Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Think Like A Hacker

No description
by

Ken Colburn

on 19 March 2018

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Think Like A Hacker

Think Like A Hacker

Today's Hacker
2 Factor
Authentication
What Is It?

How Does It Work?
Understanding EMV
'Chipped' Cards

Dip vs Swipe

Always Dip When Possible

'Card Present' Only
Social Engineering
Phishing

Spear Phishing

Businesses a Big Target

How to Use the Hover Trick
Today's Discussion
Passwords
Ransomware
One of Your Greatest Threats
$5 Billion Business
One-Click and You're A Victim
No Way to Decrypt Files
Pay or Lose Your Data
Traditional Backups Won't Help
Online Backups A Must
2 Most Common Mistakes
Human Behavior - 'I'll Get to it Tomorrow'
Something You Know
Something You Own
Free or Weak AV
Malware vs Viruses

Why Free AV Isn't Good Enough

Cloud-Based Protection Layer
Backup Mistakes
Must Be Automatic

Must Include File Versioning

Must be Off-Site

Encrypted Cloud-Based Backups
Based on Jim Harvey's speech structures
Passwords

2 Factor Authentication

Social Engineering

Ransomware

Recommended Protection

Targeted Attacks vs Random Acts of Hacking
You've been taught wrong

Hard to remember

Easy to break

GRC's Haystack Tool

Start Using Passphrases
https://GRC.com/haystack.htm
https://mail.google.com
Where Can I Get Instructions?
https://TwoFactorAuth.org
Test Yourself at:
https://opendns.com/phishing-quiz
Our Recommendations
Questions?
A Word On Password Management
Unique Passwords Are A Must

Use Password Managers

Hi-Tech vs Low-Tech Managers
Backup Strategy
Adopt the
3
-
2
-
1
Strategy

3
Copies of your data on
2
different devices with
1
that is off-site
Full transcript