SlideShare una empresa de Scribd logo
1 de 47
Descargar para leer sin conexión
www.treetopsecurity.com
Cybersecurity
Awareness
Tips To Protect You And Your Data
CONTENT BY
1
DALLAS HASELHORST
FOUNDER/OWNER, TREETOP SECURITY
GSE #231, MSISE, CISSP, SANS/GIAC(X10)
From the makers of Peak. The only comprehensive and
affordable cybersecurity platform for small businesses.
PRESENTED BY
TreeTop Security - CAT - v1.3
# whoami
● 20+ years of IT & cybersecurity experience
● Consulted for companies all over the world
● Multiple computer-related degrees from FHSU
● Master’s degree in Information Security Engineering
from the SANS Technology Institute
● Alphabet soup of security-related certifications
○ CISSP, GSEC, GCIH, GCCC, GCPM, GPEN,
GMON, GCIA, GWAPT, GDSA, GSE #231
● Co-organizer of BSidesKC security conference
● Founded an MSP in 2003, acquired in 2016
● Founded TreeTop in 2016, lead design on Peak platform
2
TreeTop Security - CAT - v1.3
3
About this presentation
Shared and recommended
at the RSA conference
Feb 2020
Version 1.0 downloaded in over
150 countries in first 6 months!
Sept 2019 - March 2020
Latest version is available at
https://www.treetopsecurity.com/CAT
TreeTop Security - CAT - v1.3
4
TreeTop Security - CAT - v1.3
Overview
● Why security awareness?
● Backup, backup, backup
● Patching ALL of your devices
● Passwords
What to do when things go wrong
5
TreeTop Security - CAT - v1.3
● 2-factor authentication
● Internet safety & email
● Phone scams
● Privacy concerns
Why is
cybersecurity
awareness
important?
6
TreeTop Security - CAT - v1.3
Awareness training is a must!
● Technology alone cannot protect you from everything
● Attackers go where security is weakest
● People -> a link in the chain & the last first line of defense
● Essential to reducing cybersecurity risk
● Cybersecurity awareness is for...
○ Employees
○ Business owners
Reminder: Many tips that keep you safe
at work will also keep you safe at home!
7
○ Parents
○ Kids
○ Seniors
○ Everyone!
TreeTop Security - CAT - v1.3
But an attacker isn’t interested in me...
● Credit card and financial data
● Medical data
○ Prescription, insurance, or identity fraud
○ Far more valuable than financial data
● Computer resources
○ Cryptomining
○ Advertising
● User or email credentials
○ Sending spam
○ Recovery/reset other accounts
8
○ Ransomware
○ Jump point
○ “More” access
TreeTop Security - CAT - v1.3
Wrong!!! You are exactly what an attacker wants!
HELP!!!
Ways to protect
yourself!
9
TreeTop Security - CAT - v1.3
Backups
● Backups protect when all else fails
○ NO level of protection is perfect
○ Only “guaranteed” protection against ransomware
● Backup media should not be connected at all times
● Test your backups! Restore, restore, restore...
Users that
have never
backed up
35%
Users that
backup
daily
6%
Users that
backup
monthly
14%
Users that
backup
yearly
20%
10
TreeTop Security - CAT - v1.3
Worksheet #1
Your data,
your backups
https://www.treetopsecurity.com/CAT
11
TreeTop Security - CAT - v1.3
Updates are essential to security
• What was secure yesterday may not
be secure today
• New software vulnerabilities found
every day
• Over 360K new malware (viruses &
ransomware) released every day
• Nothing is “Set & Forget”
12
TreeTop Security - CAT - v1.3
● Operating Systems
○ Microsoft Windows, Apple MacOS, Linux
○ Windows 7 end of life was January 2020
● Anti-virus
○ Update to the latest definitions to ensure
protection against the latest threats
○ Symantec/Norton, McAfee, Windows Defender,
Avast, and many others!
13
Keeping your system up-to-date
TreeTop Security - CAT - v1.3
Don’t forget!!!
● Browser - your portal to the internet
○ Chrome, Firefox, Edge, Safari, Brave, etc.
○ Internet Explorer (Not recommended)
● Mobile devices - cell phones & tablets
● Internet of Things (IoT) - Alexa, Google Home, light
bulbs, thermostats, doorbells, surveillance system,
smart locks, pet feeder, vacuums, health monitors...
This could keep going forever!
14
TreeTop Security - CAT - v1.3
15
TreeTop Security - CAT - v1.3
Worksheet #2
What’s on your
network?
https://www.treetopsecurity.com/CAT
All
About
Passwords
16
TreeTop Security - CAT - v1.3
17
TreeTop Security - CAT - v1.3
Managing Passwords
● Keep your passwords in a secure location
○ Don’t use paper or sticky notes
○ Don’t store passwords in clear-text on
your computer - Word, Excel, etc.
● Utilize a password manager (aka vault)
○ Bitwarden
● Benefits of a password manager
○ One strong password to access them all
○ Encrypted storage of passwords
○ Auto-fill username/password on websites
