![Page 1: Internet Security: Protect the Personal; Defend the Workplace](https://reader035.vdocuments.us/reader035/viewer/2022062614/546e4782af7959ed6d8b4b34/html5/thumbnails/1.jpg)
Internet Safety Awareness:Protect the Personal and Defend the Workplace
Marian MerrittNorton Internet Safety Advocate, Symantec Corporation
![Page 2: Internet Security: Protect the Personal; Defend the Workplace](https://reader035.vdocuments.us/reader035/viewer/2022062614/546e4782af7959ed6d8b4b34/html5/thumbnails/2.jpg)
Why are you here?
![Page 3: Internet Security: Protect the Personal; Defend the Workplace](https://reader035.vdocuments.us/reader035/viewer/2022062614/546e4782af7959ed6d8b4b34/html5/thumbnails/3.jpg)
Cybercrime is a massive global problem
each year
$110 billion
each year
Cybercrime costs consumers
2/3of online adults have been hit by cybercrime
1 in 6social network
users have been hacked
Attacks on employees of targeted
organizations on the rise
$1 million +new pieces of malware are createdevery day
3
![Page 4: Internet Security: Protect the Personal; Defend the Workplace](https://reader035.vdocuments.us/reader035/viewer/2022062614/546e4782af7959ed6d8b4b34/html5/thumbnails/4.jpg)
Why am I here?
![Page 5: Internet Security: Protect the Personal; Defend the Workplace](https://reader035.vdocuments.us/reader035/viewer/2022062614/546e4782af7959ed6d8b4b34/html5/thumbnails/5.jpg)
Who here checked Facebook today?
Played Angry Birds or Temple Run on a mobile device?
What’s really going on?
5
![Page 6: Internet Security: Protect the Personal; Defend the Workplace](https://reader035.vdocuments.us/reader035/viewer/2022062614/546e4782af7959ed6d8b4b34/html5/thumbnails/6.jpg)
What you think you did
6
SCORE
USER NAME
PREVIOUS SCORES
FACEBOOK FRIEND LIST
IP ADDRESSTIME SPENT
PLAYING
vs what actually happened in the background
GENDER& AGE
LOCATION
![Page 7: Internet Security: Protect the Personal; Defend the Workplace](https://reader035.vdocuments.us/reader035/viewer/2022062614/546e4782af7959ed6d8b4b34/html5/thumbnails/7.jpg)
What is the issue at stake?
![Page 8: Internet Security: Protect the Personal; Defend the Workplace](https://reader035.vdocuments.us/reader035/viewer/2022062614/546e4782af7959ed6d8b4b34/html5/thumbnails/8.jpg)
8
Facebook click jacking attack types
![Page 9: Internet Security: Protect the Personal; Defend the Workplace](https://reader035.vdocuments.us/reader035/viewer/2022062614/546e4782af7959ed6d8b4b34/html5/thumbnails/9.jpg)
9
Bad Guys Want to Get Us to Click to:Infect us with malware
Make us take bogus surveys to: Gain information or Sign us up for premium SMS services
Send spam to us and our friends
OMG! Videos get people to click
![Page 10: Internet Security: Protect the Personal; Defend the Workplace](https://reader035.vdocuments.us/reader035/viewer/2022062614/546e4782af7959ed6d8b4b34/html5/thumbnails/10.jpg)
10
Bad guys know that people want to know who viewed their Facebook page
![Page 11: Internet Security: Protect the Personal; Defend the Workplace](https://reader035.vdocuments.us/reader035/viewer/2022062614/546e4782af7959ed6d8b4b34/html5/thumbnails/11.jpg)
11
Bad guys know that people want a dislike button
![Page 12: Internet Security: Protect the Personal; Defend the Workplace](https://reader035.vdocuments.us/reader035/viewer/2022062614/546e4782af7959ed6d8b4b34/html5/thumbnails/12.jpg)
Which is more likely to get attacked?
12
Small or Medium Organization
Large Organization
![Page 13: Internet Security: Protect the Personal; Defend the Workplace](https://reader035.vdocuments.us/reader035/viewer/2022062614/546e4782af7959ed6d8b4b34/html5/thumbnails/13.jpg)
Only 25% of targeted attacks directed at C-Level executives
Employee CEO
Who is most likely to be targeted in an attack?
