25
9/18/13 (C) Copyright 2010 John D. Sileo www.ThinkLikeASpy.com 1 Data spies, hackers & online attackers John Sileo, CEO of Sileo.com Thank You Canada

Data spies, hackers & online attackers

  • Upload
    others

  • View
    5

  • Download
    0

Embed Size (px)

Citation preview

9/18/13

(C) Copyright 2010 John D. Sileo www.ThinkLikeASpy.com 1

Data spies,!hackers!& online!attackers!

John Sileo, CEO of Sileo.com

Thank You Canada!

9/18/13

(C) Copyright 2010 John D. Sileo www.ThinkLikeASpy.com 2

Data spies,!hackers!& online!attackers!

John Sileo, CEO of Sileo.com

9/18/13

(C) Copyright 2010 John D. Sileo www.ThinkLikeASpy.com 3

I’m open to learning. HUMILITY

What ! is ! Your! Why? !

9/18/13

(C) Copyright 2010 John D. Sileo www.ThinkLikeASpy.com 4

I am responsible. OWNERSHIP

Identity (Data Theft)

Humanity (Fraud)

Technology (Cyber)

Mobility (Devices)

Internet (Online Privacy)

Digital Footprint Factors

9/18/13

(C) Copyright 2010 John D. Sileo www.ThinkLikeASpy.com 5

Identity (Data Theft)

Humanity (Fraud)

Technology (Cyber)

Mobility (Devices)

Internet (Online Privacy)

Digital Footprint Factor 2

HUMILITY OWNERSHIP

INSTINCT CONTROL TARGET

LEVERAGE REVERSAL

BLACK BELT PRIVACY

DEFENDING THE HUMAN ELEMENT

9/18/13

(C) Copyright 2010 John D. Sileo www.ThinkLikeASpy.com 6

I sense danger. INSTINCT

HHooggwwaasshh!! !!

9/18/13

(C) Copyright 2010 John D. Sileo www.ThinkLikeASpy.com 7

SOCIAL ENGINEERING

Authority

“I just need a bit of your information"!

Flattery Hurry

Fear Bribery

Compassion

!

I take charge. CONTROL

9/18/13

(C) Copyright 2010 John D. Sileo www.ThinkLikeASpy.com 8

QUESTIONS

EXPOSE

DECEPTION

It can happen to me. HUMILITY

I am responsible. OWNERSHIP

I sense danger. INSTINCT

I take charge. CONTROL

9/18/13

(C) Copyright 2010 John D. Sileo www.ThinkLikeASpy.com 9

I prioritize. TARGET

Identity (Data Theft)

Humanity (Fraud)

Technology (Cyber)

Mobility (Devices)

Internet (Online Privacy)

Digital Footprint Factor 4

9/18/13

(C) Copyright 2010 John D. Sileo www.ThinkLikeASpy.com 10

And this?

9/18/13

(C) Copyright 2010 John D. Sileo www.ThinkLikeASpy.com 11

Your “phone” is!

100,000X!more powerful!

“5588%% of the organizations !in a recent Ponemon study

experienced ddaattaa lloossss resulting from employee use of insecure mobile devices,

including laptops, smartphones, USB devices and

tablets.”

-Ponemon Institute “2012 Global Study on Mobility Risks”

9/18/13

(C) Copyright 2010 John D. Sileo www.ThinkLikeASpy.com 12

“Canada & Italy ranked !the highest out of the !12 countries surveyed !for mobile data loss.”

-Ponemon Institute “2012 Global Study on Mobility Risks”

!Control !

the Device!!

9/18/13

(C) Copyright 2010 John D. Sileo www.ThinkLikeASpy.com 13

CChhaannggee DDeeffaauulltt SSeettttiinnggss!!

Turn on your!pass!code!

9/18/13

(C) Copyright 2010 John D. Sileo www.ThinkLikeASpy.com 14

Enable!remote!

tracking!and!

wiping!

9/18/13

(C) Copyright 2010 John D. Sileo www.ThinkLikeASpy.com 15

WWPPAA22++ ((AAEESS))!!

Tether them Together

9/18/13

(C) Copyright 2010 John D. Sileo www.ThinkLikeASpy.com 16

PPAATTHH OOFF SSLLIIGGHHTTLLYY EELLEEVVAATTEEDD RREESSIISSTTAANNCCEE Criminals Attack the Path of Least Resistance

Identity (Data Theft)

Humanity (Fraud)

Technology (Cyber)

Mobility (Devices)

Internet (Online Privacy)

Digital Footprint Factor 5

9/18/13

(C) Copyright 2010 John D. Sileo www.ThinkLikeASpy.com 17

+ Public Private

!Dedicate browser to sensitive surfing ! Log out of search & social networks ! Install password protection software !Require two-step logins (multi-factor) !Turn on private browsing & DoNotTrack !Disable JavaScript by default & opt-in !Deny & auto-delete tracking cookies ! Leverage child controls to limit sites !Install anonymizing & privacy plug-ins !Mask your IP address & location

Steps to Build a Private Browser!

9/18/13

(C) Copyright 2010 John D. Sileo www.ThinkLikeASpy.com 18

Utilize!Password!Protection!Software !(Wisely)!

22--SStteepp VVeerriifificcaattiioonn!!

9/18/13

(C) Copyright 2010 John D. Sileo www.ThinkLikeASpy.com 19

Identity (Data Theft)

Humanity (Fraud)

Technology (Cyber)

Mobility (Devices)

Internet (Social Media)

Digital Footprint Factor 5

9/18/13

(C) Copyright 2010 John D. Sileo www.ThinkLikeASpy.com 20

Are you Tweeting your troop locations?

PPuubblliicc

PPeerrmmaanneenntt

PPoowweerrffuull

9/18/13

(C) Copyright 2010 John D. Sileo www.ThinkLikeASpy.com 21

30%!

9/18/13

(C) Copyright 2010 John D. Sileo www.ThinkLikeASpy.com 22

9/18/13

(C) Copyright 2010 John D. Sileo www.ThinkLikeASpy.com 23

“60 Minutes” Rule!

9/18/13

(C) Copyright 2010 John D. Sileo www.ThinkLikeASpy.com 24

ACTION PLAN !! Freeze your credit (email)!!! Turn on smartphone passcode!!! Enable remote tracking & wiping!!! Delete unnecessary mobile apps!!! Tether your mobile devices!!! Change default mobile settings!!! Spend 60 minutes in FB privacy!!! Create a private browser (video)!!! Monitor footprint w/ Google Alerts!

REVERSAL

9/18/13

(C) Copyright 2010 John D. Sileo www.ThinkLikeASpy.com 25