○ Sync between desktop, laptop, and mobile
18
○ KeePass ○ LastPass
TreeTop Security - CAT - v1.3
Password Tips
● Avoid using items that can be associated with you
○ Address
○ Phone numbers
○ Pet names
● Separate passwords for every account
● Auto-generated, unmemorable
Passwords shared
with colleagues
69%
Passwords shared
with household
95%
One password for all
accounts
59%
Passwords are too
“simple”
86%
19
Easy with a
password manager
○ Child names
○ Birthdays
○ Sports teams
TreeTop Security - CAT - v1.3
Passwords vs passphrases
● Useful when passwords must be typed in
● Should not be easy to guess
○ At least 12 characters, but 15 or more is far better
○ Length is better than complexity (passphrases)
○ Bad password (8): P@ssw0rd
○ Great password (25): MysonwasbornNovember1995!
Passwords exactly 8
characters
61%
Average Length of
Password
9.6
Average number of
lowercase letters
6.1
Average number of
special characters
0.2
20
TreeTop Security - CAT - v1.3
Top 20 passwords by rank & year
Source: https://nordpass.com/most-common-passwords-list/
If you use any of these, change them NOW!!!
21
TreeTop Security - CAT - v1.3
Rank 2018 2019 2020 Rank 2018 2019 2020
1 123456 123456 123456 11 princess abc123 1234567
2 password 123456789 123456789 12 admin qwerty123 qwerty
3 123456789 qwerty picture1 13 welcome 1q2w3e4r abc123
4 12345678 password password 14 666666 admin Million2
5 12345 1234567 12345678 15 abc123 qwertyuiop 000000
6 111111 12345678 111111 16 football 654321 1234
7 1234567 12345 123123 17 123123 555555 iloveyou
8 sunshine iloveyou 12345 18 monkey lovely aaron431
9 qwerty 111111 1234567890 19 654321 7777777 password1
10 iloveyou 123123 senha 20 !@#$%^&* welcome qqww1122
2FA - two-factor authentication
● “Your one-time code is…”
○ Email
○ Phone pop-up
○ Snail Mail
○ Applications
■ Google Authenticator
■ Authy <- ability to recover on new device
● What is 2FA?
○ “Beyond” a username and password
○ Second form to prove it is you
○ Typically out-of-band
22
○ Phone Call
○ SMS
TreeTop Security - CAT - v1.3
Not as
secure
23
TreeTop Security - CAT - v1.3
Worksheet #3
Password managers
& 2FA
https://www.treetopsecurity.com/CAT
Just
A Little
Click
24
TreeTop Security - CAT - v1.3
Is the link safe in 4 steps
1. Verify
Were you expecting a link?
○ Not just email!
○ Social Media
○ SMS/iMessage
○ Zoom, Teams, Slack, etc.
2. Hover
Hover over the link to
ensure that it leads to
where it says it does
3. Sniff test
Is it a site you recognize?
Does it feel “familiar” to you?
Be skeptical
4. Click
Does it pass all 3 tests?
Still use caution
“When in doubt, throw
it out”
01
02
03
04
25
TreeTop Security - CAT - v1.3
Easy to recognize scam
○ Viagra <- ?!?!?!
○ Strange wording
○ Email address
26
Domain name
Expected email?
Interesting link
Red flags?
TreeTop Security - CAT - v1.3
Known email account
○ Email address ok
○ Name ok
○ Odd “signature”
27
Expected email?
Link - .fr is France
Hacked or
spoofed email
from someone
you know
Red flags?
TreeTop Security - CAT - v1.3
○ Received a text regarding
a package before?
○ Recognized domain?
Text messaging example
28
TreeTop Security - CAT - v1.3
Red flags?
Source: CNN
○ Name in SMS ok
○ Number ok?
○ Expected text?
Hover before you click
29
● Why hover?
○ Blue text can be deceiving
○ Underlying URL may be
different
○ Foreign domains - .uk, .cn, or .ru
● Numbers instead of letters
○ Example: 192.168.1.1
○ Don’t trust it!
● Hover on mobile/tablet?
○ Long press (hold)
● Any doubts? Don’t click it!!!
http://www.evil.com/
Desktop - Hover
Mobile - Long Press
TreeTop Security - CAT - v1.3
Shortened or obfuscated links?
30
● Instead of 300 characters, the link is reduced to 15 characters
○ Bit.ly
○ TinyURL
● Extremely common and helpful, but...
● Abused by criminals to hide malicious websites
Link expander
www.linkexpander.com
TreeTop Security - CAT - v1.3
Hover is your friend
31
TreeTop Security - CAT - v1.3
○ Email address ok?
○ Expected email?
○ Sense of urgency
○ Hover!!!
Red flags?
Source: Malware Traffic Analysis
More email attacks
92% of malware is
delivered by email
Source: CSO Online
32
TreeTop Security - CAT - v1.3
Email Attachments
● Stop & think before you click!
● Recognized sender?
● Expecting attachment?
● Is it normal for that contact to
send attachments?
Macros
● Step 1: Don’t do it!!!
● Step 2: See step 1
● Found in downloaded files too
33
Attachments in Microsoft Outlook
Enable Macros <- NOOOOOO!!!!
TreeTop Security - CAT - v1.3
Other Email Scams
34
TreeTop Security - CAT - v1.3
● Can be “non-technical”
● Spear phishing (CEO <-> CFO)
○ Published organization chart
