2017 Spring Tech Conference - UTSA STC... · 2017 Spring Tech Conference . Digital Media:...
Transcript of 2017 Spring Tech Conference - UTSA STC... · 2017 Spring Tech Conference . Digital Media:...
![Page 1: 2017 Spring Tech Conference - UTSA STC... · 2017 Spring Tech Conference . Digital Media: Protecting Your Data and Yourself Presenters: Brad Cooper. Senior Information Security Analyst.](https://reader034.fdocuments.net/reader034/viewer/2022042306/5ed2499857a90c76e074c63d/html5/thumbnails/1.jpg)
2017 Spring Tech Conference
![Page 2: 2017 Spring Tech Conference - UTSA STC... · 2017 Spring Tech Conference . Digital Media: Protecting Your Data and Yourself Presenters: Brad Cooper. Senior Information Security Analyst.](https://reader034.fdocuments.net/reader034/viewer/2022042306/5ed2499857a90c76e074c63d/html5/thumbnails/2.jpg)
Digital Media:Protecting Your Data and Yourself
Presenters: Brad CooperSenior Information Security Analyst
Lance PritchardSenior Information Security Analyst
![Page 3: 2017 Spring Tech Conference - UTSA STC... · 2017 Spring Tech Conference . Digital Media: Protecting Your Data and Yourself Presenters: Brad Cooper. Senior Information Security Analyst.](https://reader034.fdocuments.net/reader034/viewer/2022042306/5ed2499857a90c76e074c63d/html5/thumbnails/3.jpg)
Overview
![Page 4: 2017 Spring Tech Conference - UTSA STC... · 2017 Spring Tech Conference . Digital Media: Protecting Your Data and Yourself Presenters: Brad Cooper. Senior Information Security Analyst.](https://reader034.fdocuments.net/reader034/viewer/2022042306/5ed2499857a90c76e074c63d/html5/thumbnails/4.jpg)
Session Topic- Overview
Introduction:• This session will cover guidelines to protect your data
when visiting websites, using your mobile devices and when using your email.
Why it matters?• Data breaches don’t only happen to large
corporations. Malicious websites, mobile device hacking and phishing emails are prevalent throughout society and you are the target.
![Page 5: 2017 Spring Tech Conference - UTSA STC... · 2017 Spring Tech Conference . Digital Media: Protecting Your Data and Yourself Presenters: Brad Cooper. Senior Information Security Analyst.](https://reader034.fdocuments.net/reader034/viewer/2022042306/5ed2499857a90c76e074c63d/html5/thumbnails/5.jpg)
Take Away
1. Know what to watch for when using your digital devices
2. Know the telltale signs you’re being targeted
3. Know how to reduce your chance of being a victim
![Page 6: 2017 Spring Tech Conference - UTSA STC... · 2017 Spring Tech Conference . Digital Media: Protecting Your Data and Yourself Presenters: Brad Cooper. Senior Information Security Analyst.](https://reader034.fdocuments.net/reader034/viewer/2022042306/5ed2499857a90c76e074c63d/html5/thumbnails/6.jpg)
• What is Phishing?• Deceptive, Spear, Whaling, Pharming, Vishing…
• Have you ever received an unsolicited offer via email?
Phishing
![Page 7: 2017 Spring Tech Conference - UTSA STC... · 2017 Spring Tech Conference . Digital Media: Protecting Your Data and Yourself Presenters: Brad Cooper. Senior Information Security Analyst.](https://reader034.fdocuments.net/reader034/viewer/2022042306/5ed2499857a90c76e074c63d/html5/thumbnails/7.jpg)
EmailPhishing
Link= https://t.co/7KSjYg8c2H
![Page 9: 2017 Spring Tech Conference - UTSA STC... · 2017 Spring Tech Conference . Digital Media: Protecting Your Data and Yourself Presenters: Brad Cooper. Senior Information Security Analyst.](https://reader034.fdocuments.net/reader034/viewer/2022042306/5ed2499857a90c76e074c63d/html5/thumbnails/9.jpg)
EmailPhishing
What’s wrong with this?
![Page 10: 2017 Spring Tech Conference - UTSA STC... · 2017 Spring Tech Conference . Digital Media: Protecting Your Data and Yourself Presenters: Brad Cooper. Senior Information Security Analyst.](https://reader034.fdocuments.net/reader034/viewer/2022042306/5ed2499857a90c76e074c63d/html5/thumbnails/10.jpg)
EmailPhishing
What’s wrong with this?
![Page 11: 2017 Spring Tech Conference - UTSA STC... · 2017 Spring Tech Conference . Digital Media: Protecting Your Data and Yourself Presenters: Brad Cooper. Senior Information Security Analyst.](https://reader034.fdocuments.net/reader034/viewer/2022042306/5ed2499857a90c76e074c63d/html5/thumbnails/11.jpg)
EmailPhishing
What’s wrong with this?
