90 of cyber attacks are 90 of cyber attacks are
play

90% OF CYBER ATTACKS ARE 90% OF CYBER ATTACKS ARE SUCCESSFUL DUE TO - PowerPoint PPT Presentation

90% OF CYBER ATTACKS ARE 90% OF CYBER ATTACKS ARE SUCCESSFUL DUE TO HUMAN SUCCESSFUL DUE TO HUMAN ERROR ERROR CYBER AWARE CYBER AWARE NEXT-GEN SECURITY AWARENESS TRAINING Cyber Crime Is Now A Cyber Crime Is Now A Business Opportunity


  1. 90% OF CYBER ATTACKS ARE 90% OF CYBER ATTACKS ARE SUCCESSFUL DUE TO HUMAN SUCCESSFUL DUE TO HUMAN ERROR ERROR CYBER AWARE CYBER AWARE NEXT-GEN SECURITY AWARENESS TRAINING

  2. Cyber Crime Is Now A Cyber Crime Is Now A Business Opportunity Business Opportunity For Low Tech Criminals For Low Tech Criminals

  3. CYBER SECURITY CYBER SECURITY LANDSCAPE LANDSCAPE Ransomware attacks occur every 14 seconds. Security breaches have increased by 67% year on year $280k is the average cost to an SME from a cyber incident Damages to reach $6 trillion annually. Damages to reach $6 trillion annually. "Represents the greatest transfer of economic wealth in history, and will be more pro�table than the global trade of all major illegal drugs combined"

  4. WHO ARE THESE WHO ARE THESE CRIMINALS? CRIMINALS? hackers have bosses too it's about Return On Investment lowest hanging fruit will be targeted limited technical ability required

  5. BUSINESSES ARE THE BUSINESSES ARE THE NEW TARGETS NEW TARGETS $280,000 Passwords Passwords 2012: $0.01 2019: $0.0001 Credit Cards Credit Cards 2012: $25.00 2019: $4.00 2012 2013 2014 2015 2016 2017 2018 2019 Consumers Business

  6. BUT I'M A SMALL BUT I'M A SMALL BUSINESS, WHY ME? BUSINESS, WHY ME? Credential Credential Attacks launched Attacks launched towards towards a a Stuffing Stuffing large volume of targets large volume of targets Phishing Phishing Attacks Attacks Personal Personal Targeted Attack Launched Targeted Attack Launched Devices Devices

  7. THE PATH OF LEAST THE PATH OF LEAST RESISTANCE RESISTANCE Firewalls SOCs VPN MDM Antivirus 2FA Human Emotions: Pay Rise?

  8. 90% 90% OF ALL SUCCESSFUL CYBER OF ALL SUCCESSFUL CYBER ATTACKS ARE CAUSED BY ATTACKS ARE CAUSED BY HUMAN ERROR. HUMAN ERROR. Source: IBM Cyber Security Intelligence Index 70% of employees don’t understand cybersecurity Poor password hygiene Unable to identify phishing emails Poor web browsing behaviour Unsafe remote access Information classi�cation Email / SMS spoo�ng Ransomeware response

  9. CORONAVIRUS PHISHING ON THE CORONAVIRUS PHISHING ON THE RISE! RISE!

  10. Cyber Crime Is Now A Cyber Crime Is Now A Business Opportunity Business Opportunity For Low Tech Criminals For Low Tech Criminals Market Size: $6 Trillion Business vs Consumer Technical vs Emotions Phishing

  11. HOW DO WE BUILD A HOW DO WE BUILD A HUMAN FIREWALL? HUMAN FIREWALL?

  12. IT'S ALL ABOUT IT'S ALL ABOUT AWARENESS AWARENESS

  13. Do all staff know... Do all staff know... The risks of re-using passwords? The risks of re-using passwords? What Business Email Compromise is? What Business Email Compromise is? How to browse the internet safely? How to browse the internet safely? How GDPR impacts your business? How GDPR impacts your business? How to prevent ransomware from How to prevent ransomware from What information security is and What information security is and spreading? spreading? how to treat different data? how to treat different data? Identify a spear phishing campaign? Identify a spear phishing campaign? How to use public WiFi securely? How to use public WiFi securely? What malware and ransomware are What malware and ransomware are How to create a safe password? How to create a safe password? and associated risks? and associated risks? How to secure their personal How to secure their personal What social engineering is and What social engineering is and devices? devices? how it is a risk to your business? how it is a risk to your business?

  14. 1: IT'S ABOUT THE 1: IT'S ABOUT THE PEOPLE PEOPLE Fun content Fun content Engaging topics Engaging topics Relevant to the learner Relevant to the learner Fosters inquiry Fosters inquiry "An organisation does not make its people cyber aware; its people make the organisation cyber aware"

  15. 2: IT'S NOT ABOUT 2: IT'S NOT ABOUT TICKING THE BOX TICKING THE BOX It's about engagement It's about engagement Trend monitoring Trend monitoring Human risk scores Human risk scores Meaningful reports Meaningful reports "Automated regular reporting that provides clear, actionable data for management and boards"

  16. 3: SUCCESS IS SEEN 3: SUCCESS IS SEEN AROUND THE WATER AROUND THE WATER COOLER COOLER Safe & open culture Safe & open culture Confident knowledge Confident knowledge Understand their role Understand their role "A cyber aware culture is where sta� take their own digital footprint seriously and what safe behaviour to model"

  17. CYBER AWARE CYBER AWARE COMPLETE END-TO-END SECURITY AWARENESS SOLUTION

  18. EFFECTIVE SECURITY EFFECTIVE SECURITY AWARENESS PROGRAM AWARENESS PROGRAM 1. ENGAGING 1. ENGAGING 2. SPEAR PHISHING 2. SPEAR PHISHING TRAINING TRAINING SIMULATIONS SIMULATIONS Simulate real world cyber attacks Changing culture requires to test, measure and �x engaging, fun and informative e�ectiveness of training. training on a regular basis.

  19. 40+ Security Awareness Courses TRAINING TRAINING Courses covering all cyber topics Access from any device, anytime. Learning outcome assessments

  20. 100+ Spear Phishing Templates PHISHING PHISHING Real world simulations Automated delivery and reporting At risk sta� auto-enrol training

  21. MEANINGFUL REPORTS MEANINGFUL REPORTS

  22. Granular Risk Reporting REPORTING REPORTING Detailed drill-down reporting Training gami�cation Exportable raw data source

  23. IT WORKS! IT WORKS!

  24. LIVE REPORTS LIVE REPORTS

  25. Live Questions Live Questions Type questions in the Q&A box of Zoom More information at More information at training.cyberaware.com training.cyberaware.com Jonathan@cyberaware.com Jonathan@cyberaware.com

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend