SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Delivering IT Peace of MindSM
The
Art
of
Phishing
Delivering IT Peace of MindSM
Our Speaker
• Oversees corporate Information
Security programs
• 10+ years with mindSHIFT
• Bachelor’s degree in Information
and Technology Management
• Certifications: CISSP, MCSE,
CCNA, ITIL v3
Matt Lunzer
Director of Information Security
mindSHIFT Technologies
Delivering IT Peace of MindSM
Agenda
The Art of War
What Is Phishing?
Why Is It So Successful?
Preparing and Defending
Advanced Security Measures
About mindSHIFT – What We Can Do
Agenda
Delivering IT Peace of MindSM
• The Art of War is an ancient Chinese military
treatise attributed to Sun Tzu, a high-ranking
military general, strategist and tactician
• Composed of 13 chapters, each of which is
devoted to one aspect of warfare
• A definitive work on military strategy and
tactics
• For more information, “Google” it!
The Art of War
Delivering IT Peace of MindSM
“All warfare is based on
deception.”
― Sun Tzu, The Art of War
Social Engineering:
The clever manipulation of the
natural human tendency to
trust.
What is Phishing?
Click Here: for the full webinar, including audio.
Delivering IT Peace of MindSM
“Engage people with what they expect; it is what they are able to
discern and confirms their projections. It settles them into
predictable patterns of response, occupying their minds while you
wait for the extraordinary moment — that which they cannot
anticipate.”
― Sun Tzu, The Art of War
Why Is It So Successful?
Click Here: for the full webinar, including audio.
Delivering IT Peace of MindSM
Why Is It So Successful?
http://www.mcafee.com/us/resources/misc/infographic-click-protect.pdf
http://www.verizonenterprise.com/DBIR/2015/
95% of all enterprise network
attacks the results of
successful spear phishing
Email based attacks
accounted for 79% of social
breaches in 2012
23% of recipients open
phishing messages and 11%
click on links and attachments
Click Here: for the full webinar, including audio.
Delivering IT Peace of MindSM
Phishing Example
Click Here: for the full webinar, including audio.
Delivering IT Peace of MindSM
The Rise of Phishing!
http://www.verizonenterprise.com/DBIR/2015/
Click Here: for the full webinar, including audio.
Delivering IT Peace of MindSM
Ransomware
Some phishing attacks, such as Ransomware go after data
If you see this, not good!
Click Here: for the full webinar, including audio.
Delivering IT Peace of MindSM
“The supreme art
of war is to
subdue the
enemy without
fighting.”
― Sun Tzu,
The Art of War
Preparing and Defending
Click Here: for the full webinar, including audio.
Delivering IT Peace of MindSM
Data Protection
•Validate Backups
•Verify Frequency
•Test Restores
Click Here: for the full webinar, including audio.
Delivering IT Peace of MindSM
“One of the most effective ways you can minimize
the phishing threat is through awareness and
training.”
—Lance Spitzner, Training Director, SANS Securing The Human
Training
Click Here: for the full webinar, including audio.
Delivering IT Peace of MindSM
•Establish a security awareness program
•Utilize resources on the Internet
•Focus on social engineering, specifically phishing
Training
Click Here: for the full webinar, including audio.
Delivering IT Peace of MindSM
Defense Measures - Patching
Patch your systems!
• Windows Updates
• Internet Explorer
• Flash
• Java
• Third Party Browsers
• Line of Business applications
Click Here: for the full webinar, including audio.
Delivering IT Peace of MindSM
Anti-SpamVirus
•Defense in Depth Tools
– Anti-Spam
– Anti-Virus
•Verify operational
effectiveness
•Check with your
vendors regularly for
updated features
Click Here: for the full webinar, including audio.
Delivering IT Peace of MindSM
Advanced Security Measures
•Beyond Defense in Depth
Tools
•Tools that do not rely
solely on “signature
technology”
•Focus on tools that
directly target phishing
•Consider adoption of
Security behavioral
management tools
Click Here: for the full webinar, including audio.
Delivering IT Peace of MindSM
Conclusion
“The greatest victory is that which
requires no battle.”
― Sun Tzu, The Art of War
Click Here: for the full webinar, including audio.
Delivering IT Peace of MindSM
Who is mindSHIFT?
• vCIO Technology Steering
• Cloud Strategy Consulting
• Application Development
• Content Management System
Design & Development
• General IT Projects
• SharePoint Solutions
Cloud Services
Data Center Services Professional Services
Managed IT Services
• Server Management
• Network Management
• Desktop / Laptop Management
• Mobile Device Management
• Data Protection & Backup
• 7x24 Support
• cloudSHIFT® Server
• cloudSHIFT® Desktop
• cloudSHIFT® VoIP
• cloudSHIFT® Private Cloud
• Office 365
• cloudSHIFT® IBM i Series
• AWS (Amazon Web Services)
• Managed Hosting
• Disaster Recovery
• IBM i Series Management
• AS/400 Management
• Colocation
• Web Hosting
• Content Management Systems
Click Here: for the full webinar, including audio.
Delivering IT Peace of MindSM
Thank You
Find Us
Click Here For More Information
Please contact us with questions at:
info@mindSHIFT.com
www.mindSHIFT.com
877-227-5054

