Cybersecurity Update 2022: The Weakest Link
James M. Dodmead, USN Retired X 2
Contents
This presentation provides some high level background and recommendations for you. This briefing should not be viewed as all inclusive and as you know, cybersecurity is a rapidly changing area. Contents of this presentation are listed below:
Data Breach Overview (2022 Verizon Data Breach Investigations Report)
From the latest Verizon DBIR, company analysts have examined 23,896 security incidents (5,212 of which were confirmed breaches) between November 1, 2020 and October 31, 2021, and found that:
Location, location, location
Personal Cyber-Hygiene
Personal Cyber-Hygiene
Multi Factor Authentication
General Guidance
Social Media
Mobile Devices
At Home
My Data
At Work
At Work (continued)
18 Secrets from People that Never Get Hacked�Wired Magazine: Joe McKinley Updated: Feb. 02, 2022
2022 Update Topics: Vulnerabilities
2022 Update Topics: Network Sharing
Sidewalk
https://www.zdnet.com/article/working-from-home-switch-off-amazons-alexa-say-lawyers/
2022 Update Topics: Devices
Monitoring Devices
2022 Update Topics: Ransomware
Ransomware: https://ransomwhe.re/
1. MAKE SURE YOUR ANTIVIRUS SOFTWARE IS UP TO DATE
2. UNDERSTAND WHAT'S HAPPENING ACROSS THE NETWORK
3. SCAN AND FILTER EMAILS BEFORE THEY REACH YOUR USERS
4. HAVE A PLAN FOR HOW TO RESPOND TO A RANSOMWARE ATTACK, AND TEST IT
5. THINK VERY LONG AND HARD BEFORE YOU PAY A RANSOM
6. UNDERSTAND WHAT YOUR MOST IMPORTANT DATA IS AND CREATE AN EFFECTIVE BACKUP STRATEGY
7. UNDERSTAND WHAT'S CONNECTED TO YOUR NETWORK
8. MAKE IT HARDER TO ROAM ACROSS YOUR NETWORKS
9. TRAIN STAFF TO RECOGNIZE SUSPICIOUS EMAILS
10. CHANGE DEFAULT PASSWORDS ACROSS ALL ACCESS POINTS
11. APPLY SOFTWARE PATCHES TO KEEP SYSTEMS UP TO DATE
2022 Update Topics: Brushing
Brushing Scam: If you receive an unexpected package, you may be the victim of a Brushing Scam
2022 Update Topics
Identity Theft, Phishing and Pharming: Scammers gain access to your confidential information, like social security numbers, date of birth and then use it to apply for credit cards, loans and financial accounts. Typically, the victim receives an email that appears to be from a credible, real bank or credit card company, with links to a website and a request to update account information. But the website and email are fakes, made to look like the real website.
Phone scams: Scammers call anyway, of course, and they've even found a way to scam consumers by pretending to be a government official calling to sign you up or confirming your previous participation on the Do Not call list! A good example of this is the "Your Microsoft license key has expired" scam call - which you can hear and read about on this page: https://www.microsoft.com/security/blog/2014/06/26/is-that-call-from-microsoft-a-scam/ .
2022 Update Topics: Zelle
2022 Update Topics: QR Codes
2022 Update Topics
Internet merchandise scams: You purchase something online, but it is either never delivered or it is not what they claimed it was, or is defective. Online shopping, and other shop from home, such as catalog, mail and phone shopping scams are on the rise. Remove your Personal Information From Google Search:
Type something into the world’s most popular search engine and you will likely find it – to include some of your PII. Google has long-provided a mechanism to remove data from its search engine database – but now has expanded that capability to permit individuals to request their PII to be removed (good news for INFOSEC-minded individuals) https://support.google.com/websearch/answer/4628134?hl=en#zippy=%2Cremove-image-with-sensitive-financial-medical-or-national-id-info
2022 Update Topics
Credit Bureaus and related credit scams: �Credit/debit card fees, pay day loans, credit repair companies and unauthorized use of credit/debit cards. Some of these complaints involved hidden fees and billing disputes as well. Phishing/Spoofing Emails: �Emails that pretend to be from a company, organization or government agency but ask you to enter or confirm�your personal information
Online Credit Card Processing: �Since 2019 Tens of Millions of $s have been charged via fake websites using stolen credit card numbers. BE SURE TO REGULARLY REVIEW YOUR CREDIT CARD STATEMENTS!!!
2022 Scams: More Information
U.S. CERT bulletins on Scams: https://search.us-cert.gov/search?utf8=%E2%9C%93&affiliate=us-cert&query=scams
The hot spot imposter (He’s close, real close) https://search.us-cert.gov/search?utf8=%E2%9C%93&affiliate=us-cert&sort_by=&query=wireless+scams
2022 Scams: Don’t Say “Yes”
Voice Recording: Can you hear me? If you hear that, just hang up. The person on the other end will be recording the call, and would then use the track of you saying “yes” to access your sensitive information. How? The three-letter word is used frequently by companies to confirm account changes, security settings, and purchases, giving the scammer extensive access to your stuff.
Workshop
What did we learn?
Final Exam
Question 1
What did we learn?
Independently verify any transaction (text, email, voice mail, etc.) before acting on it.
What did we learn?
Do Not Click on that Link!
(Unless you are sure about it)
What did we learn?
Final Exam
Question 2
What did we learn?
You
(the user)
Got Questions?
Questions?
Secure@CYBERDEF.BIZ
Cybersecurity Assessment, Staff training, IT Consulting,
System Hardening, Data Recovery, Intellectual Property/Data Loss
CSAM 2022
Got Questions?
Backup Slides
History
The Wild, Wild West
History
Evolution
Organized Crime
Evolution
Dawning of the Age of Cyber-Warfare (Nation States)
Risks and Mitigations (Overview)
Resulting in Loss of access to data.
water, hospitals, fire departments,
police departments
And “Bake In” security
Risks and Mitigations (Overview)
Wreak Havoc on our Country
documents we lose invaluable national resources