Upload
others
View
0
Download
0
Embed Size (px)
Citation preview
Online and Under Attack – Guarding your Family and Financial Assets
Hart Brown, CORP, CBCP, CEH, CLCS, LPQ
SVP, Practice Leader – Organizational Resilience
HUB International
“Targeting”
hubinternational.com 2
How
Social Engineering
Internet
Data Breaches
Travel
Why
Fun/Vandalism
ID Fraud
Reputation
Financial Manipulation
Cyber Extortion
Burglary, K&R
Source: Kaspersky Cyberthreat Real-Time Map
Source: Google Digital Attack Map
Vishing
hubinternational.com 3
Online Communications
4
Email, SMS, Social Media
Problems
Overly Connected
Phishing
Smishing
Whaling
E-Mail Compromise
Options
2 Factor Authentication
Multiple Emails
Secure Email Service
IM Chat Security
Adapted from Krebsonsecurity.com
hubinternational.com
SET
5
hubinternational.com
Web Based Interactions
hubinternational.com 6
Password Strength
Social Media Rules
Avoid Public Wi-Fi
Secure Browser
Securing Mobile Devices
Bluejacking
“Sync”
Updates
Different Phones
Different Computers
Source: Private Wifi
Source: Kapersky
WiFi
7
hubinternational.com
Travel
hubinternational.com 8
Single Password
“Juice Jacking”
Internet Connections
Executive Targeting
Hotels
Corporate Espionage
Economic Espionage
Transfer Money Spoofing
Email Spoofing
Virtual Kidnapping
Kidnapping & Ransom
Internet of Things
hubinternational.com 9
Problems
Pre-Determined Passwords
Open Connections
Liability
Cyber to Physical World
Data Breaches
Safety Levels
Misuse
Extortion
Source: Libelium
Additional Resources
10
http://www.hubcyberrisk.com
hubinternational.com
HUB Cyber Risk Solutions HUB Personal Insurance HUB Crisis Management
http://www.hubinternational.com/p
ersonal-insurance/
http://www.hubinternational.com/c
risis-management/
Q & A
Hart S. Brown, CORP, CBCP, CEH, CLCS, LPQ
SVP, Practice Leader – Organizational Resilience
214-855-5650
HUB International
12 hubinternational.com