SlideShare a Scribd company logo
How to manage your client’s
data responsibly
Protect your clients from fraud, identity theft and
confidential information
Jeremiah Cruz
jeremy@cryptoaustralia.org.au
Nick Kavadias
nick@cryptoaustralia.org.au
Gabor Szathmari
gabor@cryptoaustralia.org.aucryptoaustralia.org.au
Who is CryptoAUSTRALIA
• A not-for-profit started by security and privacy enthusiasts.
• We have nothing to do with BitCoin, so please stop asking.
• We are for finding practical ways of dealing with the modern
privacy and security challenges.
• We are looking for sponsors in order to continue our work
and research.
• This may be a new concept to lawyers, but we are running
these events for free*.
* This presentation does not constitute cybersecurity advice.
Self Promotion..
Tonight’s speakers:
•Jeremy – Network Security Expert
•Nick – Solicitor and Technologist
•Gabor – Cybersecurity Expert
We know how to internet…
@CryptoAustralia
#cryptoaus
http://chat.cryptoaustralia.org.au
https://fb.me/CryptoStraya
Interact with us in the digital world…
What we are covering tonight…
1) Bad practices
2) Password security
(2FA and Password reuse)
3) Sharing documents securely
4) Storing documents securely
5) Prudent data disposal practices
6) Physical security (dos and don’ts)
7) What to do post-breach 🙏
Secret: “hackers” log into your webmail
Password hygiene
• Websites get hacked.
• People reuse same
email and password
across multiple online
accounts. D’oh!
Haveibeenpwned
Do you have leaked passwords? https://haveibeenpwned.com/
Haveibeenpwned Leaderboard
Today’s winner is …
How to manage your client's data responsibly
How to manage your client's data responsibly
How to manage your client's data responsibly
Meanwhile on SpyCloud...
(an unrelated account)
Meanwhile on SpyCloud
Bad client document & personal
information management practices
• VOI checks
• Online document conversion
• Document sharing (e.g. Dropbox)
• Keeping emails forever
• Public Wifi
Bad practices - VOI checks
100 points ID checks – Leaks everywhere
• Scan-to-email printers (bonus: unencrypted
traffic)
• Documents sent/received over emails
• Emails are never deleted on the
sender/receiver side
Bad practices - VOI checks
• Don’t ask for scanned documents to be sent over
emails
• Rely on VOI providers instead
• Secure smartphone app and web portal
• https://www.dvs.gov.au/users/Pages/Identity-
service-providers.aspx
Bad practices
Bad practices - Online document conversion
Online2PDF.com, freepdfconvert.com...
• They provide a convenient service to
convert documents to PDF
How to manage your client's data responsibly
Bad practices - Online document conversion
Online2PDF.com, freepdfconvert.com...
• Who’s behind the service?
• What happens to your documents?
• Why would you upload
sensitive documents to random
strangers?
Online document conversion
Convert documents offline with
Adobe Professional
Bad practices -
Document sharing over emails
Problem statement:
Your email file attachments and
embedder download links remain in
your ‘Sent’ email folder forever, waiting
for a hacker to login and download them
Bad practices -
Document sharing over cloud-based file
storage services
File sharing with Dropbox, OneDrive, random
service:
• Download links are valid forever
• Mailbox gets hacked → Links are still live
Transferring sensitive documents securely
• Send web links instead of file
attachments where appropriate
• Use expiring web links
Services:
Google Drive, Sync.com, Tresorit...
Bad practices
Transferring documents securely
Bad practices - Emails are kept forever
Keeping all emails for extended period
• Limit the damage if the mailbox gets hacked
• Set an archive and retention policy and archive
emails to a secure third-party service
(e.g. Spinbackup, Backupify)
• Office 365, G Suite support retention policies
Bad practices
Bad practices - Public Wifi
Lots of hacking wizardry:
• Password theft via fake login pages
• HTTP pages tampered on the fly
• Theft of unencrypted sensitive data
Just take our advice on the next slide
Public Wifi – Use VPN or a 4G dongle
Good security hygiene
What else you can do
Secret: “hackers” log into your webmail
Password hygiene
• Websites get hacked.
• People reuse same
email and password
across multiple online
accounts. D’oh!
Two-factor authentication
Most powerful defence from:
•Crappy passwords (Letmein1)
•Stolen passwords (phishing)
•Leaked passwords (reuse)
Two-factor authentication
Password hygiene – Wallets
Remember a single password only
• LastPass
• 1Password
• Dashlane
• RoboForm
• < Any random password wallet >
Storing documents securely
Cloud file storage – Who your adversary is
• Hackers? - Dropbox, G Drive, OneDrive + Two-factor
authentication turned on
• Government? - End-to-end encrypted service: Sync.com, Tresorit
• Encrypt your disks, USB flash drives and smartphones
• BitLocker - Windows 10 Professional
• FileVault – Mac
• Android supports disk encryption
• On iOS disk encryption is turned on by default
Prudent data disposal practices
Laptops, computers:
• Magnetic disks: overwrite
• DBAN (https://dban.org/)
• SSD: Physical destruction
• USB flash drives: Physical destruction
Prudent data disposal practices
iPhone: Factory reset
Android*:
1. Encrypt device
2. Remove storage and SIM cards
3. Factory reset
4. Remove from Google account
Phones (SD card): Physical destruction
* https://www.computerworld.com/article/3243253/android/how-to-securely-erase-your-android-device-in-4-steps.html
Physical security (dos and don’ts)
Physical security (dos and don’ts)
• Shredding documents
• Diamond cut shredder
• Secure document disposal service
• Can secure dispose digital media for you
• Digital certificates (e.g. PEXA key)
•Leave them unplugged when not in use
•Cut the built-in smart card in half to dispose
What to do when you get hacked 🙏
• Disconnect your computer from the
Internet and stop using it
• Notify LawCover - They have an
incident response team
• Checklist:
http://lca.lawcouncil.asn.au/lawcou
ncil/images/cyber/CP-What-to-
Do.pdf
Summary
1) Use a VOI provider for identity checks
2) Use 2FA and don’t reuse your password
3) Share documents with expiring links
4) Store documents in the cloud securely (2FA)
5) Dispose data securely
6) Shred documents & protect digital certificates
7) Notify LawCover when the house is on fire
Where to get help
• Law Council of Australia Cyber Precedent, great learning resource
• Law Council cyber-attack checklist
• Lawcover crisis management team can help you clean up the
mess.
• Victim of identity theft, you should contact IDCARE, NFP helping
people
• Have a conversation with your IT Service Provider, or staff. Use
these slides as a talking point!
@CryptoAustralia
#cryptoaus
http://chat.cryptoaustralia.org.au
https://fb.me/CryptoStraya
Get updates:
https://cryptoaustralia.org.au/newsletter
Next workshop:
https://www.meetup.com/Cybersecurity
-for-Lawyers-by-CryptoAUSTRALIA/

