SlideShare a Scribd company logo
1 of 13
Alexandre Pluvinage – 29-04-2015
Who am I ?
 Master in Law (European Law)
 Master in Communication and
Multimedia
 7 years in the field of security as:
 Project manager on security projects (ING)
 Spokeperson for security and online banking
questions (ING)
 Cybercrime Coordination Manager (ING)
 Head of the Cybercrime Awareness Team
Cyber security in 2014
 Cyber crimes are growing more
common, more costly, and taking longer
to resolve.
 In 2014, cybercrime has cost more than
400 Billions dollars
Why me ? I’m just a marketeer
!!
 I’m also a target for cybercriminals
 My communications can create cyber risks
 I have a responsibility in educating my customers/targets
Topics:
 You as a target
 Monitor social media
 Emails
 Links (hyperlinks)
 Websites hosting
 Password management
 Code review and security checks
 Get help from the experts
I’m an employee, I’m a
target
 Brute force attack against IT systems is
complicated
 The human is the weakest factor
 Spear phishing
 USB Key
 Watering hole
 Use you common sense
 Respect the policies
 In case of doubt, refer to an expert
Monitoring my social media
?
 Hackers are on Twitter …
 … and sometimes, they are on yours too !
How to make it secured ?
 Monitor what happens on your SM
 Use tools to look after fake accounts
 Change password regularly
 Train you webcare teams
 Have a recover procedure
Of course, I’m using emails in my
campaigns !!
 Emails are a high risk factor for cybersecurity (links or attachments
could lead to phishing or system infection)
How to make it secured ?
 Always use the same sender address for a specific topic. If the
sender changes, it’s a sign for the recipient that there might be a
security issue
 Always send email from @mycompany.be email addresses (never
from an external address) even if the mail is signed by a board
member
 Do not send attached files (put the file on your site Internet and link
it)
 Secure your links (see next slide)
 Have an email policy for your customers/prospects
And what about the links ?
 Links can lead the clicker to a security issue
 All links are concerned (in emails, website, Intranet, social media)
How to make it secured ?
 Never use short links (bitly or other)
 Always use a link that can be recognized (https://www.mycompany.be/XYZ,
or an Intranet link)
 If you lead the user to an external site or source, mention it
(e.g. Click here (External site))
 Explain where the link should lead so the user can recognize a fake link as he
goes to an unknown page
 Always link to your own website (and add links to other websites from there)
Website hosting and technology
 If you decide to create a website to promote an idea or get information from employees there
are some rules to follow aiming to cyber security
How to make it secured ?
 Ask advice to an IT security expert
 External sites have to be created and hosted by a qualified partner
 Use https and not http
 Always say to the user that he/she is going to an external platform
 If you really need a new external partner, he needs to be qualified by ING (refer to existing
security and procurement processes)
 Always secure sensible content by a password
 Use a www.mycompany.be/mylastcampaign URL
 Connected platform are a risk of intrusion in your IT systems
Can you give me you password
? I need to login
 Passwords are too often shared, unsecured and re-
used
 People are not happy with password, they will use
automatisms
How to make it secured ?
 Force capital letters, signs, figures in the password
 Use a password policy
 Promote ways to create secured and easy to
remember passwords
Educate your customers
 It’s your responsability
 Create safe habbits
How to make it secured ?
 Inform
 Respect the rules
 Ask yourself is the information you ask is
really necessary
 Be careful with links and attachments
Please ask an expert
 Communication teams and IT security
expert have to work together
 Train your team about security best
practices
 Update this knowledge
Thank you for your attention

More Related Content

What's hot

Social Media Security
Social Media SecuritySocial Media Security
Social Media SecurityDel Belcher
 
Bullet proofing your career online 41812
Bullet proofing your career online 41812Bullet proofing your career online 41812
Bullet proofing your career online 41812Hannah Morgan
 
