Staying secure and ensuring privacy while using technology may seem like a daunting task but it's not mission impossible. Join us as we discuss some simple actions you and your organization can take to stay safe while using the devices on the web.
3. Navigating the Digital Landscape
Some Phishing and spoofing email spam statistics…
•Nearly 96% of phishing attacks are conducted using email.
•77% of organizations faced business email compromise (BEC) attacks in 2021. Eg. payroll redirect and supplier invoicing frauds.
•BEC includes The average cost of a BEC exploits was $5.96 million in 2021.
•83% of organizations faced a successful email-based phishing attacks in 2021.
•39% of individuals have said they received at least one suspicious email attachment.
•15% of individuals said they received an email impersonating their organization.
Source: What Is Phishing? - Definition, Types of Attacks & More | Proofpoint US
4. Can Be A Challenge
Source: Number of ransomware attacks per year 2022 | Statista
v The average downtime a company experiences after a
ransomware attack is 22 days. (Statista, 2021)
v A recent survey found 37 percent of respondents’
organizations were affected by ransomware attacks in the last
year. (Sophos, 2021)
v In 2021, the largest ransomware payout was made by an
insurance company for $40 million, setting a world record.
(Business Insider, 2021)
v The average ransom fee requested has increased from $5,000
in 2018 to around $200,000 in 2020. (National Security
Institute, 2021)
6. Security Basics
Using Simple Yet Effective Steps
Mail
• Develop a culture of email
security awareness
• User strong, unique
passwords across
accounts
• Learn your email hosts
security functions and
tools
• Be cautious of email links
and attachments
Identity
• Establishing Multi-factor
Authentication
• Adopting devices with
security Keys or biometric
• Consider, whenever
possible, a location-based
access tool
• Develop policies
surrounding privacy
Devices
• Invest time in learning
about device encryption
(particularly around
hardware drivers)
• Along with Identity, when
looking at onboarding new
devices consider a
product with Biometric or
even FIDO key
• Avoid ‘co-mingling’
personal and professional
devices
7. Privacy Basics
Privacy vs Security
Let’s start by defining just what privacy and security are:
•Privacy refers to the control that you have over your personal
information and how that information is used. Personal
information is any information that can be used to determine
your identity.
•Security refers to how protected your personal information is.
8. Privacy Basics
Work Hand in Hand
Limit Sharing
on the Web
Separate
Device
Environments
Where Possible
Know Your Web
Browser
Understand
Your
Connection
Review Apps
and
Permissions