Profiling Hackers - The Psychology of Cybercrime | Mark T. Hoffmann | TEDxHHL

TEDx Talks
28 Jun 202118:56

Summary

TLDRMark T. Hofmann, a crime and intelligence analyst, reveals the psychological strategies behind cybercrime, focusing on social engineering and manipulation. He emphasizes that most cyberattacks stem from human error, making cybercrime more of a psychological than technical issue. Hackers exploit human vulnerabilities like trust, authority, and curiosity to gain access. Hofmann uses examples and illusions to demonstrate how easily we can be misled. He calls for increased awareness and vigilance to become a 'human firewall' against cyber threats, concluding that education and awareness are key to preventing cybercrime.

Takeaways

  • 🕵️‍♂️ Hackers leave personality traces in their behavior, from language to decision-making.
  • 📊 More than 90% of cyberattacks are caused by human error, highlighting people as the weakest link.
  • 🔐 Cybercrime is not just a technical problem; it's also a psychological and management problem.
  • 💻 Many cybercriminals operate in company-like structures, using 'crime as a service' models.
  • 🧠 Hackers, especially 'black hat hackers,' are typically young, intelligent, well-educated males.
  • 💰 The primary motives for hacking are money, espionage, and thrill-seeking, with money being the most common.
  • 🎩 Social engineers manipulate psychological weak points, such as trust, urgency, and authority, to exploit victims.
  • 🔍 Hackers use misdirection techniques, tricking victims into ignoring critical thinking, just like in magic tricks.
  • 🔐 Hackers often exploit authority and sympathy principles by impersonating trusted figures or institutions.
  • 🛡️ Awareness and vigilance are key to becoming a 'human firewall' and preventing cybercrime.

Q & A

  • What does Mark T. Hofmann describe himself as, and what is his role?

    -Mark T. Hofmann describes himself as a crime and intelligence analyst, or more commonly referred to as a 'criminal profiler.' His role involves analyzing behavior to understand the motives and psychology behind cybercriminals' actions.

  • How does Hofmann contrast the portrayal of hackers in media with reality?

    -Hofmann highlights that in media, hackers are often depicted as people in hoodies with green text on their screens, and their faces are rarely shown. In reality, hackers often operate differently and may leave psychological and behavioral traces that can help identify them.

  • According to Hofmann, what percentage of cyberattacks are caused by human error?

    -Hofmann states that more than 90% of cyberattacks or cybersecurity breaches are caused by human error, making people the weakest link in cybersecurity.

  • What are some of the main motives behind cybercrime as listed by Hofmann?

    -The main motives for cybercrime, according to Hofmann, are financial gain (money), espionage, fun, ideology, or simply trolling. Financial gain is the most common motive.

  • What is 'crime as a service' in the context of cybercrime?

    -'Crime as a service' refers to the organized structures in cybercrime that operate similarly to legitimate companies. Cybercriminals often work in a business-like manner, with supply chains, quality management, and even customer support systems.

  • Who are 'black hat hackers,' and what are their common characteristics?

    -Black hat hackers are the 'bad guys' in the world of hacking. Hofmann states that over 90% of them are male, about 80% are under 30 years old, and most of them started hacking between the ages of 10 and 15. They are typically intelligent, well-educated, and do not come from low socio-economic backgrounds.

  • What psychological motive, besides financial gain, do some hackers have according to Hofmann?

    -Besides financial gain, some hackers are motivated by thrill-seeking or the 'challenge to beat the system.' They enjoy the feeling of being cleverer than law enforcement and take pleasure in outsmarting others.

  • How do hackers exploit human vulnerabilities through social engineering?

    -Hackers exploit human vulnerabilities by using psychological manipulation techniques such as misdirection, the sympathy principle, and the authority principle. They use tactics like phishing emails, sympathy-based schemes, and fake authority symbols to gain access to sensitive information.

  • Can you explain Hofmann's lesson about the 'art of misdirection'?

    -Hofmann demonstrates the 'art of misdirection' by performing a magic trick, explaining it, and then surprising the audience with an unexpected twist. He likens this to how hackers manipulate people by making them think they are aware of a situation, only to mislead them further.

  • What is Hofmann's key recommendation for preventing cyberattacks?

