SlideShare a Scribd company logo
1 of 13
Download to read offline
Email Insecurities

An Ethical Hacker’s View




                     Peter Wood
                 Chief Executive Officer
               First•Base Technologies
Who am I ?

 • Worked in computers & electronics since 1969
 • Founded First•Base Technologies in 1989
          (one of the first ethical hacking firms)
 • Primary roles:
          - Social engineer & penetration tester
          - Conference speaker
          - TV and radio security ‘expert’
          - Member of ISACA Security Advisory Group
          - ISACA Conference Task Force member
          - Expert at the Corporate Executive Programme
          - Chair of Advisory board at CSA UK & Ireland



Slide 2                                                   © First Base Technologies 2011
Slide 3   © First Base Technologies 2011
Poor email password?




Slide 4                     © First Base Technologies 2011
Poor email password?




Slide 5                     © First Base Technologies 2011
Slide 6   © First Base Technologies 2011
Data Loss Prevention?




Slide 7                      © First Base Technologies 2011
Data Loss Prevention?




Slide 8                      © First Base Technologies 2011
Data Loss Prevention?




Slide 9                      © First Base Technologies 2011
Where is your email stored?




Slide 10                         © First Base Technologies 2011
Slide 11   © First Base Technologies 2011
The consequences?




Slide 12                   © First Base Technologies 2011
Need more information?


              Peter Wood
           Chief Executive Officer
      First•Base Technologies LLP

           peterw@firstbase.co.uk
             Twitter: peterwoodx
           Blog: fpws.blogspot.com
            http://firstbase.co.uk
           http://white-hats.co.uk
            http://peterwood.com




Slide 13                             © First Base Technologies 2011

More Related Content

Viewers also liked

mY namE is rAiNe..
mY namE is rAiNe..mY namE is rAiNe..
mY namE is rAiNe..
RAine PAbleo
 
The Ultimate Defence - Think Like a Hacker
The Ultimate Defence - Think Like a HackerThe Ultimate Defence - Think Like a Hacker
The Ultimate Defence - Think Like a Hacker
Peter Wood
 
Pg bahasa malaysia sk thn 4
Pg bahasa malaysia sk thn 4Pg bahasa malaysia sk thn 4
Pg bahasa malaysia sk thn 4
Ina Salinah
 
Fortios v5.0-patch-release-7-release-notes
Fortios v5.0-patch-release-7-release-notesFortios v5.0-patch-release-7-release-notes
Fortios v5.0-patch-release-7-release-notes
venkadesh Prasath
 

Viewers also liked (19)

mY namE is rAiNe..
mY namE is rAiNe..mY namE is rAiNe..
mY namE is rAiNe..
 
Security Testing in an Age of Austerity
Security Testing in an Age of AusteritySecurity Testing in an Age of Austerity
Security Testing in an Age of Austerity
 
Network Security - Real and Present Dangers
Network Security - Real and Present DangersNetwork Security - Real and Present Dangers
Network Security - Real and Present Dangers
 
Pragmatic Network Security - Avoiding Real-World Vulnerabilities
Pragmatic Network Security - Avoiding Real-World VulnerabilitiesPragmatic Network Security - Avoiding Real-World Vulnerabilities
Pragmatic Network Security - Avoiding Real-World Vulnerabilities
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate IT
 
The Ultimate Defence - Think Like a Hacker
The Ultimate Defence - Think Like a HackerThe Ultimate Defence - Think Like a Hacker
The Ultimate Defence - Think Like a Hacker
 
Infosec 2014: Capita Customer Management: Network Visibility to Manage Firewa...
Infosec 2014: Capita Customer Management: Network Visibility to Manage Firewa...Infosec 2014: Capita Customer Management: Network Visibility to Manage Firewa...
Infosec 2014: Capita Customer Management: Network Visibility to Manage Firewa...
 
Hacking case-studies
Hacking case-studiesHacking case-studies
Hacking case-studies
 
Developingand assessing schoolculture
Developingand assessing schoolcultureDevelopingand assessing schoolculture
Developingand assessing schoolculture
 
Hadware
HadwareHadware
Hadware
 
Hoopsfix All Star Classic 2014 Programme
Hoopsfix All Star Classic 2014 ProgrammeHoopsfix All Star Classic 2014 Programme
Hoopsfix All Star Classic 2014 Programme
 
Rpt sivik th 6
Rpt sivik th 6Rpt sivik th 6
Rpt sivik th 6
 
Security in a Virtualised Environment
Security in a Virtualised EnvironmentSecurity in a Virtualised Environment
Security in a Virtualised Environment
 
Top Five Internal Security Vulnerabilities
Top Five Internal Security VulnerabilitiesTop Five Internal Security Vulnerabilities
Top Five Internal Security Vulnerabilities
 
