lance spitzner
play

Lance Spitzner www.securingthehuman.org facebook.com/securethehuman - PowerPoint PPT Presentation

Lance Spitzner www.securingthehuman.org facebook.com/securethehuman @securethehuman 1 in 251,800,000 Source: http://www.bookofodds.com/content/view/full/252163 1 in 112,000,000 Source: http://www.bookofodds.com/content/view/full/248157 The Human


  1. Lance Spitzner www.securingthehuman.org facebook.com/securethehuman @securethehuman

  2. 1 in 251,800,000 Source: http://www.bookofodds.com/content/view/full/252163

  3. 1 in 112,000,000 Source: http://www.bookofodds.com/content/view/full/248157

  4. The Human Risk People underestimate risks on the Internet – They feel they are in control – Impact is often not seen – Combine this with the fact the Internet makes it simple to spoof things victims trust

  5. Targeting You You and your organization is specifically targeted – Advanced Persistent Threat (APT) – Insider Threat – Hactivisim

  6. Targeting Everyone • Primary motive is money (ROI) • Fraud, identity theft, and extortion always existed • Internet simply makes crime highly profitable with minimal risk/effort • The more people criminals hack, the more money they make

  7. Social Engineering • Not a technical attack, it is a psychological attack that leverages technology • Most human based attacks involved social engineering • Hotel room example

  8. Social Networking Sites Social networking websites became a breeding ground for social engineering attacks – London mugging – Malicious messages/links – Used by APT to learn about and target individuals within an organization

  9. Phone • E-mail filtering and other security technologies becoming more effective • Bad guys bypass these by calling people directly • The classic “Microsoft Support” attack

  10. Protecting Yourself • You Are The Target • Passwords • Social Engineering • Mobile Devices • Email & Messaging • Hacked • Social Media

  11. You Are the Target • Most people do not realize they are a target. Never forget you, your devices and your information have tremendous value to many different people. • By taking some basic steps, you can continue to safely use the latest in technology.

  12. Social Engineering • Social engineering is the foundation of most human based attacks • These type of attacks will always be evolving and changing

  13. E-mail & Messaging • Infected attachments • Malicious links • Scams • Messaging

  14. Social Media • Ultimately there is no privacy on social media, assume anything you post your mom or boss will eventually read • Scams and attacks are prevalent • Do not post work related information

  15. Passwords • Passphrases • Use passwords / passphrases securely – Use different passwords for different accounts (password manager) – Always use VPN when logging into your computer away from the office – Do not share with anyone – The dangers of questions as passwords – Two-step verification

  16. Mobile Devices • Use PIN and encryption to protect phone • Be careful when downloading apps • Update OS and apps • Don’t trust SMS messages

  17. Hacked Security is not just about preventing attacks but also detecting and responding. The sooner an incident is reported, the more you can mitigate the impact – Happens to everyone – Things to look for – Whom to report to

  18. Summary • You are a target. • By taking some basic steps you can protect yourself and your family.

  19. Resources • OUCH! free monthly security awareness newsletter • Posters & presentations www.securingthehuman.org/resources

Recommend


More recommend