Weitere ähnliche Inhalte

Andere mochten auch

PSYCHO VIDEO SLIDES
PSYCHO VIDEO SLIDESPSYCHO VIDEO SLIDES
PSYCHO VIDEO SLIDESLillian June
 
PSYCHO ASSIGNMENTS BRIEF SLIDES
PSYCHO ASSIGNMENTS BRIEF SLIDESPSYCHO ASSIGNMENTS BRIEF SLIDES
PSYCHO ASSIGNMENTS BRIEF SLIDESLillian June
 
Office365 vs Hosted Exchange: Migrations Made Easy
Office365 vs Hosted Exchange: Migrations Made EasyOffice365 vs Hosted Exchange: Migrations Made Easy
Office365 vs Hosted Exchange: Migrations Made EasymindSHIFT Technologies Inc.
 
ENG II ASSIGNMENT 1 BRIEF
ENG II ASSIGNMENT 1 BRIEFENG II ASSIGNMENT 1 BRIEF
ENG II ASSIGNMENT 1 BRIEFLillian June
 
Bergkamp Advantage SMART Patching
Bergkamp Advantage SMART PatchingBergkamp Advantage SMART Patching
Bergkamp Advantage SMART PatchingCrystal Lance
 
Apple x fbi o que está acontecendo-
Apple x fbi   o que está acontecendo-Apple x fbi   o que está acontecendo-
Apple x fbi o que está acontecendo-Thiago Escobar
 
The grand design hawking, mlodinow (2010)
The grand design   hawking, mlodinow (2010)The grand design   hawking, mlodinow (2010)
The grand design hawking, mlodinow (2010)drdvinod
 

Andere mochten auch (10)

PSYCHO VIDEO SLIDES
PSYCHO VIDEO SLIDESPSYCHO VIDEO SLIDES
PSYCHO VIDEO SLIDES
 
PSYCHO ASSIGNMENTS BRIEF SLIDES
PSYCHO ASSIGNMENTS BRIEF SLIDESPSYCHO ASSIGNMENTS BRIEF SLIDES
PSYCHO ASSIGNMENTS BRIEF SLIDES
 
Office365 vs Hosted Exchange: Migrations Made Easy
Office365 vs Hosted Exchange: Migrations Made EasyOffice365 vs Hosted Exchange: Migrations Made Easy
Office365 vs Hosted Exchange: Migrations Made Easy
 
ISE_Newsletter_2011
ISE_Newsletter_2011ISE_Newsletter_2011
ISE_Newsletter_2011
 
ENG II ASSIGNMENT 1 BRIEF
ENG II ASSIGNMENT 1 BRIEFENG II ASSIGNMENT 1 BRIEF
ENG II ASSIGNMENT 1 BRIEF
 
Bergkamp Advantage SMART Patching
Bergkamp Advantage SMART PatchingBergkamp Advantage SMART Patching
Bergkamp Advantage SMART Patching
 
Mirror in the_water
Mirror in the_waterMirror in the_water
Mirror in the_water
 
Apple x fbi o que está acontecendo-
Apple x fbi   o que está acontecendo-Apple x fbi   o que está acontecendo-
Apple x fbi o que está acontecendo-
 
The grand design hawking, mlodinow (2010)
The grand design   hawking, mlodinow (2010)The grand design   hawking, mlodinow (2010)
The grand design hawking, mlodinow (2010)
 
Foto fenomenální ,h1
Foto fenomenální  ,h1Foto fenomenální  ,h1
Foto fenomenální ,h1
 

