Cybersecurity Safari Brower Hardening and Time Machine Backup

13
12/16/19 1 Cybersecurity and Mac Time Machine Backup Dr. Leon D. Chapman Grand Computers - Cybersecurity & Time Machine Backup 1 National Cybersecurity Awareness Month (NCSAM) Held every October Collaborative effort between government and industry NCSAM 2019 emphasize (www.dhs.gov ) Personal accountability Proactive step to enhance Cybersecurity at home and workplace Message: Own It, Secure It, Protect It Grand Computers Cybersecurity & Time Machine Backup 2 1 2

Transcript of Cybersecurity Safari Brower Hardening and Time Machine Backup

12/16/19

1

Cybersecurity and Mac Time Machine Backup

Dr. Leon D. Chapman

Grand Computers - Cybersecurity & Time Machine Backup 1

National Cybersecurity Awareness Month(NCSAM)

• Held every October

• Collaborative effort between government and

industry

• NCSAM 2019 emphasize (www.dhs.gov)

➢Personal accountability

➢Proactive step to enhance Cybersecurity at home and

workplace

➢Message: Own It, Secure It, Protect It

Grand Computers – Cybersecurity & Time Machine Backup 2

1

2

12/16/19

2

National Cybersecurity Awareness Month(NCSAM)

https://niccs.us-cert.gov/national-cybersecurity-awareness-month-2019

Grand Computers – Cybersecurity & Time Machine Backup 3

OWN, SECURE &

PROTECT IT

NCSAM 2019 TOOLKIT IS A

COMPREHENSIVE GUIDE

https://niccs.us-cert.gov/national-

cybersecurity-awareness-month-

2019

HIGHLY RECOMMENDED

Grand Computers – Cybersecurity & Time Machine Backup 4

3

4

12/16/19

3

NATIONAL CYBERSECURITY AWARENESS MONTH

TRIVIA GAMEHTTPS://NICCS.US-CERT.GOV/NATIONAL-CYBERSECURITY-AWARENESS-MONTH-2019

#BeCyberSmart:

Online Safety

100

200

300

400

500

Device Security

100

200

300

400

500

Types of

Cyber Attacks

100

200

300

400

500

Cyber History

100

200

300

400

500

Cyber Stats

100

200

300

400

500

Final Round5Grand Computers – Cybersecurity & Time Machine Backup

DEVICE SECURITY - 100

Which of the following are strong password practices? (Choose all that apply.)

1. Passwords should contain a mixture of upper and lower case letters, numbers, and

special characters.

2. Passwords should have personal meaning to you (e.g. a relative’s birthday) so that you

can remember them more easily.

3. You should immediately change your password in the case of a known data breach.

4. You should store your passwords on paper or in a text document, giving you a backup in

the event that you forget them.

Answer: 1 & 3. While it is helpful for passwords to have some level of personal relevance,

anything concrete or publicly-available (high schools, birthdates, pets’ names, etc.) can

be easily researched and guessed by an attacker. Storing your passwords physically or

in a text-document is also ill-advised, as someone could gain access to the copy.

After each answer appears, please return to Game

Board.Back to game board

6Grand Computers – Cybersecurity & Time Machine Backup

5

6

12/16/19

4

Grand Computers Cybersecurity Initiative

• Planning meetings started in winter 2018

➢What could the club do to help our members?

➢Ransomware, Phishing, Malware increasing all around us

➢Ray Fagan, Leon Chapman, Maria Frasca, Gloria Young, Dan Wallen & Joe Parla

• Develop Cybersecurity courses 1st for Windows 10 & MacOS

• Educate Tech Helpers 1st – Nov & Dec 2019 – Ray & Leon

• Offer classes to our members

➢Classes starting in Winter 2020

➢Classes will be two 2-hr sessions – Lecture + Hands-on

❖Hands-on for students to bring devices for hardening – several Tech Helpers to assist

students

Grand Computers - Cybersecurity & Time Machine Backup 7

Threats, Updates & Passwords

• Three places threats are likely to come from:

➢ Internet

➢Via email

➢Someone with direct access / Phone calls

• Always update to latest Operating System

➢Have the latest security updates

➢ If your computer won’t update to latest OS, it is your signal to upgrade to a

newer computer

• Passwords

➢Use complex 12-16-character passwords

➢Do not use same password for different accounts

➢Must have a Password Manager

❖Cloud based, encrypted files, synced to all devices

Grand Computers - Cybersecurity & Time Machine Backup 8

7

8

12/16/19

5

Characteristics of Home Cybersecurity Threats

Grand Computers - Cybersecurity & Time Machine Backup 9

Threats Threat Types Devices Preventions

Devices Ransomware Computers Backups - #1

Identity Phishing Modem / Router / hub Operating system updates

Accounts Malicious Apps Network / ISP Firmware updates

Home Social Media Streaming devices Antivirus / Anti-malware

Virus & worms Internet of Things (IoT) Browser Hardening

Wi-Fis Smart Home Devices Password Management

Medical monitoring Encryption

2-Factor Authentication

Surge in Mac Malware(https://www.appleworld.today/blog/2019/6/25/new-research-says-theres-a-surge-in-mac-malware)

• Illustrates the importance of layered security protections

in today’s advanced threat landscape

Grand Computers - Cybersecurity & Time Machine Backup 10

9

10

12/16/19

6

Cybersecurity Introduction• Hardening your computer is an essential step for securing your personal

information and data

• Hardening tries to detect, delay and deny external users using your

computer

• Hardening involves several steps to form “layers” of protection

➢Using antivirus and antispyware protection

➢Regularly downloading the latest manufacturers patches

➢Disabling unused software and applications

➢Use strong passwords for all accounts

➢Use a firewall

➢Lock your PC / Mac screen when not in use

➢Shut down computer if gone more than 6 hrs

➢ Install a back-up system

Grand Computers - Cybersecurity & Time Machine Backup 11

macOS Version History

• Mac OS X Public Beta - 2000

• Mac OS X 10.0 Cheetah - 2001

• Mac OS X 10.1 Puma - 2001

• Mac OS X 10.2 Jaguar - 2002

• Mac OS X 10.3 Panther - 2003

• Mac OS X 10.4 Tiger - 2005

• Mac OS X 10.5 Leopard - 2007

• Mac OS X 10.6 Snow leopard - 2009

• Mac OS X 10.7 Lion - 2011

• Mac OS X 10.8 Mountain Lion - 2012

• Mac OS X 10.9 Mavericks - 2013

• Mac OS X 10.10 Yosemite - 2014

• Mac OS X 10.11 El Capitan - 2015

• macOS X 10.12 Sierra - 2016

• macOS X 10.13 High Sierra - 2017

• macOS X 10.14 Mojave - 2018

• macOS X 10.15 Catalina - 2019

Grand Computers - Cybersecurity & Time Machine Backup 12

11

12

12/16/19

7

Why Backup your Machine?

• #1 Protection for your data

• Hard Disk / SSD on your computer will fail

➢Just a matter of time

• Disaster may cause loss of computer / data

➢Fire, Flood, Tornado, etc.

• Theft

➢House break in – stolen computer

• Cybersecurity

➢Ransomware / malware attack – encrypts / infects files

• User errors

➢Deletes wrong files

Grand Computers - Cybersecurity & Time Machine Backup 13

The Ideal Backup Checklist

• Backup Frequently

• Redundancy - have multiple backups

➢Local Backup – External USB Local Drive

➢Online Backup – a Cloud service (BackBlaze)

➢Off-Site Backup – Store backup USB disk at a Bank

• The 3-2-1 Rule (no single point failure)

➢3 copies of data

➢2 different media formats (e.g., USB & Cloud)

➢1 stored off-siteGrand Computers - Cybersecurity & Time Machine Backup 14

13

14

12/16/19

8

Three Options for Local External Backup

1. USB Solid State Device

➢Fast, small storage space, expensive

2. USB Hard Drives - recommended

➢Slower, lots of space – e.g., 4-10GB

3. USB Flash Drives

➢Cheap, Simple, small storage space

Grand Computers - Cybersecurity & Time Machine Backup 15

Grand Computers - Cybersecurity & Time Machine Backup 16

Backup using Time Machine Software on Macs(Time Machine is Apple’s Backup Software - on all Macs)