The Cloud Security Landscape
The Cloud Security LandscapeThe Cloud Security Landscape
The Cloud Security Landscape
 
Emerging Threats and Attack Surfaces
Emerging Threats and Attack SurfacesEmerging Threats and Attack Surfaces
Emerging Threats and Attack Surfaces
 
Pg bahasa malaysia sk thn 4
Pg bahasa malaysia sk thn 4Pg bahasa malaysia sk thn 4
Pg bahasa malaysia sk thn 4
 
Unpatched Systems: An Ethical Hacker's View
Unpatched Systems: An Ethical Hacker's ViewUnpatched Systems: An Ethical Hacker's View
Unpatched Systems: An Ethical Hacker's View
 
Fortios v5.0-patch-release-7-release-notes
Fortios v5.0-patch-release-7-release-notesFortios v5.0-patch-release-7-release-notes
Fortios v5.0-patch-release-7-release-notes
 

Similar to Use of Personal Email for Business

Top 5 myths of it security in the light of current events tisa pro talk 4 2554
Top 5 myths of it security in the light of current events tisa pro talk 4 2554Top 5 myths of it security in the light of current events tisa pro talk 4 2554
Top 5 myths of it security in the light of current events tisa pro talk 4 2554
TISA
 
Smart Factory Technology Road Mapping Initiative_The Intent of Things and Ana...
Smart Factory Technology Road Mapping Initiative_The Intent of Things and Ana...Smart Factory Technology Road Mapping Initiative_The Intent of Things and Ana...
Smart Factory Technology Road Mapping Initiative_The Intent of Things and Ana...
Paul Fechtelkotter
 
Peter Ramacher EOA 2014 v4
Peter Ramacher EOA 2014 v4Peter Ramacher EOA 2014 v4
Peter Ramacher EOA 2014 v4
Peter Ramacher
 
E gov security_tut_session_1
E gov security_tut_session_1E gov security_tut_session_1
E gov security_tut_session_1
Mustafa Jarrar
 
Anup Bootstrapping Feb9th
Anup Bootstrapping Feb9thAnup Bootstrapping Feb9th
Anup Bootstrapping Feb9th
ClubExpress
 

Similar to Use of Personal Email for Business (20)

How to open source a project at Mega Corp (Geecon - May/2011)
How to open source a project at Mega Corp (Geecon - May/2011)How to open source a project at Mega Corp (Geecon - May/2011)
How to open source a project at Mega Corp (Geecon - May/2011)
 
Top 5 myths of it security in the light of current events tisa pro talk 4 2554
Top 5 myths of it security in the light of current events tisa pro talk 4 2554Top 5 myths of it security in the light of current events tisa pro talk 4 2554
Top 5 myths of it security in the light of current events tisa pro talk 4 2554
 
Sustainable Green IT, Cisco Systems
Sustainable Green IT, Cisco SystemsSustainable Green IT, Cisco Systems
Sustainable Green IT, Cisco Systems
 
Kcgi maruuchi1
Kcgi maruuchi1Kcgi maruuchi1
Kcgi maruuchi1
 
Intersect
IntersectIntersect
Intersect
 
Smart Factory Technology Road Mapping Initiative_The Intent of Things and Ana...
Smart Factory Technology Road Mapping Initiative_The Intent of Things and Ana...Smart Factory Technology Road Mapping Initiative_The Intent of Things and Ana...
Smart Factory Technology Road Mapping Initiative_The Intent of Things and Ana...
 
Cloud, social networking and BYOD collide!
Cloud, social networking and BYOD collide!Cloud, social networking and BYOD collide!
Cloud, social networking and BYOD collide!
 
Maximize Government Projects in the Cloud - Innovative-e
Maximize Government Projects in the Cloud - Innovative-eMaximize Government Projects in the Cloud - Innovative-e
Maximize Government Projects in the Cloud - Innovative-e
 
Peter Ramacher EOA 2014 v4
Peter Ramacher EOA 2014 v4Peter Ramacher EOA 2014 v4
Peter Ramacher EOA 2014 v4
 
Social engineereing
Social engineereingSocial engineereing
Social engineereing
 
IMT Solutions - Overview of IMT
IMT Solutions - Overview of IMTIMT Solutions - Overview of IMT
IMT Solutions - Overview of IMT
 
Out of the Blue: Responding to New Zero-Day Threats
Out of the Blue: Responding to New Zero-Day ThreatsOut of the Blue: Responding to New Zero-Day Threats
Out of the Blue: Responding to New Zero-Day Threats
 
2011 ATE Conference Panel Session
2011 ATE Conference Panel Session2011 ATE Conference Panel Session
2011 ATE Conference Panel Session
 
Project Controls Expo, 13th Nov 2013 - "A new visual way to engage executive ...
Project Controls Expo, 13th Nov 2013 - "A new visual way to engage executive ...Project Controls Expo, 13th Nov 2013 - "A new visual way to engage executive ...
Project Controls Expo, 13th Nov 2013 - "A new visual way to engage executive ...
 
