Personal Digital Security Implications for the home and the office Sponsored by Lydia Kostopoulos, PhD @LKCYBER June 4, 2015
Personal Digital SecurityImplications for the home and the office
Sponsored by
Lydia Kostopoulos, PhD @LKCYBERJune 4, 2015
Personal Digital SecurityWhat it entails.
What it means for you:• As an individual• As an employee for your company
What you can do about it
Personal Digital Security
• Protection of your identity, communications, accounts, assets and technology from malicious intruders.
• Protection of personal tools: SIM cards, contactless credit cards, health and digital security devices, biometric data, IOTs, etc.
• Read Terms of Service (ToS) and Privacy Policies before agreeing.
• Update and patch software often.
• Don’t share personal information unless absolutely necessary.
• Don’t click on suspicious links and do not open email attachments from people you don’t know.
• Be conscious of meta-data.
• Read Terms of Service (ToS) and Privacy Policies before agreeing.
• Pay attention to the site link at the top and make sure it is a secure connection.
• Avoid being a phishing victim and pay attention to email headers to make sure they are legit.
HOME
Leakage awareness!
Personal Digital Security
• Read Terms of Service (ToS) and Privacy Policies before agreeing.
• Update and patch software often.
• Don’t share personal information unless absolutely necessary.
• Don’t click on suspicious links and do not open email attachments from people you don’t know.
• Be conscious of meta-data.
• Read Terms of Service (ToS) and Privacy Policies before agreeing.
• Pay attention to the site link at the top and make sure it is a secure connection.
• Avoid being a phishing victim and pay attention to email headers to make sure they are legit.
OFFICE
Policies!
Data Loss Prevention (DLP)
Source: COMSEC Consulting: Information Security
What measures have you taken to secure the following?
Security is an evolving process.
Keep an open mind to learning!
Awareness is key.
Stress Reduction Kit
BangHeadHere
Directions:1. Place kit on FIRM surface.2. Follow directions in circle of kit.3. Repeat step 2 as necessary, or until unconscious.4. If unconscious, cease stress reduction activity.
“Digital equivalent of locking the front door to your home and not leaving your car keys in the ignition”. – Marc Goodman
Avoid 85% of common digital
threats.
Government
Cyber Security Evaluation Tool(self-assessment)
FBI and Private Sector PartnershipAssociation of persons who represent businesses, academic institutions, state and local law enforcement agencies, and others dedicated to sharing information and intelligence to prevent hostile acts against the U.S.
• Meetings• Newsletters• Briefs
https://ics-cert.us-cert.gov/Assessments
https://www.infragard.org
http://www.stopthinkconnect.org/
https://www.fcc.gov/cyberforsmallbiz
• Cyber Security Tips for Small Businesses
Guide Keeping Your Social Media Accounts Secure
Defense Media Activity
• Protective Measures • Checklist• Social Media Tips
Government
Private Sector
https://www.social-engineer.com
• Social Engineering• Physical Security• Information Security
https://www.securingthehuman.org
• Awareness Posters/Presentations• Newsletter• Security Awareness Guidance• Internet Security for Kids
Newsletter on latest phishing trendshttps://www.knowbe4.com
Non-Profit
http://www.antiphishing.org/
• In association with CyLab at Carnegie Mellon• Education Initiative• Phishing landing page example
• HTTPS Everywhere Add-Onhttps://www.eff.org/https-everywhere
https://www.staysafeonline.org/business-safe-online/
Resources for businesses• Risk Assessment• Threat monitoring strategies• Reporting cyber attacks• Implementing a cybersecurity plan• Protecting customers• Training employees
• Training & Videos• Guides• Newsletters & Tips
Everyone plays a role in corporate security.