Presentation is loading. Please wait.

Presentation is loading. Please wait.

Want to be secure? Eliminate passwords.

Similar presentations


Presentation on theme: "Want to be secure? Eliminate passwords."— Presentation transcript:

1 Want to be secure? Eliminate passwords.
If you don't have a password, it can't be stolen! Jack Bicer, CEO sekur.me © Sekur Me, Inc Your Logo

2 How many people remember all of their passwords?
© Sekur Me, Inc

3 Founder and CEO of SEKUR.me, a mobile security and payments company.
JACK BICER - Short BIO Founder and CEO of SEKUR.me, a mobile security and payments company. Two previous inventions “Uninstall” and “Automatic Software Updates”, run on every computer and every smartphone today. Author of 2 issued and 1 pending patent on eliminating passwords. © Sekur Me, Inc

4 Passwords were first used 56 years ago, at MIT.
History of Passwords Passwords were first used 56 years ago, at MIT. Users passed through a security guard Entered a secure room Wanted to protect their information from 10 other people who could be in the room. © Sekur Me, Inc

5 Passwords were not designed to protect against: Automated Attacks
History of Passwords Passwords were not designed to protect against: Automated Attacks Phishing Social Hacking Theft © Sekur Me, Inc

6 Passwords are getting more complex and harder to remember.
Password Issues Passwords are getting more complex and harder to remember. Upper & Lower Case + Symbol + Number New Minimum Password lengths GoDaddy: 12 characters Freddy Mac, Western Dental: 16 characters Who can remember all their passwords? © Sekur Me, Inc

7 2 out of 3 data breaches are from stolen user credentials.
Fraud attempts are up by 50% over last year. Average cost of a data breach is $7M and rising. Why? © Sekur Me, Inc

8 JP Morgan Chase: 76 Million
Passwords Get Stolen Stolen UserIDs and Passwords Yahoo: 1 Billion Blue Cross: 80 Million Adult Sites: 500 Million MySpace: 164 Million JP Morgan Chase: 76 Million eBay: 145 Million Tumbler: 65 Million Living Social: 50M Dropbox: 68 Million Linked In: 117 Million © Sekur Me, Inc

9 Ashely Madison: 37 Million
Passwords Get Stolen Stolen UserIDs and Passwords Evernote: 50 Million Facebook: 6 Million Ashely Madison: 37 Million Google: 5 Million Home Depot: 56 million Experian: 15 Million Sony: 77 Million Last FM: 44 Million OPM: 21 Million Weebly: 43 Million © Sekur Me, Inc

10 Passwords Get Stolen The numbers are staggering – over 2.5 Billion logins stolen. Almost every company and every government agency can and probably will be hacked (including FBI and CIA) Hackers can range from: Professional & Amateur Individual Hackers Security Researchers Organized & Unorganized Cyber Criminals Industrial Spies Foreign Government Sponsored Groups Terrorist Groups Spy Agencies © Sekur Me, Inc

11 Average consumer has 118 online accounts today, reaching 207 by 2020.
Password Usage Average consumer has 118 online accounts today, reaching 207 by 2020. How are consumers protecting themselves? © Sekur Me, Inc

12 8 out 10 users use the same UserID and password on multiple sites.
Password Usage 8 out 10 users use the same UserID and password on multiple sites. 55% of users use the same password for most, if not all sites. © Sekur Me, Inc

13 Algorithmic Passwords
118 unique passwords are impossible to remember. Some use algorithmic passwords: Jack2Yahoo, Jack2Google, Jack2Citibank What is my password for Chase? Once they have a few of your passwords, they know ALL your passwords. © Sekur Me, Inc

14 Keyboard Loggers Current login methods at online banks and vendors are not as secure as they once were. All sorts of hackers, viruses, keystroke loggers and screen capture malware are on the loose. Credit card fraud and identity theft are at all time highs.

