SlideShare a Scribd company logo
1 of 16
NO PHISHING
ALLOWED!
PREPARING AGAINST
PHISHING AND SOCIAL
ENGINEERING
Presented by Patrick Kinsella, CTO
Today's
Discussion MAIN POINTS
Definition of Cyberattack
Likelihood
Diligence & Prevention
Social Engineering
Phishing
Defense
MFA & SSO
Training & Testing
Presented by Patrick Kinsella, CTO
How We Define
a Cyberattack
GOALS: CREDENTIALS,
INFORMATION, MONEY
WHAT HACKERS LOOK
FOR: WEAK LINKS, POOR
CYBERSECURITY KNOWLEDGE/
PRACTICES
MAIN TYPES OF
ATTACKS: SOCIAL
ENGINEERING (AN EXAMPLE
OF WHICH YOU JUST
SAW) AND PHISHING
What is the Likelihood?
IF WE APPLY THE SAME DILIGENCE WE UTILIZE IN FACE-TO-
FACE INTERACTIONS, OUR RISKS DECREASE AND OUR
SECURITY STRENGTHENS
2“THERE ARE TWO TYPES OF
COMPANIES: THOSE THAT HAVE
BEEN HACKED, AND THOSE WHO
DON’T YET KNOW THEY HAVE
BEEN HACKED.”
Former CISCO CEO, John Chambers
145NUMBER OF CYBERATTACK
ATTEMPTS PER YEAR A BUSINESS
IS LIKELY TO EXPERIENCE
Cited by Accenture in 2019
63%OF THOSE ATTACKS WILL BE
SUCCESSFUL
Cited by KnowBe4
Why is
Diligence &
Prevention so
Important?
NEARLY 30% OF BREACHES
LEAD TO FRAUD OR
IDENTITY THEFT
Cited by KnowBe4
THE AVERAGE COST OF
CYBERCRIME IN 2018 WAS
$13 MILLION
Cited by Accenture
SPECIFICALLY, SOCIAL
ENGINEERING AND
PHISHING NOW COST ~$1.4
MILLION PER ATTACK
Cited by KnowBe4
What
is Social
Engineering?
A PSYCHOLOGICAL ATTACK
Uses deception to trick someone into
revealing information or performing an action,
like plugging in an infected USB stick
CAN OCCUR MULTIPLE WAYS
In person or be used over multiple platforms
SKILLS YOU NEED
Be skeptical, responsible, and knowledgeable in
order to stop them
In-Person
Attacks
• YOU ALREADY SAW ONE EXAMPLE
• CYBERCRIMINALS CAN ALSO USE THIS
TECHNIQUE TO SNEAK INTO YOUR OFFICE
• ONCE INSIDE, THEY CAN DOWNLOAD
FILES, UPLOAD VIRUSES, OR DESTROY
DOCUMENTS
• HOW TO STOP THEM: ASK FOR ID, LEAVE
DOOR LOCKED, HIDE IMPORTANT
INFORMATION
Social Engineering
STOPPING AN ATTACK
It isn't so different from stopping one
in-person
VISHING
SMISHING
Phone calls involving a spoofed number
and/or automated voicemail
Text messages from a number
pretending to be a specific company or
person
HOW TO STOP
Ask questions, reach out to a reliable
number/account to get confirmation,
hesitate before clicking links or sending
information
What is
Phishing?
• OFTEN ENCOMPASSES SOCIAL ENGINEERING
VIA EMAIL
• OVER 90% OF SUCCESSFUL CYBERATTACKS
RESULT FROM PHISHING
(HTTPS://WWW.KNOWBE4.COM/PHISHING)
• THE HACKER MIGHT PRETEND TO BE
SOMEONE YOU KNOW, LIKE A FRIEND OR
FAMILY MEMBER
• THEY COULD ALSO PRETEND TO BE YOUR
BANK, IT PROVIDER, OR COMPANY
• THEY’RE TRYING TO GAIN INFORMATION OR
GET YOU TO DO SOMETHING, LIKE CLICK ON
AN INFECTED LINK
SOPHISTICATED
PHISHING:
WHAT STANDS
OUT?
Ways to
Identify
Phishing
APPLY THE SAME BASIC
STRATEGIES YOU WOULD
IN A FACE-TO-FACE
INTERACTION.
DO YOU KNOW THIS
PERSON? DO THEY HAVE
PROPER ID?
IF THEY DO SOMEHOW
GET PAST YOUR FIRST
DEFENSES, DO YOU HAVE
ADDITIONAL DEFENSES?
STEP 1
The best way to stop
an attack is to be
prepared and
proactive
STEP 2
Cybersecurity is a leadership
issue. If you’re not taking
security seriously, why
should anyone else in your
organization?
STEP 3
MFA, SSO, training,
and testing
How Can You Combat
Hackers?
MFA and SSO: Multi
Factor Authentication
and Single Sign On
OVER 80% OF HACKS ARE A RESULT
OF WEAK OR STOLEN PASSWORDS
GOOD PASSWORD POLICY
IS IMPORTANT, BUT IT NEEDS
ADDITIONAL DEFENSES
MFA AND SSO WORK TOGETHER TO
THWART ATTACKERS—IF YOU’RE NOT AN
EASY TARGET, THEY’RE LESS LIKELY TO
ATTACK
OVER 99% LESS LIKELY TO HAVE YOUR
INFORMATION COMPROMISED
Training
& Testing
• ABOUT 50% OF HACKS ARE
BLAMED ON EMPLOYEE
ERROR
• A SUCCESSFUL BREACH
ONLY REQUIRES ONE WEAK
LINK, SO YOU’LL NEED TO
FORTIFY YOUR COMPANY ON
ALL FRONTS
• ANNUAL CYBERSECURITY
AWARENESS TRAINING
• FREQUENT TESTING
• CONTINUE TO UTILIZE
IN PERSON THREAT
IDENTIFICATION METHODS
ONLINE
IN CONCLUSION:
• BAD ACTORS ARE ALWAYS COMING UP WITH
NEW STRATEGIES
• CULTIVATE A CULTURE OF CYBERSECURITY
• EDUCATION, ALERTNESS, AND DILIGENCE
170 Chastain Meadows Ct.
Kennesaw, GA
HEADQUARTERS
678-695-5500
PHONE NUMBER
info@1path.com
EMAIL ADDRESS
Let's Talk
CONTACT US