○ Policy requiring phone call?
● What they want
○ Prepaid cards
○ Wire transfers
○ Account & email credentials
● Sense of urgency
Technical safeguards cannot help
Account credentials
Wire transfer
Scammer favorites
● Mimic recent news
○ Worldwide
■ Health scares
■ Protests
■ Elections
○ Local and regional
● Seasonal/holidays
○ Order & delivery issues
○ Tax issues
35
Recent events - coronavirus
Order Cancelled
TreeTop Security - CAT - v1.3
Keep your guard up!
36
TreeTop Security - CAT - v1.3
Worksheet #4
Have you been part
of a breach?
https://www.treetopsecurity.com/CAT
Reach Out
& Scam
Someone
37
TreeTop Security - CAT - v1.3
Phone Scams
38
TreeTop Security - CAT - v1.3
● Social engineering, what is it?
○ Banks & credit card companies
○ Medical & insurance
○ IRS or any past due account balance
○ Objective: access your sensitive info
● Phone numbers can be easily spoofed
○ Make the caller provide verification
○ Hang up & call back a published number
● Other common phone scams
○ Grandparent Scam
○ Tech support - Microsoft, Apple, Dell,
etc. will never contact the average user
“out of the blue”
Phone scam example
○ Sense of urgency
○ Purposefully confusing
○ Expected call from Microsoft?
39
Red flags?
Hi! This is Kathleen from Microsoft. We have been trying to get in
touch with you. However, we will be disconnecting your license
within 48 hours because your IP address has been compromised
from several countries. So we need to change your IP address and
license key. So please press 1 to get connected…
Technical safeguards can only do so much...
That’s why security awareness is a must!
TreeTop Security - CAT - v1.3
General Tips
&
Privacy
40
TreeTop Security - CAT - v1.3
USB Drives & More
● Do NOT connect unknown or
unauthorized media (or devices)
● Programs can run when plugged in
without you doing anything
● Examples
○ USB/flash drives
○ SD or micro SD cards
○ CDs or DVDs
○ External hard drives
○ Cell phones <- Often forgotten
41
TreeTop Security - CAT - v1.3
Encryption
● Can help protect your data
● Can also “help” an attacker, e.g. ransomware
● Protecting data sent or received
○ HTTP vs. HTTPS
○ Wireless -> WPA2 (AES) recommended
● Protecting devices
○ Helpful if device is lost/stolen
○ Often associated with phone PIN/passcode
○ Microsoft Windows - BitLocker
○ Apple MacOS - FileVault
42
TreeTop Security - CAT - v1.3
Internet Safety Quick Tips
● Never install anything based on a
pop-up when visiting a website
● “Trusted” websites can & have
hosted malware, aka malvertising
○ Local news?
○ WSJ, Forbes, ESPN, Yahoo, etc.
○ Limit browsing to business
relevant sites?
● Avoid public: Wi-Fi, computers
(hotels, libraries), charging, etc.
43
Do NOT assume a site is legitimate
simply because of the green padlock
TreeTop Security - CAT - v1.3
● Data is the new gold -> your data is valuable!
● If you’re not paying for it, are you the product?
○ Data analytics & predictive results
○ Examples: advertising & insurance rates
● Are you oversharing?
○ Default privacy settings on social media
○ Vacation photos & “checking-in” (location sharing)
■ Thieves see that information also
■ Would you be comfortable telling people on
the street?
Internet Privacy
44
TreeTop Security - CAT - v1.3
Uh oh! You’ve been scammed
● It happens! Don’t be ashamed!
● Don’t panic, but don’t wait around
○ Unplug computer?
○ Contact your technical support
○ Write down details - event timeline, financial
accounts, credentials used, phone numbers, etc.
● Ransomware or scam
○ Report the incident to law enforcement?
○ In the US
■ BBB - https://www.bbb.org/scamtracker
■ FBI - Ransomware keys may be available
○ https://www.nomoreransom.org/
45
TreeTop Security - CAT - v1.3
More Resources
● When in doubt, ask questions
○ Your IT dept/provider?
○ Don’t stop here! Attacks change, so should you
● Additional Resources
○ SANS Ouch! - free monthly newsletter
○ StaySafeOnline.org - numerous free resources
○ Stop. Think. Connect. - free, little bit of everything
○ TreeTop Security - Cybersecurity Awareness Training (free)
These slides, video presentation of this material, value-add worksheets,
post-training quiz, feedback form, newsletter sign-up, certificate of
completion & more! - https://www.treetopsecurity.com/CAT
● Worksheet #5 - Sharing is caring
46
○ TreeTop?
TreeTop Security - CAT - v1.3
Questions?
47
785-370-3444
Dallas Haselhorst
info@treetopsecurity.com
https://www.treetopsecurity.com
Ask about Peak. The affordable, comprehensive, & common sense
cybersecurity platform designed for small businesses.
TreeTop Security - CAT - v1.3

