SlideShare a Scribd company logo
1 of 30
Internet Safety Awareness:
Social, Mobile and Messy
Marian Merritt

Internet Safety: Advocate, Symantec Corporation
Norton Internet Safety Social, Mobile, Messy
Marian Merritt, Norton Internet Safety Advocate
Why are you here?
Cybercrime is a massive global problem

Cybercrime costs
consumers

$112

billion
each year

1/2
of online adults
have been hit
by cybercrime

12%

More Targeted
Attacks
employees
social media

Ransomware
New forms of costly
malicious threats

social network
users have
each year
been hacked

3
Why am I here?
What’s really going on with mobile?
Who here checked Facebook today?
Played Angry Birds or Candy Crush on a mobile device?

5
What you think you did
vs what actually happened in the background

PREVIOUS SCORES

TIME SPENT
PLAYING

IP ADDRESS

LOCATION
GENDER
& AGE

USER NAME

SCORE

FACEBOOK FRIEND LIST

6
OK, so I’ll be careful with apps

• , WiFi if not using

7
What’s going on with Social: advertising scams
WHAT YOU SEE

WHY THEY DO IT

8
And malicious social links

Bad Guys Want to Get Us to Click to:
Infect us with malware
Make us take bogus surveys to:
Gain information or
Sign us up for premium SMS services
Send spam to us and our friends

9
Ok, I’ll be careful in social networks and media

10
What is the issue
at stake?
SAVVY ON COMPUTER, LESS SO ON MOBILE
DELETE SUSPICIOUS
EMAILS FROM PEOPLE
THEY DON’T KNOW

HAVE AT LEAST A BASIC
FREE ANTIVIRUS SOLUTION

AVOID STORING SENSITIVE
FILES ONLINE

90%

72%

78%

VS.

VS.

VS.

60%

42%

53%

VS.

VS.

VS.

56%

33%

48%

GOOD JOB!

NEEDS
WORK!

NEEDS
WORK!
How often do we lose our
mobile devices?

27%
13
What are the chances of
getting your lost phone back?

50%
14
What are the chances of your work and
personal information being looked at?

100%
15
NEARLY ½ MOBILE USERS SLEEP WITH DEVICE
NEARBY

16
36% SAY THEIR COMPANY HAS NO POLICY ON
BYOD

17
49% USE PERSONAL DEVICE FOR BOTH WORK
AND PLAY

18
ONLINE FILE STORAGE BLURS WORK AND PLAY

18%

21%

SHARE WITH
FRIENDS

SHARE WITH
FAMILY

*

*
19
Targeted attacks: Likely to get attacked?

Small or Medium
Organization

Large Organization

20
Who is most likely to be targeted in an attack?

Employee

CEO

Only 17% of targeted attacks directed at C-Level executives
21
STUXNET:
thousands of industrial centers infiltrated

DENMARK

IRAN
MALAYSIA

22
MAKE THE CONNECTION: Change Behavior

23
MAKE THE CONNECTION: Change Behavior
• Set PASSWORDS on all devices

24
MAKE THE CONNECTION: Change Behavior
• Use security and anti-theft
SOFTWARE

25
MAKE THE CONNECTION: Change Behavior

• Be CAUTIOUS:
• Don’t friend strangers
• Be careful with links
• STOP.THINK.CONNECT.

26
Wrap up
What will you do?
Questions
THANK YOU!
Marian Merritt
marian@norton.com

Copyright © 2013 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in
the U.S. and other countries. Other names may be trademarks of their respective owners.
This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied,
are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.

TM

More Related Content

What's hot

Arrott Htcia St Johns 101020
Arrott Htcia St Johns 101020Arrott Htcia St Johns 101020
Arrott Htcia St Johns 101020Anthony Arrott
 
4 Facts Every Business Should Know About Phishing
4 Facts Every Business Should Know About Phishing4 Facts Every Business Should Know About Phishing
4 Facts Every Business Should Know About PhishingPhishingBox
 
Verizon Data Breach Investigations Report (DBIR) 2017
Verizon Data Breach Investigations Report (DBIR) 2017Verizon Data Breach Investigations Report (DBIR) 2017
Verizon Data Breach Investigations Report (DBIR) 2017PhishingBox
 
Estudio cibercimen-2013-ciberinvestigacion
Estudio cibercimen-2013-ciberinvestigacionEstudio cibercimen-2013-ciberinvestigacion
Estudio cibercimen-2013-ciberinvestigacionSelva Orejón
 
The Norton Report 2013
The Norton Report 2013The Norton Report 2013
The Norton Report 2013Marian Merritt
 
Better Security Through Big Data Analytics
Better Security Through Big Data AnalyticsBetter Security Through Big Data Analytics
Better Security Through Big Data AnalyticsSymantec
 
Techvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutionsTechvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutionsSaad Ahmad
 
The New NotCompatible
The New NotCompatibleThe New NotCompatible
The New NotCompatibleLookout
 
Top Cyber Threats of 2009
Top Cyber Threats of 2009Top Cyber Threats of 2009
Top Cyber Threats of 2009Symantec
 
Keys to Network Security & Shocking Statistics
Keys to Network Security & Shocking StatisticsKeys to Network Security & Shocking Statistics
Keys to Network Security & Shocking StatisticsChristine Spicuzza
 
The state of mobile app security
The state of mobile app security The state of mobile app security
The state of mobile app security Mahima Anand Sharma
 
Beware of cyber security threats
Beware of cyber security threatsBeware of cyber security threats
Beware of cyber security threatsSam Vohra
 
Digital security update: 10 cybersecurity and privacy threats
Digital security update: 10 cybersecurity and privacy threatsDigital security update: 10 cybersecurity and privacy threats
Digital security update: 10 cybersecurity and privacy threatsEntefy
 
Security Trends to Watch in 2010 - A Mid-Year Status Check
Security Trends to Watch in 2010 - A Mid-Year Status Check Security Trends to Watch in 2010 - A Mid-Year Status Check
Security Trends to Watch in 2010 - A Mid-Year Status Check Symantec
 
Phishing Awareness
Phishing Awareness Phishing Awareness
Phishing Awareness mphadden
 
PhishingBox Presents 'What is Phishing' 2017
PhishingBox Presents 'What is Phishing' 2017PhishingBox Presents 'What is Phishing' 2017
PhishingBox Presents 'What is Phishing' 2017Ryan Hardesty
 

What's hot (19)

The Cyber Threat Landscape
The Cyber Threat LandscapeThe Cyber Threat Landscape
The Cyber Threat Landscape
 
Arrott Htcia St Johns 101020
Arrott Htcia St Johns 101020Arrott Htcia St Johns 101020
Arrott Htcia St Johns 101020
 
4 Facts Every Business Should Know About Phishing
4 Facts Every Business Should Know About Phishing4 Facts Every Business Should Know About Phishing
4 Facts Every Business Should Know About Phishing
 
Verizon Data Breach Investigations Report (DBIR) 2017
Verizon Data Breach Investigations Report (DBIR) 2017Verizon Data Breach Investigations Report (DBIR) 2017
Verizon Data Breach Investigations Report (DBIR) 2017
 
Estudio cibercimen-2013-ciberinvestigacion
Estudio cibercimen-2013-ciberinvestigacionEstudio cibercimen-2013-ciberinvestigacion
Estudio cibercimen-2013-ciberinvestigacion
 
The Norton Report 2013
The Norton Report 2013The Norton Report 2013
The Norton Report 2013
 
Better Security Through Big Data Analytics
Better Security Through Big Data AnalyticsBetter Security Through Big Data Analytics
Better Security Through Big Data Analytics
 
Techvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutionsTechvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutions
 
The New NotCompatible
The New NotCompatibleThe New NotCompatible
The New NotCompatible
 
Top Cyber Threats of 2009
Top Cyber Threats of 2009Top Cyber Threats of 2009
Top Cyber Threats of 2009
 
