Date post: | 22-Dec-2014 |
Category: |
Technology |
Upload: | marian-merritt |
View: | 421 times |
Download: | 1 times |
Internet Safety Awareness:Social, Mobile and Messy
Marian MerrittNorton Internet Safety Advocate, Symantec Corporation
Internet Safety: Social, Mobile, Messy
Marian Merritt, Norton Internet Safety Advocate
Why are you here?
3
Cybercrime is a massive global problem
each year
$112 billion
each year
Cybercrime costs consumers
1/2of online adults have been hit by cybercrime
12%social network
users have been hacked
More Targeted Attacks
employees social media
RansomwareNew forms of costly malicious threats
Why am I here?
5
Who here checked Facebook today? Played Angry Birds or Candy Crush on a mobile device?
What’s really going on with mobile?
6
What you think you did
SCORE
USER NAME
PREVIOUS SCORES
FACEBOOK FRIEND LIST
IP ADDRESSTIME SPENT
PLAYING
vs what actually happened in the background
GENDER& AGE
LOCATION
OK, so I’ll be careful with apps
• , WiFi if not using
7
What’s going on with Social: advertising scams
8
WHAT YOU SEE WHY THEY DO IT
9
Bad Guys Want to Get Us to Click to:Infect us with malware
Make us take bogus surveys to: Gain information or Sign us up for premium SMS services
Send spam to us and our friends
And malicious social links
Ok, I’ll be careful in social networks and media
10
What is the issue at stake?
SAVVY ON COMPUTER, LESS SO ON MOBILE
72%90% 78%GOOD JOB!
56% 48%33%NEEDS WORK!
VS. VS. VS.
VS. VS. VS.
60% 42% 53%
DELETE SUSPICIOUS EMAILS FROM PEOPLE THEY DON’T KNOW
HAVE AT LEAST A BASIC FREE ANTIVIRUS SOLUTION
AVOID STORING SENSITIVE FILES ONLINE
NEEDS WORK!
How often do we lose our mobile devices?
27%13
What are the chances of getting your lost phone back?
50%14
What are the chances of your work andpersonal information being looked at?
100%
15
16
NEARLY ½ MOBILE USERS SLEEP WITH DEVICE NEARBY
17
36% SAY THEIR COMPANY HAS NO POLICY ON BYOD
18
49% USE PERSONAL DEVICE FOR BOTH WORK AND PLAY
19
18% SHARE WITH
FRIENDS*
21% SHARE WITH
FAMILY*
ONLINE FILE STORAGE BLURS WORK AND PLAY
Targeted attacks: Likely to get attacked?
20
Small or Medium Organization
Large Organization
Only 17% of targeted attacks directed at C-Level executives21
Employee CEO
Who is most likely to be targeted in an attack?
22
DENMARK
MALAYSIA
STUXNET: thousands of industrial centers infiltrated
IRAN
23
MAKE THE CONNECTION: Change Behavior
24
MAKE THE CONNECTION: Change Behavior
• Set PASSWORDS on all devices
25
MAKE THE CONNECTION: Change Behavior
• Use security and anti-theft SOFTWARE
26
MAKE THE CONNECTION: Change Behavior
• Be CAUTIOUS:• Don’t friend strangers• Be careful with links• STOP.THINK.CONNECT.
Wrap up
What will you do?
Questions
THANK YOU!
Copyright © 2013 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.
This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.
TM
Marian [email protected]