.us-cert.gov/Assessments Infragard - https://www.infragard.org/ http://affiliate-101.com/wp-content/uploads/2015/04/free-resources-to-learn-affiliate-marketing.jpg DOD - http://www.defense.gov/documents/WEB_Guide_to_Keeping_Your_Social_Media_Accounts_Secure_2015.pdf Stop Think Connect: http://www.stopthinkconnect.org/ FCC https://www.fcc.gov/cyberforsmallbiz SANS – Secure the Human http://www.securingthehuman.org/ Social-Engineer.com Podcasts https://www.social-engineer.com/ http://www.social-engineer.org/category/podcast/ KnowBe4 - http://www.knowbe4.com http://www.knowbe4.com/cyberheist-news/ Image source: http://upload.wikimedia.org/wikipedia/commons/thumb/8/8a/Seal_of_the_United_States_Department_of_Homeland_Security.svg/1027px-Seal_of_the_United_States_Department_of_Homeland_Security.svg.png http://www.fbi.gov/about-us/history/seal-motto/image/fbi_seal.jpg https://pbs.twimg.com/profile_images/148495155/infragard_seal-full.jpg https://ics-cert.us-cert.gov/sites/default/files/cset_banner_noVersion.png https://www.offensive-security.com/wp-content/uploads/2009/09/se400.jpg http://fhmin.org/wp-content/uploads/sites/2/2013/11/podcast.jpg http://web.usca.edu/dotAsset/e60c99ae-fd76-4eb3-8315-66cef7affa31.gif http://www.plus91.in/wp-content/themes/twentytwelve/images/news.png http://thedailyjournalist.com/wp-content/uploads/2012/04/Infragard-1.jpg http://www.eci.com/blog/images/3-6-12%20tabletop%20meeting.jpg http://readysouthflorida.org/wp-content/uploads/2013/10/stop-think-connect.gif
  15. Poster From: http://www.stopthinkconnect.org/resources/f
  16. DHS – CSET https://ics-cert.us-cert.gov/Assessments Infragard - https://www.infragard.org/ http://affiliate-101.com/wp-content/uploads/2015/04/free-resources-to-learn-affiliate-marketing.jpg SANS – Secure the Human http://www.securingthehuman.org/ Social-Engineer.com Podcasts https://www.social-engineer.com/ http://www.social-engineer.org/category/podcast/ KnowBe4 - http://www.knowbe4.com http://www.knowbe4.com/cyberheist-news/ Image source: http://upload.wikimedia.org/wikipedia/commons/thumb/8/8a/Seal_of_the_United_States_Department_of_Homeland_Security.svg/1027px-Seal_of_the_United_States_Department_of_Homeland_Security.svg.png http://www.fbi.gov/about-us/history/seal-motto/image/fbi_seal.jpg https://pbs.twimg.com/profile_images/148495155/infragard_seal-full.jpg https://ics-cert.us-cert.gov/sites/default/files/cset_banner_noVersion.png https://www.offensive-security.com/wp-content/uploads/2009/09/se400.jpg http://fhmin.org/wp-content/uploads/sites/2/2013/11/podcast.jpg http://web.usca.edu/dotAsset/e60c99ae-fd76-4eb3-8315-66cef7affa31.gif http://webbiquity.com/wp-content/uploads/2011/02/Email-Icon.jpg
  17. Stay Safe Online https://www.staysafeonline.org/business-safe-online/ Center for Internet Security https://msisac.cisecurity.org/ https://msisac.cisecurity.org/resources/videos/free-training.cfm Anti-Phishing Working Group http://www.antiphishing.org/ http://education.apwg.org/safety-messaging-convention/ https://www.eff.org/https-everywhere Image source: http://docs.apwg.org/images/logo.gif http://siliconangle.com/files/2011/06/electronicfrontierfoundation.png http://www.paritynews.com/wp-content/uploads/2013/08/https-everywhere.jpg
  18. Image source: http://eccitsolutions.com/wp-content/uploads/2013/01/computer-network-security.png
  19. https://blog.cyveillance.com/wp-content/uploads/2011/02/batman-robin-fourwhere-agent-x-comic.jpg http://3.bp.blogspot.com/-93eMF7KJDVE/UtgH01MGiRI/AAAAAAAAA_o/6quKMAvTzAs/s1600/140116-questions.jpg