More Related Content

PDF
Online Privacy, the next Battleground
PDF
Web3.0 or The semantic web
PPTX
The dark web
PPTX
Digital citizenship number 6
PPS
Radicalising an Online Brand
PPTX
The Deep Web
PPT
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
PPT
Vindbaarheid
Online Privacy, the next Battleground
Web3.0 or The semantic web
The dark web
Digital citizenship number 6
Radicalising an Online Brand
The Deep Web
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
Vindbaarheid

What's hot (15)

PPTX
The dark web
PPTX
Dark web presentation
PPTX
The deepweb
PDF
SecuredBox - Secure your privacy
PPTX
PPTX
PPTX
Dark Web and Privacy
PPTX
Gripla slides 09 2011
PPTX
Deep web
PPTX
Dark and Deep web
PPTX
The Dark Web
PPTX
Dark web by Claudine Impas
PDF
Your Digital Afterlife: What happens to your digital memories when you die? ...
PPTX
Internet Security is an Oxymoron
The dark web
Dark web presentation
The deepweb
SecuredBox - Secure your privacy
Dark Web and Privacy
Gripla slides 09 2011
Deep web
Dark and Deep web
The Dark Web
Dark web by Claudine Impas
Your Digital Afterlife: What happens to your digital memories when you die? ...
Internet Security is an Oxymoron
Ad

Similar to How to manage your client's data responsibly (20)

