b'2023Post WPMAEXPOTHURSDAYEducational SessionThursday Educationalspeaker Theresa Payton spoke on cybersecurity and how we can protect ourselves and our businesses. Here are a few clips from her presentation synopsis, as shared on the WPMA App:Cybercriminals will come and go. Technologys list of whats-hot andwhats-not will change. There are three core principles for security These three core principles will stand you in good stead no matter what threats you face:Master Human Nature. Educate yourself about what drives human nature and incorporate that understanding into your cyber security.Know the criminals. Create decoys of fake but authentic-lookinghuman profiles and systems that look valuable and leave the decoys vul-nerable to cyber criminals. Then, study the criminal elements that attack the decoys and learn from them. Beat the criminals at their own game. Leverage the power of ArtificialIntelligence (AI) and behavior-based analytics to create behavior-based profiles of employees as well as profiles of criminal activities. Then, use those profiles to create a digital bodyguard. A Big Concern: . the treatment of cybercrime is too vague and not enough work has been done around human rights. We cant even agree globally yet on what constitutes cybercrime. We dont have a framework across all borders regarding how law enforcement needs to work in a cross-border crime and investigation. You Can Become Unhackable in 15 Minutes or Less 1. Immediately change all passwords on all online accounts if they have been breached, or if they have poor passwords (e.g., namesof family members or pets, hobbies). Use phrases rather than words. 2. Consider password management tools plus hardware (e.g., Password vault + physical key such as the YubiKeyor trusted device) on all private accounts. This is the bestway to negate poor password usage. 3. Implement Multi-Factor Authentication (MFA) on all online accounts,including personal accounts, which are a bigger target for cyber-criminals. 4. De-activate any dormant and inactive online accounts. Even if no longer in use, these accounts still provide an important targetfor cyber-criminals. 5 Undertake a digital footprint assessment to understand the full extent of what information is out there about you.14 www.wpma.com / Post WPMAEXPO 2023'