SlideShare une entreprise Scribd logo
1  sur  19
Télécharger pour lire hors ligne
EVERYONE WORKED


FROM AN OFFICE
Once upon a time
OUR LANDSCAPE
CHANGED
then…
WORKING REMOTELY
IS NOW THE NEW NORM
Instead of exploiting mobile apps
and infrastructure, criminals focus
on subscribers, and their
likelihood to “tap”.
THE SECURITY INDUSTRY
HASN’T CAUGHT UP WITH
SMS PHISHING YET
“FluBot is likely to continue to spread at a fairly rapid rate, moving
methodically from country to country via a conscious effort by the threat
actors. As long as there are users willing to trust an unexpected SMS
message and follow the threat actors’ provided instructions and prompts,
campaigns such as these will be successful.”
WHILE WAITING FOR THE
SECURITY INDUSTRY TO CATCH
UP, MOBILE OPERATORS ARE
LEFT WITH…
Subscribers should avoid
links from people they don’t
know.
Mobile Operator
s

Everywhere
It’s time to try something different because…
It’s impossible for any security system to detect unknown URLs.


SMS phishing messages don’t contain enough words for AI to detect a
deceptive call-to-action.
๏ Phishing was the most common type of cybercrime in 2020.


๏ 90% of all cyberattacks start with Phishing.


๏ 1.5 million new phishing sites are created every month.


๏ 2020 is the worst year on record for Phishing.


๏ 2021 is on track to become worse than 2020.


๏ 84% of organizations were subject to mobile-based phishing attacks in 2020.


๏ Data suggests that 2022 will be worse than 2021.


๏ Phishing was
fi
rst discovered on the AOL network in 1995.


๏ The web has evolved since 1995, but the approach to anti-phishing security hasn’t.


๏ Advising subscribers to avoid links from people they don’t know is unreliable and ineffective. It
also leads to fewer conversions for brands and banks.


๏ Risk overall loss of A2P SMS revenue.
7 of 19
Subscribers make decisions by
either guessing or using their gut
.

They will be either lucky, or 

very, very wrong.
8 of 19
What’s the


common thread?
Subscribers need help to avoid
links from criminals.
Block dangerous URLs after criminals have caused harm
The Old Way
Prepare
Criminals spend
most of their time
and energy
creating malware,
fake webpages
and deceptive
URLs - in secret.


Their URLs are
unknown to
security vendors.
09:30 It’s Too Late
Test
To make sure their
secret URLs
bypass security,
criminals send a
test message to
themselves.


An attack is only
launched after a
test proves
successful.
Start
The attack is
launched
immediately after
the test passes.


The clock starts
ticking for the
operator and
security vendors at
this point.
Finish
SMS messages
have a 99%
delivery rate within
3 seconds.


Blocking the URL
after this point is
meaningless to
these victims.
Report
Subscribers
complain about a
new scam.


Operator asks for
the “suspicious”
message to be
forwarded to a
short code for
investigation.
Block
URL is
investigated and
added to a
“blocklist”.


Firewall vendors
claim to block
phishing URLs in
“real time”.
Paradoxically, industry is proud of its ability
to block a “new” dangerous URL in “real
time”. Criminals have already swapped it
for a new one and clicked “resend”. Loop!
The URL is
fi
nally blocked
The URL passes through the network to
every handset in less than 3 seconds. It’s
no longer possible to protect subscribers
beyond this point.
It’s all over in 3 seconds
Weeks or Months 08:55
Before launching an attack, criminals test
and verify that their secret URLs are
guaranteed to pass through their


target network of subscribers.
Campaign
09:00 09:00:03
(3 seconds)
10 of 19
Make it easy for subscribers to avoid links from
criminals before harm can be done
The New Way
Prepare
To make sure their
secret URLs
bypass security,
criminals send a
test message to
themselves.


An attack is only
launched after a
test proves
successful.
Test - Fail
Secret URL fails to
authenticate.


Criminals are
redirected to a
caution page.