Kürzlich hochgeladen

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 

Kürzlich hochgeladen (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

The Art of Phishing

  • 1. Delivering IT Peace of MindSM The Art of Phishing
  • 2. Delivering IT Peace of MindSM Our Speaker • Oversees corporate Information Security programs • 10+ years with mindSHIFT • Bachelor’s degree in Information and Technology Management • Certifications: CISSP, MCSE, CCNA, ITIL v3 Matt Lunzer Director of Information Security mindSHIFT Technologies
  • 3. Delivering IT Peace of MindSM Agenda The Art of War What Is Phishing? Why Is It So Successful? Preparing and Defending Advanced Security Measures About mindSHIFT – What We Can Do Agenda
  • 4. Delivering IT Peace of MindSM • The Art of War is an ancient Chinese military treatise attributed to Sun Tzu, a high-ranking military general, strategist and tactician • Composed of 13 chapters, each of which is devoted to one aspect of warfare • A definitive work on military strategy and tactics • For more information, “Google” it! The Art of War
  • 5. Delivering IT Peace of MindSM “All warfare is based on deception.” ― Sun Tzu, The Art of War Social Engineering: The clever manipulation of the natural human tendency to trust. What is Phishing? Click Here: for the full webinar, including audio.
  • 6. Delivering IT Peace of MindSM “Engage people with what they expect; it is what they are able to discern and confirms their projections. It settles them into predictable patterns of response, occupying their minds while you wait for the extraordinary moment — that which they cannot anticipate.” ― Sun Tzu, The Art of War Why Is It So Successful? Click Here: for the full webinar, including audio.
  • 7. Delivering IT Peace of MindSM Why Is It So Successful? http://www.mcafee.com/us/resources/misc/infographic-click-protect.pdf http://www.verizonenterprise.com/DBIR/2015/ 95% of all enterprise network attacks the results of successful spear phishing Email based attacks accounted for 79% of social breaches in 2012 23% of recipients open phishing messages and 11% click on links and attachments Click Here: for the full webinar, including audio.
  • 8. Delivering IT Peace of MindSM Phishing Example Click Here: for the full webinar, including audio.
  • 9. Delivering IT Peace of MindSM The Rise of Phishing! http://www.verizonenterprise.com/DBIR/2015/ Click Here: for the full webinar, including audio.
  • 10. Delivering IT Peace of MindSM Ransomware Some phishing attacks, such as Ransomware go after data If you see this, not good! Click Here: for the full webinar, including audio.
  • 11. Delivering IT Peace of MindSM “The supreme art of war is to subdue the enemy without fighting.” ― Sun Tzu, The Art of War Preparing and Defending Click Here: for the full webinar, including audio.
  • 12. Delivering IT Peace of MindSM Data Protection •Validate Backups •Verify Frequency •Test Restores Click Here: for the full webinar, including audio.
  • 13. Delivering IT Peace of MindSM “One of the most effective ways you can minimize the phishing threat is through awareness and training.” —Lance Spitzner, Training Director, SANS Securing The Human Training Click Here: for the full webinar, including audio.
  • 14. Delivering IT Peace of MindSM •Establish a security awareness program •Utilize resources on the Internet •Focus on social engineering, specifically phishing Training Click Here: for the full webinar, including audio.
  • 15. Delivering IT Peace of MindSM Defense Measures - Patching Patch your systems! • Windows Updates • Internet Explorer • Flash • Java • Third Party Browsers • Line of Business applications Click Here: for the full webinar, including audio.
  • 16. Delivering IT Peace of MindSM Anti-SpamVirus •Defense in Depth Tools – Anti-Spam – Anti-Virus •Verify operational effectiveness •Check with your vendors regularly for updated features Click Here: for the full webinar, including audio.
  • 17. Delivering IT Peace of MindSM Advanced Security Measures •Beyond Defense in Depth Tools •Tools that do not rely solely on “signature technology” •Focus on tools that directly target phishing •Consider adoption of Security behavioral management tools Click Here: for the full webinar, including audio.
  • 18. Delivering IT Peace of MindSM Conclusion “The greatest victory is that which requires no battle.” ― Sun Tzu, The Art of War Click Here: for the full webinar, including audio.
  • 19. Delivering IT Peace of MindSM Who is mindSHIFT? • vCIO Technology Steering • Cloud Strategy Consulting • Application Development • Content Management System Design & Development • General IT Projects • SharePoint Solutions Cloud Services Data Center Services Professional Services Managed IT Services • Server Management • Network Management • Desktop / Laptop Management • Mobile Device Management • Data Protection & Backup • 7x24 Support • cloudSHIFT® Server • cloudSHIFT® Desktop • cloudSHIFT® VoIP • cloudSHIFT® Private Cloud • Office 365 • cloudSHIFT® IBM i Series • AWS (Amazon Web Services) • Managed Hosting • Disaster Recovery • IBM i Series Management • AS/400 Management • Colocation • Web Hosting • Content Management Systems Click Here: for the full webinar, including audio.
  • 20. Delivering IT Peace of MindSM Thank You Find Us Click Here For More Information Please contact us with questions at: info@mindSHIFT.com www.mindSHIFT.com 877-227-5054