Internet Safety Awareness:
Social, Mobile and Messy
Marian Merritt

Internet Safety: Advocate, Symantec Corporation
Norton...
Why are you here?
Cybercrime is a massive global problem

Cybercrime costs
consumers

$112

billion
each year

1/2
of online adults
have bee...
Why am I here?
What’s really going on with mobile?
Who here checked Facebook today?
Played Angry Birds or Candy Crush on a mobile device?...
What you think you did
vs what actually happened in the background

PREVIOUS SCORES

TIME SPENT
PLAYING

IP ADDRESS

LOCAT...
OK, so I’ll be careful with apps

• , WiFi if not using

7
What’s going on with Social: advertising scams
WHAT YOU SEE

WHY THEY DO IT

8
And malicious social links

Bad Guys Want to Get Us to Click to:
Infect us with malware
Make us take bogus surveys to:
Gai...
Ok, I’ll be careful in social networks and media

10
What is the issue
at stake?
SAVVY ON COMPUTER, LESS SO ON MOBILE
DELETE SUSPICIOUS
EMAILS FROM PEOPLE
THEY DON’T KNOW

HAVE AT LEAST A BASIC
FREE ANTI...
How often do we lose our
mobile devices?

27%
13
What are the chances of
getting your lost phone back?

50%
14
What are the chances of your work and
personal information being looked at?

100%
15
NEARLY ½ MOBILE USERS SLEEP WITH DEVICE
NEARBY

16
36% SAY THEIR COMPANY HAS NO POLICY ON
BYOD

17
49% USE PERSONAL DEVICE FOR BOTH WORK
AND PLAY

18
ONLINE FILE STORAGE BLURS WORK AND PLAY

18%

21%

SHARE WITH
FRIENDS

SHARE WITH
FAMILY

*

*
19
Targeted attacks: Likely to get attacked?

Small or Medium
Organization

Large Organization

20
Who is most likely to be targeted in an attack?

Employee

CEO

Only 17% of targeted attacks directed at C-Level executive...
STUXNET:
thousands of industrial centers infiltrated

DENMARK

IRAN
MALAYSIA

22
MAKE THE CONNECTION: Change Behavior

23
MAKE THE CONNECTION: Change Behavior
• Set PASSWORDS on all devices

24
MAKE THE CONNECTION: Change Behavior
• Use security and anti-theft
SOFTWARE

25
MAKE THE CONNECTION: Change Behavior

• Be CAUTIOUS:
• Don’t friend strangers
• Be careful with links
• STOP.THINK.CONNECT...
Wrap up
What will you do?
Questions
THANK YOU!
Marian Merritt
marian@norton.com

Copyright © 2013 Symantec Corporation. All rights reserved. Symantec and the ...
Upcoming SlideShare
Loading in …5
×

Internet Safety: Social, Mobile, Messy

916 views

Published on

How we use mobile devices increasingly impacts our online safety. Learn quick tips for upping your internet safety savvy and keep your private data secure.

Published in: Technology, Business
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
916
On SlideShare
0
From Embeds
0
Number of Embeds
4
Actions
Shares
0
Downloads
31
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Internet Safety: Social, Mobile, Messy

  1. 1. Internet Safety Awareness: Social, Mobile and Messy Marian Merritt Internet Safety: Advocate, Symantec Corporation Norton Internet Safety Social, Mobile, Messy Marian Merritt, Norton Internet Safety Advocate
  2. 2. Why are you here?
  3. 3. Cybercrime is a massive global problem Cybercrime costs consumers $112 billion each year 1/2 of online adults have been hit by cybercrime 12% More Targeted Attacks employees social media Ransomware New forms of costly malicious threats social network users have each year been hacked 3
  4. 4. Why am I here?
  5. 5. What’s really going on with mobile? Who here checked Facebook today? Played Angry Birds or Candy Crush on a mobile device? 5
  6. 6. What you think you did vs what actually happened in the background PREVIOUS SCORES TIME SPENT PLAYING IP ADDRESS LOCATION GENDER & AGE USER NAME SCORE FACEBOOK FRIEND LIST 6
  7. 7. OK, so I’ll be careful with apps • , WiFi if not using 7
  8. 8. What’s going on with Social: advertising scams WHAT YOU SEE WHY THEY DO IT 8
  9. 9. And malicious social links Bad Guys Want to Get Us to Click to: Infect us with malware Make us take bogus surveys to: Gain information or Sign us up for premium SMS services Send spam to us and our friends 9
  10. 10. Ok, I’ll be careful in social networks and media 10
  11. 11. What is the issue at stake?
  12. 12. SAVVY ON COMPUTER, LESS SO ON MOBILE DELETE SUSPICIOUS EMAILS FROM PEOPLE THEY DON’T KNOW HAVE AT LEAST A BASIC FREE ANTIVIRUS SOLUTION AVOID STORING SENSITIVE FILES ONLINE 90% 72% 78% VS. VS. VS. 60% 42% 53% VS. VS. VS. 56% 33% 48% GOOD JOB! NEEDS WORK! NEEDS WORK!
  13. 13. How often do we lose our mobile devices? 27% 13
  14. 14. What are the chances of getting your lost phone back? 50% 14
  15. 15. What are the chances of your work and personal information being looked at? 100% 15
  16. 16. NEARLY ½ MOBILE USERS SLEEP WITH DEVICE NEARBY 16
  17. 17. 36% SAY THEIR COMPANY HAS NO POLICY ON BYOD 17
  18. 18. 49% USE PERSONAL DEVICE FOR BOTH WORK AND PLAY 18
  19. 19. ONLINE FILE STORAGE BLURS WORK AND PLAY 18% 21% SHARE WITH FRIENDS SHARE WITH FAMILY * * 19
  20. 20. Targeted attacks: Likely to get attacked? Small or Medium Organization Large Organization 20
  21. 21. Who is most likely to be targeted in an attack? Employee CEO Only 17% of targeted attacks directed at C-Level executives 21
  22. 22. STUXNET: thousands of industrial centers infiltrated DENMARK IRAN MALAYSIA 22
  23. 23. MAKE THE CONNECTION: Change Behavior 23
  24. 24. MAKE THE CONNECTION: Change Behavior • Set PASSWORDS on all devices 24
  25. 25. MAKE THE CONNECTION: Change Behavior • Use security and anti-theft SOFTWARE 25
  26. 26. MAKE THE CONNECTION: Change Behavior • Be CAUTIOUS: • Don’t friend strangers • Be careful with links • STOP.THINK.CONNECT. 26
  27. 27. Wrap up
  28. 28. What will you do?
  29. 29. Questions
  30. 30. THANK YOU! Marian Merritt marian@norton.com Copyright © 2013 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. TM

×