2 Threats Overview Password Safety Web Protection Email Protection AgendaThreats OverviewPassword SafetyWeb ProtectionProtectionPreventive Measures12345First we will go through a threats overview, which is designed to bring awareness to the different security concerns surrounding specific threats.Next Password Safety that will run through some best practices not just when creating passwords but utilizing them.Then Web Protection, which will go through different things to know about when utilizing the internetThen Protection, which will focus on borne threats and spam.Then finally we will finish up with preventative measures.Keep in mind throughout this webinar I will be giving tips and best practices not just for you to utilize in the business world, but at home as well
12 On average, 390,000 unique threats per day.1 MalwareOn average, 390,000 unique threats per day.1Unique threats ≠ extremely dissimilar.Malicious threats are changed in the smallest amount possible to evade detection.Malicious threats are targeted in order to have the highest penetration (success) rate.1AV-TEST GmbH,
13 Is malware on Windows only? Malware definitely exists on other operating systems (Oses) outside of Windows.Windows is typically the major target due to high market share.When new malware is released on other Oses, it typically has a high penetration rate due to people believing their Android, Mac, and Linux devices are safe without having any endpoint security installed.
14 Is malware on mobile phones? Mobile phone malware is a growing threat due to users doing the majority of their internet browsing on a cell phone.Ransomware, or screen locking malware, is a popular threat on mobile devices.In 2016, malware targeting Apple iOS (iPhones, iPads) increased. Apple doesn’t allow vendors to create antivirus for these products, so users must depend on the company to fix any vulnerabilities.
15 How does my computer get infected? Clicking malicious links inPlugging in an unknown flash driveDownloading malware masquerading as other software
16 How does my mobile device get infected? Clicking malicious links inDownloading malware masquerading as other softwareInstalling 3rd party apps directly from the internet instead of via official stores such as Google Play or Apple’s App Store.
17 Top Tips to Avoid Malware Install Endpoint Security on all devices.Be careful what you plug in.Be careful what you click.Get awareness training for entire family.1234
19 https://youtu.be/-0Ql6xnNj7g Threats OverviewPhishing Video
20 Is the act of setting the bait (trap)… Phishing? Or fishing?Is the act of setting the bait (trap)…Casting it out into a wide ocean…Hoping that something bites that you can then hook.
21 Intentionally deceiving someone by posing as a legitimate company. PhishingIntentionally deceiving someone by posing as a legitimate company.Typically, utilizes by pretending to be a company or service requesting you to do something.Hoping that you click the link and fill out the requested info.
22 54% of all inbound email is spam Phishing Stats54% of all inbound is spam1 in 20 messages has malicious contentSpamTypes2016 Trustwave Global Security Report
23 30% of people 12% of people Phishing Stats Open phishing messages (23% last year)12% ofpeopleOpen attachments (11% last year)Verizon 2016 Data Breach Investigations Report
28 Social EngineeringManipulation of people into divulging confidential or sensitive informationMost commonly done over , but also regularly carried out over the phone
29 Can be a slow gain of information Social EngineeringCan be a slow gain of informationCan attempt to gain all information needed at once
30 Social Engineering Examples Phone call targets employees at a business.Caller asks who the boss/CEO is.Requests his/her address.Now the attacker has the username and the name of the person targeted for compromise.
31 Social Engineering Examples A person walks into office pretending to be a contractor.Due to his/her uniform, people assume it’s OK.Person walks into room with sensitive info and steals it.
32 Top Tips to Avoid Social Engineering Be careful with the information you disclose.Verify credentials of contractors.If you have any doubts on the identity of callers, hang up and call their official company number back.123
35 Can these answers be found on your Facebook account? What city did you grow up in?What is your dog’s name?What high school did you attend?What is your favorite book?What is your dream job?What is your mother’s maiden name?
36 Does this look familiar? Does this screen or others like this look familiar?
37 How about this?How about this? This is extremely important in the conversation around passwords due to the fact that most passwords can be simply changed or reset by knowing a few answers to questions about yourself. Most of these answers can be commonly found on users’ social media accounts. So it is very important to not just practice good password policies but also strong security questions as well.
38 Typically, users are honest when filling out security questions. Malicious parties can utilize social media to find out the answers to these questions, which allows them to reset your password.Best practice is to not be honest when filling out these questions. Treat security questions as another password field.
39 Users and Poor Password Hygiene Typically, users practice risky behavior with respect to passwords.Passwords nowadays can be a gateway into identity theft.
40 Document or sticky note with passwords written on it Poor Password HygieneDocument or sticky note with passwords written on itSo typically due to the complexity requirements of passwords usually users end up writing their passwords on sticky notes or in documents on their desktop.
41 Freely sharing password with friends, family members, colleagues Poor Password HygieneFreely sharing password with friends, family members, colleaguesOthers freely share their passwords with other users. We see this especially in organizations that require users to clock in at the beginning and end of the day. They do not want to be late again so they call their friend who is already at work and ask them to clock in for them.
