Skip to content

Tech 360 at Penn State Great Valley focuses on cyber security

  • Darin Bielby, managing director of Navigate Consulting Inc., discusses cyber...

    PETE BANNAN — DIGITAL FIRST MEDIA

    Darin Bielby, managing director of Navigate Consulting Inc., discusses cyber security with fellow panel members on Thursday at Tech 360 conference on cyber security

  • Luke Olenoski, head of identity access management at Vanguard, makes...

    PETE BANNAN — DIGITAL FIRST MEDIA

    Luke Olenoski, head of identity access management at Vanguard, makes a point.

  • Moderator Austin Morris Jr. , president of Morris Risk Management...

    PETE BANNAN — DIGITAL FIRST MEDIA

    Moderator Austin Morris Jr. , president of Morris Risk Management LLC, guides a panel discussion.

of

Expand
Author
PUBLISHED: | UPDATED:

EAST WHITELAND >> The threat of cyber crime against consumers and businesses has never been greater, which keeps FBI agent Ben Stone busy.

Stone, a special agent now working out of the FBI’s Philadelphia office, capped off this year’s Tech 360 conference held Thursday at Penn State Great Valley.

The cyber crime issue, he noted, is a people problem, not a tech problem. And for victims of it, the results are often devastating.

Not only can it cost millions to fix, “people won’t want to do business with you if you’ve been affected by” a hacked system, Stone said.

The motivations of hackers differ, which can make figuring out where to look for the criminals difficult. Some, like Edward Snowden, are malicious insiders, Stone said. Others are motivated by money and are interested only in extorting their victims.

In business settings, the key to safety is to use all security software available and to make sure everyone in the organization is aware of the threat companies now operate under.

“Convince your staff that the threat is real and that they are targets,” Stone advised the 185 Tech 360 attendees who stayed for the last presentation of the day. “Require training and test what they’ve learned … Know where your stuff is.”

Stone urged the business people in the audience to “make a friend.” Get to know people from a U.S. Attorney’s office, the FBI, the Department of Homeland Security, and other agencies, he suggested.

“Have a plan before something really bad happens and practice the plan,” Stone advised. “The biggest thing we want is for people to call.”

Stone said business owners or executives are sometimes embarrassed when they become a victim of crime or they attempt to solve the problems themselves to avoid publicity.

“We don’t take over your system, we don’t repair your system, we don’t release proprietary or confidential information, or divulge information to the media,” the special agent said. “You are the victim of a crime.”

The only time information from a cyber crime investigation becomes public is if the case goes to trial.

“Nine times out of 10 they plead guilty,” Stone said.

For consumers, the threat is ever growing.

Many are falling victims to online work-from-home scams and romantic scams, Stone said.

“You’ll have people dating online and they’ll pretend they’ve gotten hurt and ask the other person to send them money,” Stone said. “People will fall for it.”

One precaution Stone advised all consumers to take to protect their information, particularly their financial accounts: use two-factor identification systems.

“It’s crucial in this day and age,” Stone said.

There also is growing concern with cyber criminals targeting unsecure Internet of Things, or IoT, devices. The number of such devices in use is expected to increase from 5 billion in 2016 to somewhere between 20 billion and 50 billion by 2020. Once an IoT device is compromised, cyber criminals can launch attacks on other systems or networks, send spam e-mails, steal personal information, interfere with physical safety, and leverage compromised devices for participation in distributed denial of service (DDoS) attacks, the FBI notes.

Some IoT devises are:* Home automation device that control lighting, heating and cooling, electricity, sprinklers, locks;

* Security systems such as alarm systems and surveillance cameras;

* Medical devices like wireless heart monitors, insulin dispensers;

* Wearables such as fitness trackers, clothing, watches;

* Smart appliances like refrigerators, vacuums and stoves;

* Office equipment such as wireless printers, computer mouse, outlets, interactive whiteboards;

* Entertainment devices such as DVRs, TVs, gaming systems, music players and toys.

Thursday’s event was the fifth year for the Tech 360 conference, which is put on by ITAG – Information Technology Awareness Group – and i2n – Ideas Innovation Network. Both are initiatives of the Chester County Economic Development Council. The all-day event included breakout sessions and panel discussion on cyber security issues.

“This is by far and away the best ever,” said Nancy White, a board member of ITAG. “Not only by the numbers, but the quality of information provided was great.”

For information on the event: www.tech360pa.com

For information on cyber crime or to report an incident, visit www.ic3.gov

To contact Business Writer Brian McCullough, call 610-235-2655 or send an email to bmccullough@21st-centurymedia.com.