Welcome to the Elkhart Rotary Club Meeting on September 9, 2019; Today we welcomed Jason Williams, Director of Information Security & Compliance, M.S., CISSP at the University of Notre Dame. 
 
 

President Candy Yoder opened the meeting and introduced Shannon White who informed the club about the passing of long time club member Phil Penn on August 29. Shan shared thoughtful words, led the Pledge, and Four-Way Test.  

Guests were introduced by Paul Warning, including Chris Frey (Susan Bossung), Erin McNeal (Ashley Bowen), and Dave Miller (Paul Warning). Welcome to ALL, we hope you can all join us again some other time!

Announcements for September 9:

  • Candy announced the upcoming 2019 Rotary Zones 30-31 All Club Luncheon scheduled for Friday, October 11 at the 2019 Rotary Summit in Fort Wayne. Elkhart Rotary Club has been asked to present its Wellfield Botanic Gardens project as a way of 'thinking big' about community projects. Eric Garton and Eric Amt will be coordinating the presentation.
  • Julie Cotton announced that RSVPs are being taken for our Monday, September 30 - - the FIFTH MONDAY - - Rotary Dinner at Matterhorn, a special event in lieu of our regular Monday luncheon. Drinks and happy hour begin at 5:30 p.m. Musical entertainment provided generously by Steve Gruber, featuring songs of remembrance from our past. RSVP to Julie Cotton, along with your song requests and photos from the past for a special slideshow. Cost is $25 per person.
  • Julie also announced that there are still TWO TICKETS LEFT to the October 4 Dionne Warwick concert at the Lerner; if you're interested, contact Julie directly. Billing will be done through your account.
  • Eric Garton thanked club members, whether actively volunteering at Taste of the Gardens, helping with its coordination, sponsoring, or simply helping spread the word about this great event. In total, nearly 3500 attended Taste of the Gardens on Sunday; more financial reporting to follow. It was a fantastic event and your help is appreciated!!
  • Doug Risser announced the upcoming friendship exchange that will take place March 1-14, 2020 to Sao Paolo, Brazil. For more information contact Doug directly.
Today's Sergeant was Stan Cohen, who offered valuable information about Labor Day since we were off last week observing the Holiday. Labor Day trivia and fun fines were levied. Nice job of FUNdraising, Stan. Rotary fines are collected weekly and are pooled into a fund throughout the year. In the spring more than $10,000 is distributed as grants to not for profit organizations around our county. Thanks, All, for your contributions!
 
Moe Jacobson introduced today's speaker Jason Williams, Director of Information Security & Compliance, M.S., CISSP at the University of Notre Dame. His team protects the University from cybersecurity threats, supports safe computing, and helps campus leadership manage IT risk. Jason has spoken at several national conferences on topics ranging from credit card compliance to security program management to cybersecurity. Jason has his BA from Stanford University and an MS in National Security from the University of New Haven. He also teaches at the University’s Mendoza College of Business.
 
Today, Jason focused on several aspects of cyber security and issue YOU should be aware of to avoid being taken for a ride along the information superhighway. Issues discussed included: 
  • Phishing: In some respects, phishing is a confidence trick, designed by would-be thieves in order to part unsuspecting computer users from their most precious personal and/or financial information. Traditionally, phishing attempts looked to acquire data such as bank account details, social security numbers, and credit card numbers, either for direct financial gain or to facilitate identity theft (more on that below). Over the last few years, however, other forms of data and information have become valuable too. Phishing attempts are now just as likely to target users of social networking sites in order to try and steal their accounts either to use them as a launchpad for socially engineered scams or as a means of spamming the victim’s friends and other contacts. Phishing scams usually arrive via email and are designed to appear to be from legitimate organisations so as to trick the recipient into responding with their personal information. Many will even spoof email headers so that they appear to have come from a trusted source, or link to fake websites that are clones of the official sites that they purport to be. An example pictured below, creates the issue of 'urgency' to get the user to fall for the scheme.
 
