In a rare decision, itSynergy is changing the topic of its scheduled “Hacking the Human” webinar this Thursday, September 14 from air gap attacks to the Equifax breach.
“The magnitude of this breach is enormous, and we are getting inundated with questions from people who are concerned that their personal data was compromised,” said Michael Cocanower, president and CEO of Phoenix-based itSynergy.
Cocanower, who has been recognized nationally and locally for his IT expertise, will conduct the free, 15-minute “Equifax Breach” webinar this Thursday, September 14 at 11:30 a.m. Interested participants should register at http://www.itsynergy.com/webinar.
The webinar will cover how the breach happened and what immediate steps people can take to protect themselves. In addition, Cocanower will share his thoughts regarding the pros and cons for putting a credit freeze on accounts and why victims of the breach should sign up for the free identity protection that Equifax is offering.
“People need to realize that a credit freeze will protect hackers from opening new accounts, but they can still cause havoc with existing accounts,” Cocanower said. “I’ll provide tips for setting up alerts and monitoring questionable activity.”
The “Hacking the Human” webinars take place at 11:30 a.m. on the second Thursday of each month. The webinars are geared towards non-technical end users in business at any level in the company. Each webinar provides useful tips to ward off cyberattacks and more complex social engineering schemes that result in theft and corporate espionage.
The “Air Gap Attacks” webinar will be rescheduled to a later date. The schedule of webinars after September include:
October 12 – Two Factor Authentication
One of the best ways to defeat any attack involving compromise of a password is to utilize two factor authentication. This month we’ll teach you what two factor authentication is and why it helps to defeat attacks. We’ll then discuss many locations where it is available, and how to turn it on and use it. You’ll leave armed with the knowledge of how to make settings changes that will protect some of your most frequently visited and most valuable online assets such as email, file sharing sites, banking sites, and more.
• Learn what two factor authentication is
• See various common methods that can be used for two factor authentication
• Learn the types of attacks that can be thwarted using two factor authentication
• See a list of many common websites and services that have two factor authentication available, and learn how to enable it
November 9 – Your Phone – Hacker’s Friend?
When you think about hacking, do you think mostly about your computer? What you may not realize is that more and more, thieves are targeting your phone just as much as any other device. Because your defenses may be a bit lower when it comes to your phone, these attacks can be very successful. Join us to learn about what you need to be aware of when it comes to potential attacks on your phone, and how you can protect yourself.
• What types of attacks are launched by criminals against your phone?
• What physical measures do you need to take to protect your phone from being hacked?
• What can the bad guys get by targeting your phone?
• Learn the steps you need to take to recognize an attack and protect yourself
December 14 – ATM Security
Out shopping for the holidays? Decided to stop at an ATM for a bit of extra cash? How can you protect yourself from getting hacked at the ATM? Join us to learn how to leave the ATM with just cash, and not as the victim of a newly stolen identity or theft victim whose accounts will shortly be trained of cash.
• What techniques do criminals use at an ATM to ‘get you’?
• What happens once your information has been stolen from a compromised ATM?
• Learn what to look for when approaching/using an ATM to help ensure it hasn’t been compromised
• Understand how to select an ATM with the lowest probability of criminal exploit