SlideShare a Scribd company logo
1 of 25
COFENSE.COM
© Copyright 2018 Cofense™ All rights reserved.
General Cybersecurity
Awareness
© Copyright 2018 Cofense™ All rights reserved.
What is Cybersecurity?
Cyber security is the practice of
defending computers, servers, mobile
devices, electronic systems, networks,
and data from malicious attacks.
© Copyright 2018 Cofense™ All rights reserved.
Personal Cybersecurity Tips /
Best Practices
Use Strong
Passwords
Use a VPN
When
Necessary
Think Before
You Click
Update Your
Home Router
Update Your
Devices
Use Two-
Factor
Authentication
© Copyright 2018 Cofense™ All rights reserved.
Threats and Practices
Malware
Spear Phishing
Malicious Links
Passwords
Browsing in Public
Data Compromise
© Copyright 2018 Cofense™ All rights reserved.
Threat: Malware
• Software designed to compromise
a device/network
• Examples:
– Worm/virus
– Botnet
– Banking Trojan
– Ransomware
© Copyright 2018 Cofense™ All rights reserved.
Who is Targeted?
• It is estimated that ransomware
damages will cost more than $20
billion globally in 2020
• Encrypts/locks files
• Holds files for ransom
• Typically obtained via:
– Spam & phishing emails
– Unpatched security vulnerabilities
Ransomware
© Copyright 2018 Cofense™ All rights reserved.
Threat: Malware
Ransomware
1
2
© Copyright 2018 Cofense™ All rights reserved.
Best Practices: Malware
• Learn to identify phishing emails
• Exercise caution with links
• Do not download or click suspicious
links or files
• Keep software up-to-date
• Back files up regularly
© Copyright 2018 Cofense™ All rights reserved.
Threat: Spear Phishing
• Spear-phishing is a targeted attempt to
steal sensitive information such as
account credentials or financial
information from a specific victim, often for
malicious reasons.
• Common cause of data breaches
• Targeted emails
• Sent to small groups or individuals
• Use social engineering tactics
• 93 percent of incidents/breaches
© Copyright 2018 Cofense™ All rights reserved.
Example of a Spear Phishing Email
1
3
2
5
4
© Copyright 2018 Cofense™ All rights reserved.
Threat: Business Email Compromise
• Solicits wire transfer
• Impersonates executive,
vendor, or supplier
• Resembles spear phishing
• Targets financial officers
© Copyright 2018 Cofense™ All rights reserved.
Best Practices: Spear Phishing
• Check the sender
• Look out for warning signs
• Think before you click or take action
• Never hand over sensitive info
© Copyright 2018 Cofense™ All rights reserved.
Threat: Malicious Links
• Anchor may hide true destination
• Hacked landing pages
• Copycat domains (exampel.com)
• Shortened links
© Copyright 2018 Cofense™ All rights reserved.
Best Practices: Malicious Links
• Always check the destination
• Desktop: hover over anchor
• Mobile: hold for several seconds
See It In Action!
https://www.example.com/totally-legit.html
(http://www.example.com.some-other-site.co.uk/downloads/file.php)
© Copyright 2018 Cofense™ All rights reserved.
Threat: Password Security
• Susceptible to:
– Brute force
– Hacking
– Malware
– Phishing
– Data breach
© Copyright 2018 Cofense™ All rights reserved.
Best Practices: Password Security
9@kj*YbM25nGnl
Yes
• Effective passwords are:
– Long
– Complex
– Unique
– Rotating
• Enable MFA where possible
p@ssw0rd12
No
© Copyright 2018 Cofense™ All rights reserved.
Threat: Browsing in Public
• Unsecured networks
– “Man in the Middle”
• Visual hacking
• 44% of stolen devices were left in a
public place [3]
© Copyright 2018 Cofense™ All rights reserved.
Best Practices: Browsing in Public
• Avoid public wireless networks
• Use reputable VPN
• Be mindful of surroundings
• Precautionary apps
– “Find my phone”
– “Remote wipe”
© Copyright 2018 Cofense™ All rights reserved.
Threat: Data Compromise
• May result from:
– Spear phishing
– Hacking or malware
– Simple negligence
• Average cost: $3.86 MM [4]
© Copyright 2018 Cofense™ All rights reserved.
Best Practices: Data Compromise
• Storing sensitive information:
– Yes to encrypted devices
– No to removable media (flash drives)
• Sharing:
– Who is authorized?
– Check email CC’s
– Secured network?
• Destruction:
– Recycle bin is not enough!
© Copyright 2018 Cofense™ All rights reserved.
Cybersecurity Basics Checklist
• Keep all your software up-to-date
• Install a reliable antivirus solution
• Enhance your security with a product that can block
attacks antivirus can’t detect
• Use strong passwords and change them often
• Activate and use two step verification where available
• Avoid oversharing information on social media
• Back up your data. Do it often. Back up in several places
© Copyright 2018 Cofense™ All rights reserved.
Cybersecurity Basics Checklist
• Never open emails from unknown senders
• Never download or open attachments sent by unknown
senders
• Keep your financial information safe and don’t share it with
anyone
• Avoid untrusted websites and don’t click on suspicious
banners or links
• Adjust the privacy and security settings in your browser
and apps
© Copyright 2018 Cofense™ All rights reserved.
Let’s Recap
© Copyright 2018 Cofense™ All rights reserved.
Sources for Cybersecurity News
1. Forbes Cybersecurity offers daily cybersecurity-focused pieces from staff writers and
contributors.
2. WIRED SECURITY publishes content on cyberwarfare, dark web and global
cybersecurity news.
3. The New York Times Computer Security News shares breaking cybersecurity
news/stories.
4. U.S. News Cybersecurity covers the latest news items on cybersecurity and
cybercrime.
5. CNBC Tech | Cybersecurity shares relevant news on cybersecurity and privacy issues.
6. Technopedia offers a comprehensive glossary of cybersecurity terms and concepts.
QUESTIONS?