Keys to Network Security & Shocking Statistics
Keys to Network Security & Shocking StatisticsKeys to Network Security & Shocking Statistics
Keys to Network Security & Shocking Statistics
 
Network
NetworkNetwork
Network
 
Social Media & Crime
Social Media & CrimeSocial Media & Crime
Social Media & Crime
 
The state of mobile app security
The state of mobile app security The state of mobile app security
The state of mobile app security
 
Beware of cyber security threats
Beware of cyber security threatsBeware of cyber security threats
Beware of cyber security threats
 
Digital security update: 10 cybersecurity and privacy threats
Digital security update: 10 cybersecurity and privacy threatsDigital security update: 10 cybersecurity and privacy threats
Digital security update: 10 cybersecurity and privacy threats
 
Security Trends to Watch in 2010 - A Mid-Year Status Check
Security Trends to Watch in 2010 - A Mid-Year Status Check Security Trends to Watch in 2010 - A Mid-Year Status Check
Security Trends to Watch in 2010 - A Mid-Year Status Check
 
Phishing Awareness
Phishing Awareness Phishing Awareness
Phishing Awareness
 
PhishingBox Presents 'What is Phishing' 2017
PhishingBox Presents 'What is Phishing' 2017PhishingBox Presents 'What is Phishing' 2017
PhishingBox Presents 'What is Phishing' 2017
 

Similar to Internet Safety: Social, Mobile, Messy

Awareness about cybercrime among youth
Awareness about cybercrime among youthAwareness about cybercrime among youth
Awareness about cybercrime among youthnirmal00776
 
Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017CheapSSLsecurity
 
Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware IBM Security
 
Cyber Crime Awareness and Prevension.pdf
Cyber Crime Awareness and Prevension.pdfCyber Crime Awareness and Prevension.pdf
Cyber Crime Awareness and Prevension.pdfnisarmca
 
5 Technology Trends Construction Contractors Can't Afford To Ignore
5 Technology Trends Construction Contractors Can't Afford To Ignore5 Technology Trends Construction Contractors Can't Afford To Ignore
5 Technology Trends Construction Contractors Can't Afford To IgnoreGross, Mendelsohn & Associates
 
Internet safety and security
Internet safety and securityInternet safety and security
Internet safety and securityDjTechs
 
Securing Your Digital Life;Tips and Tools for online safety
Securing Your Digital Life;Tips and Tools for online safetySecuring Your Digital Life;Tips and Tools for online safety
Securing Your Digital Life;Tips and Tools for online safetyLeonardMensah5
 
Internet security threat report 2013
Internet security threat report 2013Internet security threat report 2013
Internet security threat report 2013Karim Shaikh
 
Attitudes to online Privacy and Security
Attitudes to online Privacy and SecurityAttitudes to online Privacy and Security
Attitudes to online Privacy and SecurityMOTC Qatar
 
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...TechSoup
 
Cybercrime & Cybersecurity
Cybercrime & CybersecurityCybercrime & Cybersecurity
Cybercrime & CybersecurityRitamaJana
 
Cybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 SurveyCybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 SurveyImperva
 
The 2018 Hacker Report: Insights on the hacker mindset, who they are, and the...
The 2018 Hacker Report: Insights on the hacker mindset, who they are, and the...The 2018 Hacker Report: Insights on the hacker mindset, who they are, and the...
The 2018 Hacker Report: Insights on the hacker mindset, who they are, and the...HackerOne
 

Similar to Internet Safety: Social, Mobile, Messy (20)

Protectthepersonaldefendtheworkplace 121023115113-phpapp01
Protectthepersonaldefendtheworkplace 121023115113-phpapp01Protectthepersonaldefendtheworkplace 121023115113-phpapp01
Protectthepersonaldefendtheworkplace 121023115113-phpapp01
 
Awareness about cybercrime among youth
Awareness about cybercrime among youthAwareness about cybercrime among youth
Awareness about cybercrime among youth
 
Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017
 
Norton Cyber Crime Report 2013
Norton Cyber Crime Report 2013Norton Cyber Crime Report 2013
Norton Cyber Crime Report 2013
 
Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware
 
Cyber Crime Awareness and Prevension.pdf
Cyber Crime Awareness and Prevension.pdfCyber Crime Awareness and Prevension.pdf
Cyber Crime Awareness and Prevension.pdf
 
5 Technology Trends Construction Contractors Can't Afford To Ignore
5 Technology Trends Construction Contractors Can't Afford To Ignore5 Technology Trends Construction Contractors Can't Afford To Ignore
5 Technology Trends Construction Contractors Can't Afford To Ignore
 
Must Know Cyber Security Stats of 2016
Must Know Cyber Security Stats of 2016Must Know Cyber Security Stats of 2016
Must Know Cyber Security Stats of 2016
 
CyberDen 2020
CyberDen 2020CyberDen 2020
CyberDen 2020
 
Internet safety and security
Internet safety and securityInternet safety and security
Internet safety and security
 
Securing Your Digital Life;Tips and Tools for online safety
Securing Your Digital Life;Tips and Tools for online safetySecuring Your Digital Life;Tips and Tools for online safety
Securing Your Digital Life;Tips and Tools for online safety
 
Internet security threat report 2013
Internet security threat report 2013Internet security threat report 2013
Internet security threat report 2013
 
Abso lutely!
Abso lutely!Abso lutely!
Abso lutely!
 
Attitudes to online Privacy and Security
Attitudes to online Privacy and SecurityAttitudes to online Privacy and Security
Attitudes to online Privacy and Security
 
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
 
B istr main-report_v18_2012_21291018.en-us
B istr main-report_v18_2012_21291018.en-usB istr main-report_v18_2012_21291018.en-us
B istr main-report_v18_2012_21291018.en-us
 
Cybercrime & Cybersecurity
Cybercrime & CybersecurityCybercrime & Cybersecurity
Cybercrime & Cybersecurity
 
Tot edu eng.
Tot edu eng.Tot edu eng.
Tot edu eng.
 
Cybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 SurveyCybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 Survey
 
The 2018 Hacker Report: Insights on the hacker mindset, who they are, and the...
The 2018 Hacker Report: Insights on the hacker mindset, who they are, and the...The 2018 Hacker Report: Insights on the hacker mindset, who they are, and the...
The 2018 Hacker Report: Insights on the hacker mindset, who they are, and the...
 

More from Marian Merritt

Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital AgeMarian Merritt
 
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety AdvocateCyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety AdvocateMarian Merritt
 
Family Online Safety: Truth and Consequences
Family Online Safety: Truth and ConsequencesFamily Online Safety: Truth and Consequences
Family Online Safety: Truth and ConsequencesMarian Merritt
 
2012 norton cybercrime report
2012 norton cybercrime report2012 norton cybercrime report
2012 norton cybercrime reportMarian Merritt
 
Let me in! 10 tips to better passwords
Let me in! 10 tips to better passwordsLet me in! 10 tips to better passwords
Let me in! 10 tips to better passwordsMarian Merritt
 
12 tips for cell phone safety for kids
12 tips for cell phone safety for kids12 tips for cell phone safety for kids
12 tips for cell phone safety for kidsMarian Merritt
 
8th grade presentation for slideshare
8th grade presentation for slideshare8th grade presentation for slideshare
8th grade presentation for slideshareMarian Merritt
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for ParentsMarian Merritt
 

More from Marian Merritt (9)

Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety AdvocateCyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
 
Family Online Safety: Truth and Consequences
Family Online Safety: Truth and ConsequencesFamily Online Safety: Truth and Consequences
Family Online Safety: Truth and Consequences
 
2012 norton cybercrime report
2012 norton cybercrime report2012 norton cybercrime report
2012 norton cybercrime report
 
Let me in! 10 tips to better passwords
Let me in! 10 tips to better passwordsLet me in! 10 tips to better passwords
Let me in! 10 tips to better passwords
 
