How Secure Are Your On-Line Payments? Brad Rand V.P. Information Technology Infrastructure Manager Information Security Officer.

Slides:



Advertisements
Similar presentations
Keep Your PC Safe (Windows 7, Vista or XP) Nora Lucke 02/05/2012 Documents - security.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Grass Valley Learning Center Surf the Net Safely Roger Thornburn.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
7 Effective Habits when using the Internet Philip O’Kane 1.
Facebook Security and Privacy Issues Brian Allen Network Security Analyst Washington University December 2, 2010 Alumni House.
NCS welcome all participants on behalf of Quick Heal Anti Virus and Fortinet Firewall solution.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
The Most Dangerous Places on The Web (according to PC World)
Don’t Lose Your Identity – Protect Yourself from Spyware Dan Frommer Sherry Minton.
LittleOrange Internet Security an Endpoint Security Appliance.
We are partners in learning.. Note: Office 365 works best in Internet Explorer V 9 or above. Some features do not work in PWCS’s Chrome Browser or in.
Sensitive Data Accessibility Financial Management College of Education Michigan State University.
FIRST COURSE Computer Concepts Internet and Microsoft Office Get to Know Your Computer.
Microsoft Office 2013 ®® Appendix A Introduction to Cloud Computing.
New Data Regulation Law 201 CMR TJX Video.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Working with Applications Lesson 7. Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application.
eScan Total Security Suite with Cloud Security
P6 - CONFIGURE THE SOFTWARE. CONFIGURE SOFTWARE Most software can be configured to suit an individual user, for example by changing the appearance of.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Staying Safe Online Keep your Information Secure.
Web Browser Security Prepared By Mohammed EL-Batta Mohammed Soubih Supervised By Eng. Eman alajrami Explain Date 10. may University of Palestine.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
On-Line Banking Security Bradford Rand Vice President INFOSEC Officer.
TRUSTPORT PRODUCT PORTFOLIO Marcela Parolkova Sales Director.
Protecting Your Information Assets
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
DIGITAL SECURITY PART 2 TOOLS. phising  Internet criminals can steal your personal and banking information without you ever noticing – they can do it.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
Microsoft Internet Explorer and the Internet Using Microsoft Explorer 5.
TECHNOLOGY GUIDE THREE Protecting Your Information Assets.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 5 1 Downloading and Storing Data Using FTP and Other Services to Transfer and.
Types of Electronic Infection
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
WHAT IS E-COMMERCE? E-COMMERCE is a online service that helps the seller/buyer complete their transaction through a secure server. Throughout the past.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Sniper Corporation. Sniper Corporation is an IT security solution company that has introduced security products for the comprehensive protection related.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
11 SUPPORTING INTERNET EXPLORER IN WINDOWS XP Chapter 11.
Computer Security Keeping you and your computer safe in the digital world.
Computer Security  Computer Security:  Password Strength  Windows Screen Saver  Deleting browser cache  Deleting browser cookies  Securing MS Office.
Windows Tutorial 5 Protecting Your Computer
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Three steps to prevent Malware infection
Common Methods Used to Commit Computer Crimes
TECHNOLOGY GUIDE THREE
MICROSOFT OUTLOOK and Outlook service Provider
How to Fix Trojan.Poweliks Using Norton Antivirus?
Protect Your Computer Against Harmful Attacks!
 Security is a must today. If your device is not secure with updated antivirus then it is surely vulnerable to the attacks of dangerous viruses, spyware.
Malware, Phishing and Network Policies
Information Security Session October 24, 2005
Connecting Remotely Winter 2014.
Presentation transcript:

How Secure Are Your On-Line Payments? Brad Rand V.P. Information Technology Infrastructure Manager Information Security Officer

How Secure Are Your On-Line Payments? Hopefully

How Secure Are Your On-Line Payments? Reason: Many Open Areas Of Risk On The Internet Not Like Onsite “Swipe” Transactions Dial up direct line and exchanges information Secure Endpoints. Cannot be altered The Internet Consists of Stores Many places to upload NPI Login and Passwords for some sites Retain Credit Card info / Bank Account info

