0% found this document useful (0 votes)
5 views

Presentation ON Cybersecurity Awareness

The document outlines a cybersecurity awareness agenda, highlighting the importance of protecting digital information from cyber threats, which can impact organizations of all sizes. It discusses current trends in cybercrime, common types of attacks, and best practices for prevention, including the use of multi-factor authentication, regular patching, and employee training. Additionally, it provides resources for further guidance and emphasizes the need for comprehensive security measures to mitigate risks.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

Presentation ON Cybersecurity Awareness

The document outlines a cybersecurity awareness agenda, highlighting the importance of protecting digital information from cyber threats, which can impact organizations of all sizes. It discusses current trends in cybercrime, common types of attacks, and best practices for prevention, including the use of multi-factor authentication, regular patching, and employee training. Additionally, it provides resources for further guidance and emphasizes the need for comprehensive security measures to mitigate risks.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

CYBERSECURITY

AWARENESS
Agenda:
● Introductions
● Current Local Trends
● Common Types of Cyber Attacks
● Best Practices
● Resources
● Questions
Presenters
Captain Lawrence
San Diego Sheriff City of Encinitas

Jessica Contreras
City of Encinitas IT Director
Infragard SD Cyber Council

Darren Bennett
Former FBI Cyber / San Diego CISO
Infragard SD Cyber Council

Cameron Matthews
Nth Generation
Virtual CISO
Introduction to Cybersecurity
Cybersecurity is the process of protecting your digital information and
computer systems from cybercriminals.

● Cybercrime can impact all businesses and organizations regardless of size

● The average cost of recovering from a cyber incident was over $1.8M in 2022
(Forbes)

● Cybersecurity awareness and implementation of best practices can help


protect your organization
State of Cybercrime
National Trends:

In 2022, over 800,000 complaints were received by the FBI’s Internet Crime Complaint Center (IC3). This is a 5% decrease from 2021. However, the total loss as grown from $6.9
billion in 2021 to more than $10.2 billion in 2022.

Ransomware continues to be the #1 threat which is facilitated by phishing attempts.

Phishing attempts are increasing with the use of ChatGPT

Supply chain attacks are a major concern - SolarWinds Attack has over 30,000 victim organizations to date

Data Breaches - average cost of remediation is $4.5 million

Cloud Security Misconfiguration is a growing trend - If you store your data in the Cloud, you may still be responsible for its security

Cryptojacking has decreased recently due to the devaluing of cryptocurrencies.


San Diego County alone lost $80 million in 2022

Threats from Nation State Actors is on the rise - Russian, North Korean, Iranian and Chinese - affiliated groups are using ransomware to fund war, nuclear programs and gather
intelligence.

San Diego Trends:


Non-payment/non-delivery scam is #1 - over 28,000 instances in 2022
Personal Data Breach - over 8,000 instances
Investment impersonation scam - over 4,900 instances
Extortion (Ransomware) - 4,700 instances
Tech Support - 4,400 instances

Keep your systems up to date! Validate and Verify!


Common Types of Cyber Attacks
Phishing Ransomware
A social engineering scam where the hacker lures the Ransomware is a type of malicious code (malware)
victim to provide information such as account designed to encrypt files. The cyber actors then
numbers or passwords. They may pose as a coworker request ransom to restore the files.
or friend using email, phone, or text. Ransomware can be delivered in an email, text
message, or by clicking a malicious link.

Email Compromise EFT Fraud


Electronic Funds Transfer Fraud occurs when a
Business email compromise occurs when a hacker fraudster posing as someone else such as a vendor
takes control of someone elses email account. They redirects payments to their accounts. They may use
are then able to read emails and often spread malware business email compromise to intercept emails from a
using the compromised address book. business for this purpose.

Network hacker attack


This would typically occur to a business’s: The main security issues are:
● marketing website ● services missing patches
● employee/partner portal ● application misconfigurations
● e-commerce website
Cyber Security Best Practices

● Security is a layered approach


○ There is no “Silver Bullet”
○ Like any security system, there needs
to be multiple means of protection
(Think Castle)
○ This briefing is a good start, but NOT
all inclusive…
Cyber Security Best Practices
● For more detailed security guidance:
Use a security framework*
● CIS 18 Critical Controls
https://www.cisecurity.org/controls/cis-controls-list

● NIST 800-53
https://nvlpubs.nist.gov/nistpubs/SpecialPublications
/NIST.SP.800-53r5.pdf