12 tips for cell phone safety for kids
12 tips for cell phone safety for kids12 tips for cell phone safety for kids
12 tips for cell phone safety for kids
 
8th grade presentation for slideshare
8th grade presentation for slideshare8th grade presentation for slideshare
8th grade presentation for slideshare
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
 
School presentation
School presentationSchool presentation
School presentation
 

Recently uploaded

DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 

Recently uploaded (20)

DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 

Internet Safety: Social, Mobile, Messy

  • 1. Internet Safety Awareness: Social, Mobile and Messy Marian Merritt Internet Safety: Advocate, Symantec Corporation Norton Internet Safety Social, Mobile, Messy Marian Merritt, Norton Internet Safety Advocate
  • 2. Why are you here?
  • 3. Cybercrime is a massive global problem Cybercrime costs consumers $112 billion each year 1/2 of online adults have been hit by cybercrime 12% More Targeted Attacks employees social media Ransomware New forms of costly malicious threats social network users have each year been hacked 3
  • 4. Why am I here?
  • 5. What’s really going on with mobile? Who here checked Facebook today? Played Angry Birds or Candy Crush on a mobile device? 5
  • 6. What you think you did vs what actually happened in the background PREVIOUS SCORES TIME SPENT PLAYING IP ADDRESS LOCATION GENDER & AGE USER NAME SCORE FACEBOOK FRIEND LIST 6
  • 7. OK, so I’ll be careful with apps • , WiFi if not using 7
  • 8. What’s going on with Social: advertising scams WHAT YOU SEE WHY THEY DO IT 8
  • 9. And malicious social links Bad Guys Want to Get Us to Click to: Infect us with malware Make us take bogus surveys to: Gain information or Sign us up for premium SMS services Send spam to us and our friends 9
  • 10. Ok, I’ll be careful in social networks and media 10
  • 11. What is the issue at stake?
  • 12. SAVVY ON COMPUTER, LESS SO ON MOBILE DELETE SUSPICIOUS EMAILS FROM PEOPLE THEY DON’T KNOW HAVE AT LEAST A BASIC FREE ANTIVIRUS SOLUTION AVOID STORING SENSITIVE FILES ONLINE 90% 72% 78% VS. VS. VS. 60% 42% 53% VS. VS. VS. 56% 33% 48% GOOD JOB! NEEDS WORK! NEEDS WORK!
  • 13. How often do we lose our mobile devices? 27% 13
  • 14. What are the chances of getting your lost phone back? 50% 14
  • 15. What are the chances of your work and personal information being looked at? 100% 15
  • 16. NEARLY ½ MOBILE USERS SLEEP WITH DEVICE NEARBY 16
  • 17. 36% SAY THEIR COMPANY HAS NO POLICY ON BYOD 17
  • 18. 49% USE PERSONAL DEVICE FOR BOTH WORK AND PLAY 18
  • 19. ONLINE FILE STORAGE BLURS WORK AND PLAY 18% 21% SHARE WITH FRIENDS SHARE WITH FAMILY * * 19
  • 20. Targeted attacks: Likely to get attacked? Small or Medium Organization Large Organization 20
  • 21. Who is most likely to be targeted in an attack? Employee CEO Only 17% of targeted attacks directed at C-Level executives 21
  • 22. STUXNET: thousands of industrial centers infiltrated DENMARK IRAN MALAYSIA 22
  • 23. MAKE THE CONNECTION: Change Behavior 23
  • 24. MAKE THE CONNECTION: Change Behavior • Set PASSWORDS on all devices 24
  • 25. MAKE THE CONNECTION: Change Behavior • Use security and anti-theft SOFTWARE 25
  • 26. MAKE THE CONNECTION: Change Behavior • Be CAUTIOUS: • Don’t friend strangers • Be careful with links • STOP.THINK.CONNECT. 26
  • 30. THANK YOU! Marian Merritt marian@norton.com Copyright © 2013 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. TM