E gov security_tut_session_1
E gov security_tut_session_1E gov security_tut_session_1
E gov security_tut_session_1
 
Attacking the cloud with social engineering
Attacking the cloud with social engineeringAttacking the cloud with social engineering
Attacking the cloud with social engineering
 
Anup Bootstrapping Feb9th
Anup Bootstrapping Feb9thAnup Bootstrapping Feb9th
Anup Bootstrapping Feb9th
 
Social Networking - An Ethical Hacker's View
Social Networking - An Ethical Hacker's ViewSocial Networking - An Ethical Hacker's View
Social Networking - An Ethical Hacker's View
 
Data Archive Considerations for Customer Communication Management
Data Archive Considerations for Customer Communication ManagementData Archive Considerations for Customer Communication Management
Data Archive Considerations for Customer Communication Management
 
Implementing PeopleSoft 9.2 During the Age of the Cloud
Implementing PeopleSoft 9.2 During the Age of the CloudImplementing PeopleSoft 9.2 During the Age of the Cloud
Implementing PeopleSoft 9.2 During the Age of the Cloud
 

More from Peter Wood

More from Peter Wood (13)

Hacking is easy: understanding your vulnerabilities
Hacking is easy: understanding your vulnerabilitiesHacking is easy: understanding your vulnerabilities
Hacking is easy: understanding your vulnerabilities
 
The future of cloud security
The future of cloud securityThe future of cloud security
The future of cloud security
 
The 2018 Threatscape
The 2018 ThreatscapeThe 2018 Threatscape
The 2018 Threatscape
 
Introduction to Cyber Resilience
Introduction to Cyber ResilienceIntroduction to Cyber Resilience
Introduction to Cyber Resilience
 
Network security, seriously?
Network security, seriously?Network security, seriously?
Network security, seriously?
 
Lessons from a Red Team Exercise
Lessons from a Red Team ExerciseLessons from a Red Team Exercise
Lessons from a Red Team Exercise
 
Red teaming in the cloud
Red teaming in the cloudRed teaming in the cloud
Red teaming in the cloud
 
All your files now belong to us
All your files now belong to usAll your files now belong to us
All your files now belong to us
 
Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)
 
Advanced Threat Protection: Lessons from a Red Team Exercise
Advanced Threat Protection: Lessons from a Red Team ExerciseAdvanced Threat Protection: Lessons from a Red Team Exercise
Advanced Threat Protection: Lessons from a Red Team Exercise
 
Advanced threat protection and big data
Advanced threat protection and big dataAdvanced threat protection and big data
Advanced threat protection and big data
 
Security Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent ThreatsSecurity Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent Threats
 
Security testing in critical systems
Security testing in critical systemsSecurity testing in critical systems
Security testing in critical systems
 

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Recently uploaded (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

Use of Personal Email for Business

  • 1. Email Insecurities An Ethical Hacker’s View Peter Wood Chief Executive Officer First•Base Technologies
  • 2. Who am I ? • Worked in computers & electronics since 1969 • Founded First•Base Technologies in 1989 (one of the first ethical hacking firms) • Primary roles: - Social engineer & penetration tester - Conference speaker - TV and radio security ‘expert’ - Member of ISACA Security Advisory Group - ISACA Conference Task Force member - Expert at the Corporate Executive Programme - Chair of Advisory board at CSA UK & Ireland Slide 2 © First Base Technologies 2011
  • 3. Slide 3 © First Base Technologies 2011
  • 4. Poor email password? Slide 4 © First Base Technologies 2011
  • 5. Poor email password? Slide 5 © First Base Technologies 2011
  • 6. Slide 6 © First Base Technologies 2011
  • 7. Data Loss Prevention? Slide 7 © First Base Technologies 2011
  • 8. Data Loss Prevention? Slide 8 © First Base Technologies 2011
  • 9. Data Loss Prevention? Slide 9 © First Base Technologies 2011
  • 10. Where is your email stored? Slide 10 © First Base Technologies 2011
  • 11. Slide 11 © First Base Technologies 2011
  • 12. The consequences? Slide 12 © First Base Technologies 2011
  • 13. Need more information? Peter Wood Chief Executive Officer First•Base Technologies LLP peterw@firstbase.co.uk Twitter: peterwoodx Blog: fpws.blogspot.com http://firstbase.co.uk http://white-hats.co.uk http://peterwood.com Slide 13 © First Base Technologies 2011