90% OF CYBER ATTACKS ARE 90% OF CYBER ATTACKS ARE SUCCESSFUL DUE TO - - PowerPoint PPT Presentation

90 of cyber attacks are 90 of cyber attacks are
SMART_READER_LITE
LIVE PREVIEW

90% OF CYBER ATTACKS ARE 90% OF CYBER ATTACKS ARE SUCCESSFUL DUE TO - - PowerPoint PPT Presentation

90% OF CYBER ATTACKS ARE 90% OF CYBER ATTACKS ARE SUCCESSFUL DUE TO HUMAN SUCCESSFUL DUE TO HUMAN ERROR ERROR CYBER AWARE CYBER AWARE NEXT-GEN SECURITY AWARENESS TRAINING Cyber Crime Is Now A Cyber Crime Is Now A Business Opportunity


slide-1
SLIDE 1

CYBER AWARE CYBER AWARE

NEXT-GEN SECURITY AWARENESS TRAINING

90% OF CYBER ATTACKS ARE 90% OF CYBER ATTACKS ARE SUCCESSFUL DUE TO HUMAN SUCCESSFUL DUE TO HUMAN ERROR ERROR

slide-2
SLIDE 2

Cyber Crime Is Now A Cyber Crime Is Now A Business Opportunity Business Opportunity For Low Tech Criminals For Low Tech Criminals

slide-3
SLIDE 3

CYBER SECURITY CYBER SECURITY LANDSCAPE LANDSCAPE

Ransomware attacks occur every 14 seconds. Security breaches have increased by 67% year on year $280k is the average cost to an SME from a cyber incident

"Represents the greatest transfer of economic wealth in history, and will be more protable than the global trade of all major illegal drugs combined"

Damages to reach $6 trillion annually. Damages to reach $6 trillion annually.

slide-4
SLIDE 4

WHO ARE THESE WHO ARE THESE CRIMINALS? CRIMINALS?

hackers have bosses too it's about Return On Investment lowest hanging fruit will be targeted limited technical ability required

slide-5
SLIDE 5

BUSINESSES ARE THE BUSINESSES ARE THE NEW TARGETS NEW TARGETS

Passwords Passwords

2012: $0.01 2019: $0.0001

Credit Cards Credit Cards

2012: $25.00 2019: $4.00

$280,000

Consumers Business

2012 2013 2014 2015 2016 2017 2018 2019

slide-6
SLIDE 6

BUT I'M A SMALL BUT I'M A SMALL BUSINESS, WHY ME? BUSINESS, WHY ME?

Credential Credential Stuffing Stuffing

Targeted Attack Launched Targeted Attack Launched

Phishing Phishing Attacks Attacks Personal Personal Devices Devices

Attacks launched Attacks launched towards towards a a large volume of targets large volume of targets

slide-7
SLIDE 7

THE PATH OF LEAST THE PATH OF LEAST RESISTANCE RESISTANCE

Human Emotions: Pay Rise? Firewalls MDM SOCs Antivirus VPN 2FA

slide-8
SLIDE 8

OF ALL SUCCESSFUL CYBER OF ALL SUCCESSFUL CYBER ATTACKS ARE CAUSED BY ATTACKS ARE CAUSED BY HUMAN ERROR. HUMAN ERROR.

90% 90%

Source: IBM Cyber Security Intelligence Index

Poor password hygiene Unable to identify phishing emails Poor web browsing behaviour Unsafe remote access Information classication Email / SMS spoong Ransomeware response

70% of employees don’t understand cybersecurity

slide-9
SLIDE 9

CORONAVIRUS PHISHING ON THE CORONAVIRUS PHISHING ON THE RISE! RISE!

slide-10
SLIDE 10

Cyber Crime Is Now A Cyber Crime Is Now A Business Opportunity Business Opportunity For Low Tech Criminals For Low Tech Criminals

Market Size: $6 Trillion Business vs Consumer

Technical vs Emotions Phishing

slide-11
SLIDE 11

HOW DO WE BUILD A HOW DO WE BUILD A HUMAN FIREWALL? HUMAN FIREWALL?

slide-12
SLIDE 12

IT'S ALL ABOUT IT'S ALL ABOUT AWARENESS AWARENESS

slide-13
SLIDE 13

The risks of re-using passwords? The risks of re-using passwords?

Do all staff know... Do all staff know...

How to browse the internet safely? How to browse the internet safely? How to prevent ransomware from How to prevent ransomware from spreading? spreading? Identify a spear phishing campaign? Identify a spear phishing campaign? What malware and ransomware are What malware and ransomware are and associated risks? and associated risks? How to secure their personal How to secure their personal devices? devices? What Business Email Compromise is? What Business Email Compromise is? How GDPR impacts your business? How GDPR impacts your business? What information security is and What information security is and how to treat different data? how to treat different data? How to use public WiFi securely? How to use public WiFi securely? How to create a safe password? How to create a safe password? What social engineering is and What social engineering is and how it is a risk to your business? how it is a risk to your business?

slide-14
SLIDE 14

1: IT'S ABOUT THE 1: IT'S ABOUT THE PEOPLE PEOPLE

Fun content Fun content Engaging topics Engaging topics Relevant to the learner Relevant to the learner Fosters inquiry Fosters inquiry

"An organisation does not make its people cyber aware; its people make the organisation cyber aware"

slide-15
SLIDE 15

2: IT'S NOT ABOUT 2: IT'S NOT ABOUT TICKING THE BOX TICKING THE BOX

It's about engagement It's about engagement Trend monitoring Trend monitoring Human risk scores Human risk scores Meaningful reports Meaningful reports

"Automated regular reporting that provides clear, actionable data for management and boards"

slide-16
SLIDE 16

3: SUCCESS IS SEEN 3: SUCCESS IS SEEN AROUND THE WATER AROUND THE WATER COOLER COOLER

Safe & open culture Safe & open culture Confident knowledge Confident knowledge Understand their role Understand their role

"A cyber aware culture is where sta take their own digital footprint seriously and what safe behaviour to model"

slide-17
SLIDE 17

CYBER AWARE CYBER AWARE

COMPLETE END-TO-END SECURITY AWARENESS SOLUTION

slide-18
SLIDE 18

EFFECTIVE SECURITY EFFECTIVE SECURITY AWARENESS PROGRAM AWARENESS PROGRAM

  • 1. ENGAGING
  • 1. ENGAGING

TRAINING TRAINING

  • 2. SPEAR PHISHING
  • 2. SPEAR PHISHING

SIMULATIONS SIMULATIONS

Changing culture requires engaging, fun and informative training on a regular basis. Simulate real world cyber attacks to test, measure and x eectiveness of training.

slide-19
SLIDE 19

TRAINING TRAINING

40+ Security Awareness Courses Courses covering all cyber topics Access from any device, anytime. Learning outcome assessments

slide-20
SLIDE 20

PHISHING PHISHING

100+ Spear Phishing Templates Real world simulations Automated delivery and reporting At risk sta auto-enrol training

slide-21
SLIDE 21

MEANINGFUL REPORTS MEANINGFUL REPORTS

slide-22
SLIDE 22

REPORTING REPORTING

Granular Risk Reporting Detailed drill-down reporting Training gamication Exportable raw data source

slide-23
SLIDE 23

IT WORKS! IT WORKS!

slide-24
SLIDE 24

LIVE REPORTS LIVE REPORTS

slide-25
SLIDE 25

Live Questions Live Questions

More information at More information at training.cyberaware.com training.cyberaware.com

Jonathan@cyberaware.com Jonathan@cyberaware.com

Type questions in the Q&A box of Zoom