![Page 12: 2017 Spring Tech Conference - UTSA STC... · 2017 Spring Tech Conference . Digital Media: Protecting Your Data and Yourself Presenters: Brad Cooper. Senior Information Security Analyst.](https://reader034.fdocuments.net/reader034/viewer/2022042306/5ed2499857a90c76e074c63d/html5/thumbnails/12.jpg)
Websites & Online
• Computer• Admin accounts• Guest accounts• Non-admin accounts
• Use different password/PIN for each account
• Change default passwords
Accounts
![Page 13: 2017 Spring Tech Conference - UTSA STC... · 2017 Spring Tech Conference . Digital Media: Protecting Your Data and Yourself Presenters: Brad Cooper. Senior Information Security Analyst.](https://reader034.fdocuments.net/reader034/viewer/2022042306/5ed2499857a90c76e074c63d/html5/thumbnails/13.jpg)
Websites & OnlineDefault Passwords
![Page 14: 2017 Spring Tech Conference - UTSA STC... · 2017 Spring Tech Conference . Digital Media: Protecting Your Data and Yourself Presenters: Brad Cooper. Senior Information Security Analyst.](https://reader034.fdocuments.net/reader034/viewer/2022042306/5ed2499857a90c76e074c63d/html5/thumbnails/14.jpg)
Websites & Online
• Don’t assume a public Wi-Fi network is secure
• Look for the padlock
• Turn on your firewall, block all incoming traffic
• Check the network name• Use two-factor authentication
Public Wi-Fi
![Page 15: 2017 Spring Tech Conference - UTSA STC... · 2017 Spring Tech Conference . Digital Media: Protecting Your Data and Yourself Presenters: Brad Cooper. Senior Information Security Analyst.](https://reader034.fdocuments.net/reader034/viewer/2022042306/5ed2499857a90c76e074c63d/html5/thumbnails/15.jpg)
Websites & Online
• Three credit report a year (free)• TransUnion• Equifax• Experian
• Monitor account especially when fraud is suspected
• https://www.annualcreditreport.com
Identity Theft
![Page 16: 2017 Spring Tech Conference - UTSA STC... · 2017 Spring Tech Conference . Digital Media: Protecting Your Data and Yourself Presenters: Brad Cooper. Senior Information Security Analyst.](https://reader034.fdocuments.net/reader034/viewer/2022042306/5ed2499857a90c76e074c63d/html5/thumbnails/16.jpg)
Websites & OnlineSACU
![Page 17: 2017 Spring Tech Conference - UTSA STC... · 2017 Spring Tech Conference . Digital Media: Protecting Your Data and Yourself Presenters: Brad Cooper. Senior Information Security Analyst.](https://reader034.fdocuments.net/reader034/viewer/2022042306/5ed2499857a90c76e074c63d/html5/thumbnails/17.jpg)
Websites & OnlineUSAA
![Page 18: 2017 Spring Tech Conference - UTSA STC... · 2017 Spring Tech Conference . Digital Media: Protecting Your Data and Yourself Presenters: Brad Cooper. Senior Information Security Analyst.](https://reader034.fdocuments.net/reader034/viewer/2022042306/5ed2499857a90c76e074c63d/html5/thumbnails/18.jpg)
Websites & OnlineWebsites
• Hover over links http://www.utsa.edu
http://www.utsa.comhttp://www.google.com/
![Page 19: 2017 Spring Tech Conference - UTSA STC... · 2017 Spring Tech Conference . Digital Media: Protecting Your Data and Yourself Presenters: Brad Cooper. Senior Information Security Analyst.](https://reader034.fdocuments.net/reader034/viewer/2022042306/5ed2499857a90c76e074c63d/html5/thumbnails/19.jpg)
Websites & OnlineDownloading Software
![Page 20: 2017 Spring Tech Conference - UTSA STC... · 2017 Spring Tech Conference . Digital Media: Protecting Your Data and Yourself Presenters: Brad Cooper. Senior Information Security Analyst.](https://reader034.fdocuments.net/reader034/viewer/2022042306/5ed2499857a90c76e074c63d/html5/thumbnails/20.jpg)
Websites & OnlineAdware
![Page 21: 2017 Spring Tech Conference - UTSA STC... · 2017 Spring Tech Conference . Digital Media: Protecting Your Data and Yourself Presenters: Brad Cooper. Senior Information Security Analyst.](https://reader034.fdocuments.net/reader034/viewer/2022042306/5ed2499857a90c76e074c63d/html5/thumbnails/21.jpg)
Mobile Devices
• There are over 4,700,000,000 mobile phones in the world.
https://www.statista.com/statistics/274774/forecast-of-mobile-phone-users-worldwide/
• There are over 265,000,000 mobile phone in the U.S.
https://www.statista.com/statistics/222306/forecast-of-smartphone-users-in-the-us/
• Time spent per adult user per day on a mobile device has increased from 2.37 hours in 2014 to 3.15 hours today.
http://www.geomarketing.com/us-mobile-usage-in-2017-stats-you-need-to-know
![Page 22: 2017 Spring Tech Conference - UTSA STC... · 2017 Spring Tech Conference . Digital Media: Protecting Your Data and Yourself Presenters: Brad Cooper. Senior Information Security Analyst.](https://reader034.fdocuments.net/reader034/viewer/2022042306/5ed2499857a90c76e074c63d/html5/thumbnails/22.jpg)
Mobile Devices
• Mobile device users spend 90% of their time on mobile apps compared to mobile sites.
