Notices

My day job

Thread Tools
 
Search this Thread
 
Old Mar 27, 2014 | 08:26 PM
  #1  
JimV8's Avatar
JimV8
Thread Starter
Team Owner
 
Joined: Nov 2002
Posts: 26,394
Likes: 482
From: Ontario
Default My day job

I expect most know what I do for a living and today attended a seminar on banking security. I learned quite a bit and some I'll share with you.

DO NOT use cloud computing other than to store your snapshots. A forensic expert showed how with only a name he could steal your identity and drain your bank account in 48 hours.

DO USE locks on your Smartphone, 75% of people who lost, misplaced theirs had personal data accessed by the 'finder'.

DO NOT ALLOW, BYOD, bring your own device to connect to the network.

There's more but it gets even more worrisome.
Reply
Old Mar 27, 2014 | 09:01 PM
  #2  
69gaugeman's Avatar
69gaugeman
Nordschleife Master
 
Joined: Dec 2004
Posts: 6,164
Likes: 7
From: Guelph, Ontario, Canada
Default

Not in the industry, but have been becoming more and more worried about electronic (in)security....

One of the reasons my IP is stored on a drive I keep with me at all times. Backed up to a drive not connected to anything (except when backing up).
Reply
Old Mar 27, 2014 | 11:05 PM
  #3  
CamsPorsche's Avatar
CamsPorsche
Race Car
15 Year Member
 
Joined: Apr 2009
Posts: 4,496
Likes: 593
From: Taxronto
Default

BYOD?
Reply
Old Mar 27, 2014 | 11:41 PM
  #4  
JimV8's Avatar
JimV8
Thread Starter
Team Owner
 
Joined: Nov 2002
Posts: 26,394
Likes: 482
From: Ontario
Default

BYOD ( bring your own device). Thats when folks use their personal device, phone, for work purposes. Problem with that is there are many ways to embed or use apps that can be used maliciously either overt or covertly.
Reply
Old Mar 28, 2014 | 12:22 AM
  #5  
zer026T's Avatar
zer026T
Pro
 
Joined: Jan 2012
Posts: 546
Likes: 2
From: Halifax, Nova Scotia
Default

It's becoming more prevalent in the education space as there are school districts out there today supporting BYOD for their students too. They are also looking at IT partners to help subsidize the cost of portable devices so parents can send their young students to class with a reliable and affordable piece of technology.
Reply
Old Mar 28, 2014 | 12:34 AM
  #6  
aviography's Avatar
aviography
Rennlist Member
10 Year Member
 
Joined: Jul 2011
Posts: 2,422
Likes: 13
From: Oakville, Canada
Default

Originally Posted by JimV8
BYOD ( bring your own device). Thats when folks use their personal device, phone, for work purposes. Problem with that is there are many ways to embed or use apps that can be used maliciously either overt or covertly.
Do you mean by the company against the worker or the other way around?
Reply
Old Mar 28, 2014 | 01:58 AM
  #7  
Sir5n's Avatar
Sir5n
Three Wheelin'
15 Year Member
 
Joined: Dec 2010
Posts: 1,309
Likes: 14
From: 1 hour from CTMP!
Default

Originally Posted by aviography
Do you mean by the company against the worker or the other way around?
Good one! Most here are employers.

I've always been careful about any internet exchanges. Particularly in regard to anything that may have implications in the workplace.
Reply
Old Mar 28, 2014 | 10:39 AM
  #8  
JimV8's Avatar
JimV8
Thread Starter
Team Owner
 
Joined: Nov 2002
Posts: 26,394
Likes: 482
From: Ontario
Default

Industrial espionage is the first reason, second is protection against extortion using an infected personal device inside a firewall protected environment. The latter poses the greatest risk right now and here's how it works. A small code is downloaded through being embedded in a photo or a PDF ( the latter was used in a real world situation) The code or virus isn't identified by anti malware once in it begins a search of the net looking for it's brethren and starts collecting them one at a time. In the real world example this took ten weeks. Once the code it constructed it instantly encrypts all the files on the hard drive and leaves a message that reads ALL FILES ARE ENCRYPED - DEPOSIT xxx BICOINS TO xxxx WITHIN xxx TIME OR ENCRYTION KEY WILL DISAPPEAR.

It was thought the initial file was downloaded to a phone or pad and brought into a well secured system. I don't have the solution to the problem but IT should be made aware of it and also the service provider as they control the bandwidth. The latter is important for DDOS (distributed denial of service) attacks as that floods the server with files and manifests as heavy bandwidth traffic.

Have a nice day.
Reply
Old Mar 28, 2014 | 11:30 AM
  #9  
Turbodan's Avatar
Turbodan
Rennlist Member
15 Year Member
 
Joined: Jun 2006
Posts: 11,715
Likes: 658
From: Toronto Canada eh!
Default

how about the guest sign in on the router is that safe to allow visitors to use?
Reply
Old Mar 28, 2014 | 12:17 PM
  #10  
JimV8's Avatar
JimV8
Thread Starter
Team Owner
 
Joined: Nov 2002
Posts: 26,394
Likes: 482
From: Ontario
Default

Originally Posted by Turbodan
how about the guest sign in on the router is that safe to allow visitors to use?
Good question and I don't know.
Reply
Old Mar 28, 2014 | 05:58 PM
  #11  
soontobe's Avatar
soontobe
Advanced
15 Year Member
 
Joined: Apr 2008
Posts: 82
Likes: 61
From: Ontario
Default

Why would you need a guest account on the router. You are just asking to be hacked with that.
Reply
Old Mar 28, 2014 | 06:02 PM
  #12  
JimV8's Avatar
JimV8
Thread Starter
Team Owner
 
Joined: Nov 2002
Posts: 26,394
Likes: 482
From: Ontario
Default

I'll axe my IT guru for advice and get back to y'all.
Reply
Old Mar 28, 2014 | 06:28 PM
  #13  
SToronto's Avatar
SToronto
Nordschleife Master
10 Year Member
 
Joined: Jan 2012
Posts: 7,284
Likes: 1,379
Default

What seminar was that?
Reply
Old Mar 28, 2014 | 07:02 PM
  #14  
aviography's Avatar
aviography
Rennlist Member
10 Year Member
 
Joined: Jul 2011
Posts: 2,422
Likes: 13
From: Oakville, Canada
Default

Originally Posted by Turbodan
how about the guest sign in on the router is that safe to allow visitors to use?
As a business, the "guest access" should be outside of the company firewall, it should never be within the company internal access for the very reason of being hacked into company's internal network.

Originally Posted by JimV8
I'll axe my IT guru for advice and get back to y'all.
Isn't that kind of extreme, Jim? And how do you expect any response from him when his head is rolling on the ground after you've axed him?
Reply
Old Mar 28, 2014 | 08:05 PM
  #15  
JimV8's Avatar
JimV8
Thread Starter
Team Owner
 
Joined: Nov 2002
Posts: 26,394
Likes: 482
From: Ontario
Default

Originally Posted by SToronto
What seminar was that?
I could tell you but then.. well you know the answer already. Really not much a big deal but it was for insiders and it was by invitation.
Reply



All times are GMT -3. The time now is 01:54 PM.