Más contenido relacionado

La actualidad más candente

Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0DallasHaselhorst
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awarenessJason Murray
 
Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08DallasHaselhorst
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationTriCorps Technologies
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness TrainingRandy Bowman
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee TrainingPaige Rasid
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxDinesh582831
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness SnapComms
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Radar Cyber Security
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training OpenFred Beck MBA, CPA
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessInnocent Korie
 
Public - Cybersecurity awareness presentation (1).pptx
Public - Cybersecurity awareness presentation (1).pptxPublic - Cybersecurity awareness presentation (1).pptx
Public - Cybersecurity awareness presentation (1).pptxSileSoftwareInc
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness PresentationCristian Mihai
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityAtlantic Training, LLC.
 

La actualidad más candente (20)

Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08
 
Cyber security training
Cyber security trainingCyber security training
Cyber security training
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Public - Cybersecurity awareness presentation (1).pptx
Public - Cybersecurity awareness presentation (1).pptxPublic - Cybersecurity awareness presentation (1).pptx
Public - Cybersecurity awareness presentation (1).pptx
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
 

Similar a Cybersecurity Awareness Training Presentation v1.3

Cybersecurity Awareness Training Presentation v1.2
Cybersecurity Awareness Training Presentation v1.2Cybersecurity Awareness Training Presentation v1.2
Cybersecurity Awareness Training Presentation v1.2DallasHaselhorst
 
DSRY_Cybersecurity Awareness Presentation
DSRY_Cybersecurity Awareness PresentationDSRY_Cybersecurity Awareness Presentation
DSRY_Cybersecurity Awareness PresentationMohammedFarouk38
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
Don't Diligence Information Security for Lawyers
Don't Diligence Information Security for LawyersDon't Diligence Information Security for Lawyers
Don't Diligence Information Security for Lawyersdarrentthurston
 
FHSU CITI CS Training.pptx
FHSU CITI CS Training.pptxFHSU CITI CS Training.pptx
FHSU CITI CS Training.pptxLaurieAnnFrazier
 
Securing your digital life - Jason Addie
Securing your digital life -  Jason AddieSecuring your digital life -  Jason Addie
Securing your digital life - Jason AddieDataFest Tbilisi
 
Mc physics colloquium2018-03-30.-handouts
Mc physics colloquium2018-03-30.-handoutsMc physics colloquium2018-03-30.-handouts
Mc physics colloquium2018-03-30.-handoutsKevin Wall
 
7 Cybersecurity Sins When Working From Home
7 Cybersecurity Sins When Working From Home7 Cybersecurity Sins When Working From Home
7 Cybersecurity Sins When Working From HomeDallasHaselhorst
 
Iron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyIron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyGabor Szathmari
 
PBL Encryption project.pptx
PBL Encryption project.pptxPBL Encryption project.pptx
PBL Encryption project.pptxXyzAnc
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security InnovationPriyanka Aash
 
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01TechSoup
 
The top 5 basics fundamentals of network security cyberhunter solutions
The top 5 basics fundamentals of network security    cyberhunter solutionsThe top 5 basics fundamentals of network security    cyberhunter solutions
The top 5 basics fundamentals of network security cyberhunter solutionsCyberhunter Cyber Security
 
Disruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptxDisruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptxDebra Baker, CISSP CSSP
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online PrivacyKazi Sarwar Hossain
 
How to be your Security Team's Best Friend
How to be your Security Team's Best FriendHow to be your Security Team's Best Friend
How to be your Security Team's Best FriendEmilyGladstoneCole
 
Manage your privacy and security online
Manage your privacy and security onlineManage your privacy and security online
Manage your privacy and security onlineChristopherTalib
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02amiinaaa
 
cyber security presentation (1).pdf
cyber security presentation (1).pdfcyber security presentation (1).pdf
cyber security presentation (1).pdfw4tgrgdyryfh
 

Similar a Cybersecurity Awareness Training Presentation v1.3 (20)

Cybersecurity Awareness Training Presentation v1.2
Cybersecurity Awareness Training Presentation v1.2Cybersecurity Awareness Training Presentation v1.2
Cybersecurity Awareness Training Presentation v1.2
 
DSRY_Cybersecurity Awareness Presentation
DSRY_Cybersecurity Awareness PresentationDSRY_Cybersecurity Awareness Presentation
DSRY_Cybersecurity Awareness Presentation
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
Don't Diligence Information Security for Lawyers
Don't Diligence Information Security for LawyersDon't Diligence Information Security for Lawyers
Don't Diligence Information Security for Lawyers
 
FHSU CITI CS Training.pptx
FHSU CITI CS Training.pptxFHSU CITI CS Training.pptx
FHSU CITI CS Training.pptx
 
Securing your digital life - Jason Addie
Securing your digital life -  Jason AddieSecuring your digital life -  Jason Addie
Securing your digital life - Jason Addie
 
Mc physics colloquium2018-03-30.-handouts
Mc physics colloquium2018-03-30.-handoutsMc physics colloquium2018-03-30.-handouts
Mc physics colloquium2018-03-30.-handouts
 
7 Cybersecurity Sins When Working From Home
7 Cybersecurity Sins When Working From Home7 Cybersecurity Sins When Working From Home
7 Cybersecurity Sins When Working From Home
 
Iron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyIron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data Responsibly
 
PBL Encryption project.pptx
PBL Encryption project.pptxPBL Encryption project.pptx
PBL Encryption project.pptx
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security Innovation
 
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
 
The top 5 basics fundamentals of network security cyberhunter solutions
The top 5 basics fundamentals of network security    cyberhunter solutionsThe top 5 basics fundamentals of network security    cyberhunter solutions
The top 5 basics fundamentals of network security cyberhunter solutions
 
Disruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptxDisruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptx
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
 
How to be your Security Team's Best Friend
How to be your Security Team's Best FriendHow to be your Security Team's Best Friend
How to be your Security Team's Best Friend
 
Manage your privacy and security online
Manage your privacy and security onlineManage your privacy and security online
Manage your privacy and security online
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
Masterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy BasicsMasterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy Basics
 
cyber security presentation (1).pdf
cyber security presentation (1).pdfcyber security presentation (1).pdf
cyber security presentation (1).pdf
 

Último

Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionMintel Group
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchirictsugar
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadAyesha Khan
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...lizamodels9
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxMarkAnthonyAurellano
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...lizamodels9
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Timedelhimodelshub1
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 

Último (20)

Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted Version
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchir
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Time
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 