15 Capture every keystroke on your computer and send it to hackers.
Keyboard Loggers Capture every keystroke on your computer and send it to hackers. If I type what are the next two things I will be typing? My Login ID and Password Does it matter how complex your password is? No – they will get you! © Sekur Me, Inc

16 So how do we protect ourselves?
What To Do? 39% of Americans would give up sex for a year to never have to worry about being hacked (NBC News). So how do we protect ourselves? © Sekur Me, Inc

17 The best long term solution is to Eliminate Passwords!
What To Do? The best long term solution is to Eliminate Passwords! © Sekur Me, Inc

18 Because: If you don't have a password, it can't be stolen!
What To Do? Because: If you don't have a password, it can't be stolen! If you eliminate passwords, you can eliminate 67% of the data breaches. © Sekur Me, Inc

19 Phishing: One of the most common attacks:
Real World Example Phishing: One of the most common attacks: John Podesta/DNC hack. General Colin Powell hack. © Sekur Me, Inc

20 Phishing © Sekur Me, Inc

21 Phishing Even Hillary Clinton’s IT Staff thought the phishing was legitimate. © Sekur Me, Inc

22 New Effective Phishing Hack
Discovered by Wordfence You get an from someone you know. With a familiar picture/attachment. You click on the attachment. You are sent to Google Account Login page. Notice “data:text” in the URL and the <script> after many spaces  makes script invisible in location bar. © Sekur Me, Inc

23 New Effective Phishing Hack
Discovered by Wordfence © Sekur Me, Inc

24 If you don’t have a password, you can eliminate the data breaches
Phising If you don’t have a password, you can eliminate the data breaches from phishing attacks. You will immediately recognize the Phishing attacks. Even if someone clicks on the bad link, there is no password to change. Untrained users can’t enable a breach. © Sekur Me, Inc

25 How to Eliminate Passwords?
How can you eliminate passwords? Turn our smartphones into our digital identity. Almost everyone has one. We always carry our phones with us. © Sekur Me, Inc

26 How to Eliminate Passwords?
How do you eliminate passwords? Send a login request to a smartphone QR, Push, Image, Sound, EM Waves, NFC… Verify identity response using: Encryption or Device Fingerprinting © Sekur Me, Inc

27 1. Verify identity with encryption.
Encryption Example 1. Verify identity with encryption. PKI – most commonly used encryption method: Store UserID on the phone. Phone encrypts UserID with server’s public key. Server decrypts UserID using it’s private key. If all goes OK, let user in. © Sekur Me, Inc

28 Downside of encryption:
The data and encryption keys can easily be copied: Backup and Restore Copy app data on Rooted/Jailbroken phones Malware When they have your keys, they have you. © Sekur Me, Inc

29 Device Fingerprinting
Every Smartphone has unique hardware. Hardware data can not be falsified. Associate a user with a Device Fingerprint © Sekur Me, Inc

30 Device Fingerprinting
Downside of Device Fingerprinting: When phones switch hands, others can login as you. When you switch phones, your Device Fingerprint association is no longer valid. © Sekur Me, Inc

31 “Dynamic Mobile Device Fingerprinting” Every phone has unique hardware
Our Approach “Dynamic Mobile Device Fingerprinting” Every phone has unique hardware Every person is unique By combining YOU + YOUR PHONE, you get tamperproof security (FonePrint ™) © Sekur Me, Inc

32 Creating Your Own Solution
Watch for Patents If you want to create your own solution, patents are significant barriers to entry: Passwordless Login is heavily patented. Most approaches are already patented. Research existing patents before designing your solution. Or consider licensing to avoid litigation. © Sekur Me, Inc

33 Passwordless Login :: Web
© Sekur Me, Inc

34 Passwordless gSuite Login
© Sekur Me, Inc

35 Passwordless Login :: Mobile Web
© Sekur Me, Inc

36 Q & A Jack Bicer, CEO info @ sekur.me 714 453 9000 www.sekur.me
© Sekur Me, Inc Your Logo


Download ppt "Want to be secure? Eliminate passwords."

Similar presentations


Ads by Google