42 8 characters + 1 number + 1 symbol Poor Password Hygiene8 characters8 characters number8 characters number + 1 symbol8 characters number + 1 symbol + 1 capitalelephantelephant1elephant1!Elephant1!====Current password policies that are often used today are not adequate at protecting users. As you can see this is what a typical user does. If a password requires 8 characters they might choose something like elephant. But if they go to another application or website and now it requires a number, they are not going to think of a brand new unique password, they are just going to tack on a 1 at the end. This continues when websites require a symbol, or capital. Users are re-using the exact same password base, which is Elephant.
43 Change password every 90 days Poor Password Hygieneelephant1!elephant3#elephant4$Change password every 90 days!This leads to current password policies that typically have users change their password every 90 days or every 6 months. Users are not increasing your businesses security by changing their password on these scheduled intervals due to them doing the above. They are simply going to the next number and next symbol on the keyboard. In fact now NIST is recommending against having users change passwords every 90 days due to the above.
44 Data breaches lead to password problems because… Passwords sometimes are extractedVery simple to try all alternative options of password-baseExamplePassword that was stolen was elephantPassword required by website is 8 characters 1 symbol32 symbols on the computer(would take a human 5 minutes)Computers can carry out these tasks in fractions of a secondSo when data breaches occur passwords are sometimes extracted, it would be very easy for me to go to another website and figure out what your password is.For example if the password that was stolen was elephant, and I went to a website that required 8 characters and 1 symbol. There are only 32 symbols on the keyboard, therefore I only need to type in elephant and then try every symbol and see if I gain access into whatever system I am trying to break into.
45 Password ManagersIf you have trouble remembering passwords or creating unique passwords, utilize a password manager.There are several very secure password managers on the market that work across all Oses.They will remember and auto-complete your passwords for you once your “master” password is entered.
46 Password Hygiene Checkup Currently checks 210 websites2.6 billion compromised accounts containedTreat it like a credit-checkSo a great resource to inform your users about is this website. which will check all of the databases of compromised credentials to see if your credentials are any of the ones that have been stolen. You can enter in your commonly used usernames or address and it will let you know if there has been a breach and what was breached. If your password was stolen it is recommended to completely change your password, don’t just change the number or symbol!
47 Two-factor Authentication (2FA) Explained As opposed to the standard password authentication, 2FA OTP (one-time password) uses two elements. These are “something that user knows,” such as a password or a PIN code, and “something that user has,” typically a mobile phone or hardware token.Used in combination, they provide greatly enhanced security for data access.So Two-Factor is a solution that can prevent poor password policies, and ultimately turns the login process into requiring a User, Password, and a One time password. This one time password typically comes from a mobile device or hard token. So it turns the password authentication into something that the user knows (such as a password) and something they have (a cell phone). If you do not have both pieces of information you are unable to log in.
48 2FA solves the problem of: Data breach through weak or stolen passwordsUser-created passwords that are not random charactersRe-use of passwords intended for access to company assets for private accountsPasswords containing user-specific data – e.g. name, date of birthSimple patterns to derive new passwords, such as “elephant1,” “elephant2,” etc.
49 Top Tips for Password Safety Utilize unique passwords across all websites/applicationsEnable and utilize 2FA on all websites that allow itChoose unique, non-true security questions123
51 Internet Protection Overview Search Engine SafetyWeb Content FilterHTTPSPublic Wi-FiInternet of Things
52 Internet Protection Overview Search Engine Safety
53 This happens commonly on social media websites as well. Search Engine SafetyNowadays, users utilize search engines to ask every question they can think of.Users click on search results without first checking if it is a legitimate site.This happens commonly on social media websites as well.
54 Search Engine SafetyEven if the website is reputable, the advertisement being displayed could be malicious and infect your computer or mobile device.Free things (music, movies, game cheats, etc.) are very commonly filled with malware, and are rarely what they say they are.
55 Top Tips for Search Engines Stick to clicking on sites on the first page of results.Be careful when clicking on non-name recognizable sites.Malware commonly masquerades as free things.123
56 Internet Protection Overview Web Content Filter
57 There are both home versions and corporate versions. Web Content FilterFilters web traffic based off pre-configured policies set by the administrator.There are both home versions and corporate versions.Home versions focus on child safety, while corporate versions focus on employee productivity.
58 Web Content FilterNot only can it restrict the content that is displayed to a certain audience, it can also be utilized to filter malicious content and protect the user.
59 Top Tips for Web Content Filter Increase employee productivity by implementing a web filter.Curb risky user behavior and reduce malware exposure by implementing a web filter.Protect children’s mobile devices and computers from displaying inappropriate content with a web filter.123
62 HTTPSIs a protocol for secure communication over a computer network which is widely used on the internetHTTPS is typically notated by displaying a green lock in the web address bar:
63 HTTPSNo sensitive information should be typed into a page that is not secured by HTTPS.Even though a page is secured with HTTPS, it does not automatically mean the page is safe.Most browsers have begun to let users know more easily when they are on a non-secure page.
