Internet Safety: Social, Mobile, Messy

Post on 22-Dec-2014

422 views 1 download

Tags:

description

How we use mobile devices increasingly impacts our online safety. Learn quick tips for upping your internet safety savvy and keep your private data secure.

Transcript of Internet Safety: Social, Mobile, Messy

Internet Safety Awareness:Social, Mobile and Messy

Marian MerrittNorton Internet Safety Advocate, Symantec Corporation

Internet Safety: Social, Mobile, Messy

Marian Merritt, Norton Internet Safety Advocate

Why are you here?

3

Cybercrime is a massive global problem

each year

$112 billion

each year

Cybercrime costs consumers

1/2of online adults have been hit by cybercrime

12%social network

users have been hacked

More Targeted Attacks

employees social media

RansomwareNew forms of costly malicious threats

Why am I here?

5

Who here checked Facebook today? Played Angry Birds or Candy Crush on a mobile device?

What’s really going on with mobile?

6

What you think you did

SCORE

USER NAME

PREVIOUS SCORES

FACEBOOK FRIEND LIST

IP ADDRESSTIME SPENT

PLAYING

vs what actually happened in the background

GENDER& AGE

LOCATION

OK, so I’ll be careful with apps

• , WiFi if not using

7

What’s going on with Social: advertising scams

8

WHAT YOU SEE WHY THEY DO IT

9

Bad Guys Want to Get Us to Click to:Infect us with malware

Make us take bogus surveys to: Gain information or Sign us up for premium SMS services

Send spam to us and our friends

And malicious social links

Ok, I’ll be careful in social networks and media

10

What is the issue at stake?

SAVVY ON COMPUTER, LESS SO ON MOBILE

72%90% 78%GOOD JOB!

56% 48%33%NEEDS WORK!

VS. VS. VS.

VS. VS. VS.

60% 42% 53%

DELETE SUSPICIOUS EMAILS FROM PEOPLE THEY DON’T KNOW

HAVE AT LEAST A BASIC FREE ANTIVIRUS SOLUTION

AVOID STORING SENSITIVE FILES ONLINE

NEEDS WORK!

How often do we lose our mobile devices?

27%13

What are the chances of getting your lost phone back?

50%14

What are the chances of your work andpersonal information being looked at?

100%

15

Author
The image should still be a phone. Ideally, it would be a picture of a phone in someone's hands with private data like email or a bank login being viewed on the screen.

16

NEARLY ½ MOBILE USERS SLEEP WITH DEVICE NEARBY

Author
The image should still be a phone. Ideally, it would be a picture of a phone in someone's hands with private data like email or a bank login being viewed on the screen.

17

36% SAY THEIR COMPANY HAS NO POLICY ON BYOD

Author
The image should still be a phone. Ideally, it would be a picture of a phone in someone's hands with private data like email or a bank login being viewed on the screen.

18

49% USE PERSONAL DEVICE FOR BOTH WORK AND PLAY

Author
The image should still be a phone. Ideally, it would be a picture of a phone in someone's hands with private data like email or a bank login being viewed on the screen.

19

18% SHARE WITH

FRIENDS*

21% SHARE WITH

FAMILY*

ONLINE FILE STORAGE BLURS WORK AND PLAY

Author
The image should still be a phone. Ideally, it would be a picture of a phone in someone's hands with private data like email or a bank login being viewed on the screen.

Targeted attacks: Likely to get attacked?

20

Small or Medium Organization

Large Organization

Only 17% of targeted attacks directed at C-Level executives21

Employee CEO

Who is most likely to be targeted in an attack?

Author
CEO image can be a generic confident man/woman in a suit. This is a great slide. clean, makes the point easily.

22

DENMARK

MALAYSIA

STUXNET: thousands of industrial centers infiltrated

IRAN

Author
My approach on stuxnet is to show it was targeted to Iranian nuclear enrichment facilities. So while it did spread all over the world (can we remove the names of the websites?) it did DAMAGE in Iran only. This slide shou
Author
come after 16.

23

MAKE THE CONNECTION: Change Behavior

24

MAKE THE CONNECTION: Change Behavior

• Set PASSWORDS on all devices

25

MAKE THE CONNECTION: Change Behavior

• Use security and anti-theft SOFTWARE

26

MAKE THE CONNECTION: Change Behavior

• Be CAUTIOUS:• Don’t friend strangers• Be careful with links• STOP.THINK.CONNECT.

Wrap up

Author
we can add in a couple of images of malicious activity if you wish

What will you do?

Questions

THANK YOU!

Copyright © 2013 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.

TM

Marian Merrittmarian@norton.com

Author
change email to marian@norton.com