grants management training 200 cyber security there are two kinds of people in america today: those...

37
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and those who have experienced a cyber-attack and don’t know it. –Frank Wolf Which one are you?

Upload: chad-williams

Post on 17-Jan-2016

213 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and

Grants Management Training 200

Cyber Security

There are two kinds of people in America today:

Those who have experienced a cyber-attack and know it,

and those who have experienced a cyber-attack and don’t know it.

–Frank Wolf

Which one are you?

Page 2: Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and

Grants Management Training 200

SAME EMAIL SECURITY RULES APPLY WITH SMART PHONES AND

SOCIAL NETWORKING

91% of Targeted Attacks Start with a Phishing email

Page 3: Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and

Grants Management Training 200

Universities are a prime target for hackers

In 2015, at least 9 major universities were victims of cyber-attacks

Page 4: Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and

Grants Management Training 200

HACKED

http://thehill.com/policy/cybersecurity/251259-hackers-hit-university-of-virginia

Page 5: Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and

Grants Management Training 200

HACKED

http://news.softpedia.com/news/harvard-university-announces-cyber-intrusion-485837.shtml

Page 6: Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and

Grants Management Training 200

HACKED

http://www.esecurityplanet.com/hackers/johns-hopkins-university-hacked.html

Page 7: Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and

Grants Management Training 200

HACKED

http://money.cnn.com/2014/02/19/news/university-maryland-hack/

Page 8: Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and

Grants Management Training 200

HACKED

http://www.nextgov.com/cybersecurity/threatwatch/2015/08/breach/2435/

Page 9: Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and

Grants Management Training 200

http://www.miamiherald.com/news/local/community/miami-dade/coral-gables/article31056513.html

HACKED

Page 10: Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and

Grants Management Training 200

HACKED

http://www.nj.com/education/2015/08/who_hacked_rutgers_university_spending_up_to_3m_to.html

Page 11: Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and

Grants Management Training 200

HACKED

http://www.providencejournal.com/article/20150820/NEWS/150829905

http://www.nextgov.com/cybersecurity/threatwatch/2015/08/breach/2450/

Page 12: Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and

Grants Management Training 200

HACKED

Page 13: Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and

Grants Management Training 200

?

Page 14: Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and

Grants Management Training 200

Number of spam/phishing emails UNM IT blocks DAILY

1-3 MILLION

If one gets through, forward to:

[email protected]

Page 15: Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and

Grants Management Training 200

Why Universities? • Universities are prime targets for hackers because of the

vast amounts of personal and technological data that they store

• Universities are on the cutting edge of science and technology creating next generation technology that is coveted worldwide

• The cornerstone for academic research institutions is collaboration. This fundamental aspects makes universities a soft target

Page 16: Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and

Grants Management Training 200

Your information is out there

Page 17: Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and

Grants Management Training 200

Page 18: Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and

Grants Management Training 200

Page 19: Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and

Grants Management Training 200

Cyber Crime• 6 BILLION email scams sent out monthly!

• CYBER CRIME COST CONSUMERS $113 BILLION ANNUALLY!

• 110 million Americans, about 47% of American adults, lost some personal information to hackers in 2014 http://www.businessinsider.com/half-of-american-adults-were-hacked-last-year-2014-5#ixzz3XyUm2sOl

• Cyber Attacks on U.S. Companies in 2014http://www.heritage.org/research/reports/2014/10/cyber-attacks-on-us-companies-in-2014

Target/KmartHome Depot

PF Changs/Chick-fil-a/Jimmy Johns/Dairy QueenMichaels

Ebay• JP Morgan Chase

• Sony• Blue Cross

Page 20: Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and

Grants Management Training 200

So what can you do to protect

yourself and your research from hackers?

It only takes ONE click

Page 21: Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and

Grants Management Training 200

It just takes ONE to start the virus

When a virus infects UNM computers a hacker can obtain every document stored on your UNM computer/network

Personal Information

Research

Email

Page 22: Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and

Grants Management Training 200

TRUST YOUR GUT

• YOU have to do something to be attacked!

