protect the personal

22
Internet Safety Awareness: Protect the Personal Marian Merritt Norton Internet Safety Advocate, Symantec Corporation

Upload: durban-chamber-of-commerce-and-industry

Post on 18-Nov-2014

725 views

Category:

Technology


0 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Protect the personal

Internet Safety Awareness:Protect the Personal

Marian MerrittNorton Internet Safety Advocate, Symantec Corporation

Page 2: Protect the personal

Cybercrime is a massive global problem

each year

$110 billion

each year

Cybercrime costs consumers

2/3of online adults have been hit by cybercrime

1 in 6social network

users have been hacked

Attacks on employees of targeted

organizations on the rise

$1 million +new pieces of malware are createdevery day

2

Page 3: Protect the personal

Who here checked Facebook today?

Played Angry Birds or Temple Run on a mobile device?

What’s really going on?

3

Page 4: Protect the personal

What you think you did

4

SCORE

USER NAME

PREVIOUS SCORES

FACEBOOK FRIEND LIST

IP ADDRESSTIME SPENT

PLAYING

vs what actually happened in the background

GENDER& AGE

LOCATION

Page 5: Protect the personal

What is the issue at stake?

Page 6: Protect the personal

6

Facebook click jacking attack types

Page 7: Protect the personal

7

Bad Guys Want to Get Us to Click to:Infect us with malware

Make us take bogus surveys to: Gain information or Sign us up for premium SMS services

Send spam to us and our friends

OMG! Videos get people to click

Page 8: Protect the personal

8

Bad guys know that people want to know who viewed their Facebook page

Page 9: Protect the personal

9

Bad guys know that people want a dislike button

Page 10: Protect the personal

Which is more likely to get attacked?

10

Small or Medium Organization

Large Organization

Page 11: Protect the personal

Only 25% of targeted attacks directed at C-Level executives

Employee CEO

Who is most likely to be targeted in an attack?

11

Author
CEO image can be a generic confident man/woman in a suit. This is a great slide. clean, makes the point easily.
Page 12: Protect the personal

“Spear Phishing” for company data

12

Page 13: Protect the personal

13

Data breach how a criminal uses your data

Page 14: Protect the personal

What are the chances of getting your lost phone back?

50%14

Page 15: Protect the personal

What are the chances of your work andpersonal information being looked at?

100%15

Author
The image should still be a phone. Ideally, it would be a picture of a phone in someone's hands with private data like email or a bank login being viewed on the screen.
Page 16: Protect the personal
Page 17: Protect the personal

17

STOP

Page 18: Protect the personal

18

THINK

Page 19: Protect the personal

19

CONNECT

Page 20: Protect the personal

20

Page 21: Protect the personal

Change your Behavior

Page 22: Protect the personal

What will you do?