Social Engineering? (And h o w d o yo u p r o t ec t yo ur busin e ss - - PowerPoint PPT Presentation

social engineering
SMART_READER_LITE
LIVE PREVIEW

Social Engineering? (And h o w d o yo u p r o t ec t yo ur busin e ss - - PowerPoint PPT Presentation

Wh a t is Social Engineering? (And h o w d o yo u p r o t ec t yo ur busin e ss a nd peop l e ?) www.id e ntit yexpe rts. co .uk | @Id e ntit y E xpe rts With Am y St o k e s-W a t e rs Wh a t ca n I s ay ? Th e r e a r e s o m e a wful peop l e in


slide-1
SLIDE 1

What is

www.identityexperts.co.uk | @IdentityExperts

Social Engineering?

With Amy Stokes-Waters

(And how do you protect your business and people?)

slide-2
SLIDE 2

What can I say? There are some awful people in the world - and they'd love to get their mitts on your organisation's valuable data.

Bad guy Your data

slide-3
SLIDE 3

One way they get that data is by using

Social Engineering

It's all about trust, gained by getting in touch under the guise of trying to help - usually frightening users with news of a fake data breach or a compromised account.

slide-4
SLIDE 4

Most often, fraudsters pose as colleagues, bosses or friends, and can target through:

Email Telephone Social media

Once they've gained a user's trust, they'll try to extract login credentials from them, or convince them to click on an untrustworthy link.

Don't trust him

slide-5
SLIDE 5

Not very nice, is it?

"the weakest link in the security chain"

It's so effective because hackers believe that users are Luckily, that also means that your users are also capable of being

"the strongest link in the security chain"

slide-6
SLIDE 6

Read

Tackling social engineering is all about preparing your people. Education plays a key role here. Make sure your people know to be :

RAD

Read the URL, email addresses, and messages carefully: are they suspicious? Ask your colleague/boss/employee/friend if they sent an email, or ask callers for telltale details to be sure they're who they say they are. Doesn't look trustworthy? Delete and report!

Ask Delete

slide-7
SLIDE 7

It doesn't stop at your people, of course. Your organisation also needs to ensure it's got some extra firepower in its corner:

Identity and Access Management

The right solutions - including phishing tests, MFA and so much more - can all ensure your people are kitted out with everything they need to protect the

  • rganisation from social engineering.

Bye bye, bad guy!

"Get outta here!"

slide-8
SLIDE 8

Got a Question?

Talk to me! I'm always up for a coffee and a chat.

www.identityexperts.co.uk | @IdentityExperts

Email me: AmyS@identityexperts.co.uk Connect with me on LinkedIn Phone me: 07712 741 463