PPTX
Iron Bastion: How to Manage Your Clients' Data Responsibly
PPTX
How to protect your clients and your law firm from money transfer scams
PDF
Learning about Security and Compliance in Office 365
PPT
Protecting Customer Confidential Information
PDF
Tresorit intro - Europas 2014
PDF
Secure Yourself, Practice what we preach - BSides Austin 2015
PPTX
Law Practice Management - Organization, Cloud, Social Media and Ethics
PDF
Data protection in Practice
PPTX
Personal Internet Security Practice
PPTX
Presentation cyber forensics & ethical hacking
PDF
Computer Forensics – What Every Lawyer Needs to Know
PDF
001 ho basic computer
PPTX
Harbin clinic iot-mobile-no-vid
PPTX
Sara Day Thomson, 'Personal Digital Archiving: Storing, Organising and Protec...
PPTX
Security best practices for regular users
PPTX
Security Best Practices for Regular Users
PDF
Users awarness programme for Online Privacy
PPT
Online Self Defense
PDF
Better to Ask Permission? Best Practices for Privacy and Security
PPTX
Computer / Internet Security WHPL
Iron Bastion: How to Manage Your Clients' Data Responsibly
How to protect your clients and your law firm from money transfer scams
Learning about Security and Compliance in Office 365
Protecting Customer Confidential Information
Tresorit intro - Europas 2014
Secure Yourself, Practice what we preach - BSides Austin 2015
Law Practice Management - Organization, Cloud, Social Media and Ethics
Data protection in Practice
Personal Internet Security Practice
Presentation cyber forensics & ethical hacking
Computer Forensics – What Every Lawyer Needs to Know
001 ho basic computer
Harbin clinic iot-mobile-no-vid
Sara Day Thomson, 'Personal Digital Archiving: Storing, Organising and Protec...
Security best practices for regular users
Security Best Practices for Regular Users
Users awarness programme for Online Privacy
Online Self Defense
Better to Ask Permission? Best Practices for Privacy and Security
Computer / Internet Security WHPL
Ad

More from Gabor Szathmari (11)

PPTX
Iron Bastion: Preventing business email compromise fraud at your firm
PPTX
Hacking law firms with abandoned domain names
PPTX
Phishing stories from the trenches
PDF
Help! I am an Investigative Journalist in 2017
PPTX
CryptoParty Tor Relay Workshop
PDF
Privacy for journalists introduction
PDF
Threat Modeling for Journalists
PDF
Privacy for Journalists Introduction
PDF
Safe Browsing in 2016
PDF
When the CDN goes bananas
PPTX
PGP and Keybase (CryptoParty Belfast)
Iron Bastion: Preventing business email compromise fraud at your firm
Hacking law firms with abandoned domain names
Phishing stories from the trenches
Help! I am an Investigative Journalist in 2017
CryptoParty Tor Relay Workshop
Privacy for journalists introduction
Threat Modeling for Journalists
Privacy for Journalists Introduction
Safe Browsing in 2016
When the CDN goes bananas
PGP and Keybase (CryptoParty Belfast)

Recently uploaded (20)