More Related Content

Similar to Cybersecurity Awareness Overview.pptx

Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureLourdes Paloma Gimenez
 
106 Threat defense and information security development trends
106 Threat defense and information security development trends106 Threat defense and information security development trends
106 Threat defense and information security development trendsSsendiSamuel
 
Protecting Your Business From Cybercrime
Protecting Your Business From CybercrimeProtecting Your Business From Cybercrime
Protecting Your Business From CybercrimeDavid J Rosenthal
 
iGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTiGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTjonspav
 
Cybercrime - Stealing in the Connected Age
Cybercrime - Stealing in the Connected AgeCybercrime - Stealing in the Connected Age
Cybercrime - Stealing in the Connected Agedlblumen
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Imperva
 
You think you are safe online. Are You?
You think you are safe online. Are You?You think you are safe online. Are You?
You think you are safe online. Are You?TechGenie
 
Data security best practices for risk awareness and mitigation
Data security best practices for risk awareness and mitigationData security best practices for risk awareness and mitigation
Data security best practices for risk awareness and mitigationNick Chandi
 
Defending Your IBM i Against Malware
Defending Your IBM i Against MalwareDefending Your IBM i Against Malware
Defending Your IBM i Against MalwarePrecisely
 
Cybersecurity for CRM v0219-3
Cybersecurity for CRM v0219-3Cybersecurity for CRM v0219-3
Cybersecurity for CRM v0219-3Caston Thomas
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
Cybersecurity: Malware & Protecting Your Business From Cyberthreats
Cybersecurity: Malware & Protecting Your Business From CyberthreatsCybersecurity: Malware & Protecting Your Business From Cyberthreats
Cybersecurity: Malware & Protecting Your Business From CyberthreatsSecureDocs
 
IntroCyberv2.1_Chp2_Instructor_Supplemental_Material.pptx
IntroCyberv2.1_Chp2_Instructor_Supplemental_Material.pptxIntroCyberv2.1_Chp2_Instructor_Supplemental_Material.pptx
IntroCyberv2.1_Chp2_Instructor_Supplemental_Material.pptxfuebf
 
Leveraging Compliance to “Help” Prevent a Future Breach
Leveraging Compliance to “Help” Prevent a Future BreachLeveraging Compliance to “Help” Prevent a Future Breach
Leveraging Compliance to “Help” Prevent a Future BreachKevin Murphy
 
OWASP Poland Day 2018 - Amir Shladovsky - Crypto-mining
OWASP Poland Day 2018 - Amir Shladovsky - Crypto-miningOWASP Poland Day 2018 - Amir Shladovsky - Crypto-mining
OWASP Poland Day 2018 - Amir Shladovsky - Crypto-miningOWASP
 

Similar to Cybersecurity Awareness Overview.pptx (20)

Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity posture
 
106 Threat defense and information security development trends
106 Threat defense and information security development trends106 Threat defense and information security development trends
106 Threat defense and information security development trends
 
Protecting Your Business From Cybercrime
Protecting Your Business From CybercrimeProtecting Your Business From Cybercrime
Protecting Your Business From Cybercrime
 
NEDMA18 Keynote: Cyber Security – what you need to know, what you need to do
NEDMA18 Keynote: Cyber Security – what you need to know, what you need to doNEDMA18 Keynote: Cyber Security – what you need to know, what you need to do
NEDMA18 Keynote: Cyber Security – what you need to know, what you need to do
 
Cybersecurity.pptx
Cybersecurity.pptxCybersecurity.pptx
Cybersecurity.pptx
 
iGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTiGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICT
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
Cybercrime - Stealing in the Connected Age
Cybercrime - Stealing in the Connected AgeCybercrime - Stealing in the Connected Age
Cybercrime - Stealing in the Connected Age
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
 
You think you are safe online. Are You?
You think you are safe online. Are You?You think you are safe online. Are You?
You think you are safe online. Are You?
 
Data security best practices for risk awareness and mitigation
Data security best practices for risk awareness and mitigationData security best practices for risk awareness and mitigation
Data security best practices for risk awareness and mitigation
 
Defending Your IBM i Against Malware
Defending Your IBM i Against MalwareDefending Your IBM i Against Malware
Defending Your IBM i Against Malware
 
Cybersecurity for CRM v0219-3
Cybersecurity for CRM v0219-3Cybersecurity for CRM v0219-3
Cybersecurity for CRM v0219-3
 
Cyber
CyberCyber
Cyber
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Cybersecurity: Malware & Protecting Your Business From Cyberthreats
Cybersecurity: Malware & Protecting Your Business From CyberthreatsCybersecurity: Malware & Protecting Your Business From Cyberthreats
Cybersecurity: Malware & Protecting Your Business From Cyberthreats
 
Cyber security
Cyber securityCyber security
Cyber security
 
IntroCyberv2.1_Chp2_Instructor_Supplemental_Material.pptx
IntroCyberv2.1_Chp2_Instructor_Supplemental_Material.pptxIntroCyberv2.1_Chp2_Instructor_Supplemental_Material.pptx
IntroCyberv2.1_Chp2_Instructor_Supplemental_Material.pptx
 
Leveraging Compliance to “Help” Prevent a Future Breach
Leveraging Compliance to “Help” Prevent a Future BreachLeveraging Compliance to “Help” Prevent a Future Breach
Leveraging Compliance to “Help” Prevent a Future Breach
 
OWASP Poland Day 2018 - Amir Shladovsky - Crypto-mining
OWASP Poland Day 2018 - Amir Shladovsky - Crypto-miningOWASP Poland Day 2018 - Amir Shladovsky - Crypto-mining
OWASP Poland Day 2018 - Amir Shladovsky - Crypto-mining
 

Recently uploaded

April 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's AnalysisApril 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's Analysismanisha194592
 
Discover Why Less is More in B2B Research
Discover Why Less is More in B2B ResearchDiscover Why Less is More in B2B Research
Discover Why Less is More in B2B Researchmichael115558
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptxAnupama Kate
 
Introduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxIntroduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxfirstjob4
 
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% SecureCall me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% SecurePooja Nehwal
 
Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionfulawalesam
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxolyaivanovalion
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
CebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxCebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxolyaivanovalion
 
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Edukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxEdukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxolyaivanovalion
 
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort ServiceBDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort ServiceDelhi Call girls
 
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...amitlee9823
 
Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxolyaivanovalion
 
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...SUHANI PANDEY
 
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...amitlee9823
 

Recently uploaded (20)

Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in  KishangarhDelhi 99530 vip 56974 Genuine Escort Service Call Girls in  Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
 
April 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's AnalysisApril 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's Analysis
 
Discover Why Less is More in B2B Research
Discover Why Less is More in B2B ResearchDiscover Why Less is More in B2B Research
Discover Why Less is More in B2B Research
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx
 
Introduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxIntroduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptx
 
Sampling (random) method and Non random.ppt
Sampling (random) method and Non random.pptSampling (random) method and Non random.ppt
Sampling (random) method and Non random.ppt
 
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% SecureCall me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
 
Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interaction
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptx
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
CebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxCebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptx
 
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Edukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxEdukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFx
 
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort ServiceBDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
 
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFx
 
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
 
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
 
(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7
(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7
(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7
 