Cybersecurity Awareness Training Presentation v1.3

  • 1. www.treetopsecurity.com Cybersecurity Awareness Tips To Protect You And Your Data CONTENT BY 1 DALLAS HASELHORST FOUNDER/OWNER, TREETOP SECURITY GSE #231, MSISE, CISSP, SANS/GIAC(X10) From the makers of Peak. The only comprehensive and affordable cybersecurity platform for small businesses. PRESENTED BY TreeTop Security - CAT - v1.3
  • 2. # whoami ● 20+ years of IT & cybersecurity experience ● Consulted for companies all over the world ● Multiple computer-related degrees from FHSU ● Master’s degree in Information Security Engineering from the SANS Technology Institute ● Alphabet soup of security-related certifications ○ CISSP, GSEC, GCIH, GCCC, GCPM, GPEN, GMON, GCIA, GWAPT, GDSA, GSE #231 ● Co-organizer of BSidesKC security conference ● Founded an MSP in 2003, acquired in 2016 ● Founded TreeTop in 2016, lead design on Peak platform 2 TreeTop Security - CAT - v1.3
  • 3. 3 About this presentation Shared and recommended at the RSA conference Feb 2020 Version 1.0 downloaded in over 150 countries in first 6 months! Sept 2019 - March 2020 Latest version is available at https://www.treetopsecurity.com/CAT TreeTop Security - CAT - v1.3
  • 4. 4 TreeTop Security - CAT - v1.3
  • 5. Overview ● Why security awareness? ● Backup, backup, backup ● Patching ALL of your devices ● Passwords What to do when things go wrong 5 TreeTop Security - CAT - v1.3 ● 2-factor authentication ● Internet safety & email ● Phone scams ● Privacy concerns
  • 7. Awareness training is a must! ● Technology alone cannot protect you from everything ● Attackers go where security is weakest ● People -> a link in the chain & the last first line of defense ● Essential to reducing cybersecurity risk ● Cybersecurity awareness is for... ○ Employees ○ Business owners Reminder: Many tips that keep you safe at work will also keep you safe at home! 7 ○ Parents ○ Kids ○ Seniors ○ Everyone! TreeTop Security - CAT - v1.3
  • 8. But an attacker isn’t interested in me... ● Credit card and financial data ● Medical data ○ Prescription, insurance, or identity fraud ○ Far more valuable than financial data ● Computer resources ○ Cryptomining ○ Advertising ● User or email credentials ○ Sending spam ○ Recovery/reset other accounts 8 ○ Ransomware ○ Jump point ○ “More” access TreeTop Security - CAT - v1.3 Wrong!!! You are exactly what an attacker wants!
  • 10. Backups ● Backups protect when all else fails ○ NO level of protection is perfect ○ Only “guaranteed” protection against ransomware ● Backup media should not be connected at all times ● Test your backups! Restore, restore, restore... Users that have never backed up 35% Users that backup daily 6% Users that backup monthly 14% Users that backup yearly 20% 10 TreeTop Security - CAT - v1.3
  • 11. Worksheet #1 Your data, your backups https://www.treetopsecurity.com/CAT 11 TreeTop Security - CAT - v1.3
  • 12. Updates are essential to security • What was secure yesterday may not be secure today • New software vulnerabilities found every day • Over 360K new malware (viruses & ransomware) released every day • Nothing is “Set & Forget” 12 TreeTop Security - CAT - v1.3
  • 13. ● Operating Systems ○ Microsoft Windows, Apple MacOS, Linux ○ Windows 7 end of life was January 2020 ● Anti-virus ○ Update to the latest definitions to ensure protection against the latest threats ○ Symantec/Norton, McAfee, Windows Defender, Avast, and many others! 13 Keeping your system up-to-date TreeTop Security - CAT - v1.3
  • 14. Don’t forget!!! ● Browser - your portal to the internet ○ Chrome, Firefox, Edge, Safari, Brave, etc. ○ Internet Explorer (Not recommended) ● Mobile devices - cell phones & tablets ● Internet of Things (IoT) - Alexa, Google Home, light bulbs, thermostats, doorbells, surveillance system, smart locks, pet feeder, vacuums, health monitors... This could keep going forever! 14 TreeTop Security - CAT - v1.3
  • 15. 15 TreeTop Security - CAT - v1.3 Worksheet #2 What’s on your network? https://www.treetopsecurity.com/CAT
  • 17. 17 TreeTop Security - CAT - v1.3
  • 18. Managing Passwords ● Keep your passwords in a secure location ○ Don’t use paper or sticky notes ○ Don’t store passwords in clear-text on your computer - Word, Excel, etc. ● Utilize a password manager (aka vault) ○ Bitwarden ● Benefits of a password manager ○ One strong password to access them all ○ Encrypted storage of passwords ○ Auto-fill username/password on websites ○ Sync between desktop, laptop, and mobile 18 ○ KeePass ○ LastPass TreeTop Security - CAT - v1.3
  • 19. Password Tips ● Avoid using items that can be associated with you ○ Address ○ Phone numbers ○ Pet names ● Separate passwords for every account ● Auto-generated, unmemorable Passwords shared with colleagues 69% Passwords shared with household 95% One password for all accounts 59% Passwords are too “simple” 86% 19 Easy with a password manager ○ Child names ○ Birthdays ○ Sports teams TreeTop Security - CAT - v1.3
  • 20. Passwords vs passphrases ● Useful when passwords must be typed in ● Should not be easy to guess ○ At least 12 characters, but 15 or more is far better ○ Length is better than complexity (passphrases) ○ Bad password (8): P@ssw0rd ○ Great password (25): MysonwasbornNovember1995! Passwords exactly 8 characters 61% Average Length of Password 9.6 Average number of lowercase letters 6.1 Average number of special characters 0.2 20 TreeTop Security - CAT - v1.3
  • 21. Top 20 passwords by rank & year Source: https://nordpass.com/most-common-passwords-list/ If you use any of these, change them NOW!!! 21 TreeTop Security - CAT - v1.3 Rank 2018 2019 2020 Rank 2018 2019 2020 1 123456 123456 123456 11 princess abc123 1234567 2 password 123456789 123456789 12 admin qwerty123 qwerty 3 123456789 qwerty picture1 13 welcome 1q2w3e4r abc123 4 12345678 password password 14 666666 admin Million2 5 12345 1234567 12345678 15 abc123 qwertyuiop 000000 6 111111 12345678 111111 16 football 654321 1234 7 1234567 12345 123123 17 123123 555555 iloveyou 8 sunshine iloveyou 12345 18 monkey lovely aaron431 9 qwerty 111111 1234567890 19 654321 7777777 password1 10 iloveyou 123123 senha 20 !@#$%^&* welcome qqww1122
  • 22. 2FA - two-factor authentication ● “Your one-time code is…” ○ Email ○ Phone pop-up ○ Snail Mail ○ Applications ■ Google Authenticator ■ Authy <- ability to recover on new device ● What is 2FA? ○ “Beyond” a username and password ○ Second form to prove it is you ○ Typically out-of-band 22 ○ Phone Call ○ SMS TreeTop Security - CAT - v1.3 Not as secure
  • 23. 23 TreeTop Security - CAT - v1.3 Worksheet #3 Password managers & 2FA https://www.treetopsecurity.com/CAT
  • 25. Is the link safe in 4 steps 1. Verify Were you expecting a link? ○ Not just email! ○ Social Media ○ SMS/iMessage ○ Zoom, Teams, Slack, etc. 2. Hover Hover over the link to ensure that it leads to where it says it does 3. Sniff test Is it a site you recognize? Does it feel “familiar” to you? Be skeptical 4. Click Does it pass all 3 tests? Still use caution “When in doubt, throw it out” 01 02 03 04 25 TreeTop Security - CAT - v1.3
  • 26. Easy to recognize scam ○ Viagra <- ?!?!?! ○ Strange wording ○ Email address 26 Domain name Expected email? Interesting link Red flags? TreeTop Security - CAT - v1.3
  • 27. Known email account ○ Email address ok ○ Name ok ○ Odd “signature” 27 Expected email? Link - .fr is France Hacked or spoofed email from someone you know Red flags? TreeTop Security - CAT - v1.3
  • 28. ○ Received a text regarding a package before? ○ Recognized domain? Text messaging example 28 TreeTop Security - CAT - v1.3 Red flags? Source: CNN ○ Name in SMS ok ○ Number ok? ○ Expected text?
  • 29. Hover before you click 29 ● Why hover? ○ Blue text can be deceiving ○ Underlying URL may be different ○ Foreign domains - .uk, .cn, or .ru ● Numbers instead of letters ○ Example: 192.168.1.1 ○ Don’t trust it! ● Hover on mobile/tablet? ○ Long press (hold) ● Any doubts? Don’t click it!!! http://www.evil.com/ Desktop - Hover Mobile - Long Press TreeTop Security - CAT - v1.3
  • 30. Shortened or obfuscated links? 30 ● Instead of 300 characters, the link is reduced to 15 characters ○ Bit.ly ○ TinyURL ● Extremely common and helpful, but... ● Abused by criminals to hide malicious websites Link expander www.linkexpander.com TreeTop Security - CAT - v1.3
  • 31. Hover is your friend 31 TreeTop Security - CAT - v1.3 ○ Email address ok? ○ Expected email? ○ Sense of urgency ○ Hover!!! Red flags? Source: Malware Traffic Analysis
  • 32. More email attacks 92% of malware is delivered by email Source: CSO Online 32 TreeTop Security - CAT - v1.3
  • 33. Email Attachments ● Stop & think before you click! ● Recognized sender? ● Expecting attachment? ● Is it normal for that contact to send attachments? Macros ● Step 1: Don’t do it!!! ● Step 2: See step 1 ● Found in downloaded files too 33 Attachments in Microsoft Outlook Enable Macros <- NOOOOOO!!!! TreeTop Security - CAT - v1.3
  • 34. Other Email Scams 34 TreeTop Security - CAT - v1.3 ● Can be “non-technical” ● Spear phishing (CEO <-> CFO) ○ Published organization chart ○ Policy requiring phone call? ● What they want ○ Prepaid cards ○ Wire transfers ○ Account & email credentials ● Sense of urgency Technical safeguards cannot help Account credentials Wire transfer