More Related Content

Similar to No Phishing Allowed!

Phishing attack list
Phishing attack listPhishing attack list
Phishing attack list
MohammadRizwan126
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)
aleeya91
 

Similar to No Phishing Allowed! (20)

Unit iii: Common Hacking Techniques
Unit iii: Common Hacking TechniquesUnit iii: Common Hacking Techniques
Unit iii: Common Hacking Techniques
 
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptxInternet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
 
Cybersecurity for Dummies
Cybersecurity for DummiesCybersecurity for Dummies
Cybersecurity for Dummies
 
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
 
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
 
Data Security: A Guide To Whale Phishing
Data Security: A Guide To Whale PhishingData Security: A Guide To Whale Phishing
Data Security: A Guide To Whale Phishing
 
Social Engineering, or hacking people
Social Engineering, or hacking peopleSocial Engineering, or hacking people
Social Engineering, or hacking people
 
11 Cybersecurity Tips to stay safe online
11 Cybersecurity Tips to stay safe online11 Cybersecurity Tips to stay safe online
11 Cybersecurity Tips to stay safe online
 
Social engineering
Social engineering Social engineering
Social engineering
 
Cyber security ATTACK on Retired Personnel, MITIGATION and Best Practices
Cyber security ATTACK on Retired Personnel, MITIGATION and Best PracticesCyber security ATTACK on Retired Personnel, MITIGATION and Best Practices
Cyber security ATTACK on Retired Personnel, MITIGATION and Best Practices
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Phishing attack list
Phishing attack listPhishing attack list
Phishing attack list
 
Cyber Threats and its Types: Malware, Virus.pptx
Cyber Threats and its Types: Malware, Virus.pptxCyber Threats and its Types: Malware, Virus.pptx
Cyber Threats and its Types: Malware, Virus.pptx
 
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWebinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
 
cot-2022.pptx
cot-2022.pptxcot-2022.pptx
cot-2022.pptx
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
 
Social Engineering 2.0
Social Engineering 2.0Social Engineering 2.0
Social Engineering 2.0
 
Prevent phishing scams
Prevent phishing scamsPrevent phishing scams
Prevent phishing scams
 
OWASP_Presentation_FINAl. Cybercrime and cyber security awareness
OWASP_Presentation_FINAl. Cybercrime and cyber security awarenessOWASP_Presentation_FINAl. Cybercrime and cyber security awareness
OWASP_Presentation_FINAl. Cybercrime and cyber security awareness
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)
 

Recently uploaded

Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
panagenda
 

Recently uploaded (20)

How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistan
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 

No Phishing Allowed!

