The Art of Phishing

20
Delivering IT Peace of Mind SM The Art of Phishin g

Transcript of The Art of Phishing

Page 1: The Art of Phishing

Delivering IT Peace of MindSM

The Art of

Phishing

Page 2: The Art of Phishing

Delivering IT Peace of MindSM

Our Speaker

• Oversees corporate Information

Security programs

• 10+ years with mindSHIFT

• Bachelor’s degree in Information

and Technology Management

• Certifications: CISSP, MCSE,

CCNA, ITIL v3

Matt LunzerDirector of Information Security

mindSHIFT Technologies

Page 3: The Art of Phishing

Delivering IT Peace of MindSM

Agenda

The Art of War

What Is Phishing?

Why Is It So Successful?

Preparing and Defending

Advanced Security Measures

About mindSHIFT – What We Can Do

Agenda

Page 4: The Art of Phishing

Delivering IT Peace of MindSM

• The Art of War is an ancient Chinese military treatise attributed to Sun Tzu, a high-ranking military general, strategist and tactician

• Composed of 13 chapters, each of which is devoted to one aspect of warfare

• A definitive work on military strategy and tactics

• For more information, “Google” it!

The Art of War

Page 5: The Art of Phishing

Delivering IT Peace of MindSM

“All warfare is based on deception.”

― Sun Tzu, The Art of War

Social Engineering:The clever manipulation of the

natural human tendency to trust.

What is Phishing?

Click Here: for the full webinar, including audio.

Page 6: The Art of Phishing

Delivering IT Peace of MindSM

“Engage people with what they expect; it is what they are able to discern and confirms their projections. It settles them into

predictable patterns of response, occupying their minds while you wait for the extraordinary moment — that which they cannot

anticipate.” ― Sun Tzu, The Art of War

Why Is It So Successful?

Click Here: for the full webinar, including audio.

Page 7: The Art of Phishing

Delivering IT Peace of MindSM

Why Is It So Successful?

http://www.mcafee.com/us/resources/misc/infographic-click-protect.pdfhttp://www.verizonenterprise.com/DBIR/2015/

95% of all enterprise network attacks the results of successful spear phishing

Email based attacks accounted for 79% of social breaches in 2012

23% of recipients open phishing messages and 11% click on links and attachments

Click Here: for the full webinar, including audio.

Page 8: The Art of Phishing

Delivering IT Peace of MindSM

Phishing Example

Click Here: for the full webinar, including audio.

Page 9: The Art of Phishing

Delivering IT Peace of MindSM

The Rise of Phishing!

http://www.verizonenterprise.com/DBIR/2015/

Click Here: for the full webinar, including audio.

Page 10: The Art of Phishing

Delivering IT Peace of MindSM

Ransomware

Some phishing attacks, such as Ransomware go after data

If you see this, not good!

Click Here: for the full webinar, including audio.

Page 11: The Art of Phishing

Delivering IT Peace of MindSM

“The supreme art of war is to subdue the

enemy without fighting.”

― Sun Tzu, The Art of War

Preparing and Defending

Click Here: for the full webinar, including audio.

Page 12: The Art of Phishing

Delivering IT Peace of MindSM

Data Protection

•Validate Backups•Verify Frequency•Test Restores

Click Here: for the full webinar, including audio.

Page 13: The Art of Phishing

Delivering IT Peace of MindSM

“One of the most effective ways you can minimize the phishing threat is through awareness and

training.”—Lance Spitzner, Training Director, SANS Securing The Human

Training

Click Here: for the full webinar, including audio.

Page 14: The Art of Phishing

Delivering IT Peace of MindSM

•Establish a security awareness program•Utilize resources on the Internet•Focus on social engineering, specifically phishing

Training

Click Here: for the full webinar, including audio.

Page 15: The Art of Phishing

Delivering IT Peace of MindSM

Defense Measures - Patching

Patch your systems!• Windows Updates• Internet Explorer• Flash• Java• Third Party Browsers• Line of Business applications

Click Here: for the full webinar, including audio.

Page 16: The Art of Phishing

Delivering IT Peace of MindSM

Anti-Spam\Virus

•Defense in Depth Tools– Anti-Spam– Anti-Virus

•Verify operational effectiveness

•Check with your vendors regularly for updated features

Click Here: for the full webinar, including audio.

Page 17: The Art of Phishing

Delivering IT Peace of MindSM

Advanced Security Measures

•Beyond Defense in Depth Tools

•Tools that do not rely solely on “signature technology”

•Focus on tools that directly target phishing

•Consider adoption of Security behavioral management tools

Click Here: for the full webinar, including audio.

Page 18: The Art of Phishing

Delivering IT Peace of MindSM

Conclusion

“The greatest victory is that which requires no battle.”

― Sun Tzu, The Art of War

Click Here: for the full webinar, including audio.

Page 19: The Art of Phishing

Delivering IT Peace of MindSM

Who is mindSHIFT?

• vCIO Technology Steering• Cloud Strategy Consulting• Application Development• Content Management System

Design & Development• General IT Projects• SharePoint Solutions

Cloud Services

Data Center Services Professional Services

Managed IT Services• Server Management• Network Management • Desktop / Laptop Management• Mobile Device Management• Data Protection & Backup• 7x24 Support

•cloudSHIFT® Server•cloudSHIFT® Desktop•cloudSHIFT® VoIP•cloudSHIFT® Private Cloud•Office 365•cloudSHIFT® IBM i Series•AWS (Amazon Web Services)

•Managed Hosting•Disaster Recovery•IBM i Series Management•AS/400 Management•Colocation•Web Hosting•Content Management Systems

Click Here: for the full webinar, including audio.

Page 20: The Art of Phishing

Delivering IT Peace of MindSM

Thank You

Find Us

Click Here For More Information

Please contact us with questions at:[email protected] www.mindSHIFT.com 877-227-5054