  • Generic Greetings
  • Password Attacks  - - there are three types:
    1. ​​​​​​​Brute Force Attack - - A hacker uses a computer program or script to try to log in with possible password combinations, usually starting with the easiest-to-guess passwords. (So just think: if a hacker has a company list, he or she can easily guess usernames. If even one of the users has a “Password123”, he will quickly be able to get in.)
    2. Dictionary Attack - - A hacker uses a program or script to try to login by cycling through combinations of common words.
    3. Key Logger Attack - - A hacker uses a program to track all of a user’s keystrokes. So at the end of the day, everything the user has typed—including their login IDs and passwords—have been recorded. A key logger attack is different than a brute force or dictionary attack in many ways. Not the least of which, the key logging program used is malware (or a full-blown virus) that must first make it onto the user’s device (often the user is tricked into downloading it by clicking on a link in an email). Key logger attacks are also different because stronger passwords don’t provide much protection against them, which is one reason that multi-factor authentication (MFA) is becoming a must-have for all businesses and organizations.
  • HOW TO AVOID Password Attacks: Use two-factor authentication (also called multi-factor authentication, 2FA, and advanced authentication), a user is required to not only provide a password to gain access to the system, but also a another security “factor,” like a unique one-time access code generated from a token device or secure mobile app on their smartphone.
  • You SHOULD USE a 'Password Manager' application such as Dashlane to help you in keeping track of myriad passwords; they're handy and secure.
  • Eavesdropping: an electronic attack where digital communications are intercepted by an individual whom they are not intended. 

    This is done in two main ways: Directly listening to digital or analog voice communication or the interception or sniffing of data relating to any form of communication. Be cautious what wifi networks you're using, especially in public spaces... can you trust the wifi you're connected to.

  • Encrypted Traffic: To ensure safe web use, be sure you're working in spaces that have their information encrypted for security. And Jason reminded everyone, when in doubt, just delete it! IF it's an actual email, you'll receive another email. Better to be safe than sorry

  • Malware and Ransonware: Ransomware is a type of malicious software, or malware, designed to deny access to a computer system or data until a ransom is paid. Ransomware typically spreads through phishing emails or by unknowingly visiting an infected website. Ransomware can be devastating to an individual or an organization.
  • Cryptojacking: .... whoa, let's take a step back a bit... first, what ARE cryptocurrencies? Two words—“cryptography” and “currency”—combine to form “cryptocurrency." Cryptocurrencies are forms of digital money that exist only in the online world, with no actual physical form. All cryptocurrencies exist as encrypted decentralized monetary units, freely transferable between network participants. Or put more simply, cryptocurrency is electricity converted into lines of code, which have a real monetary value.They were created as an alternative to traditional money, and gained popularity for their forward-looking design, growth potential, and anonymity. One of the earliest, most successful forms of cryptocurrency, Bitcoin, came out in 2009. By December 2017, the value of a single bitcoin had reached an all-time high of nearly $20,000 USD, then dropped below $10,000. Bitcoin’s success inspired dozens of other cryptocurrencies that operate in more or less the same way. Less than a decade after its invention, people all over the world use cryptocurrencies to buy things, sell things, and make investments.
    So back to cryptojacking....
    Cryptojacking (also called malicious cryptomining) is an emerging online threat that hides on a computer or mobile device and uses the machine’s resources to “mine” forms of online money known as cryptocurrencies. It’s a burgeoning menace that can take over web browsers, as well as compromise all kinds of devices, from desktops and laptops, to smart phones and even network servers. Like most other malicious attacks on the computing public, the motive is profit, but unlike many threats, it’s designed to stay completely hidden from the user. 

To view the student and faculty portal for the Office of Information Technology, visit their website https://infosec.nd.edu/. This gives you an idea of the level of security and protection Jason and his team attempt to offer the students and faculty of Notre Dame. Surf safe out there!

About Rotary:
Rotary is a global network of 1.2 million neighbors, friends, community leaders, and problem-solvers who see a world where people unite and act to create lasting change – across the globe, in our local communities, and in ourselves. The Elkhart Rotary Club was founded in 1917 and serves its community through volunteerism, providing grants to not-for-profit organizations, sponsoring, and participating in service projects such as ringing bells for the Salvation Army, roadside trash collection, and are the originators and sustainers of Wellfield Botanic Gardens. Elkhart Rotary Club’s membership consists of approximately 150 dedicated individuals from various professional backgrounds and diverse interests. Membership in the Elkhart Rotary Club is by invitation. We welcome guests to attend any of our meetings and hear from our great lineup of weekly presenters.
For more information on the Elkhart Rotary Club, visit elkhartrotary.org or email elkhartnoonrotary@gmail.com. Like and follow us on Facebook at www.facebook/ElkhartRotaryClub to stay current on meetings, upcoming events or speakers, and initiatives in the community.
 
Upcoming Meetings and Programs:
Join us for our next meeting:
All meetings are at noon on Mondays at the Matterhorn Banquet and Conference Center, 2041 Cassopolis St. in Elkhart IN, 46514. In months that include a FIFTH Monday, the Elkhart Rotary Club holds an alternative meeting or activity.