http://www.smartinsights.com/mobile-marketing/mobile-marketing-analytics/mobile-marketing-statistics/
• $4.72B (20.8%) of all digital commerce spending was on mobile devices (2016).
https://www.statista.com/statistics/268439/quarterly-us-mobile-e-commerce-spending/
![Page 23: 2017 Spring Tech Conference - UTSA STC... · 2017 Spring Tech Conference . Digital Media: Protecting Your Data and Yourself Presenters: Brad Cooper. Senior Information Security Analyst.](https://reader034.fdocuments.net/reader034/viewer/2022042306/5ed2499857a90c76e074c63d/html5/thumbnails/23.jpg)
Mobile Devices
Average number of mobile devices per person (Global)
• About 3.64https://www.globalwebindex.net/blog/digital-consumers-own-3.64-connected-devices
• Estimated 4.3 in 2020Sources: 2013, SOPHOS, “How do you compare to Steve Wozniak?”; 2012, NetworkWorld, “BYOD is a user-driven movement, not a secure mobile device strategy”
How many do you have?
![Page 24: 2017 Spring Tech Conference - UTSA STC... · 2017 Spring Tech Conference . Digital Media: Protecting Your Data and Yourself Presenters: Brad Cooper. Senior Information Security Analyst.](https://reader034.fdocuments.net/reader034/viewer/2022042306/5ed2499857a90c76e074c63d/html5/thumbnails/24.jpg)
How Important Is Your Device?
• Can you go without it for a day? A week?
• Why is it important to you?
• What do you do with it?
• What do you have on your mobile devices?
• Do you protect your data and devices?
![Page 25: 2017 Spring Tech Conference - UTSA STC... · 2017 Spring Tech Conference . Digital Media: Protecting Your Data and Yourself Presenters: Brad Cooper. Senior Information Security Analyst.](https://reader034.fdocuments.net/reader034/viewer/2022042306/5ed2499857a90c76e074c63d/html5/thumbnails/25.jpg)
How to Protect
• Password protect your devices
• Choose the strongest password allowed
• Enable auto lock• Use recovery apps (Find My iPhone, Google
Device Manager, etc.)• Enable remote wipe capabilities
• Update OS and software/apps regularly
![Page 26: 2017 Spring Tech Conference - UTSA STC... · 2017 Spring Tech Conference . Digital Media: Protecting Your Data and Yourself Presenters: Brad Cooper. Senior Information Security Analyst.](https://reader034.fdocuments.net/reader034/viewer/2022042306/5ed2499857a90c76e074c63d/html5/thumbnails/26.jpg)
How to Protect
• Install and run Anti-Virus/Anti-Malware software (McAfee, Kaspersky, Bitdefender, etc.)
• Know your apps and the permissions they need
• Uninstall/disable unnecessary or unused apps and services
• Keep sensitive data off your device• Use ‘vaults’ for a second layer of password
protection
![Page 27: 2017 Spring Tech Conference - UTSA STC... · 2017 Spring Tech Conference . Digital Media: Protecting Your Data and Yourself Presenters: Brad Cooper. Senior Information Security Analyst.](https://reader034.fdocuments.net/reader034/viewer/2022042306/5ed2499857a90c76e074c63d/html5/thumbnails/27.jpg)
How to Physically Secure
• Keep a firm grip on your device
• Keep device in a hard-to-access place• Tight front pocket• Deep pocket in bag
• Don’t advertise you have a new “Amazing” device
http://www.cnet.com/pictures/best-practices-for-smartphone-security/7/
![Page 28: 2017 Spring Tech Conference - UTSA STC... · 2017 Spring Tech Conference . Digital Media: Protecting Your Data and Yourself Presenters: Brad Cooper. Senior Information Security Analyst.](https://reader034.fdocuments.net/reader034/viewer/2022042306/5ed2499857a90c76e074c63d/html5/thumbnails/28.jpg)
Available Resources • www.utsa.edu/oit• https://www.sonicwall.com/phishing/
phishing-quiz-question.aspx
OIT Social Media Sites:
![Page 29: 2017 Spring Tech Conference - UTSA STC... · 2017 Spring Tech Conference . Digital Media: Protecting Your Data and Yourself Presenters: Brad Cooper. Senior Information Security Analyst.](https://reader034.fdocuments.net/reader034/viewer/2022042306/5ed2499857a90c76e074c63d/html5/thumbnails/29.jpg)
Questions?
Brad CooperSenior Information Security [email protected]
Lance PritchardSenior Information Security [email protected]
![Page 30: 2017 Spring Tech Conference - UTSA STC... · 2017 Spring Tech Conference . Digital Media: Protecting Your Data and Yourself Presenters: Brad Cooper. Senior Information Security Analyst.](https://reader034.fdocuments.net/reader034/viewer/2022042306/5ed2499857a90c76e074c63d/html5/thumbnails/30.jpg)
Thank you!
Please complete the session survey before leaving