Cybersecurity Awareness Overview.pptx

  • 1. COFENSE.COM © Copyright 2018 Cofense™ All rights reserved. General Cybersecurity Awareness
  • 2. © Copyright 2018 Cofense™ All rights reserved. What is Cybersecurity? Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
  • 3. © Copyright 2018 Cofense™ All rights reserved. Personal Cybersecurity Tips / Best Practices Use Strong Passwords Use a VPN When Necessary Think Before You Click Update Your Home Router Update Your Devices Use Two- Factor Authentication
  • 4. © Copyright 2018 Cofense™ All rights reserved. Threats and Practices Malware Spear Phishing Malicious Links Passwords Browsing in Public Data Compromise
  • 5. © Copyright 2018 Cofense™ All rights reserved. Threat: Malware • Software designed to compromise a device/network • Examples: – Worm/virus – Botnet – Banking Trojan – Ransomware
  • 6. © Copyright 2018 Cofense™ All rights reserved. Who is Targeted? • It is estimated that ransomware damages will cost more than $20 billion globally in 2020 • Encrypts/locks files • Holds files for ransom • Typically obtained via: – Spam & phishing emails – Unpatched security vulnerabilities Ransomware
  • 7. © Copyright 2018 Cofense™ All rights reserved. Threat: Malware Ransomware 1 2
  • 8. © Copyright 2018 Cofense™ All rights reserved. Best Practices: Malware • Learn to identify phishing emails • Exercise caution with links • Do not download or click suspicious links or files • Keep software up-to-date • Back files up regularly
  • 9. © Copyright 2018 Cofense™ All rights reserved. Threat: Spear Phishing • Spear-phishing is a targeted attempt to steal sensitive information such as account credentials or financial information from a specific victim, often for malicious reasons. • Common cause of data breaches • Targeted emails • Sent to small groups or individuals • Use social engineering tactics • 93 percent of incidents/breaches
  • 10. © Copyright 2018 Cofense™ All rights reserved. Example of a Spear Phishing Email 1 3 2 5 4
  • 11. © Copyright 2018 Cofense™ All rights reserved. Threat: Business Email Compromise • Solicits wire transfer • Impersonates executive, vendor, or supplier • Resembles spear phishing • Targets financial officers
  • 12. © Copyright 2018 Cofense™ All rights reserved. Best Practices: Spear Phishing • Check the sender • Look out for warning signs • Think before you click or take action • Never hand over sensitive info
  • 13. © Copyright 2018 Cofense™ All rights reserved. Threat: Malicious Links • Anchor may hide true destination • Hacked landing pages • Copycat domains (exampel.com) • Shortened links
  • 14. © Copyright 2018 Cofense™ All rights reserved. Best Practices: Malicious Links • Always check the destination • Desktop: hover over anchor • Mobile: hold for several seconds See It In Action! https://www.example.com/totally-legit.html (http://www.example.com.some-other-site.co.uk/downloads/file.php)
  • 15. © Copyright 2018 Cofense™ All rights reserved. Threat: Password Security • Susceptible to: – Brute force – Hacking – Malware – Phishing – Data breach
  • 16. © Copyright 2018 Cofense™ All rights reserved. Best Practices: Password Security 9@kj*YbM25nGnl Yes • Effective passwords are: – Long – Complex – Unique – Rotating • Enable MFA where possible p@ssw0rd12 No
  • 17. © Copyright 2018 Cofense™ All rights reserved. Threat: Browsing in Public • Unsecured networks – “Man in the Middle” • Visual hacking • 44% of stolen devices were left in a public place [3]
  • 18. © Copyright 2018 Cofense™ All rights reserved. Best Practices: Browsing in Public • Avoid public wireless networks • Use reputable VPN • Be mindful of surroundings • Precautionary apps – “Find my phone” – “Remote wipe”
  • 19. © Copyright 2018 Cofense™ All rights reserved. Threat: Data Compromise • May result from: – Spear phishing – Hacking or malware – Simple negligence • Average cost: $3.86 MM [4]
  • 20. © Copyright 2018 Cofense™ All rights reserved. Best Practices: Data Compromise • Storing sensitive information: – Yes to encrypted devices – No to removable media (flash drives) • Sharing: – Who is authorized? – Check email CC’s – Secured network? • Destruction: – Recycle bin is not enough!
  • 21. © Copyright 2018 Cofense™ All rights reserved. Cybersecurity Basics Checklist • Keep all your software up-to-date • Install a reliable antivirus solution • Enhance your security with a product that can block attacks antivirus can’t detect • Use strong passwords and change them often • Activate and use two step verification where available • Avoid oversharing information on social media • Back up your data. Do it often. Back up in several places
  • 22. © Copyright 2018 Cofense™ All rights reserved. Cybersecurity Basics Checklist • Never open emails from unknown senders • Never download or open attachments sent by unknown senders • Keep your financial information safe and don’t share it with anyone • Avoid untrusted websites and don’t click on suspicious banners or links • Adjust the privacy and security settings in your browser and apps
  • 23. © Copyright 2018 Cofense™ All rights reserved. Let’s Recap
  • 24. © Copyright 2018 Cofense™ All rights reserved. Sources for Cybersecurity News 1. Forbes Cybersecurity offers daily cybersecurity-focused pieces from staff writers and contributors. 2. WIRED SECURITY publishes content on cyberwarfare, dark web and global cybersecurity news. 3. The New York Times Computer Security News shares breaking cybersecurity news/stories. 4. U.S. News Cybersecurity covers the latest news items on cybersecurity and cybercrime. 5. CNBC Tech | Cybersecurity shares relevant news on cybersecurity and privacy issues. 6. Technopedia offers a comprehensive glossary of cybersecurity terms and concepts.