PDF
TRAFFIC-MANAGEMENT-AND-ACCIDENT-INVESTIGATION-WITH-DRIVING-PDF-FILE.pdf
PPT
Understanding the Impact of the Cyber Act
PPTX
Law of Torts , unit I for BA.LLB integrated course
PDF
AHRP LB - Quick Look of the Newly-initiated Koperasi Merah Putih (KMP).pdf
PDF
OpenAi v. Open AI Summary Judgment Order
PDF
Kayla Coates Wins no-insurance case Against the Illinois Workers’ Benefit Fund
PPTX
FFFFFFFFFFFFFFFFFFFFFFTA_012425_PPT.pptx
PPT
Understanding the Impact of the Cyber Act
PPTX
BUSINESS LAW AND IT IN CONTRACT SIGNING AND MANAGEMENT
PPTX
Learning-Plan-4-Core-Principles.pptx htts
PDF
Notes to accompany the TMT and FRAND Overview Slides
PPTX
Income under income Tax Act..pptx Introduction
PPTX
Ethiopian Tort Law Short Note by Mikiyas.pptx
PPTX
PART-3-FILIPINO-ADMINISTRATIVE-CULTURE.pptx
PDF
The AI & LegalTech Surge Reshaping the Indian Legal Landscape
PPTX
RULE_4_Out_of_Court_or_Informal_Restructuring_Agreement_or_Rehabilitation.pptx
PPTX
Lecture Notes on Family Law - Knowledge Area 5
PDF
Vinayaka Mission Law School Courses and Infrastructure.pdf
PDF
Trademark, Copyright, and Trade Secret Protection for Med Tech Startups.pdf
PDF
Louisiana Bar Foundation 2023-2024 Annual Report
TRAFFIC-MANAGEMENT-AND-ACCIDENT-INVESTIGATION-WITH-DRIVING-PDF-FILE.pdf
Understanding the Impact of the Cyber Act
Law of Torts , unit I for BA.LLB integrated course
AHRP LB - Quick Look of the Newly-initiated Koperasi Merah Putih (KMP).pdf
OpenAi v. Open AI Summary Judgment Order
Kayla Coates Wins no-insurance case Against the Illinois Workers’ Benefit Fund
FFFFFFFFFFFFFFFFFFFFFFTA_012425_PPT.pptx
Understanding the Impact of the Cyber Act
BUSINESS LAW AND IT IN CONTRACT SIGNING AND MANAGEMENT
Learning-Plan-4-Core-Principles.pptx htts
Notes to accompany the TMT and FRAND Overview Slides
Income under income Tax Act..pptx Introduction
Ethiopian Tort Law Short Note by Mikiyas.pptx
PART-3-FILIPINO-ADMINISTRATIVE-CULTURE.pptx
The AI & LegalTech Surge Reshaping the Indian Legal Landscape
RULE_4_Out_of_Court_or_Informal_Restructuring_Agreement_or_Rehabilitation.pptx
Lecture Notes on Family Law - Knowledge Area 5
Vinayaka Mission Law School Courses and Infrastructure.pdf
Trademark, Copyright, and Trade Secret Protection for Med Tech Startups.pdf
Louisiana Bar Foundation 2023-2024 Annual Report