• NEVER click on “Click Here” or embedded links!• NEVER give personal information to ANYONE over

the phone/internet

• NOTHING is free

Page 23: Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and

Grants Management Training 200

Hover, Don’t click

Before Clicking On Any Links in Email, FB,Twitter, LinkedIn, etc., You Should Always Hover Your Mouse Over The

Links To Check Their Real Destination.

Page 24: Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and

Grants Management Training 200

Sender is a UNM employee whose account was compromised

From: Lucia Nicole Lowe Sent: Friday, October 23, 2015 5:21 PM Subject: Upgrade Your Account Your mailbox unm.edu has exceeded its storage limit to set your e-mail administrator, and you will not be able to receive new mail until you re-validate it. Click on the link http://helpdesk-unm-edu.weebly.com and login your information to re-validate your email account. Thanks 2015 Webmail Help Desk Administrator.

Page 25: Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and

Grants Management Training 200

From: Deeana Sanchez Sent: Thursday, October 22, 2015 7:12 AM To: Deeana Sanchez <[email protected]> Subject: RE: Important Notice

Dear User, Click here to Update your unm.edu email user account now Thank You

Page 26: Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and

Grants Management Training 200

This was an email that was sent out to the UNM Community from [email protected]

The actual sender used a system in Italy

Page 27: Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and

Grants Management Training 200

Page 28: Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and

Grants Management Training 200

Antivirus softwarecan only protect you from known viruses

http://kaspersky-cyberstat.com/

Kaspersky Lab is detecting

315,000 new malicious files every day http://www.kaspersky.com/about/news/virus/2013/number-of-the-year

Page 29: Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and

Grants Management Training 200

Fake Virus Alerts

Page 30: Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and

Grants Management Training 200

What other ways can you get a virus?

Page 31: Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and

Grants Management Training 200

Allow remote access?

Neverhttp://www.xsolutions.com/2014/03/the-dangers-of-granting-remote-access-to-your-network/

Page 32: Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and

Grants Management Training 200

Page 33: Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and

Grants Management Training 200

Page 34: Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and

Grants Management Training 200

WHAT TO DO IF YOU’VE RESPONDED TO A PHISHING SCAM:

• Report the incident -FTC, FBI, Secret Service, UNM IT http://www.ic3.gov/default.aspx

https://www.ftccomplaintassistant.gov/#crnt&panel1-1

• Change the passwords on all your online accounts

• Routinely review your credit card and bank statements

• Place a fraud alert on your credit report

Page 35: Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and

Grants Management Training 200

Cell Phone Location Tracking

Apple iphone : http://www.womansday.com/life/work-money/news/a51083/secret-iphone-locations-menu/ Android: http://www.today.com/video/how-to-turn-off-android-location-tracking-435573315637

Page 36: Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and

Grants Management Training 200

MOBILE PHONE THREATS

USE SAME PRECAUTIONS ON A MOBILE DEVICE AS YOU WOULD USE ON A COMPUTER

• Do not use passwords on public Wi-Fi• Install vendor approved anti-virus software.• Have passcode to log into phone• Don’t ask someone to take your photo with your phone• Do not save passwords, PINs or other account information as Contacts or in Notes.• Do not download software updates while logged into a Wi-Fi network.• Install tracking tools to track lost and stolen devices. Install remote wiping tools.• Disable GPS feature when taking and sending photos --

http://abclocal.go.com/wabc/video?id=7621105

Page 37: Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and

Grants Management Training 200

OTHER TRAINING OFFERED

• Cyber Security – Phishing: How Not To Become a Victim of Email Fraud• Social Networking Security

• Laptop and Cell phone Security• International Travel Security

• Workplace Violence• Identity Theft

Deb Kuidis

277-2058