How to Avoid Becoming Your Own Worst Enemy By David Savlowitz

21
How to Avoid Becoming Your Own Worst Enemy Presented by David Savlowitz

Transcript of How to Avoid Becoming Your Own Worst Enemy By David Savlowitz

Page 1: How to Avoid Becoming Your Own Worst Enemy By David Savlowitz

How to Avoid Becoming Your Own Worst Enemy

Presented by

David Savlowitz

Page 2: How to Avoid Becoming Your Own Worst Enemy By David Savlowitz

Have You Been Hacked?

Page 3: How to Avoid Becoming Your Own Worst Enemy By David Savlowitz

If not…

Page 4: How to Avoid Becoming Your Own Worst Enemy By David Savlowitz

It’s only a matter of time…

Page 5: How to Avoid Becoming Your Own Worst Enemy By David Savlowitz

Why?

Page 6: How to Avoid Becoming Your Own Worst Enemy By David Savlowitz
Page 7: How to Avoid Becoming Your Own Worst Enemy By David Savlowitz

Typical Hacker Representations

Page 8: How to Avoid Becoming Your Own Worst Enemy By David Savlowitz

Typical Hacker Representations

Dade (From Hackers 1995)

Page 9: How to Avoid Becoming Your Own Worst Enemy By David Savlowitz

Typical Hacker Representations

David(From WarGames 1983)

Page 10: How to Avoid Becoming Your Own Worst Enemy By David Savlowitz

Hackers in Reality

Gary McKinnonKevin Mitnick

Page 11: How to Avoid Becoming Your Own Worst Enemy By David Savlowitz

What techniques do hackers use?

Page 12: How to Avoid Becoming Your Own Worst Enemy By David Savlowitz

Hacking Techniques

• Distributed Denial of Service (DDOS)

• Physical Attack

• Social Engineering (Phishing)

• Custom Exploit Development

Page 13: How to Avoid Becoming Your Own Worst Enemy By David Savlowitz

The most popular technique

• Social Engineering (Phishing)• Attempting to acquire sensitive information by posing as a trusted entity

Page 14: How to Avoid Becoming Your Own Worst Enemy By David Savlowitz

Phishing Example

Page 15: How to Avoid Becoming Your Own Worst Enemy By David Savlowitz

The Deadliest Cyber Security Sins

• Having a weak password or none at all

• Not updating frequently

• Ignoring the truth that you are a target of cyber crime

• Thinking your security is perfect

• Sharing your personal information online

• Leaving your devices unlocked when unattended

• Not backing up your data frequently

• Opening emails from a sender you do not recognize

• Clicking unfamiliar links

• Disabling your anti-virus software

• Disabling you firewall

• Writing down your password

Page 16: How to Avoid Becoming Your Own Worst Enemy By David Savlowitz

What is the risk?

Page 17: How to Avoid Becoming Your Own Worst Enemy By David Savlowitz

Leading effects of security errors

• Financial loss

• Loss of property

• Mental and or physical illness

• Death

Page 18: How to Avoid Becoming Your Own Worst Enemy By David Savlowitz

Lessons Learned

• You are at risk.

• Hackers have numerous techniques, but it only takes one to destroy you.

• When in doubt, ask a professional.

Page 19: How to Avoid Becoming Your Own Worst Enemy By David Savlowitz

Thank You!

Page 20: How to Avoid Becoming Your Own Worst Enemy By David Savlowitz

References

Blackhat [Motion picture]. (2015). United States: Forward Pass.

Hackers [Motion picture]. (1995). United States: United Artists.

Kennedy, D., & Couric, K. (2014, January 1). TrustedSec CEO David Kennedy on The Katie Show. Retrieved March 25, 2015, from https://vimeo.com/77102165

Security Awareness Blog. (2013, January 9). Retrieved April 17, 2015, from http://www.securingthehuman.org/blog/2013/01/09/free-security-awareness-poster-you-are-a-

target

Seger, L. (2012). Creating the myth. In Signs of Life in the USA (7th ed., p. 386). Boston: Bedford/St. Martin's.

WarGames [Motion picture]. (1983). United artists ; Sherwood productions.

Page 21: How to Avoid Becoming Your Own Worst Enemy By David Savlowitz

Images Retrieved From

http://www.securingthehuman.org

http://www.mewan.net

http://www.indiegrits.com

http://serialeifilmy.tv

http://www.thegomarketingteam.com

http://img.thesun.co.uk

https://b1u31c3.wordpress.com/