Criminals will likely
target a network
that’s not protected
by Zero Trust SMS.
Hi Arian, Telus
has a special

o
ff
er on the
War
This URL was not
Don’t Open
If an attack is launched, subscribers are fully
protected. The caution page helps them to avoid
every deceptive link from people they don’t know.
They’re NEVER exposed to a new threat.
Always Safe
The attack will be abandoned before it even
starts. Criminals won’t waste their resources
on a network that doesn’t authenticate any of
their URLs. They will target another network.
Campaign
Z E R O T R U S T
Is https://
dhldelivery.co
veri
fi
ed and safe to
open?
Every dangerous and unknown
URL fails to authenticate and is
replaced with a link to a caution or
block page - before the message
is delivered to subscribers.
Authentication
Weeks or Months 08:55
Hi Arian, Telus has a special

o
ff
er on the new iPhone 11.

As a valued customer you

get a 75% discount. Go to 

telus.o
ff
er.com for details.
Warning!
This URL was not verified by
MetaCert. Proceed with caution
or don’t open it.
Don’t Open Open Anyway
!
12 of 19
๏ Immediate increase in conversion rates for every campaign.


๏ Increased SMS revenue for mobile operators and vendors.


๏ Business and enterprise customers will eventually select
operators that protect their employees from SMS-led attacks
on their networks and customer data.


๏ Brands and banks can build better relationships with
customers.


๏ Best-in-class brand protection for brands and banks.


๏ Reduction in overhead costs for internal security teams.


๏ Signi
fi
cant reduction in overheads associated with anti-fraud
awareness campaigns for operators, brands and banks.
Subscribers can open every link inside
every message, no matter who the sender
is, or where the URL might take them.
MetaCert Bene
fi
ts
13 of 19
Cybersecurity
SMS Firewalls
Email, Team
Collaboration,
Social Media,
Mobile Apps,
Endpoints, and
Networks
SMS
Competitive Landscape for


SMS Cybersecurity
14 of 19
Competitive Landscape for


Zero Trust Cybersecurity
Web/URL
Authentication
Users, Apps,
Devices, & Network
Data
Block


Known


Threats
Zero Trust
MetaCert Competitive Advantages
๏ MetaCert is the
fi
rst “cybersecurity” company in the world to build a security
service for SMS.


๏ MetaCert pioneered the concept of “Zero Trust” for URL & Web Access
Authentication.


๏ MetaCert pioneered the concept of “Zero Trust SMS”.


๏ First security service with anti-phishing awareness built-in for end-users.


๏ It’s 10x faster and easier for an operator to integrate MetaCert than it is to
integrate an SMS Firewall. 90% of the grunt work takes place inside
MetaCert’s infrastructure and authentication system (see diagram).


๏ SMS Firewalls cannot be updated to offer a “Zero Trust” strategy for SMS.
That’s why leading Firewall vendors who recognize the new landscape, are
joining MetaCert’s reseller program.


๏ MetaCert is the only security team in the world that can prove everything it
offers, with a 1 minute virtual demo - demonstrating the entire end-to-end
solution for mobile operators as well as the user experience for subscribers.
15 of 19
Building Better Subscriber Trust
& Brand Reputation
With special access to the MetaCert Verify service, your security team,
business customers, and partners may submit domains, downloads, and
social media accounts for verification. All verified URLs will authenticate
across your network with no need for a software update.
MetaCert has classified tens of billions of URLs


to keep your subscribers safe with Zero Trust security.


But we like to be extra careful.
16 of 19
17 of 19
Zero Trust Authentication server that makes it easy for an
operator to implement “Zero Trust SMS” security. On premise and
cloud-based solutions available.


Threat Intelligence API with 6 lines of code / lookup 50 billion URLs
in 470ms.


Web App that makes it easy for customers and partners to verify their
URLs before launching a marketing campaign.


URL Classification technology that can identify and automatically
classify domains, sub-domains, folders, user accounts, downloads, and
regulated gTLDs like .GOV and .BANKING.


Global Registry of 50 billion URLs, getting bigger and smarter every day.


Regex, AI & Machine-Learning built into monitoring services that
automatically identify phishing threats on social media.


Domain Age Reputation service that automatically checks the
“creation” date of every unknown domain that’s checked by our
Zero Trust authentication system. Domains that are >x-n days old
are automatically classi
fi
ed as “Dangerous” in 250ms.


URL Origin service that automatically
fi
nds the
fi
nal destination of
every URL, irrespective of how many times they redirect, in 50ms.


Proprietary tools, services, and techniques that we can’t share for
security reasons. This is what makes us different.
Malware &


Phishing
Veri
fi
ed by MetaCert
Proprietary Tools


and Techniques
Web


Crawlers
Regex, AI


& ML
Domain


Age


Reputation
Authentication
Zero Trust
Registry


50 Billion


URLs
Infrastructure, Technology & IP
Recognized as one of the "Top 100 CMOs in the
World” Kieran is the Chief Marketing Of


Chair
Sheetal was appointed Chief Strategy Officer in 2021 to the
Gov’t of Alberta, Canada, to provide leadership and guidance
for Alberta’s Recovery Plan. She is focussed on sector-related
strategies that foster investment, technology innovation,
economic policy, and position Alberta globally.


Investor
18 of 19
Board
Co-instigated the Standard for URL Classification at the
W3C in 2004 - the Standards body for the World Wide
Web.


CEO
Paul Walsh


Founder & CEO
To see a 1 minute demo that showcases the entire
end-to-end solution, with your handset, or to request
more information, please contact me directly.
paul@metacert.com
Thank You!

Contenu connexe

Tendances

Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Symantec
 

Tendances (20)

Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
 
Digital Threat Landscape
Digital Threat LandscapeDigital Threat Landscape
Digital Threat Landscape
 
Ey giss-under-cyber-attack
Ey giss-under-cyber-attackEy giss-under-cyber-attack
Ey giss-under-cyber-attack
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017
 
Mobile threat report_q3_2013
Mobile threat report_q3_2013Mobile threat report_q3_2013
Mobile threat report_q3_2013
 
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017
 
Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19
 
ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
 
BLURRING BOUNDARIES
BLURRING BOUNDARIESBLURRING BOUNDARIES
BLURRING BOUNDARIES
 
ISTR Volume 18
ISTR Volume 18ISTR Volume 18
ISTR Volume 18
 
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
 
Cybersecurity Challenges in Retail 2020: How to Prevent Retail Theft
Cybersecurity Challenges in Retail 2020: How to Prevent Retail TheftCybersecurity Challenges in Retail 2020: How to Prevent Retail Theft
Cybersecurity Challenges in Retail 2020: How to Prevent Retail Theft
 
Data Protection & Privacy During the Coronavirus Pandemic
Data Protection & Privacy During the Coronavirus PandemicData Protection & Privacy During the Coronavirus Pandemic
Data Protection & Privacy During the Coronavirus Pandemic
 
Weak Links: Cyber Attacks in the News & How to Protect Your Assets
Weak Links: Cyber Attacks in the News & How to Protect Your AssetsWeak Links: Cyber Attacks in the News & How to Protect Your Assets
Weak Links: Cyber Attacks in the News & How to Protect Your Assets
 
Symantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnlineSymantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnline
 
Email Security Threats: IT Manager's Eyes Only
Email Security Threats: IT Manager's Eyes Only Email Security Threats: IT Manager's Eyes Only
Email Security Threats: IT Manager's Eyes Only
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
Rp quarterly-threat-q3-2013
Rp quarterly-threat-q3-2013Rp quarterly-threat-q3-2013
Rp quarterly-threat-q3-2013
 
Istr number 23 internet security threat repor 2018 symantec
Istr number 23 internet security threat repor 2018 symantecIstr number 23 internet security threat repor 2018 symantec
Istr number 23 internet security threat repor 2018 symantec
 

Similaire à Enabling a Zero Trust strategy for SMS

Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
Mark Lanterman
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
Ben Graybar
 
cybercrime survival guide
cybercrime survival guidecybercrime survival guide
cybercrime survival guide
Gary Gray, MCSE
 

Similaire à Enabling a Zero Trust strategy for SMS (20)

MetaCert Security Sales Deck
MetaCert Security Sales DeckMetaCert Security Sales Deck
MetaCert Security Sales Deck
 
apidays LIVE LONDON - API Abuse - Comprehension and Prevention by David Stewart
apidays LIVE LONDON - API Abuse - Comprehension and Prevention by David Stewartapidays LIVE LONDON - API Abuse - Comprehension and Prevention by David Stewart
apidays LIVE LONDON - API Abuse - Comprehension and Prevention by David Stewart
 
10 ways to protect your e commerce site from hacking & fraud
10 ways to protect your e commerce site from hacking & fraud10 ways to protect your e commerce site from hacking & fraud
10 ways to protect your e commerce site from hacking & fraud
 