● NSA Best practices for security home networks


https://media.defense.gov/2023/Feb/22/200316517
0/-1/-1/0/CSI_BEST_PRACTICES_FOR_SECURING_YOU
R_HOME_NETWORK.PDF
*These assume a surprisingly high level of understanding of cyber and
IT. If needed, ask your IT expert for help!
Cyber Security Best Practices
● Best practices - Overview:
○ Have a plan (Incident Response Plan) - If you don’t have a plan on where you are going…
○ Identify who is responsible for security and have a backup person as well
○ Create a contact list: Know who in your organization to work with (Executive team, Legal, RISK, IT) and
when. Other important entities:
● Law Enforcement coordination center - for reporting and incident assistance, IC3.gov (FBI reporting)
● Key Vendors contacts and phone #s
● MSP (Managed Security Provider) - A contracted security provider monitoring your systems
○ Buy cyber insurance
○ Use a managed security provider (MSP) - if you can
○ Know which systems are most important to your organization and what is in place to protect them!
○ Educate your users (online training is available, some for free)
○ Keep systems patched, use multi-factor authentication, ensure you have firewalls, anti-virus, endpoint
security and other security software in place and monitored
○ “Think before you click”
○ Have good backups and TEST them
We will explain some best practices in the following slides:
Complex Passwords
The longer a password is, the harder it is to crack. A current
length of 12 characters or greater is recommended. The
password should contain:
● a combination of special characters
● numbers
● upper-case
● lower-case letters

@fterTheB3@chW33@tBurritos
Multi Factor Authentication (MFA)
MFA requires a minimum of two pieces of information to access a system
such as a password and a code texted to your phone.

● What about just complex passwords? (haveibeenpwned.com)


● MFA/2FA - Effective means of protecting your access
● REQUIRED for effective security
Inventory
Maintain an inventory listing the hardware and software your business
or organization uses including:

● Vendor Name
● Vendor Contact Information
● Make/Model
● Version

An inventory is useful for keeping informed regarding patches and security


bulletins related to your computer assets. It is also useful if you are breached to
receive customer support assistance.
Patching Devices
Patching is the process of installing software
updates to keep your systems secure.

● Most basic line of defense


● ALL organizations struggle
● While with the FBI, 100’s of incidents.. 90% could have
been prevented with proper patching
● Patch everything.. not just Operating System. Don’t
forget your applications
Anti-virus/End Point Detection Response

● Is Antivirus enough? “Depends”


(probably not)
● Favorite part of a layered defense
approach is End Point Detection and
Response (EDR)...
● If malicious content gets past all the
other layers, this is the last line of
defense.
● Ransomware example.. EDR can
stop the encryption before it occurs
and alert IT.
Email Filtering
Email and file filtering check emails
and attachments for malicious code
and quarantine these files before
the user receives them in their
email box. A “sandbox” may be
included where attachments are
opened and analyzed before a user
receives them.
Examples include:
Microsoft Defender
Avanan
GMail Spam Filter
Firewall
A firewall acts as a security guard for your network allowing certain traffic
identified by IP Addresses to access your network while blocking other traffic.
Firewalls can be configured to receive updated lists of malicious IP Addresses
to block.
Geofencing
● Geofencing is when an
organization creates virtual
boundaries around specific
locations or zones
● For example, only allowing
access from specific counties
● This is done via software and/or
hardware at various levels
including your firewall, email
systems and more
● Increasingly common
Virtual Private Network (VPN)
A VPN encrypts (scrambles) data that is passed over a network to make it illegible
if it is intercepted by a hacker. This is useful for protecting confidential information
while it is in transit such as intellectual property, bank account information, and
network credentials.
Be cautious when using AI

● What is AI?
● AI is a double edged sword
● It is VERY difficult (if not impossible) to
get back sensitive information once
entered into ChatGPT/Google Bard
● Need governance and policies in place
● Users need guidance on what is ok to
share with AI systems and what is not.
Checkout AI policy frameworks shared
online - Google “AI policy examples”
Training
The methods that will most effectively minimize the ability of intruders to compromise
information security are comprehensive user training and education. - Kevin Mitnick

● Make sure to train yourself & your staff on these best practices!

● Encinitas Chamber of Commerce Learning Workshops

● CISA | StopRansomware.gov

● San Diego Cyber Lab

● Local Colleges
Cybersecurity Resources
CISA www.cisa.gov
https://www.cisa.gov/cyber-guidance-small-businesses

Action plan for small and medium sized businesses to create a secure environment and security culture within their companies.

https://www.cisa.gov/audiences/small-and-medium-businesses

Free tools and information that will help get your business into what we call a more secure cyber posture.

https://www.cisa.gov/about/regions/region-9

CISA Region 9 (California, Hawaii, etc) regional cybersecurity information

StopRansomware.gov
one stop location for tools and resources to combat ransomware

IC3 (Internet Crime Complaint Center) www.ic3.gov


FBI's platform for reporting cybercrime

San Diego Regional Cyber Lab www.sandiego.gov/cyber-lab


Cyber information, training, tools, and virtual and physical lab facilities to learn and sharpen your cyber skills

Encinitas Chamber of Commerce Cybersecurity Resources Guide https://encinitaschamber.com/cyber-security/


Free webinars, links to resources, compact and comprehensive starting line to help small businesses build a cyber program
Who should I contact if breached?
IC3 Internet San Diego SD Sheriff
Cyber
Crime Law Non
Insurance
Complaint Enforcement Emergency
Provider
Center Coordination (North
(www.ic3.gov) Center County)
Q&A

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy