the little phish is the best catch
play

The Little Phish Is The Best Catch Dan Goodman, Co-Founder @ Anchor - PowerPoint PPT Presentation

The Little Phish Is The Best Catch Dan Goodman, Co-Founder @ Anchor Security Team Give a man a fish, he will eat for a day Teach a man to phish, and he will steal every day Phishing What is Phishing? The act of attempting to steal


  1. The Little Phish Is The Best Catch Dan Goodman, Co-Founder @ Anchor Security Team

  2. “Give a man a fish, he will eat for a day… Teach a man to phish, and he will steal every day…”

  3. Phishing

  4. What is Phishing? The act of attempting to steal information or gain access to systems through impersonation or deception over digital communication.

  5. Unprepared and Unaware Make the Easiest Target

  6. It’s my bosses problem… It’s AT&T’s problem… It’s Comcast’s Problem… It’s IT’s problem…

  7. Cyber Crime and You 2018 Cyber Crime 2018 Small Business Hacks Profit Other $1.5 Trillion 20% Damages Phishing $6 Trillion 80%

  8. Four Factors of a successful Phish: Is it Urgent? Is it Important? Is it from an Authority? Is it Limited or Free?

  9. Urgency Individuals tend to respond quickly, without considering the validity of the requests origin. Urgent matters require urgent responses.

  10. Example This may sometimes happen, But it’s rare for large companies This is not the right length, Not real UPS website Urgency Established

  11. Importance Recipients might be too focused on the importance of the request. Importance requires focus.

  12. Importance Established THE IRS WILL NEVER EMAIL YOU

  13. Authority A request coming from a higher authority requires the individual be dependable in their promptness Authority demands prompt dependability.

  14. A Picture of your CEO Your name Authority Established Urgency (Fake CEO Email)

  15. Limited and Free When something is free in limited quantity, individuals move fast Limited and Free blinds the individual.

  16. Established Limited and Free It was in spam for a reason, not even Amazon Weird syntax

  17. If They Distract You with the Request They Win.

  18. Email isn’t the only Phishing platform Phones can be even worse

  19. Martin Cooper holding the world’s first mobile phone, 1973

  20. Apple’s Steve Jobs introduces the iPhone at MacWorld, 2007

  21. Nobody had security in mind at the time… And the cellular system kept growing without it.

  22. How is the current cellular system a threat? Allow me to show you…

  23. Demo Phish: Spoofing a Phone Number

  24. Here’s the crazy part: You don’t need to be the one who gets fooled.

  25. Phishing is the most Dangerous and Widespread Attack You may never figure out that you just gave away your data

  26. 2019’s 12 Most Exploited Countries 100% 93.7% 91.5% 87.9% 87.8% 85.7% 83.7% 80.9% 79.6% 79.5% 78.1% 76.1% 75.9% 75% 50% 25% 0% Spain Saudia Arabia Colombia Turkey Japan China South Africa Italy Canada Mexico France USA These are Small Businesses Imperva 2019 Cyberthreat Defense Report

  27. Let’s Fix the Problem Together

  28. The best things you can do to prepare: 1) Training 2) More Training 3) And Then Some More Training

  29. Checking for Phishing should be second nature

  30. More Steps to Take Now Easy: Always be the one to call someone you don’t know, Always inspect emails carefully Medium: Use more modern and secure methods of communication e.g., Slack, Signal, Discord, iMessage Hard: Use digital signatures for email

  31. Don’t forget, you can be phished in person too

  32. Questions?

  33. Don’t be another statistic…

  34. Free Security Audit: Email “webinar1”, your name, company, and phone number to hello@anchorsecurityteam.com Until 8/8/19 anchorsecteam @anchorsecteam anchorsecteam

Recommend


More recommend