Cybersecurity Interview Questions_Part1.pdf
Cybersecurity Interview Questions_Part1.pdfCybersecurity Interview Questions_Part1.pdf
Cybersecurity Interview Questions_Part1.pdf
 
WeDo Technologies Blog 2014
WeDo Technologies Blog 2014WeDo Technologies Blog 2014
WeDo Technologies Blog 2014
 
A Look Into Cyber Security
A Look Into Cyber SecurityA Look Into Cyber Security
A Look Into Cyber Security
 
Avoiding Bad URL's In the Mobile Web
Avoiding Bad URL's In the Mobile WebAvoiding Bad URL's In the Mobile Web
Avoiding Bad URL's In the Mobile Web
 
W verb68
W verb68W verb68
W verb68
 
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
 
Top Cybersecurity Challenges Faced By Fintech Applications! .pdf
Top Cybersecurity Challenges Faced By Fintech Applications! .pdfTop Cybersecurity Challenges Faced By Fintech Applications! .pdf
Top Cybersecurity Challenges Faced By Fintech Applications! .pdf
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
 
Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
 
How to build a highly secure fin tech application
How to build a highly secure fin tech applicationHow to build a highly secure fin tech application
How to build a highly secure fin tech application
 
Check your network security
Check your network securityCheck your network security
Check your network security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Distil Networks Protecting the Telephony Industry
Distil Networks Protecting the Telephony IndustryDistil Networks Protecting the Telephony Industry
Distil Networks Protecting the Telephony Industry
 
cybercrime survival guide
cybercrime survival guidecybercrime survival guide
cybercrime survival guide
 
Unmasking Scam Websites: Ways to Safe Surfing
Unmasking Scam Websites: Ways to Safe SurfingUnmasking Scam Websites: Ways to Safe Surfing
Unmasking Scam Websites: Ways to Safe Surfing
 
Overcome Security Threats Affecting Mobile Financial Solutions 2020
Overcome Security Threats Affecting Mobile Financial Solutions 2020Overcome Security Threats Affecting Mobile Financial Solutions 2020
Overcome Security Threats Affecting Mobile Financial Solutions 2020
 

Plus de Paul Walsh

Plus de Paul Walsh (6)

Chatbots AI and Ethics
Chatbots AI and EthicsChatbots AI and Ethics
Chatbots AI and Ethics
 
What I learned from protecting over 1 million crypto traders and investors fr...
What I learned from protecting over 1 million crypto traders and investors fr...What I learned from protecting over 1 million crypto traders and investors fr...
What I learned from protecting over 1 million crypto traders and investors fr...
 
Cybersecurity in the Crypto World, Hybrid Summit Bangkok 2018
Cybersecurity in the Crypto World, Hybrid Summit Bangkok 2018Cybersecurity in the Crypto World, Hybrid Summit Bangkok 2018
Cybersecurity in the Crypto World, Hybrid Summit Bangkok 2018
 
Block Con 2017 LA
Block Con 2017 LABlock Con 2017 LA
Block Con 2017 LA
 
MetaCert Investor Pitch Deck That Secured $1.2M in Seed Capital (Unedited)
MetaCert Investor Pitch Deck That Secured $1.2M in Seed Capital (Unedited)MetaCert Investor Pitch Deck That Secured $1.2M in Seed Capital (Unedited)
MetaCert Investor Pitch Deck That Secured $1.2M in Seed Capital (Unedited)
 
Slack Meetup New York - How Can We Trust Chatbots?
Slack Meetup New York - How Can We Trust Chatbots?Slack Meetup New York - How Can We Trust Chatbots?
Slack Meetup New York - How Can We Trust Chatbots?
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 

