How to Avoid Becoming Your Own Worst Enemy

If you like this presentation – show it...

Slide 0

How to Avoid Becoming Your Own Worst Enemy Presented by David Savlowitz

Slide 1

Have You Been Hacked?

Slide 2

If not, You Will Be

Slide 3


Slide 4

Slide 5

Typical Hacker Representations

Slide 6

Typical Hacker Representations Dade (From Hackers 1995)

Slide 7

Typical Hacker Representations David (From WarGames 1983)

Slide 8

Hackers in Reality Gary McKinnon Kevin Mitnick

Slide 9

What techniques do hackers use?

Slide 10

Hacking Techniques Distributed Denial of Service (DDOS) Physical Attack Social Engineering (Phishing) Custom Exploit Development

Slide 11

The most popular technique Social Engineering (Phishing) Attempting to acquire sensitive information by posing as a trusted entity

Slide 12

Phishing Example

Slide 13

The Deadliest Cyber Security Sins Having a weak password or none at all Not updating frequently Ignoring the truth that you are a target of cyber crime Thinking your security is perfect Sharing your personal information online Leaving your devices unlocked when unattended Not backing up your data frequently Opening emails from a sender you do not recognize Clicking unfamiliar links Disabling your anti-virus software Disabling you firewall Writing down your password

Slide 14

What is the risk?

Slide 15

Leading effects of security errors Financial loss Loss of property Mental and or physical illness Death

Slide 16

Lessons Learned You are at risk Hackers have numerous techniques but it only takes one to destroy you When in doubt ask a professional

Slide 17

Thank You!

Slide 18

References Blackhat [Motion picture]. (2015). United States: Forward Pass. Hackers [Motion picture]. (1995). United States: United Artists. Kennedy, D., & Couric, K. (2014, January 1). TrustedSec CEO David Kennedy on The Katie Show. Retrieved March 25, 2015, from https://vimeo.com/77102165 Security Awareness Blog. (2013, January 9). Retrieved April 17, 2015, from http://www.securingthehuman.org/blog/2013/01/09/free-security-awareness-poster-you-are-a-target Seger, L. (2012). Creating the myth. In Signs of Life in the USA (7th ed., p. 386). Boston: Bedford/St. Martin's. WarGames [Motion picture]. (1983). United artists ; Sherwood productions.

Slide 19

Images Retrieved From http://www.securingthehuman.org http://www.mewan.net http://www.indiegrits.com http://serialeifilmy.tv http://www.thegomarketingteam.com http://img.thesun.co.uk https://b1u31c3.wordpress.com/