  • 35. Scammer favorites ● Mimic recent news ○ Worldwide ■ Health scares ■ Protests ■ Elections ○ Local and regional ● Seasonal/holidays ○ Order & delivery issues ○ Tax issues 35 Recent events - coronavirus Order Cancelled TreeTop Security - CAT - v1.3 Keep your guard up!
  • 36. 36 TreeTop Security - CAT - v1.3 Worksheet #4 Have you been part of a breach? https://www.treetopsecurity.com/CAT
  • 37. Reach Out & Scam Someone 37 TreeTop Security - CAT - v1.3
  • 38. Phone Scams 38 TreeTop Security - CAT - v1.3 ● Social engineering, what is it? ○ Banks & credit card companies ○ Medical & insurance ○ IRS or any past due account balance ○ Objective: access your sensitive info ● Phone numbers can be easily spoofed ○ Make the caller provide verification ○ Hang up & call back a published number ● Other common phone scams ○ Grandparent Scam ○ Tech support - Microsoft, Apple, Dell, etc. will never contact the average user “out of the blue”
  • 39. Phone scam example ○ Sense of urgency ○ Purposefully confusing ○ Expected call from Microsoft? 39 Red flags? Hi! This is Kathleen from Microsoft. We have been trying to get in touch with you. However, we will be disconnecting your license within 48 hours because your IP address has been compromised from several countries. So we need to change your IP address and license key. So please press 1 to get connected… Technical safeguards can only do so much... That’s why security awareness is a must! TreeTop Security - CAT - v1.3
  • 41. USB Drives & More ● Do NOT connect unknown or unauthorized media (or devices) ● Programs can run when plugged in without you doing anything ● Examples ○ USB/flash drives ○ SD or micro SD cards ○ CDs or DVDs ○ External hard drives ○ Cell phones <- Often forgotten 41 TreeTop Security - CAT - v1.3
  • 42. Encryption ● Can help protect your data ● Can also “help” an attacker, e.g. ransomware ● Protecting data sent or received ○ HTTP vs. HTTPS ○ Wireless -> WPA2 (AES) recommended ● Protecting devices ○ Helpful if device is lost/stolen ○ Often associated with phone PIN/passcode ○ Microsoft Windows - BitLocker ○ Apple MacOS - FileVault 42 TreeTop Security - CAT - v1.3
  • 43. Internet Safety Quick Tips ● Never install anything based on a pop-up when visiting a website ● “Trusted” websites can & have hosted malware, aka malvertising ○ Local news? ○ WSJ, Forbes, ESPN, Yahoo, etc. ○ Limit browsing to business relevant sites? ● Avoid public: Wi-Fi, computers (hotels, libraries), charging, etc. 43 Do NOT assume a site is legitimate simply because of the green padlock TreeTop Security - CAT - v1.3
  • 44. ● Data is the new gold -> your data is valuable! ● If you’re not paying for it, are you the product? ○ Data analytics & predictive results ○ Examples: advertising & insurance rates ● Are you oversharing? ○ Default privacy settings on social media ○ Vacation photos & “checking-in” (location sharing) ■ Thieves see that information also ■ Would you be comfortable telling people on the street? Internet Privacy 44 TreeTop Security - CAT - v1.3
  • 45. Uh oh! You’ve been scammed ● It happens! Don’t be ashamed! ● Don’t panic, but don’t wait around ○ Unplug computer? ○ Contact your technical support ○ Write down details - event timeline, financial accounts, credentials used, phone numbers, etc. ● Ransomware or scam ○ Report the incident to law enforcement? ○ In the US ■ BBB - https://www.bbb.org/scamtracker ■ FBI - Ransomware keys may be available ○ https://www.nomoreransom.org/ 45 TreeTop Security - CAT - v1.3
  • 46. More Resources ● When in doubt, ask questions ○ Your IT dept/provider? ○ Don’t stop here! Attacks change, so should you ● Additional Resources ○ SANS Ouch! - free monthly newsletter ○ StaySafeOnline.org - numerous free resources ○ Stop. Think. Connect. - free, little bit of everything ○ TreeTop Security - Cybersecurity Awareness Training (free) These slides, video presentation of this material, value-add worksheets, post-training quiz, feedback form, newsletter sign-up, certificate of completion & more! - https://www.treetopsecurity.com/CAT ● Worksheet #5 - Sharing is caring 46 ○ TreeTop? TreeTop Security - CAT - v1.3
  • 47. Questions? 47 785-370-3444 Dallas Haselhorst info@treetopsecurity.com https://www.treetopsecurity.com Ask about Peak. The affordable, comprehensive, & common sense cybersecurity platform designed for small businesses. TreeTop Security - CAT - v1.3