Enabling a Zero Trust strategy for SMS

  • 1. EVERYONE WORKED 
 FROM AN OFFICE Once upon a time
  • 3. WORKING REMOTELY IS NOW THE NEW NORM
  • 4. Instead of exploiting mobile apps and infrastructure, criminals focus on subscribers, and their likelihood to “tap”.
  • 5. THE SECURITY INDUSTRY HASN’T CAUGHT UP WITH SMS PHISHING YET “FluBot is likely to continue to spread at a fairly rapid rate, moving methodically from country to country via a conscious effort by the threat actors. As long as there are users willing to trust an unexpected SMS message and follow the threat actors’ provided instructions and prompts, campaigns such as these will be successful.”
  • 6. WHILE WAITING FOR THE SECURITY INDUSTRY TO CATCH UP, MOBILE OPERATORS ARE LEFT WITH… Subscribers should avoid links from people they don’t know. Mobile Operator s Everywhere
  • 7. It’s time to try something different because… It’s impossible for any security system to detect unknown URLs. SMS phishing messages don’t contain enough words for AI to detect a deceptive call-to-action. ๏ Phishing was the most common type of cybercrime in 2020. ๏ 90% of all cyberattacks start with Phishing. ๏ 1.5 million new phishing sites are created every month. ๏ 2020 is the worst year on record for Phishing. ๏ 2021 is on track to become worse than 2020. ๏ 84% of organizations were subject to mobile-based phishing attacks in 2020. ๏ Data suggests that 2022 will be worse than 2021. ๏ Phishing was fi rst discovered on the AOL network in 1995. ๏ The web has evolved since 1995, but the approach to anti-phishing security hasn’t. ๏ Advising subscribers to avoid links from people they don’t know is unreliable and ineffective. It also leads to fewer conversions for brands and banks. ๏ Risk overall loss of A2P SMS revenue. 7 of 19
  • 8. Subscribers make decisions by either guessing or using their gut . They will be either lucky, or 
 very, very wrong. 8 of 19
  • 9. What’s the 
 common thread? Subscribers need help to avoid links from criminals.
  • 10. Block dangerous URLs after criminals have caused harm The Old Way Prepare Criminals spend most of their time and energy creating malware, fake webpages and deceptive URLs - in secret. Their URLs are unknown to security vendors. 09:30 It’s Too Late Test To make sure their secret URLs bypass security, criminals send a test message to themselves. An attack is only launched after a test proves successful. Start The attack is launched immediately after the test passes. The clock starts ticking for the operator and security vendors at this point. Finish SMS messages have a 99% delivery rate within 3 seconds. Blocking the URL after this point is meaningless to these victims. Report Subscribers complain about a new scam. Operator asks for the “suspicious” message to be forwarded to a short code for investigation. Block URL is investigated and added to a “blocklist”. Firewall vendors claim to block phishing URLs in “real time”. Paradoxically, industry is proud of its ability to block a “new” dangerous URL in “real time”. Criminals have already swapped it for a new one and clicked “resend”. Loop! The URL is fi nally blocked The URL passes through the network to every handset in less than 3 seconds. It’s no longer possible to protect subscribers beyond this point. It’s all over in 3 seconds Weeks or Months 08:55 Before launching an attack, criminals test and verify that their secret URLs are guaranteed to pass through their 
 target network of subscribers. Campaign 09:00 09:00:03 (3 seconds) 10 of 19
  • 11. Make it easy for subscribers to avoid links from criminals before harm can be done The New Way Prepare To make sure their secret URLs bypass security, criminals send a test message to themselves. An attack is only launched after a test proves successful. Test - Fail Secret URL fails to authenticate. Criminals are redirected to a caution page. Criminals will likely target a network that’s not protected by Zero Trust SMS. Hi Arian, Telus has a special o ff er on the War This URL was not Don’t Open If an attack is launched, subscribers are fully protected. The caution page helps them to avoid every deceptive link from people they don’t know. They’re NEVER exposed to a new threat. Always Safe The attack will be abandoned before it even starts. Criminals won’t waste their resources on a network that doesn’t authenticate any of their URLs. They will target another network. Campaign Z E R O T R U S T Is https:// dhldelivery.co veri fi ed and safe to open? Every dangerous and unknown URL fails to authenticate and is replaced with a link to a caution or block page - before the message is delivered to subscribers. Authentication Weeks or Months 08:55
