protectthepersonaldefendtheworkplace 121023115113-phpapp01

Post on 13-Dec-2014

556 Views

Category:

News & Politics

0 Downloads

Preview:

Click to see full reader

DESCRIPTION

 

TRANSCRIPT

Internet Safety Awareness:Protect the Personal and Defend the Workplace

Marian MerrittNorton Internet Safety Advocate, Symantec Corporation

Why are you here?

Cybercrime is a massive global problem

each year

$110 billion

each year

Cybercrime costs consumers

2/3of online adults have been hit by cybercrime

1 in 6social network

users have been hacked

Attacks on employees of targeted

organizations on the rise

$1 million +new pieces of malware are createdevery day

3

Why am I here?

Who here checked Facebook today?

Played Angry Birds or Temple Run on a mobile device?

What’s really going on?

5

What you think you did

6

SCORE

USER NAME

PREVIOUS SCORES

FACEBOOK FRIEND LIST

IP ADDRESSTIME SPENT

PLAYING

vs what actually happened in the background

GENDER& AGE

LOCATION

What is the issue at stake?

8

Facebook click jacking attack types

9

Bad Guys Want to Get Us to Click to:Infect us with malware

Make us take bogus surveys to: Gain information or Sign us up for premium SMS services

Send spam to us and our friends

OMG! Videos get people to click

10

Bad guys know that people want to know who viewed their Facebook page

11

Bad guys know that people want a dislike button

Which is more likely to get attacked?

12

Small or Medium Organization

Large Organization

Only 25% of targeted attacks directed at C-Level executives

Employee CEO

Who is most likely to be targeted in an attack?

13

Author
CEO image can be a generic confident man/woman in a suit. This is a great slide. clean, makes the point easily.

“Spear Phishing” for company data

14

15

Data breach how a criminal uses your data

16

DENMARK

MALAYSIA

STUXNET: thousands of industrial centers infiltrated

IRAN

Author
My approach on stuxnet is to show it was targeted to Iranian nuclear enrichment facilities. So while it did spread all over the world (can we remove the names of the websites?) it did DAMAGE in Iran only. This slide shou
Author
come after 16.

Why it matters at work

What are the chances of getting your lost phone back?

50%18

What are the chances of your work andpersonal information being looked at?

100%19

Author
The image should still be a phone. Ideally, it would be a picture of a phone in someone's hands with private data like email or a bank login being viewed on the screen.

21

STOP

22

THINK

23

CONNECT

Get hit by cybercrime and you just opened the gate

Author
can we replace the image with less "model" looking people and maybe find some regular folks in a work environment? :)

25

Change your Behavior

Wrap up

Author
we can add in a couple of images of malicious activity if you wish

What will you do?

Questions

THANK YOU!

Copyright © 2012 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.

TM

Marian Merrittmarian@norton.com

Author
change email to marian@norton.com

top related