Transaction Flow Begins At The Workstation Communicates Through The Internet Creates Secure Session With Transaction / Payment Processor User Provides Private Information For Transaction Confirmation Of Funds Transfer Is Sent To User

Data In Transit Very Secure Encrypted Data Uses “keys” to ensure communication is secure “Man in the Middle” Not easy to set up. Very rarely used now with solid encryption

The Endpoints Transaction / Payment Larger Hacks Bigger Payoff Event Makes Headlines End User Workstation Easy To Target Phishing, , Web Site

Transaction / Payment Transaction Processing Payments can be redirected to Payment Processor Hyperlink or “SandBox” application within web code Could be both Transaction / Processor Increases Risk / Retain NPI Well Secured Environment Payment Processing MasterCard / Visa Strong Perimeter Security Very Secure Transactions New Advanced Technologies In Place IPS (Intrusion Prevention Sensors) Updates Signatures “Real Time”

Local Workstation Can Download Malware From Many Areas Phishing: sent to you appearing as a known source Contains hyperlink to contaminated web site. Click on the link and download the program Portable Media USB sticks carry malware Browsing Web Pages Ads on the sidebar Redirect to compromised sites Contained In Mouse Over Hyperlink To Reveal Actual Site Address Attachment could be.pdf /.exe /.gif P2P File Sharing Music download / Bit Torrent

Keystroke Loggers Most Common Form Of Malware Easy To Deploy End user does the work by loading the application “Calls Home” When Set Up Sniffs All Traffic From PC Going Out To Web Has search criteria (Filters) Login ID / Passwords 9 digit socials May use a dictionary Records Any String Of Data Behind Keywords Send back data in complete format Complete report of compromised data at end of the day Programmable application Possibility Of Remote Control Removes IP location restriction in “cookies”

What Can I Do? Ensure Anti Virus Is Installed Auto update of definitions Threat detection installed IPS / not just IDS Use and Web Logic: Never a “free” gift. (Too good to be true) Do I know you? I don’t remember applying for that? Change Your Passwords Frequently Dedicate a workstation for sensitive online transactions

What Can I Do? Keep Operating System up to date. Microsoft – Upload of patching for a reason. Patch Tuesday / second Tuesday of the month. Remediates known vulnerabilities. Set Updates to automatically update. Browser Internet Explorer – Version 10 Begins Auto Updates FireFox – Automatically Updates Chrome – Automatically Updates Third Party Application Patching Adobe Products Reader / Writer / Flash

Goodbye Windows XP! Windows XP EOL / EOS Yesterday – April 8 th, 2014 No Auto Update / Reboot Critical Patches Cease Call In Support Terminates Windows 7 or Is Very Compatible 8.1 Is Better Version Than 8.0 Shock Factor / “Skins” Can Be Installed

Other Resources Malwarebytes.org Anti-Malware Scanning Application Free Version Download Auto Update When Installed Very Powerful Scanning Engine Reveals “Cookies” and Temp Internet Files Best Of Breed In “Free” Applications

Other Resources Microsoft Removal Tools Be Careful – Creates “Best Practices” On Your PC. Firewall Turns On Sets Up Automatic Update For Windows Enables Internet Explorer’s Privacy Settings Turns On User Account Control (UAC) Cleans Out Your Internet Cache and Browsing History May Shut Off Other Applications Seek I.T. Support If Available

Good Too Great Current: SFA Tokens (number on display) Cell Phone – SMS Texts a number to enter “Sandbox” Application USB / Icon Near Future: Remote Web Server will scan your computer. Detect and report malware. Prevent transaction from processing.

Smart Phone Payments Is Using a Smart Phone Safe? Apple Apps are screened for malware and viruses Droid Apps can contain malware and viruses Anti Virus available

Thank You!

Malwarebytes.org Microsoft Removal Tools: