THE MEMBERS GROUP Safeguard Iowa Partnership – Cybersecurity Webinar Series.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Fraud Protection. Agenda Start time: ____ Break time: ____ (10 minutes) End time: ____ Please set phones to silent ring and answer outside of the room.
Friday June 6, 2014 OBJ: SWBAT understand what identity theft is, what the consequences are, and how to prevent it. Drill: What statement is this cartoon.
What is identity theft, and how can you protect yourself from it?
Information Security Confidential Two-Factor Authentication Solution Overview Shawn Fulton January 15th, 2015.
Internet Security Awareness Presenter: Royce Wilkerson.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
INFORMATION SECURITY AWARENESS PRESENTED BY KAMRON NELSON AND ROYCE WILKERSON.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Internet Fraud By: Noelle Woodman.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
STAY SAFE ONLINE. STAY SAFE ONLINE! PLEASE MAKE SURE YOU LOGIN AT THE CORRECT BANK URL / ADDRESS 1.NEVER LOGIN VIA LINKS 2.NEVER REVEAL YOUR PIN.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Cyber Crimes.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
The Future of Information Security Awareness Kelley Archer: Facilitator - Director Information Security, AIMIA Inc. Aaron Cohen: Managing Partner, MAD.
Scams & Schemes Common Sense Media.
Online Safety and Awareness. Introductions We are students at UNM We are taking an Information Security course this semester. It is our mission to teach.
© 2014 CustomerXPs Software Pvt Ltd | | Confidential 1 Tentacles of Fraud #StarfishBanks CustomerXPs Software Private Limited.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
CYBER CRIME.
End User Cyber Security Awareness Training. Who should complete this training This training is required for all individuals that owns a computer, mobile.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
Phishing: Trends and Countermeasures Blaine Wilson.
Topic 5: Basic Security.
HOW TO PREVENT IDENTITY THEFT ONLINE TIPS 1.WATCH OUT FOR PHISHING WEBSITES.
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
U.S. Small Business Administration Answers | Resources | Support For Your Small Business Cybersecurity Awareness Cybersecurity Awareness Signs You’ve Been.
321 Phishing Vishing SMiShing Social Engineering Techniques.
October is National CyberSecurity Awareness Month OIT and IT providers across campus are launching an awareness campaign to provide tips and resources.
Cybersecurity Risk, Remediation, Response Nathan Gibson, CCE, CEH.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
INTRODUCTION & QUESTIONS.
5 different ways to get tricked on the internet. 1. Viruses A virus is a computer malware program that copies it’s files to the computer. This may allow.
Cybersecurity Test Review Introduction to Digital Technology.
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
By : Syed Shabi Ul Hassan. What is Cyber Crime?  Crimes that have been made possible by computers.  Such as Identity Theft, Bullying, Hacking, Internet.
Cybercrime Justine Brown COSC 101. What is Cybercrime? A criminal activity using computers and the internet. A criminal activity using computers and the.
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
Outline of this module By the end of this module, you will be able to: Identify the benefits of using social networking to communicate with family and.
1 Outline of this module By the end of this module you will be able to: Understand why computer security is important; Name the different threats to.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Jeff loses his identity! Lesson 5: Identity Theft.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
Internet Security TEAMS March 18 th, ISP:Internet Service Provider.
CURRENT STATUS OF CYBERCRIME  Security is the fastest growing service in IT  Cyber Crime Costs $750 Billion annually  70% of threats arrive via .
October 28, 2015 Cyber Security Awareness Update.
Protecting Against Cyber Attacks PLEASE TAKE A MINUTE TO LOOK AT THIS IMPORTANT MESSAGE. THIS IS HAPPENING HERE AND NOW! LET US SAVE YOU AND YOUR INFORMATION.
Technical Implementation: Security Risks
Presented by: SBS CyberSecurity © SBS CyberSecurity, LLC
Fraud Protection.
Fraud protection.
how to prevent them from being successful
To Know what Cyber crime is
Personal spaces.
Cyber Security Awareness Workshop
Cybersecurity Awareness
Robert Leonard Information Security Manager Hamilton
What every consumer should know
Risk of the Internet At Home
Curating an Effective Security Culture
Report Phishing Forward phishing s to
Who am I?. Information Security and You: Identity Theft and Credit Card Encryption.
Presentation transcript:

THE MEMBERS GROUP Safeguard Iowa Partnership – Cybersecurity Webinar Series

THE MEMBERS GROUP Social Engineering and It’s Effects

THE MEMBERS GROUP What is Social Engineering? Define: psychological manipulation of people into performing actions or divulging confidential information.

THE MEMBERS GROUP Types of Attacks Phishing - SMishing - texting Pharming – website Whaling – targeting of executives Vishing - phone Tailgating/Piggybacking

THE MEMBERS GROUP UPS Example ***Do not reply to this . UPS will not receive your reply. Important Delivery Information Delivery Status:Could not deliver package due to invalid information. Fix Errors:HERE Please click the above link to correct the errors and we will attempt to re-deliver your package Driver Release Location: COULD NOT DELIVER Shipment Detail Number of Packages1 UPS Service:1 DAY OVERNIGHT - URGENT Weight:2.8 LBS

THE MEMBERS GROUP Smishing Example (Card Blocked) Alert. For more information please call XXXX.

THE MEMBERS GROUP In October 2013, RSA identified more than 62,000 phishing attacks, which raised the bar in terms of number of attacks carried out within a single month. The median takedown time for attacks is 12 hours -- worth roughly $300 each hour. During October 2013 alone, phishing attacks netted $233 million. ** ** engineering-attacks-Is-security-focused-on-the-wrong-problem Cost of Social Engineering

THE MEMBERS GROUP What happens after…

THE MEMBERS GROUP Effects of Cyber Crime Cybercrime has surpassed illegal drug trafficking as a criminal moneymaker.* Every 3 seconds an identity is stolen.** Without security, your unprotected PC can become infected within four minutes of connecting to the internet.*** *Cybercrime More Profitable Than Drugs", NineMSN, **Identity Theft Statistics, Identity Protection Online ***"Eliminating Mobile Security Blindfolds", Tech News World

THE MEMBERS GROUP Target, Neiman Marcus, Michaels, and more… Eastern European hackers developed software BlackPOS malware – Memory parsing software How did they get in the network? 6 other breaches, software downloaded 60x globally

THE MEMBERS GROUP Prevention Practices

THE MEMBERS GROUP Organizational Tips Never disclose password Limit who talks about IT structure Question people Be sure to be aware of guests/non-employee access If something does not feel right – STOP Education and training

THE MEMBERS GROUP Industry Measures Increased Communications EMV Mobile Tokenization

THE MEMBERS GROUP Fragmented Implementation Aite Survey – Merchants 75% of small to mid-sized merchants were not aware of EMV/Chip cards – Of those that were aware 52% were planning on upgrading by % of large merchants are planning to upgrade by 2015 – Issuers 64% of large issuers plan to be completed by Oct % of large issuers in the middle of reissuance by Oct % of issuers planning on chip and signature CVM 25% of issuers planning on chip and PIN CVM

THE MEMBERS GROUP Fraudsters Take Advantage

THE MEMBERS GROUP Education

THE MEMBERS GROUP Questions?

THE MEMBERS GROUP Safeguard Iowa Partnership Cybersecurity Webinar Series: October 23: Passwords Under Attack & Two Factor Authorization October 30: Iowa Fusion Center Cyber Crime Component & How the DCI Proceeds in Criminal Investigations

THE MEMBERS GROUP Become our newest Partner TODAY!