What I learned from protecting over 1 million crypto traders and investors fr...
What I learned from protecting over 1 million crypto traders and investors fr...What I learned from protecting over 1 million crypto traders and investors fr...
What I learned from protecting over 1 million crypto traders and investors fr...Paul Walsh
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Jay Nagar
 
Most Important Cyber Security Guidelines
Most Important Cyber Security GuidelinesMost Important Cyber Security Guidelines
Most Important Cyber Security GuidelinesPatten John
 
Com 6 u1 L1 Maintaining internet safety
Com 6 u1 L1 Maintaining internet safetyCom 6 u1 L1 Maintaining internet safety
Com 6 u1 L1 Maintaining internet safetyJason Ruelo
 
Php Security Iissues
Php Security IissuesPhp Security Iissues
Php Security IissuesAung Khant
 
Will My SaaS Provider Leak My Corporate Data? - Collaborate '15 Presentation
Will My SaaS Provider Leak My Corporate Data? - Collaborate '15 PresentationWill My SaaS Provider Leak My Corporate Data? - Collaborate '15 Presentation
Will My SaaS Provider Leak My Corporate Data? - Collaborate '15 PresentationSnag
 
Internet secutity ppt by vaishnavi khandelwal
Internet secutity ppt by vaishnavi khandelwalInternet secutity ppt by vaishnavi khandelwal
Internet secutity ppt by vaishnavi khandelwalVaishnaviKhandelwal6
 
CYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWCYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWBilly Warero
 

What's hot (12)

Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
 
Cyber Security Awareness - file 2 of 2
Cyber Security Awareness - file 2 of 2Cyber Security Awareness - file 2 of 2
Cyber Security Awareness - file 2 of 2
 
Bullet proofing your career online 41812
Bullet proofing your career online 41812Bullet proofing your career online 41812
Bullet proofing your career online 41812
 
What I learned from protecting over 1 million crypto traders and investors fr...
What I learned from protecting over 1 million crypto traders and investors fr...What I learned from protecting over 1 million crypto traders and investors fr...
What I learned from protecting over 1 million crypto traders and investors fr...
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual
 
Most Important Cyber Security Guidelines
Most Important Cyber Security GuidelinesMost Important Cyber Security Guidelines
Most Important Cyber Security Guidelines
 
Com 6 u1 L1 Maintaining internet safety
Com 6 u1 L1 Maintaining internet safetyCom 6 u1 L1 Maintaining internet safety
Com 6 u1 L1 Maintaining internet safety
 
ACESnWS cyber security tips
ACESnWS cyber security tipsACESnWS cyber security tips
ACESnWS cyber security tips
 
Php Security Iissues
Php Security IissuesPhp Security Iissues
Php Security Iissues
 
Will My SaaS Provider Leak My Corporate Data? - Collaborate '15 Presentation
Will My SaaS Provider Leak My Corporate Data? - Collaborate '15 PresentationWill My SaaS Provider Leak My Corporate Data? - Collaborate '15 Presentation
Will My SaaS Provider Leak My Corporate Data? - Collaborate '15 Presentation
 
Internet secutity ppt by vaishnavi khandelwal
Internet secutity ppt by vaishnavi khandelwalInternet secutity ppt by vaishnavi khandelwal
Internet secutity ppt by vaishnavi khandelwal
 
CYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWCYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEW
 

Viewers also liked

Malone Telegram Article - Yoga Stress & Osteoporosis 2014
Malone Telegram Article - Yoga Stress & Osteoporosis 2014Malone Telegram Article - Yoga Stress & Osteoporosis 2014
Malone Telegram Article - Yoga Stress & Osteoporosis 2014Helene Gibbens
 
Planeamiento semanal electrico
Planeamiento semanal electricoPlaneamiento semanal electrico
Planeamiento semanal electricoKarloz Rosadio
 
Menu semaine du100314 au 150314
Menu semaine du100314 au 150314Menu semaine du100314 au 150314
Menu semaine du100314 au 150314El Spaña
 
