Daily Local News (West Chester, PA)

Tech 360 focuses on cyber security

FBI agent urges businesses and individual­s to take steps to avoid becoming victims

- By Brian McCullough bmcculloug­h@21st-centurymed­ia.com @wcdailyloc­al on Twitter

The threat of cyber crime against consumers and businesses has never been greater, which keeps FBI agent Ben Stone busy.

Stone, a special agent now working out of the FBI’s Philadelph­ia office, capped off this year’s Tech 360 conference held Thursday at Penn State Great Valley.

The cyber crime issue, he noted, is a people problem, not a tech problem. And for victims of it, the results are often devastatin­g.

Not only can it cost millions to fix, “people won’t want to do business with you if you’ve been affected by” a hacked system, Stone said.

The motivation­s of hackers differ, which can make figuring out where to look for the criminals difficult. Some, like Edward Snowden, are malicious insiders, Stone said. Others are motivated by money and are interested only in extorting their victims.

In business settings, the key to safety is to use all security software available and to make sure everyone in the organizati­on is aware of the threat companies now operate under.

“Convince your staff that the threat is real and that they are targets,” Stone advised the 185 Tech 360 attendees who stayed for the last presentati­on of the day. “Require training and test what they’ve learned ... Know where your stuff is.”

Stone urged the business people in the audience to “make a friend.” Get to know people from a U.S. Attorney’s office, the FBI, the Department of Homeland Security, and other agencies, he suggested.

“Have a plan before something really bad happens and practice the plan,” Stone advised. “The biggest thing we want is for people to call.”

Stone said business owners or executives are sometimes embarrasse­d when they become a victim of crime or they attempt to solve the problems themselves to avoid publicity.

“We don’t take over your system, we don’t repair your system, we don’t release proprietar­y or confidenti­al informatio­n, or divulge informatio­n to the media,” the special agent said. “You are the victim of a crime.”

The only time informatio­n from a cyber crime investigat­ion becomes public is if the case goes to trial.

“Nine times out of 10 they plead guilty,” Stone said.

For consumers, the threat is ever growing.

Many are falling victims to online work-from-home scams and romantic scams, Stone said.

“You’ll have people dating online and they’ll pretend they’ve gotten hurt and ask the other person to send them money,” Stone said. “People will fall for it.”

One precaution Stone advised all consumers to take to protect their informatio­n, particular­ly their financial accounts: use twofactor identifica­tion systems.

“It’s crucial in this day and age,” Stone said.

There also is growing concern with cyber criminals targeting unsecure Internet of Things, or IoT, devices. The number of such devices in use is expected to increase from 5 billion in 2016 to somewhere between 20 billion and 50 billion by 2020. Once an IoT device is compromise­d, cy-

ber criminals can launch attacks on other systems or networks, send spam emails, steal personal informatio­n, interfere with physical safety, and leverage compromise­d devices for participat­ion in distribute­d denial of service (DDoS) attacks, the FBI notes. Some IoT devises are: • Home automation device that control lighting, heating and cooling, electricit­y, sprinklers, locks;

• Security systems such as alarm systems and surveillan­ce cameras;

• Medical devices like wireless heart monitors, insulin dispensers;

• Wearables such as fitness trackers, clothing, watches;

• Smart appliances like refrigerat­ors, vacuums and stoves;

• Office equipment such as wireless printers, computer mouse, outlets, interactiv­e whiteboard­s;

• Entertainm­ent devices such as DVRs, TVs, gaming systems, music players and toys.

Thursday’s event was the fifth year for the Tech 360 conference, which is put on by ITAG – Informatio­n Technology Awareness Group – and i2n – Ideas Innovation Network. Both are initiative­s of the Chester County Economic Developmen­t Council. The allday event included breakout sessions and panel discussion on cyber security issues.

“This is by far and away the best ever,” said Nancy White, a board member of ITAG. “Not only by the numbers, but the quality of informatio­n provided was great.” – To contact Business Writer Brian McCullough, call 610-235-2655 or send an email to bmcculloug­h@21stcentur­ymedia.com.

 ?? PETE BANNAN-DIGITAL FIRST MEDIA ?? Darin Bielby, managing director of Navigate Consulting Inc., discusses cyber security with fellow panel members on Thursday at Tech 360 conference on cyber security.
PETE BANNAN-DIGITAL FIRST MEDIA Darin Bielby, managing director of Navigate Consulting Inc., discusses cyber security with fellow panel members on Thursday at Tech 360 conference on cyber security.
 ?? PETE BANNAN-DIGITAL FIRST MEDIA ?? Moderator Austin Morris Jr., president of Morris Risk Management LLC, guides a panel discussion.
PETE BANNAN-DIGITAL FIRST MEDIA Moderator Austin Morris Jr., president of Morris Risk Management LLC, guides a panel discussion.
 ??  ??
 ?? PETE BANNAN-DIGITAL FIRST MEDIA ?? Luke Olenoski, head of identity access management at Vanguard, makes a point.
PETE BANNAN-DIGITAL FIRST MEDIA Luke Olenoski, head of identity access management at Vanguard, makes a point.

Newspapers in English

Newspapers from United States