Top Banner
SAFE COMPUTING IN THE AGE OF PERVASIVE CYBERCRIME A Real & Present Danger Jane Ginn, MRP, AIT Managing Director SedonaCyberLink
38

Cyber Security for Real Estate Agents

Nov 18, 2014

Download

Technology

SedonaCyberLink

A short slide show that I use for presentations to real estate agents on how to avoid being victimized by cyber criminals.
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cyber Security for Real Estate Agents

SAFE COMPUTING IN THE AGE OF

PERVASIVE CYBERCRIME

A Real & Present Danger

Jane Ginn, MRP, AIT

Managing Director

SedonaCyberLink

Page 2: Cyber Security for Real Estate Agents

PURPOSE:Why are we here today?

Characterize magnitude of problem

Overview of threats/vulnerabilities Identify potential cyber exploits

Outline countermeasures Online resources

Hotlinks on PowerPoint Local resources

Tech support

Page 3: Cyber Security for Real Estate Agents

KEY ISSUES TO PLAN FOR

Data Security Customer Privacy

Page 4: Cyber Security for Real Estate Agents

GROWTH OFCYBERCRIME

Exponential growth of criminal activity on the web ---

Page 5: Cyber Security for Real Estate Agents

STATE OF THE WORLDCenters of Criminal Activity ---

Source: HostExploit – Global Security Report, April 2012

Page 6: Cyber Security for Real Estate Agents

DEEP WEBDark Nets of Cyber Crime ---

Page 7: Cyber Security for Real Estate Agents

CYBER CRIMINALSWhat is their motivation?

Page 8: Cyber Security for Real Estate Agents

CRIMINAL ACTIVITY2011 Poneman Benchmark Study

Source: Symantec

Page 9: Cyber Security for Real Estate Agents

NEW MALWARE2011 Patterns ---

Source: Panda Labs

Page 10: Cyber Security for Real Estate Agents

GLOBAL SPAMTypes ---

Source: McAfee 2011 Q4 Report

Page 11: Cyber Security for Real Estate Agents

SPAM TO USOver 50% from US, China & Brazil-

http://www.securelist.com/en/analysis/204792234/Spam_report_May_2012

Page 12: Cyber Security for Real Estate Agents

BOTNET HERDS2011 Infections ---

Source: McAfee 2011 Report

Page 13: Cyber Security for Real Estate Agents

EXPLOITS EVERYWHERE

Apple Exploits (2009 data)---

http://www.sans.org/top-cyber-security-risks/trends.php

Page 14: Cyber Security for Real Estate Agents

RELATIVE VOLUMEHuman errors lead to most exploits ---

Page 15: Cyber Security for Real Estate Agents

ACTIVITIES & EXPLOITS

What you do during the day that could lead to a cyber exploit ---

Page 16: Cyber Security for Real Estate Agents

AGENT/BROKER PROCESS

Marketing

Prospecting

Developing Deal

Closing Deal

Across

All

Page 17: Cyber Security for Real Estate Agents

USING EMAIL AS A TOOL

Local and Web-based Clients ---

Sending and receiving eMail Criminals intercept and steal

confidential information Man-in-the-Middle Attacks (DSN example)

Criminals conduct phishing attacks (spam)

Fraud, Extortion Recruiting for Botnet Herds

Criminals plant malware Viruses Spyware Trojans Worms

Page 18: Cyber Security for Real Estate Agents

SURFING THE INTERNET

All Browsers---Browsing Websites

Criminals use Cross-site Scripting (XSS)Spoofed websites for capturing

personally identifiable information (PII) Downloading Key-Loggers Downloading Screen-Capture Programs Downloading rootkits

Criminals Recruit for BotNetsDistributed Denial of Service Attacks

(DDoS) Computer used as proxy for:

Peer-to-Peer hosting Darknet usage

Page 19: Cyber Security for Real Estate Agents

BUILDING A WEBSITEGetting your message out ---

Website design Criminals seek access control

Password cracking Brute-force attacks War-dialing War-driving

Criminals want your client listsSQL injection

Criminals can steal your client informationGraham – Leach – Bliley ActCalifornia data breach notification law, SB1386

Criminals want your mailing lists (prospects)

Page 20: Cyber Security for Real Estate Agents

SOCIAL NETWORKING

Increase in exploits ---Facebook scam

Bogus Facebook warnings – June 6, 2012 Infected Apps- Software installer w/

TrojanTwitter hack

LulzSec posts 10,000 passwords in mid June, 2012 TweetGIF hack

LinkedIn hack 6 million passwords stolen in early June,

2012 Weak password encryption (SHA1)

Real estate scams – 67,190 in 2009 (FBI)

Page 21: Cyber Security for Real Estate Agents

USING WIRELESS ACCESS

Special Risks ---Cellular calls & data services

Criminals download malware to mobile devicesAndroid – iPhone - Blackberry

Mobile banking vulnerabilities Criminals intercept mobile transmissions

Gap in the WAP vulnerability

Bluetooth Criminals can hijack bluetooth devices

Wireless local area networks (LAN) Criminals can infiltrate your network

Page 22: Cyber Security for Real Estate Agents

OTHER EXPLOITSExploits Targeting Humans ---Point of Sale (POS) scams

Criminals steal credit card dataFor sale on darknet sites

Botnets Criminals set up proxies on legitimate

sitesPolitical activism

Protect activists against tyrannyHacktivism

Conduct DDoS AttacksMask IP addresses for sale of illicit items

(drugs, porn, PII, money mules, money laundering schemes, etc…

Page 23: Cyber Security for Real Estate Agents

COUNTER-MEASURES

What you can do to prevent cyber exploits ---

Page 24: Cyber Security for Real Estate Agents

ADMIN CONTROLSKeeping security tight ---

Manage networkEstablish Network AdministratorStress Test System

Perimeter testingAvoid social engineering

Maintain computer updatesPatch your operating system (OS)Patch your applications

Freeze credit reports

Page 25: Cyber Security for Real Estate Agents

SAFE NETWORKINGReducing vulnerabilities ---

Home-based Office Solutions Use Antivirus + Personal Firewall

SolutionNorton 360, McAfee Total, Webroot Secure

Anywhere Use Specialty Software for Banking

Outsourced Solutions Hosting Service Offsite data storage

Use Secure Wireless Access 802.11i (WPA2)

Page 26: Cyber Security for Real Estate Agents

BANKING SECURITY TOOL

Simple Controls Editable Security Policy

Page 27: Cyber Security for Real Estate Agents

SAFE INTERACTIONSMaintaining constant vigilance ---

Practice Safe eMailing Spam Filters

Black listingWhite listing

Practice Safe web surfing Browser security

HTTPSGoogle ChromeCocoon (Firefox & IE)

Carefully manage client lists Salt list (proof of theft)

Monitor scams on social networks

Page 28: Cyber Security for Real Estate Agents

BROWSER MATTERSPerformance & Security ---

Page 29: Cyber Security for Real Estate Agents

3RD PARTY CRM TOOLTop Producer CRM ---

Page 30: Cyber Security for Real Estate Agents

3RD-PARTY CRM TOOLCheck security policy ---

Page 31: Cyber Security for Real Estate Agents

ONLINE RESOURCES

The websites that you can visit to learn how to protect yourself & your clients ---

Page 32: Cyber Security for Real Estate Agents

REALTOR UNIVERSITY

Course Addressing Data SecurityCourse Addressing

Privacy

Page 33: Cyber Security for Real Estate Agents

NGOS & GOV AGENCIES

Links to help you --- Identity Theft

Privacy Rights ClearinghouseElectronic Privacy Information Center

Banking FraudFederal Trade Commission

Phishing IntelligenceFraudWatch International

NotificationsUS-CERT

Page 34: Cyber Security for Real Estate Agents

PRIVATE SECTOR SOURCES

Apps for tracking latest scams ---

Page 35: Cyber Security for Real Estate Agents

COMPLIANCE ISSUES

Data Security Customer Privacy

Databases – ISO 27001 & 27002Credit Card Payments – PCI

compliance

Gramm Leach Bliley Act

NIST 800-122

Page 36: Cyber Security for Real Estate Agents

RECAP

And now?

Page 37: Cyber Security for Real Estate Agents

SUMMARY:What did we cover?

Characterize magnitude of problem

Overview of threats/vulnerabilities Identify potential cyber exploits

Outline countermeasures Online resources

Hotlinks on PowerPoint Local resources

Tech support

Page 38: Cyber Security for Real Estate Agents

Q & AJust the beginning….