internet security: protect the personal; defend the workplace

30
Internet Safety Awareness: Protect the Personal and Defend the Workplace Marian Merritt Norton Internet Safety Advocate, Symantec Corporation

Upload: marian-merritt

Post on 21-Nov-2014

12.685 views

Category:

Technology


1 download

DESCRIPTION

From mobile security to data breaches and global cyber terrorism; understand what you the individual need to do to protect your private information as well as defend your employers valuable information. Speaker notes are included. Feel free to download and reuse!

TRANSCRIPT

Page 1: Internet Security: Protect the Personal; Defend the Workplace

Internet Safety Awareness:Protect the Personal and Defend the Workplace

Marian MerrittNorton Internet Safety Advocate, Symantec Corporation

Page 2: Internet Security: Protect the Personal; Defend the Workplace

Why are you here?

Page 3: Internet Security: Protect the Personal; Defend the Workplace

Cybercrime is a massive global problem

each year

$110 billion

each year

Cybercrime costs consumers

2/3of online adults have been hit by cybercrime

1 in 6social network

users have been hacked

Attacks on employees of targeted

organizations on the rise

$1 million +new pieces of malware are createdevery day

3

Page 4: Internet Security: Protect the Personal; Defend the Workplace

Why am I here?

Page 5: Internet Security: Protect the Personal; Defend the Workplace

Who here checked Facebook today?

Played Angry Birds or Temple Run on a mobile device?

What’s really going on?

5

Page 6: Internet Security: Protect the Personal; Defend the Workplace

What you think you did

6

SCORE

USER NAME

PREVIOUS SCORES

FACEBOOK FRIEND LIST

IP ADDRESSTIME SPENT

PLAYING

vs what actually happened in the background

GENDER& AGE

LOCATION

Page 7: Internet Security: Protect the Personal; Defend the Workplace

What is the issue at stake?

Page 8: Internet Security: Protect the Personal; Defend the Workplace

8

Facebook click jacking attack types

Page 9: Internet Security: Protect the Personal; Defend the Workplace

9

Bad Guys Want to Get Us to Click to:Infect us with malware

Make us take bogus surveys to: Gain information or Sign us up for premium SMS services

Send spam to us and our friends

OMG! Videos get people to click

Page 10: Internet Security: Protect the Personal; Defend the Workplace

10

Bad guys know that people want to know who viewed their Facebook page

Page 11: Internet Security: Protect the Personal; Defend the Workplace

11

Bad guys know that people want a dislike button

Page 12: Internet Security: Protect the Personal; Defend the Workplace

Which is more likely to get attacked?

12

Small or Medium Organization

Large Organization

Page 13: Internet Security: Protect the Personal; Defend the Workplace

Only 25% of targeted attacks directed at C-Level executives

Employee CEO

Who is most likely to be targeted in an attack?

13

Author
CEO image can be a generic confident man/woman in a suit. This is a great slide. clean, makes the point easily.
Page 14: Internet Security: Protect the Personal; Defend the Workplace

“Spear Phishing” for company data

14

Page 15: Internet Security: Protect the Personal; Defend the Workplace

15

Data breach how a criminal uses your data

Page 16: Internet Security: Protect the Personal; Defend the Workplace

16

DENMARK

MALAYSIA

STUXNET: thousands of industrial centers infiltrated

IRAN

Author
My approach on stuxnet is to show it was targeted to Iranian nuclear enrichment facilities. So while it did spread all over the world (can we remove the names of the websites?) it did DAMAGE in Iran only. This slide shou
Author
come after 16.
Page 17: Internet Security: Protect the Personal; Defend the Workplace

Why it matters at work

Page 18: Internet Security: Protect the Personal; Defend the Workplace

What are the chances of getting your lost phone back?

50%18

Page 19: Internet Security: Protect the Personal; Defend the Workplace

What are the chances of your work andpersonal information being looked at?

100%19

Author
The image should still be a phone. Ideally, it would be a picture of a phone in someone's hands with private data like email or a bank login being viewed on the screen.
Page 20: Internet Security: Protect the Personal; Defend the Workplace
Page 21: Internet Security: Protect the Personal; Defend the Workplace

21

STOP

Page 22: Internet Security: Protect the Personal; Defend the Workplace

22

THINK

Page 23: Internet Security: Protect the Personal; Defend the Workplace

23

CONNECT

Page 24: Internet Security: Protect the Personal; Defend the Workplace

Get hit by cybercrime and you just opened the gate

Author
can we replace the image with less "model" looking people and maybe find some regular folks in a work environment? :)
Page 25: Internet Security: Protect the Personal; Defend the Workplace

25

Page 26: Internet Security: Protect the Personal; Defend the Workplace

Change your Behavior

Page 27: Internet Security: Protect the Personal; Defend the Workplace

Wrap up

Author
we can add in a couple of images of malicious activity if you wish
Page 28: Internet Security: Protect the Personal; Defend the Workplace

What will you do?

Page 29: Internet Security: Protect the Personal; Defend the Workplace

Questions

Page 30: Internet Security: Protect the Personal; Defend the Workplace

THANK YOU!

Copyright © 2012 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.

TM

Marian [email protected]

Author
change email to [email protected]