• Apple >System Preferences

>Time Machine

• Plug in External USB Drive

to use for backups

• Check – Show Time

Machine in menu bar

15

16

12/16/19

9

Grand Computers - Cybersecurity & Time Machine Backup 17

Backup using Time Machine on Macs(Time Machine is Apple’s Backup Software - on all Macs)

• Select the Disk to use for

backup

• Check Back Up

Automatically

➢Time machine backs up

hourly, incrementally

Grand Computers - Cybersecurity & Time Machine Backup 18

Backup using Time Machine on Macs

• Select Options to exclude

files you do not want to

backup

➢Applications

➢Library

➢System Files and Applications

➢etc

17

18

12/16/19

10

Backup using Time Machine on Macs

• Your done!

• Close Time Machine Window

• The 1st backup will take time

• Future backups are incremental and

occur automatically every hour

Grand Computers - Cybersecurity & Time Machine Backup 19

Retrieve Information from Time Machine

• Click Time Machine icon in Menu

>Enter Time Machine

➢Vertical Calendar days on right of

screen indicate where you are in

backup dates

➢Click any date to go back in time

➢You can retrieve any file or folder

Grand Computers - Cybersecurity & Time Machine Backup 20

19

20

12/16/19

11

Off-Site Backups

• It is recommended that you have an off-site backup in addition to

your local backup

• Example Off-Site Backup options:

➢Backblaze – single computer backup

❖ www.backblaze.com

❖$50/yr for unlimited space

➢ iDrive Personal – Backup all computers & devices

❖www.iDrive.com

❖$70/yr for 5TB of space

❖Specials exist for $6 for 1st year

• Note: Syncing services like DropBox, iCloud, etc, are not

considered system backups – they are only off-site file backups

Grand Computers - Cybersecurity & Time Machine Backup 21

iDrive.com – Cloud Backup(https://tinyurl.com/tu6btgt)

Grand Computers - Cybersecurity & Time Machine Backup 22

21

22

12/16/19

12

Priority Actions for Users

1. Always have backups of your system / files

2. Use an antivirus / malware program

3. Use a Password Manager

➢Generates complex passwords automatically

➢Easy to change and remembers passwords

➢Change passwords frequently

4. Always update OS to latest version

5. Harden your device thru OS settings

➢Firewall

➢Limit app access to location, contacts, photos, etc.

6. Harden your Browser thru settings

Grand Computers - Cybersecurity & Time Machine Backup 23

GCC Cybersecurity Classes in Winter Session

• Cybersecurity Courses for PCs

❖Introduction to Cybersecurity Basics

❖Windows 10 Hardening - Set up and Configure

❖Windows 10 Backup - Restoration Points and Data Backup

❖Window 10 Edge Browser Hardening

❖Google Chrome Browser Hardening

• Cybersecurity Courses for Macs

❖MacOS Hardening – Set up and Configure

❖Safari Browser Hardening & Time Machine backup

Grand Computers – Cybersecurity & Time Machine Backup 24

23

24

12/16/19

13

References

• Ultimate Guide to Mac Security 2018

➢https://www.avg.com/en/signal/ultimate-guide-to-mac-security

• How to Make Your Mac as Secure as Possible

➢https://lifehacker.com/how-to-make-your-mac-as-secure-as-possible-

1829531978

• Mac security tips: best Mac security settings

➢https://www.macworld.co.uk/feature/mac/security-firewall-3643100/

• Using the Mac Security Preference Pane

➢https://www.lifewire.com/use-mac-security-preference-pane-2260745

• Backup your Mac with Time Machine

➢https://support.apple.com/en-us/HT201250

Grand Computers - Cybersecurity & Time Machine Backup 25

Questions

• What questions do you have for

me?

Grand Computers - Cybersecurity & Time Machine Backup

26

25

26