64 Top Tips for Secure Websites (HTTPS) Before entering sensitive information, check to see if the site is secured by HTTPS.Check to make sure this is a reputable website before entering credit card information; don’t just depend on the HTTPS indicator.12
66 Internet Protection Overview Public Wi-Fi Video
67 Is a non-secure network that users can connect to for free Public Wi-FiIs a non-secure network that users can connect to for freeTypically found in hotels, coffee shops, libraries and many other places
68 Verify with the business owner the name of their network. Public Wi-FiDo not assume that a network named “Library” is actually the wireless network for the Public Library.Verify with the business owner the name of their network.
69 Public Wi-FiIs very insecure, so you should treat every public Wi-Fi connection as compromised (unsafe).This means you should not utilize any sensitive websites when connected (banking, social networking, etc.)If you need to access one of these sites, utilize your cell phone and do not connect it to Wi-Fi, just use the cell service.
70 Top Tips for Public Wi-Fi Verify the Wi-Fi name with the business owner prior to connecting.Treat public Wi-Fi connections as compromised (unsafe).Utilize an anti-malware product to help prevent against cyberattacks while connected.123
71 Internet Protection Overview Internet of Things
72 Internet of Things (IoT) This type of internet connection is convenient, but opens up a security hole that needs to be secured.Examples of IoT devices include internet-connected thermostats and closed circuit cameras.If you can connect to it from anywhere, that means anyone can—by simply guessing your password.Disable any web features that you do not utilize.Make sure all IoT devices are kept up to date.
73 Internet of Things (IoT) Routers are the first line of defense to protect IoT devices from exploitation.Routers should be immediately configured to change the default username and password to something unique.If someone gains access to your router they can see all other devices on your network.Make sure your router is regularly updated to avoid exploitation.
74 Top Tips for Internet of Things (IoT) Change default usernames and passwords on all devices including routers.If you do not utilize the web features, disable them.Make sure all IoT devices, including routers, are kept up to date with the newest firmware (software).123
78 2FA (Two-Factor Authentication) and Email is most important account needing protection, because if someone gains access to your , they can utilize the password reset function to gain access to other services.As we mentioned earlier, 2FA is a great way to protect your from being compromised.
79 2FA andMost major providers allow you to set up 2FA with your account.Once set up, the attacker would need your password and your cell phone in order to break into your account.
80 Top Tips for 2FA and Email Password protect or utilize fingerprint reader to protect your 2FA app in case of a lost device.Do not utilize SMS if you can help it as a 2FA method; always use an application or push.Enable 2FA not just on but all critical websites and applications that allow it.123
82 Password ResetWhen passwords are forgotten, the ability to reset your password is very convenient, but if not utilized properly this can allow someone to easily take over your account.Some websites do not require any security questions to be answered or any additional information besides account address to initiate a password reset.
83 Password ResetUsually when someone requests a password reset, an is sent to the address on file with this information.Monitor these s and contact the vendor directly if you see these and did not initiate them yourself. (But remember the spam/phishing rules from earlier.)
84 Top Tips for Password Reset Utilize strong unique passwords.Utilize strong, not correct, security questions.Monitor attempted password resets on your accounts for fraudulent activity.123
86 Some email providers have better spam protection than others. Everyone gets spam; even with the best protection, some still slips through the cracks.Some providers have better spam protection than others.A third party anti-spam product can supplement protection provided by the provider.
87 Never respond to spam emails. Spam ProtectionNever open spam s, even if you think it is funny to see the content inside.Never respond to spam s.Be careful using your address to sign up for contests or enter websites.When posting your to a public website, always add special breaks in your address. Example: ben(at)eset dotcom
88 Top Tips for Spam Protection Utilize a different provider or 3rd party product if necessary.Never click, open or respond to spam messages.When posting to classified sites, use the following format to keep spam bots from retrieving and using your address: john.smith (at) .com.123
90 Attachments are one of the most common ways to get viruses or malware. Attachment PolicyAttachments are one of the most common ways to get viruses or malware.Even though an attachment might look like a document or Excel file, it might contain a virus or malware.
91 Never open attachments from unknown senders. Attachment PolicyRules should be in place at your company to prevent receiving certain types of attachment files.Employees should receive training that describes why attachments can be harmful.Never open attachments from unknown senders.If you see something that is questionable, send to your IT department for verification.
92 Top Tips for Attachment Policies Employees need training and a clear attachment policy.Never open or save attachments from an unknown sender.Even though something looks like a file that you do not think is malicious… doesn’t mean it isn’t malicious.123
94 Top Tips for Preventive Measures Utilize an AV product on all devices, not just Windows computers.Define a clear attachment policy coupled with a spam filter.Implement a Web content filter to help with malicious content, inappropriate content, and productivity issues.Utilize unique passwords and maintain a clear password policy. If needed, use a password manager.Keep all internet-connected devices up to date, including routers, IoT devices, computers, mobile devices.12345