  • 1. NO PHISHING ALLOWED! PREPARING AGAINST PHISHING AND SOCIAL ENGINEERING Presented by Patrick Kinsella, CTO
  • 2. Today's Discussion MAIN POINTS Definition of Cyberattack Likelihood Diligence & Prevention Social Engineering Phishing Defense MFA & SSO Training & Testing Presented by Patrick Kinsella, CTO
  • 3. How We Define a Cyberattack GOALS: CREDENTIALS, INFORMATION, MONEY WHAT HACKERS LOOK FOR: WEAK LINKS, POOR CYBERSECURITY KNOWLEDGE/ PRACTICES MAIN TYPES OF ATTACKS: SOCIAL ENGINEERING (AN EXAMPLE OF WHICH YOU JUST SAW) AND PHISHING
  • 4. What is the Likelihood? IF WE APPLY THE SAME DILIGENCE WE UTILIZE IN FACE-TO- FACE INTERACTIONS, OUR RISKS DECREASE AND OUR SECURITY STRENGTHENS 2“THERE ARE TWO TYPES OF COMPANIES: THOSE THAT HAVE BEEN HACKED, AND THOSE WHO DON’T YET KNOW THEY HAVE BEEN HACKED.” Former CISCO CEO, John Chambers 145NUMBER OF CYBERATTACK ATTEMPTS PER YEAR A BUSINESS IS LIKELY TO EXPERIENCE Cited by Accenture in 2019 63%OF THOSE ATTACKS WILL BE SUCCESSFUL Cited by KnowBe4
  • 5. Why is Diligence & Prevention so Important? NEARLY 30% OF BREACHES LEAD TO FRAUD OR IDENTITY THEFT Cited by KnowBe4 THE AVERAGE COST OF CYBERCRIME IN 2018 WAS $13 MILLION Cited by Accenture SPECIFICALLY, SOCIAL ENGINEERING AND PHISHING NOW COST ~$1.4 MILLION PER ATTACK Cited by KnowBe4
  • 6. What is Social Engineering? A PSYCHOLOGICAL ATTACK Uses deception to trick someone into revealing information or performing an action, like plugging in an infected USB stick CAN OCCUR MULTIPLE WAYS In person or be used over multiple platforms SKILLS YOU NEED Be skeptical, responsible, and knowledgeable in order to stop them
  • 7. In-Person Attacks • YOU ALREADY SAW ONE EXAMPLE • CYBERCRIMINALS CAN ALSO USE THIS TECHNIQUE TO SNEAK INTO YOUR OFFICE • ONCE INSIDE, THEY CAN DOWNLOAD FILES, UPLOAD VIRUSES, OR DESTROY DOCUMENTS • HOW TO STOP THEM: ASK FOR ID, LEAVE DOOR LOCKED, HIDE IMPORTANT INFORMATION
  • 8. Social Engineering STOPPING AN ATTACK It isn't so different from stopping one in-person VISHING SMISHING Phone calls involving a spoofed number and/or automated voicemail Text messages from a number pretending to be a specific company or person HOW TO STOP Ask questions, reach out to a reliable number/account to get confirmation, hesitate before clicking links or sending information
  • 9. What is Phishing? • OFTEN ENCOMPASSES SOCIAL ENGINEERING VIA EMAIL • OVER 90% OF SUCCESSFUL CYBERATTACKS RESULT FROM PHISHING (HTTPS://WWW.KNOWBE4.COM/PHISHING) • THE HACKER MIGHT PRETEND TO BE SOMEONE YOU KNOW, LIKE A FRIEND OR FAMILY MEMBER • THEY COULD ALSO PRETEND TO BE YOUR BANK, IT PROVIDER, OR COMPANY • THEY’RE TRYING TO GAIN INFORMATION OR GET YOU TO DO SOMETHING, LIKE CLICK ON AN INFECTED LINK
  • 11. Ways to Identify Phishing APPLY THE SAME BASIC STRATEGIES YOU WOULD IN A FACE-TO-FACE INTERACTION. DO YOU KNOW THIS PERSON? DO THEY HAVE PROPER ID? IF THEY DO SOMEHOW GET PAST YOUR FIRST DEFENSES, DO YOU HAVE ADDITIONAL DEFENSES?
  • 12. STEP 1 The best way to stop an attack is to be prepared and proactive STEP 2 Cybersecurity is a leadership issue. If you’re not taking security seriously, why should anyone else in your organization? STEP 3 MFA, SSO, training, and testing How Can You Combat Hackers?
  • 13. MFA and SSO: Multi Factor Authentication and Single Sign On OVER 80% OF HACKS ARE A RESULT OF WEAK OR STOLEN PASSWORDS GOOD PASSWORD POLICY IS IMPORTANT, BUT IT NEEDS ADDITIONAL DEFENSES MFA AND SSO WORK TOGETHER TO THWART ATTACKERS—IF YOU’RE NOT AN EASY TARGET, THEY’RE LESS LIKELY TO ATTACK OVER 99% LESS LIKELY TO HAVE YOUR INFORMATION COMPROMISED
  • 14. Training & Testing • ABOUT 50% OF HACKS ARE BLAMED ON EMPLOYEE ERROR • A SUCCESSFUL BREACH ONLY REQUIRES ONE WEAK LINK, SO YOU’LL NEED TO FORTIFY YOUR COMPANY ON ALL FRONTS • ANNUAL CYBERSECURITY AWARENESS TRAINING • FREQUENT TESTING • CONTINUE TO UTILIZE IN PERSON THREAT IDENTIFICATION METHODS ONLINE
  • 15. IN CONCLUSION: • BAD ACTORS ARE ALWAYS COMING UP WITH NEW STRATEGIES • CULTIVATE A CULTURE OF CYBERSECURITY • EDUCATION, ALERTNESS, AND DILIGENCE
  • 16. 170 Chastain Meadows Ct. Kennesaw, GA HEADQUARTERS 678-695-5500 PHONE NUMBER info@1path.com EMAIL ADDRESS Let's Talk CONTACT US