The Little Phish Is The Best Catch Dan Goodman, Co-Founder @ Anchor - - PowerPoint PPT Presentation

the little phish is the best catch
SMART_READER_LITE
LIVE PREVIEW

The Little Phish Is The Best Catch Dan Goodman, Co-Founder @ Anchor - - PowerPoint PPT Presentation

The Little Phish Is The Best Catch Dan Goodman, Co-Founder @ Anchor Security Team Give a man a fish, he will eat for a day Teach a man to phish, and he will steal every day Phishing What is Phishing? The act of attempting to steal


slide-1
SLIDE 1
slide-2
SLIDE 2
slide-3
SLIDE 3

The Little Phish Is The Best Catch

Dan Goodman, Co-Founder @ Anchor Security Team

slide-4
SLIDE 4

“Give a man a fish, he will eat for a day… Teach a man to phish, and he will steal every day…”

slide-5
SLIDE 5

Phishing

slide-6
SLIDE 6

What is Phishing?

The act of attempting to steal information or gain access to systems through impersonation or deception over digital communication.

slide-7
SLIDE 7

Unprepared and Unaware Make the Easiest Target

slide-8
SLIDE 8

It’s my bosses problem… It’s AT&T’s problem… It’s Comcast’s Problem… It’s IT’s problem…

slide-9
SLIDE 9

2018 Cyber Crime

Damages $6 Trillion Profit $1.5 Trillion

2018 Small Business Hacks

Phishing 80% Other 20%

Cyber Crime and You

slide-10
SLIDE 10

Four Factors of a successful Phish:

Is it Urgent? Is it Important? Is it from an Authority? Is it Limited or Free?

slide-11
SLIDE 11

Urgency

Individuals tend to respond quickly, without considering the validity of the requests origin.

Urgent matters require urgent responses.

slide-12
SLIDE 12

Example

This may sometimes happen, But it’s rare for large companies This is not the right length, Not real UPS website

Urgency Established

slide-13
SLIDE 13

Importance

Recipients might be too focused on the importance of the request.

Importance requires focus.

slide-14
SLIDE 14

THE IRS WILL NEVER EMAIL YOU

Importance Established

slide-15
SLIDE 15

Authority

A request coming from a higher authority requires the individual be dependable in their promptness

Authority demands prompt dependability.

slide-16
SLIDE 16

(Fake CEO Email)

A Picture of your CEO Authority Established

Your name Urgency

slide-17
SLIDE 17

Limited and Free

When something is free in limited quantity, individuals move fast

Limited and Free blinds the individual.

slide-18
SLIDE 18

Established Limited and Free

Weird syntax It was in spam for a reason, not even Amazon

slide-19
SLIDE 19

If They Distract You with the Request They Win.

slide-20
SLIDE 20

Email isn’t the only Phishing platform

Phones can be even worse

slide-21
SLIDE 21

Martin Cooper holding the world’s first mobile phone, 1973

slide-22
SLIDE 22

Apple’s Steve Jobs introduces the iPhone at MacWorld, 2007

slide-23
SLIDE 23

Nobody had security in mind at the time… And the cellular system kept growing without it.

slide-24
SLIDE 24

How is the current cellular system a threat? Allow me to show you…

slide-25
SLIDE 25

Demo Phish:

Spoofing a Phone Number

slide-26
SLIDE 26

Here’s the crazy part:

You don’t need to be the one who gets fooled.

slide-27
SLIDE 27

Phishing is the most Dangerous and Widespread Attack

You may never figure out that you just gave away your data

slide-28
SLIDE 28

2019’s 12 Most Exploited Countries

0% 25% 50% 75% 100%

Spain Saudia Arabia Colombia Turkey Japan China South Africa Italy Canada Mexico France USA

75.9% 76.1% 78.1% 79.5% 79.6% 80.9% 83.7% 85.7% 87.8% 87.9% 91.5% 93.7%

Imperva 2019 Cyberthreat Defense Report

These are Small Businesses

slide-29
SLIDE 29

Let’s Fix the Problem Together

slide-30
SLIDE 30

The best things you can do to prepare:

1) Training 2) More Training 3) And Then Some More Training

slide-31
SLIDE 31

Checking for Phishing should be second nature

slide-32
SLIDE 32

More Steps to Take Now

Easy: Always be the one to call someone you don’t know, Always inspect emails carefully Medium: Use more modern and secure methods of communication e.g., Slack, Signal, Discord, iMessage Hard: Use digital signatures for email

slide-33
SLIDE 33

Don’t forget, you can be phished in person too

slide-34
SLIDE 34

Questions?

slide-35
SLIDE 35

Don’t be another statistic…

slide-36
SLIDE 36

anchorsecteam @anchorsecteam

Free Security Audit:

Email “webinar1”, your name, company, and phone number to hello@anchorsecurityteam.com

anchorsecteam

Until 8/8/19