  • 12. Hi Arian, Telus has a special o ff er on the new iPhone 11. As a valued customer you get a 75% discount. Go to telus.o ff er.com for details. Warning! This URL was not verified by MetaCert. Proceed with caution or don’t open it. Don’t Open Open Anyway ! 12 of 19 ๏ Immediate increase in conversion rates for every campaign. ๏ Increased SMS revenue for mobile operators and vendors. ๏ Business and enterprise customers will eventually select operators that protect their employees from SMS-led attacks on their networks and customer data. ๏ Brands and banks can build better relationships with customers. ๏ Best-in-class brand protection for brands and banks. ๏ Reduction in overhead costs for internal security teams. ๏ Signi fi cant reduction in overheads associated with anti-fraud awareness campaigns for operators, brands and banks. Subscribers can open every link inside every message, no matter who the sender is, or where the URL might take them. MetaCert Bene fi ts
  • 13. 13 of 19 Cybersecurity SMS Firewalls Email, Team Collaboration, Social Media, Mobile Apps, Endpoints, and Networks SMS Competitive Landscape for SMS Cybersecurity
  • 14. 14 of 19 Competitive Landscape for Zero Trust Cybersecurity Web/URL Authentication Users, Apps, Devices, & Network Data Block 
 Known 
 Threats Zero Trust
  • 15. MetaCert Competitive Advantages ๏ MetaCert is the fi rst “cybersecurity” company in the world to build a security service for SMS. ๏ MetaCert pioneered the concept of “Zero Trust” for URL & Web Access Authentication. ๏ MetaCert pioneered the concept of “Zero Trust SMS”. ๏ First security service with anti-phishing awareness built-in for end-users. ๏ It’s 10x faster and easier for an operator to integrate MetaCert than it is to integrate an SMS Firewall. 90% of the grunt work takes place inside MetaCert’s infrastructure and authentication system (see diagram). ๏ SMS Firewalls cannot be updated to offer a “Zero Trust” strategy for SMS. That’s why leading Firewall vendors who recognize the new landscape, are joining MetaCert’s reseller program. ๏ MetaCert is the only security team in the world that can prove everything it offers, with a 1 minute virtual demo - demonstrating the entire end-to-end solution for mobile operators as well as the user experience for subscribers. 15 of 19
  • 16. Building Better Subscriber Trust & Brand Reputation With special access to the MetaCert Verify service, your security team, business customers, and partners may submit domains, downloads, and social media accounts for verification. All verified URLs will authenticate across your network with no need for a software update. MetaCert has classified tens of billions of URLs 
 to keep your subscribers safe with Zero Trust security. 
 But we like to be extra careful. 16 of 19
  • 17. 17 of 19 Zero Trust Authentication server that makes it easy for an operator to implement “Zero Trust SMS” security. On premise and cloud-based solutions available. Threat Intelligence API with 6 lines of code / lookup 50 billion URLs in 470ms. Web App that makes it easy for customers and partners to verify their URLs before launching a marketing campaign. URL Classification technology that can identify and automatically classify domains, sub-domains, folders, user accounts, downloads, and regulated gTLDs like .GOV and .BANKING. Global Registry of 50 billion URLs, getting bigger and smarter every day. Regex, AI & Machine-Learning built into monitoring services that automatically identify phishing threats on social media. Domain Age Reputation service that automatically checks the “creation” date of every unknown domain that’s checked by our Zero Trust authentication system. Domains that are >x-n days old are automatically classi fi ed as “Dangerous” in 250ms. URL Origin service that automatically fi nds the fi nal destination of every URL, irrespective of how many times they redirect, in 50ms. Proprietary tools, services, and techniques that we can’t share for security reasons. This is what makes us different. Malware & 
 Phishing Veri fi ed by MetaCert Proprietary Tools and Techniques Web 
 Crawlers Regex, AI 
 & ML Domain 
 Age 
 Reputation Authentication Zero Trust Registry 
 50 Billion 
 URLs Infrastructure, Technology & IP
  • 18. Recognized as one of the "Top 100 CMOs in the World” Kieran is the Chief Marketing Of Chair Sheetal was appointed Chief Strategy Officer in 2021 to the Gov’t of Alberta, Canada, to provide leadership and guidance for Alberta’s Recovery Plan. She is focussed on sector-related strategies that foster investment, technology innovation, economic policy, and position Alberta globally. Investor 18 of 19 Board Co-instigated the Standard for URL Classification at the W3C in 2004 - the Standards body for the World Wide Web. CEO
  • 19. Paul Walsh 
 Founder & CEO To see a 1 minute demo that showcases the entire end-to-end solution, with your handset, or to request more information, please contact me directly. paul@metacert.com Thank You!