Intro Cybersecurity
Security Awarness
Social Engineering Red Flags
manipulating, influencing or decieve
Spot Red Flags
I. Why hackers do what they do
- money
- creating tension
- corporate espionate
- personal entertainment
75B devices connected online
How to stop them
II. different types of social eng
- Phishing
Pretexting - gather info on social media
Quid Pro Quo - getting something in exchange for something
Goal: trick you to give away sensitive information
Spear fishing
- get you to react
- verify sus msg
- Emails
- Untrustworthy characters within your organization
22% insider breachers (medical, finance, public admin)
Thread Landscape:
stay alert and skeptical
Types of attacks
ID specific actions to reduce risk
Goal of social eng:
- gain your trust and then exploit you
- to get info they want
Smishing
- phishing from texts
Disinformation
- decieve and receieve
Cellphone towers, after a disinformation
MalWare:
data breaches, org's network is broken into
info is sold to other bad actors for a profit
randsomeware - scrambles data in your computer and then the ransome is paid
Spyware:
- infect devices
- gather info about you
Malicious Apps
- update to your fave apps
- download app
- hackers hide program
III. Spotting red flags in email
- payroll, holiday, policy changes
Mining personal information in online social
Employees falling to attacks:
- fired
- fined
actions to take for protection
Business risk:
- global cost of cybercrims is $11.4M / min
- cyberattacks seen an 80% increase 2020-2022
- orgs fall victim to cybercrime every 11 sec
Attack Examples
http - directions on how info is transfered across the internet
http(s) - s is secure connection
Public Wifi/Coffeeshops
- unsecure wifi connections
- never connect to public wifi or create a VPN
Tailgating - pretending to be an employee and coming in to access computer
Flash Drive Attacks
Vishing - voice phising to social eng someone. Hacker has you call a fake support number
Questions:
what VPN option do we have