That sinking stomach feeling when you see your computer has been hacked and your files (precious memories – first baby pictures, unpublished novels, or simply an entire day’s work) are “lost” unless you pay a ransom. While we layout many preventative activities, there are but a few courses of action after the fact. Here are some options to consider:
This specifically deals with the WanaCrypt ransomware strain that infected tens of thousands of Windows computers (unpatched and out of date Microsoft systems, in May of 2017) is a type of malicious software that infects a computer and blocks access to data until a ransom is paid, displaying a message demanding payment to unlock it at the risk of losing all files.Read more
Change the password to a password YOU MAKE UP.
Adding a new internet-connected device (i.e., phone, digital streaming TV/radio, health-fitness tracker) is a perfect time to set up your accounts securely and manage settings on your new device.
To learn more .. you can check out the book, How Not To Be Hacked available on Amazon.
This is, in fact, covered on page 13, it is that important and goes into detail on why, but the simple answer is never.
The author of How Not To Be Hacked was accepted to speak among 1,000s of researchers at the largest information security conference in San Francisco. In the Atlanta area, James, has shared insights at conferences and chapter meetings including InfraGuard, ISACA, the Technology Association of Georgia, and Fulton County schools. Over the last two years I have been building the content and sharing the insights from the book, and now I am excited to gain fresh tips for all of our community. I’ll be sharing them as I receive them via the newsletter.
Curious about the session … here are some great Q&A about my upcoming session. If able, please join me at the session or grab me for coffee during the event in San Fran!
Who are the attendees who will most benefit from—and contribute to—this Peer2Peer session? Do you have a specific role or job title in mind? Or even the kind of skills and mindset you are looking for?
Why do you believe that your topic is important for the information security industry—and your attendees—to be thinking about?
Challenge: Are YOUR family members, parents, children, and friends safe and secure online today because of your profession?
Can you describe one or two things you would like the attendees to think about prior to the session, as a way to prepare themselves for the discussion?
What kind of outcome are you hoping for at the end of the session? What will attendees walk away with afterwards?
Desired outcome: A fresh look and optimism on how to transfer habits of highly knowledgeable security professionals to regular people.
Takeaways: Specific simple and highly potent techniques and tips to make the digital world safer and happier for our friends, family, and colleagues.
See the book on Amazon here (best anti-hacking investment you’ll ever make for your parents): How Not To Be Hacked
Source, RSA Conference Official Site: Make Sure You Don’t Miss These Peer2Peer Sessions at RSAC 2016 | RSA ConferenceRead more
The impact of identity theft is a serious event, not from the simple letter in the mail in the first months. The impact is a lifetime of monitoring, reaction, prevention, and caution. The use of the stolen data will only evolve and so must consumers.
Interesting detail on the theft, and article below:
According to a recent study from Javelin Strategy & Research, fraudsters stole $16 billion from 12.7 million U.S. consumers in 2014, with a new identity fraud victim popping up about every two seconds.
Don’t forget the tips in chapter 13 in How Not To Be Hacked that address the key lifetime habits to address these criminal events.
Over the past week news of security researchers remotely taking over a Chrysler Jeep hit the news. This was written up and demonstrated nicely in the Wired Magazine article. I received many emails about how to prevent yourself from being harmed, and there is good news!
Fiat Chrysler has issued a voluntary safety recall affecting 1.4M vehicles in the US – call your dealership if you are on one of the listed models of cars below.
– Source: BBC
More details to follow as other manufacturers and models will certainly need attention as ‘connected’ motorized vehicles catch up to network security research scrutiny.
Photo credit: ANDY GREENBERG/WIREDRead more
This week there was a lot of media attention on how Criminals accessed over a 100,000 U.S. Citizen tax returns, and then used this in a successful attack to file requests for tax refunds totaling over $50,000,000. If you were a victim of this, please immediately begin working with the iRS to secure your tax returns (you can activate a two-factor type authentication to prevent these attacks in the future).
It is important to know – the IRS WAS NOT HACKED. The criminals used data gathered from other data breaches and public information to trick the IRS system into thinking they were you. This is a principle raised in the book, once your data is breached it is ALWAYS breached. So, 12 months of monitoring or short term protection won’t suffice.
If you have the book (release is first weeks of June!!!), please visit the last two chapters that cover recovery. These will give you great protections and assurances.
Here is how the IRS was attacked, and no it is not complicated. In fact, we will see these types of “attacks” against many institutions relying on such information for authentication:
Ask questions on www.facebook.com/hntbh
*Credits to Van Gogh for the image, and Privacy Rights for the stats on last year’s data breaches.
One of the first pieces of advice shared is to stop using your Debit Card. Most banks allow you to have an ATM card issued that is perfect for grabbing cash on the go. The reasons are many, but the most important centers of you liability for funds in these accounts.
Quite simply, if money is transferred out of your bank accounts (ATM / Debit Card #s) that money is gone, forever. There is a window of time though for you, and this is based on your bank statements. In the days of electronic statements this can become slippery (meaning when you receive a paper statement you may flip through quickly and see if anything jumps at you, but electronic statements I believe are far less reviewed).
Above is a simple table from the FTC showing the time elapsed from the release of a bank statement/notification and how much you owe. Note, at 60 days you are liable for “All the money taken from your ATM/debit card account, and possibly more…” yikes!
Update on the book – YES, it is nearly completed. The reviews have been very encouraging and I am humbled by all the time folks have helped make it great. May is the month! Stay tuned and visit www.Facebook.com/hntbh for more community news.