internet safety: social, mobile, messy

30
Internet Safety Awareness: Social, Mobile and Messy Marian Merritt Norton Internet Safety Advocate, Symantec Corporation Internet Safety: Social, Mobile, Messy Marian Merritt, Norton Internet Safety Advocate

Upload: marian-merritt

Post on 22-Dec-2014

421 views

Category:

Technology


1 download

DESCRIPTION

How we use mobile devices increasingly impacts our online safety. Learn quick tips for upping your internet safety savvy and keep your private data secure.

TRANSCRIPT

Page 1: Internet Safety: Social, Mobile, Messy

Internet Safety Awareness:Social, Mobile and Messy

Marian MerrittNorton Internet Safety Advocate, Symantec Corporation

Internet Safety: Social, Mobile, Messy

Marian Merritt, Norton Internet Safety Advocate

Page 2: Internet Safety: Social, Mobile, Messy

Why are you here?

Page 3: Internet Safety: Social, Mobile, Messy

3

Cybercrime is a massive global problem

each year

$112 billion

each year

Cybercrime costs consumers

1/2of online adults have been hit by cybercrime

12%social network

users have been hacked

More Targeted Attacks

employees social media

RansomwareNew forms of costly malicious threats

Page 4: Internet Safety: Social, Mobile, Messy

Why am I here?

Page 5: Internet Safety: Social, Mobile, Messy

5

Who here checked Facebook today? Played Angry Birds or Candy Crush on a mobile device?

What’s really going on with mobile?

Page 6: Internet Safety: Social, Mobile, Messy

6

What you think you did

SCORE

USER NAME

PREVIOUS SCORES

FACEBOOK FRIEND LIST

IP ADDRESSTIME SPENT

PLAYING

vs what actually happened in the background

GENDER& AGE

LOCATION

Page 7: Internet Safety: Social, Mobile, Messy

OK, so I’ll be careful with apps

• , WiFi if not using

7

Page 8: Internet Safety: Social, Mobile, Messy

What’s going on with Social: advertising scams

8

WHAT YOU SEE WHY THEY DO IT

Page 9: Internet Safety: Social, Mobile, Messy

9

Bad Guys Want to Get Us to Click to:Infect us with malware

Make us take bogus surveys to: Gain information or Sign us up for premium SMS services

Send spam to us and our friends

And malicious social links

Page 10: Internet Safety: Social, Mobile, Messy

Ok, I’ll be careful in social networks and media

10

Page 11: Internet Safety: Social, Mobile, Messy

What is the issue at stake?

Page 12: Internet Safety: Social, Mobile, Messy

SAVVY ON COMPUTER, LESS SO ON MOBILE

72%90% 78%GOOD JOB!

56% 48%33%NEEDS WORK!

VS. VS. VS.

VS. VS. VS.

60% 42% 53%

DELETE SUSPICIOUS EMAILS FROM PEOPLE THEY DON’T KNOW

HAVE AT LEAST A BASIC FREE ANTIVIRUS SOLUTION

AVOID STORING SENSITIVE FILES ONLINE

NEEDS WORK!

Page 13: Internet Safety: Social, Mobile, Messy

How often do we lose our mobile devices?

27%13

Page 14: Internet Safety: Social, Mobile, Messy

What are the chances of getting your lost phone back?

50%14

Page 15: Internet Safety: Social, Mobile, Messy

What are the chances of your work andpersonal information being looked at?

100%

15

Author
The image should still be a phone. Ideally, it would be a picture of a phone in someone's hands with private data like email or a bank login being viewed on the screen.
Page 16: Internet Safety: Social, Mobile, Messy

16

NEARLY ½ MOBILE USERS SLEEP WITH DEVICE NEARBY

Author
The image should still be a phone. Ideally, it would be a picture of a phone in someone's hands with private data like email or a bank login being viewed on the screen.
Page 17: Internet Safety: Social, Mobile, Messy

17

36% SAY THEIR COMPANY HAS NO POLICY ON BYOD

Author
The image should still be a phone. Ideally, it would be a picture of a phone in someone's hands with private data like email or a bank login being viewed on the screen.
Page 18: Internet Safety: Social, Mobile, Messy

18

49% USE PERSONAL DEVICE FOR BOTH WORK AND PLAY

Author
The image should still be a phone. Ideally, it would be a picture of a phone in someone's hands with private data like email or a bank login being viewed on the screen.
Page 19: Internet Safety: Social, Mobile, Messy

19

18% SHARE WITH

FRIENDS*

21% SHARE WITH

FAMILY*

ONLINE FILE STORAGE BLURS WORK AND PLAY

Author
The image should still be a phone. Ideally, it would be a picture of a phone in someone's hands with private data like email or a bank login being viewed on the screen.
Page 20: Internet Safety: Social, Mobile, Messy

Targeted attacks: Likely to get attacked?

20

Small or Medium Organization

Large Organization

Page 21: Internet Safety: Social, Mobile, Messy

Only 17% of targeted attacks directed at C-Level executives21

Employee CEO

Who is most likely to be targeted in an attack?

Author
CEO image can be a generic confident man/woman in a suit. This is a great slide. clean, makes the point easily.
Page 22: Internet Safety: Social, Mobile, Messy

22

DENMARK

MALAYSIA

STUXNET: thousands of industrial centers infiltrated

IRAN

Author
My approach on stuxnet is to show it was targeted to Iranian nuclear enrichment facilities. So while it did spread all over the world (can we remove the names of the websites?) it did DAMAGE in Iran only. This slide shou
Author
come after 16.
Page 23: Internet Safety: Social, Mobile, Messy

23

MAKE THE CONNECTION: Change Behavior

Page 24: Internet Safety: Social, Mobile, Messy

24

MAKE THE CONNECTION: Change Behavior

• Set PASSWORDS on all devices

Page 25: Internet Safety: Social, Mobile, Messy

25

MAKE THE CONNECTION: Change Behavior

• Use security and anti-theft SOFTWARE

Page 26: Internet Safety: Social, Mobile, Messy

26

MAKE THE CONNECTION: Change Behavior

• Be CAUTIOUS:• Don’t friend strangers• Be careful with links• STOP.THINK.CONNECT.

Page 27: Internet Safety: Social, Mobile, Messy

Wrap up

Author
we can add in a couple of images of malicious activity if you wish
Page 28: Internet Safety: Social, Mobile, Messy

What will you do?

Page 29: Internet Safety: Social, Mobile, Messy

Questions

Page 30: Internet Safety: Social, Mobile, Messy

THANK YOU!

Copyright © 2013 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.

TM

Marian [email protected]

Author
change email to [email protected]