How to manage your client's data responsibly

  • 1. How to manage your client’s data responsibly Protect your clients from fraud, identity theft and confidential information Jeremiah Cruz jeremy@cryptoaustralia.org.au Nick Kavadias nick@cryptoaustralia.org.au Gabor Szathmari gabor@cryptoaustralia.org.aucryptoaustralia.org.au
  • 2. Who is CryptoAUSTRALIA • A not-for-profit started by security and privacy enthusiasts. • We have nothing to do with BitCoin, so please stop asking. • We are for finding practical ways of dealing with the modern privacy and security challenges. • We are looking for sponsors in order to continue our work and research. • This may be a new concept to lawyers, but we are running these events for free*. * This presentation does not constitute cybersecurity advice.
  • 3. Self Promotion.. Tonight’s speakers: •Jeremy – Network Security Expert •Nick – Solicitor and Technologist •Gabor – Cybersecurity Expert
  • 4. We know how to internet… @CryptoAustralia #cryptoaus http://chat.cryptoaustralia.org.au https://fb.me/CryptoStraya Interact with us in the digital world…
  • 5. What we are covering tonight… 1) Bad practices 2) Password security (2FA and Password reuse) 3) Sharing documents securely 4) Storing documents securely 5) Prudent data disposal practices 6) Physical security (dos and don’ts) 7) What to do post-breach 🙏
  • 6. Secret: “hackers” log into your webmail
  • 7. Password hygiene • Websites get hacked. • People reuse same email and password across multiple online accounts. D’oh!
  • 8. Haveibeenpwned Do you have leaked passwords? https://haveibeenpwned.com/
  • 13. Meanwhile on SpyCloud... (an unrelated account)
  • 15. Bad client document & personal information management practices • VOI checks • Online document conversion • Document sharing (e.g. Dropbox) • Keeping emails forever • Public Wifi
  • 16. Bad practices - VOI checks 100 points ID checks – Leaks everywhere • Scan-to-email printers (bonus: unencrypted traffic) • Documents sent/received over emails • Emails are never deleted on the sender/receiver side
  • 17. Bad practices - VOI checks • Don’t ask for scanned documents to be sent over emails • Rely on VOI providers instead • Secure smartphone app and web portal • https://www.dvs.gov.au/users/Pages/Identity- service-providers.aspx
  • 19. Bad practices - Online document conversion Online2PDF.com, freepdfconvert.com... • They provide a convenient service to convert documents to PDF
  • 21. Bad practices - Online document conversion Online2PDF.com, freepdfconvert.com... • Who’s behind the service? • What happens to your documents? • Why would you upload sensitive documents to random strangers?
  • 22. Online document conversion Convert documents offline with Adobe Professional
  • 23. Bad practices - Document sharing over emails Problem statement: Your email file attachments and embedder download links remain in your ‘Sent’ email folder forever, waiting for a hacker to login and download them
  • 24. Bad practices - Document sharing over cloud-based file storage services File sharing with Dropbox, OneDrive, random service: • Download links are valid forever • Mailbox gets hacked → Links are still live
  • 25. Transferring sensitive documents securely • Send web links instead of file attachments where appropriate • Use expiring web links Services: Google Drive, Sync.com, Tresorit...
  • 28. Bad practices - Emails are kept forever Keeping all emails for extended period • Limit the damage if the mailbox gets hacked • Set an archive and retention policy and archive emails to a secure third-party service (e.g. Spinbackup, Backupify) • Office 365, G Suite support retention policies
  • 30. Bad practices - Public Wifi Lots of hacking wizardry: • Password theft via fake login pages • HTTP pages tampered on the fly • Theft of unencrypted sensitive data Just take our advice on the next slide
  • 31. Public Wifi – Use VPN or a 4G dongle
  • 32. Good security hygiene What else you can do
  • 33. Secret: “hackers” log into your webmail
  • 34. Password hygiene • Websites get hacked. • People reuse same email and password across multiple online accounts. D’oh!
  • 35. Two-factor authentication Most powerful defence from: •Crappy passwords (Letmein1) •Stolen passwords (phishing) •Leaked passwords (reuse)
  • 37. Password hygiene – Wallets Remember a single password only • LastPass • 1Password • Dashlane • RoboForm • < Any random password wallet >
  • 38. Storing documents securely Cloud file storage – Who your adversary is • Hackers? - Dropbox, G Drive, OneDrive + Two-factor authentication turned on • Government? - End-to-end encrypted service: Sync.com, Tresorit • Encrypt your disks, USB flash drives and smartphones • BitLocker - Windows 10 Professional • FileVault – Mac • Android supports disk encryption • On iOS disk encryption is turned on by default
  • 39. Prudent data disposal practices Laptops, computers: • Magnetic disks: overwrite • DBAN (https://dban.org/) • SSD: Physical destruction • USB flash drives: Physical destruction
  • 40. Prudent data disposal practices iPhone: Factory reset Android*: 1. Encrypt device 2. Remove storage and SIM cards 3. Factory reset 4. Remove from Google account Phones (SD card): Physical destruction * https://www.computerworld.com/article/3243253/android/how-to-securely-erase-your-android-device-in-4-steps.html
  • 41. Physical security (dos and don’ts)
  • 42. Physical security (dos and don’ts) • Shredding documents • Diamond cut shredder • Secure document disposal service • Can secure dispose digital media for you • Digital certificates (e.g. PEXA key) •Leave them unplugged when not in use •Cut the built-in smart card in half to dispose
  • 43. What to do when you get hacked 🙏 • Disconnect your computer from the Internet and stop using it • Notify LawCover - They have an incident response team • Checklist: http://lca.lawcouncil.asn.au/lawcou ncil/images/cyber/CP-What-to- Do.pdf
  • 44. Summary 1) Use a VOI provider for identity checks 2) Use 2FA and don’t reuse your password 3) Share documents with expiring links 4) Store documents in the cloud securely (2FA) 5) Dispose data securely 6) Shred documents & protect digital certificates 7) Notify LawCover when the house is on fire
  • 45. Where to get help • Law Council of Australia Cyber Precedent, great learning resource • Law Council cyber-attack checklist • Lawcover crisis management team can help you clean up the mess. • Victim of identity theft, you should contact IDCARE, NFP helping people • Have a conversation with your IT Service Provider, or staff. Use these slides as a talking point!