3. WAS
• Hacking
• Phishing
• Data Espionage
• Data Interference
MOVING TO
• Intellectual property theft
• Identity theft
• Social Engineering
Fin24 – April 2014
4. HACKING
A technical effort to manipulate
the normal behaviour of networks,
connections and information
5. PHISHING / SMISHING
Fraudulent practice of sending
messages purporting to be from
reputable companies in order
to induce individuals to reveal
personal information, such as
passwords and credit card numbers,
online.
6. DATA ESPIONAGE
Data espionage describes the
stealing of secrets stored in digital
formats or on computers and
IT networks
7. DATA INTERFERENCE
Data corruption refers to errors in
computer data resulting in unintended
changes to the original data.
8. INTELLECTUAL PROPERTY THEFT
The theft of any innovation any method or formula
with economic value; or any unique name, symbol, or
logo that is used commercially. It can also be the
theft of company data.
9. IDENTITY THEFT
Identity theft is a form of stealing an identity for
personal or corporate gain.
• True Name
• Account Takeover
16. The problem with human resources
Is that they are human, with all that entails.
Truthfully, the human condition is by and large good.
Most people are honest, sincere, responsible
And prepared to work hard for a fair shake.
But there are others that give people a bad name.
These are the ones that lie, cheat and steal.
They are the businessman’s worst nightmare
For the damage they can cause.
These are the people you don’t want working for you.
17. • Incidents by insiders increased by 10%
• Incidents by contractors / suppliers rose
by 17%
• Incidents by competitors increased by
64%
18. The problem with human resources
• Communication via social networks is one of the
most popular activites on the internet
• Social networking – 3rd most popular activity
• 75% of people pay no attention to possible
hackers
• 13% discuss private information with strangers
• 20% share information on social networks that
they would never share in person
• 18% share online account data from public wi-fi
19. Computer Forensics
Imaging hard
drives
Analysis of data
Data verification
Legal Advice
Transgressions
of internal
policies
21. Insurance against Cybercrime
People
Risk
Risk
Assessment
Training
Ongoing
vulnerability
assessments People Risk
Established
relationship
with fraud
investigations
expert
Management
Programme
22. People Risk
Pre
Employment
Screening
Lifestyle
Audits
Suppliers Contractors
Exit
Interviews
People Risk
Management
Programme