Presentation du Restaurant "El Spaña"
Presentation du Restaurant "El Spaña"Presentation du Restaurant "El Spaña"
Presentation du Restaurant "El Spaña"El Spaña
 
samia elwakil resume 2015
samia  elwakil resume 2015samia  elwakil resume 2015
samia elwakil resume 2015samia elwakil
 
Guia apoyo sgsi
Guia apoyo sgsiGuia apoyo sgsi
Guia apoyo sgsiSusana Tan
 

Viewers also liked (8)

Hfinance
HfinanceHfinance
Hfinance
 
Malone Telegram Article - Yoga Stress & Osteoporosis 2014
Malone Telegram Article - Yoga Stress & Osteoporosis 2014Malone Telegram Article - Yoga Stress & Osteoporosis 2014
Malone Telegram Article - Yoga Stress & Osteoporosis 2014
 
Planeamiento semanal electrico
Planeamiento semanal electricoPlaneamiento semanal electrico
Planeamiento semanal electrico
 
Menu semaine du100314 au 150314
Menu semaine du100314 au 150314Menu semaine du100314 au 150314
Menu semaine du100314 au 150314
 
Presentation du Restaurant "El Spaña"
Presentation du Restaurant "El Spaña"Presentation du Restaurant "El Spaña"
Presentation du Restaurant "El Spaña"
 
samia elwakil resume 2015
samia  elwakil resume 2015samia  elwakil resume 2015
samia elwakil resume 2015
 
Diseño y seguridad vial lamm
Diseño y seguridad vial lammDiseño y seguridad vial lamm
Diseño y seguridad vial lamm
 
Guia apoyo sgsi
Guia apoyo sgsiGuia apoyo sgsi
Guia apoyo sgsi
 

Similar to Cybersecurity in communication

Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006Ben Rothke
 
A Guide to Cyber Etiquette.pdf
A Guide to Cyber Etiquette.pdfA Guide to Cyber Etiquette.pdf
A Guide to Cyber Etiquette.pdfInfosec Train
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness TrainingDenis kisina
 
Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies Anwar CHFI, SSCP, ITIL
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxMustafa Amiri
 
Information security a new era technology_
Information security a new era technology_Information security a new era technology_
Information security a new era technology_Tahmid Munaz
 
Cyber security.docx
Cyber security.docxCyber security.docx
Cyber security.docxsaivarun91
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02amiinaaa
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityNcell
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security TipsInfusionsoft
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101mateenzero
 
FHSU CITI CS Training.pptx
FHSU CITI CS Training.pptxFHSU CITI CS Training.pptx
FHSU CITI CS Training.pptxLaurieAnnFrazier
 
What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?
What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?
What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?Lucy Zeniffer
 
I’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextI’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextBrian Pichman
 
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWebinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWPICPE
 

Similar to Cybersecurity in communication (20)

Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006
 
A Guide to Cyber Etiquette.pdf
A Guide to Cyber Etiquette.pdfA Guide to Cyber Etiquette.pdf
A Guide to Cyber Etiquette.pdf
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
 
PHISHING PROTECTION
 PHISHING PROTECTION PHISHING PROTECTION
PHISHING PROTECTION
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
 
Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptx
 
Information security a new era technology_
Information security a new era technology_Information security a new era technology_
Information security a new era technology_
 
Cyber security.docx
Cyber security.docxCyber security.docx
Cyber security.docx
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security Tips
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
Why Cybercriminals are targeting Small Businesses
Why Cybercriminals are targeting Small BusinessesWhy Cybercriminals are targeting Small Businesses
Why Cybercriminals are targeting Small Businesses
 
FHSU CITI CS Training.pptx
FHSU CITI CS Training.pptxFHSU CITI CS Training.pptx
FHSU CITI CS Training.pptx
 
What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?
What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?
What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?
 
Masterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy BasicsMasterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy Basics
 
I’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextI’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take Next
 
Phishing
PhishingPhishing
Phishing
 
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWebinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
 

Recently uploaded

Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escorts
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our EscortsCall Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escorts
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escortsindian call girls near you
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663Call Girls Mumbai
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdf
象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdf象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdf
象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdfkeithzhangding
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一3sw2qly1
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 

Recently uploaded (20)

Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escorts
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our EscortsCall Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escorts
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escorts
 
Vip Call Girls Aerocity ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Aerocity ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Aerocity ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Aerocity ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdf
象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdf象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdf
象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdf
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 

Cybersecurity in communication

  • 2. Who am I ?  Master in Law (European Law)  Master in Communication and Multimedia  7 years in the field of security as:  Project manager on security projects (ING)  Spokeperson for security and online banking questions (ING)  Cybercrime Coordination Manager (ING)  Head of the Cybercrime Awareness Team
  • 3. Cyber security in 2014  Cyber crimes are growing more common, more costly, and taking longer to resolve.  In 2014, cybercrime has cost more than 400 Billions dollars
  • 4. Why me ? I’m just a marketeer !!  I’m also a target for cybercriminals  My communications can create cyber risks  I have a responsibility in educating my customers/targets Topics:  You as a target  Monitor social media  Emails  Links (hyperlinks)  Websites hosting  Password management  Code review and security checks  Get help from the experts
  • 5. I’m an employee, I’m a target  Brute force attack against IT systems is complicated  The human is the weakest factor  Spear phishing  USB Key  Watering hole  Use you common sense  Respect the policies  In case of doubt, refer to an expert
  • 6. Monitoring my social media ?  Hackers are on Twitter …  … and sometimes, they are on yours too ! How to make it secured ?  Monitor what happens on your SM  Use tools to look after fake accounts  Change password regularly  Train you webcare teams  Have a recover procedure
  • 7. Of course, I’m using emails in my campaigns !!  Emails are a high risk factor for cybersecurity (links or attachments could lead to phishing or system infection) How to make it secured ?  Always use the same sender address for a specific topic. If the sender changes, it’s a sign for the recipient that there might be a security issue  Always send email from @mycompany.be email addresses (never from an external address) even if the mail is signed by a board member  Do not send attached files (put the file on your site Internet and link it)  Secure your links (see next slide)  Have an email policy for your customers/prospects
  • 8. And what about the links ?  Links can lead the clicker to a security issue  All links are concerned (in emails, website, Intranet, social media) How to make it secured ?  Never use short links (bitly or other)  Always use a link that can be recognized (https://www.mycompany.be/XYZ, or an Intranet link)  If you lead the user to an external site or source, mention it (e.g. Click here (External site))  Explain where the link should lead so the user can recognize a fake link as he goes to an unknown page  Always link to your own website (and add links to other websites from there)
  • 9. Website hosting and technology  If you decide to create a website to promote an idea or get information from employees there are some rules to follow aiming to cyber security How to make it secured ?  Ask advice to an IT security expert  External sites have to be created and hosted by a qualified partner  Use https and not http  Always say to the user that he/she is going to an external platform  If you really need a new external partner, he needs to be qualified by ING (refer to existing security and procurement processes)  Always secure sensible content by a password  Use a www.mycompany.be/mylastcampaign URL  Connected platform are a risk of intrusion in your IT systems
  • 10. Can you give me you password ? I need to login  Passwords are too often shared, unsecured and re- used  People are not happy with password, they will use automatisms How to make it secured ?  Force capital letters, signs, figures in the password  Use a password policy  Promote ways to create secured and easy to remember passwords
  • 11. Educate your customers  It’s your responsability  Create safe habbits How to make it secured ?  Inform  Respect the rules  Ask yourself is the information you ask is really necessary  Be careful with links and attachments
  • 12. Please ask an expert  Communication teams and IT security expert have to work together  Train your team about security best practices  Update this knowledge
  • 13. Thank you for your attention