2. Who am I?
Who am I?
• Well over 30 years in telecom
• 26 years in the Naval Air Reserve
• Top Secret clearance
• Responsible for proper operation of all in‐flight
Responsible for proper operation of all in flight
communication and navigation equipment
• Former Central Region Adtran, AFC Territory Sales Manager
• L
Long time member of the MNTA and NDTA organizations
ti b f th MNTA d NDTA i ti
• Project manager – County oif Sacramento telecom project
• Visiting faculty at DePaul University in Chicago
• Founder of SimpleTel, Inc. – manufacturer’s representative
3. The ABC’s
of
f
Identity Th ft
Id tit Theft
Part One in a multi part series of overviews on Disaster
Part One in a multi‐part series of overviews on Disaster
Avoidance, Business Continuity and Disaster Recovery
12. During the 2nd half of 2008,
g ,
70 of the top 100 websites
were found to have been
were found to have been
compromised or contained
links to malicious sites.
links to malicious sites
13. Interesting information…
• 25 million new strains of malware are
presented in just one year
• 23 new malware samples per minute
• Banker trojans make up 66% of all malware
• 95% of the bits and bytes sent across the
95% of the bits and bytes sent across the
internet consists of “unstructured” data
• PDF
• JPG/GIF
• MPEG
SOURCE: Infoweek TechWeb Webcast of 2/17/2010
14. Interesting information (cont)…
The most alarming sources of malware
attacks come from:
• Social Networking @ 31%
• Web sites @ 29%
• Email @ 17%
SOURCE: Infoweek TechWeb Webcast of 2/17/2010
15. Interesting information (cont)…
• Facebook receives 15 million requests for
service PER SECOND
• 49 % of companies polled allow their staff
to access Facebook
to access Facebook
What happens when Facebook
What happens hen Facebook
becomes a tool of evil people
SOURCE: Infoweek TechWeb Webcast of 2/17/2010
23. Identity theft in its simplest
y p
form is the compromise and
use of your personal data
use of your personal data
for the purpose of
committing a fraudulent
committing a fraudulent
act.
25. What they want…
• DOB
• SSN/National ID number
/
• Online banking information
• Email address and passwords
• Mailing address
• Telephone number
26. Why they do it…
• Access to your bank accounts
Access to your bank accounts
• Access to your credit card accounts
y
• Use of your personal data to secure
credit
• Use of your personal data to obtain
Use of your personal data to obtain
fraudulent identification papers
36. Hacking
• Remote access of private areas of the company
Remote access of private areas of the company
server environment
Primarily access over the web
1) access into the company home page
2) access into sensitive files areas
• Unlawful or malicious removal of sensitive
information
Internal/local access
Internal/local access
1) USB drives
2) CD burners
3) Rogue wireless devices
)
40. One Support Website
One Pharmacy
Billions of One Merchant Account
Messages
10-15 Unique Site
Designs
100’s Web
1,000’s URLs Servers
10,000’s Message
100,000’s Zombies Variants
41. Spotting malware activity…
• Malware morphs
• IRC ffi i
IRC traffic increases across the common ports
h
• Increases in antivirus file changes
Increases in antivirus file changes
• Outbound SMTP traffic increases
• Host file modification
50. 10 typical security mistakes…
• Sending sensitive date in an unencrypted e‐mail
• Using “security” questions whose answers are
easily discovered
easily discovered
• Imposing password restrictions that are too strict
• Letting vendors define “good security”
• Underestimating req ired sec rit e pertise
Underestimating required security expertise
• Underestimating the importance of review
• Overestimating the importance of secrecy
• Requiring easily forged identification
• Unnecessarily reinventing the wheel
• Giving up the means of your security in exchange
Giving up the means of your security in exchange
for a feeling of security
51. 10 Wi‐fi i f R d W i i
10 Wi fi tips for Road Warrioirs …
• Turn off the wi‐fi clients when not in use
• Verify that the SSID actually represents the
provider’s wi‐fi network
• Make sure that a software firewall is running on
Make sure that a software firewall is running on
your laptop
• Disable Window’s file and printer sharing
• Avoid sensitive online transactions when using
Avoid sensitive online transactions when using
open wi‐fi networks
• Keep you laptop’s OS up to date
• Secure any personal, banking, or credit card details
• Use secure and anonymous web surfing techniques
• Use VPN technology when necessary
Use VPN technology when necessary
• Use remote access applications for security
63. Your individual solution requires a
“blended” approach…
blended approach…
• Your firewall
• Some sort of hardware or software “monitor”
Your corporate solution requires a
Your corporate solution requires a
“blended” approach as well…
• Your firewall
• Some sort of hardware or software “monitor”
• Endpoint security with forensics
65. Business Continuity
and
Disaster Recovery
Part Two in a multi part series of overviews on Disaster
Part Two in a multi‐part series of overviews on Disaster
Avoidance, Business Continuity and Disaster Recovery
66. Compliance: HIPAA,
HITECH, PCI,
Sarbanes-Oxley
Sarbanes Oxley
Part Three in a multi part series of overviews on Disaster
Part Three in a multi‐part series of overviews on Disaster
Avoidance, Business Continuity and Disaster Recovery
67. Larry Pyrz
SimpleTel, Inc.
SimpleTel, Inc.
www.simpletel.biz
larry@simpletel.biz
773‐728‐3315
Larry Pyrz
@larrypyrz
Larry Pyrz