13
![Page 14: Internet Security: Protect the Personal; Defend the Workplace](https://reader035.vdocuments.us/reader035/viewer/2022062614/546e4782af7959ed6d8b4b34/html5/thumbnails/14.jpg)
“Spear Phishing” for company data
14
![Page 15: Internet Security: Protect the Personal; Defend the Workplace](https://reader035.vdocuments.us/reader035/viewer/2022062614/546e4782af7959ed6d8b4b34/html5/thumbnails/15.jpg)
15
Data breach how a criminal uses your data
![Page 16: Internet Security: Protect the Personal; Defend the Workplace](https://reader035.vdocuments.us/reader035/viewer/2022062614/546e4782af7959ed6d8b4b34/html5/thumbnails/16.jpg)
16
DENMARK
MALAYSIA
STUXNET: thousands of industrial centers infiltrated
IRAN
![Page 17: Internet Security: Protect the Personal; Defend the Workplace](https://reader035.vdocuments.us/reader035/viewer/2022062614/546e4782af7959ed6d8b4b34/html5/thumbnails/17.jpg)
Why it matters at work
![Page 18: Internet Security: Protect the Personal; Defend the Workplace](https://reader035.vdocuments.us/reader035/viewer/2022062614/546e4782af7959ed6d8b4b34/html5/thumbnails/18.jpg)
What are the chances of getting your lost phone back?
50%18
![Page 19: Internet Security: Protect the Personal; Defend the Workplace](https://reader035.vdocuments.us/reader035/viewer/2022062614/546e4782af7959ed6d8b4b34/html5/thumbnails/19.jpg)
What are the chances of your work andpersonal information being looked at?
100%19
![Page 20: Internet Security: Protect the Personal; Defend the Workplace](https://reader035.vdocuments.us/reader035/viewer/2022062614/546e4782af7959ed6d8b4b34/html5/thumbnails/20.jpg)
![Page 21: Internet Security: Protect the Personal; Defend the Workplace](https://reader035.vdocuments.us/reader035/viewer/2022062614/546e4782af7959ed6d8b4b34/html5/thumbnails/21.jpg)
21
STOP
![Page 22: Internet Security: Protect the Personal; Defend the Workplace](https://reader035.vdocuments.us/reader035/viewer/2022062614/546e4782af7959ed6d8b4b34/html5/thumbnails/22.jpg)
22
THINK
![Page 23: Internet Security: Protect the Personal; Defend the Workplace](https://reader035.vdocuments.us/reader035/viewer/2022062614/546e4782af7959ed6d8b4b34/html5/thumbnails/23.jpg)
23
CONNECT
![Page 24: Internet Security: Protect the Personal; Defend the Workplace](https://reader035.vdocuments.us/reader035/viewer/2022062614/546e4782af7959ed6d8b4b34/html5/thumbnails/24.jpg)
Get hit by cybercrime and you just opened the gate
![Page 25: Internet Security: Protect the Personal; Defend the Workplace](https://reader035.vdocuments.us/reader035/viewer/2022062614/546e4782af7959ed6d8b4b34/html5/thumbnails/25.jpg)
25
![Page 26: Internet Security: Protect the Personal; Defend the Workplace](https://reader035.vdocuments.us/reader035/viewer/2022062614/546e4782af7959ed6d8b4b34/html5/thumbnails/26.jpg)
Change your Behavior
![Page 27: Internet Security: Protect the Personal; Defend the Workplace](https://reader035.vdocuments.us/reader035/viewer/2022062614/546e4782af7959ed6d8b4b34/html5/thumbnails/27.jpg)
Wrap up
![Page 28: Internet Security: Protect the Personal; Defend the Workplace](https://reader035.vdocuments.us/reader035/viewer/2022062614/546e4782af7959ed6d8b4b34/html5/thumbnails/28.jpg)
What will you do?
![Page 29: Internet Security: Protect the Personal; Defend the Workplace](https://reader035.vdocuments.us/reader035/viewer/2022062614/546e4782af7959ed6d8b4b34/html5/thumbnails/29.jpg)
Questions
![Page 30: Internet Security: Protect the Personal; Defend the Workplace](https://reader035.vdocuments.us/reader035/viewer/2022062614/546e4782af7959ed6d8b4b34/html5/thumbnails/30.jpg)
THANK YOU!
Copyright © 2012 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.
This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.
TM
Marian [email protected]