    -Hofmann stresses the importance of awareness as a key element in preventing cybercrime. By being aware of common tactics like phishing emails, social engineering, and psychological manipulation, individuals and companies can better protect themselves from cyberattacks.

Outlines

00:00

🕵️‍♂️ Unmasking Hackers and Their Psychology

Mark T. Hofmann introduces himself as a crime and intelligence analyst, often referred to as a 'criminal profiler.' He explains the stereotypical portrayal of hackers on television versus reality. He aims to 'unmask' hackers by discussing their profiles, motives, and the psychological techniques, like social engineering, that they use to exploit human weaknesses. Hofmann emphasizes that hackers leave traces of their personality through their actions and decisions, which can be analyzed, particularly through language.

05:02

👨‍💻 Profiling the Black Hat Hackers

Hofmann provides a detailed profile of 'black hat hackers,' describing them as predominantly male, under 30, highly intelligent, and well-educated. Despite having no significant socio-economic challenges, these individuals turn to cybercrime mainly for financial gain, espionage, or thrill-seeking. Hofmann questions why, given their intelligence and opportunities, these individuals choose illegal activities over legal career paths. He also highlights that ego and the desire to outsmart systems play crucial roles in their actions.

10:06

🎭 The Art of Misdirection in Cybercrime

Hofmann uses a magic trick to illustrate how hackers use misdirection to fool their victims. He explains how hackers distract targets by making them think they are being protected or helped, only to exploit them when their guard is down. He highlights the tactics used in phishing emails and how urgency is often created to manipulate victims into acting without thinking critically. He also emphasizes that even a small percentage of people falling for these tricks can result in significant success for hackers.

15:10

❤️ Sympathy and Curiosity: Exploiting Human Weaknesses

Hofmann explains how hackers exploit human emotions like sympathy and curiosity. He shares an example of a USB flash drive left by a pickpocket, which could tempt someone into plugging it into their computer, potentially initiating a cyberattack. He also points out how female spies and agents, often seen as unsuspicious due to sexism, are highly effective in intelligence work. He cautions that cybercriminals and spies often look ordinary or sympathetic, making it hard for victims to recognize the threat.

🧑‍⚕️ The Authority Principle: Trusting Experts

In this section, Hofmann describes how cybercriminals exploit people's trust in authority figures by using logos, brands, and institutions in phishing scams. He compares this to marketing strategies where companies use authority symbols to sell products, like in a TV ad for a toothbrush. Hackers do the same by pretending to represent trusted institutions like the FBI or banks. He reinforces that cybercrime is a psychological issue, with more than 90% of cyberattacks stemming from human error, and calls for greater awareness as a defense.

Mindmap

Keywords

💡Cybercrime

Cybercrime refers to illegal activities that involve computers and networks. In the video, Mark Hofmann explains that cybercrime is not just a technical problem but a psychological one, as it often involves human manipulation. Hackers exploit human vulnerabilities to gain access to systems, as seen in examples like phishing emails or social engineering.

💡Social Engineering

Social engineering is a method used by hackers to manipulate people into divulging confidential information. In the video, Hofmann highlights how hackers exploit human psychology, using techniques such as fake emails or creating a sense of urgency to get individuals to unknowingly share sensitive data, like passwords.

💡Human Firewall

A 'human firewall' refers to a person who is trained to recognize and prevent cyberattacks by using awareness and caution. Hofmann encourages individuals to become human firewalls by being aware of social engineering techniques and understanding how hackers manipulate emotions to gain access to systems.

💡Misdirection

Misdirection is a technique where attention is deliberately diverted to hide the real action or truth. In the video, Hofmann uses a magic trick to demonstrate how hackers use misdirection to exploit human vulnerabilities, drawing attention away from critical details to execute cyberattacks without the victim noticing.

💡Phishing

Phishing is a form of cyberattack where hackers send fraudulent messages that appear to be from legitimate sources to steal sensitive information. Hofmann provides examples like fake Amazon or bank emails that prompt users to click links, giving hackers access to personal data.

💡Black Hat Hackers

Black hat hackers are individuals who use their technical skills to break into systems for malicious purposes, often for financial gain or espionage. Hofmann explains that most black hat hackers are young, intelligent, and motivated by a challenge or thrill, making cybercrime a form of ego-driven activity.

💡Challenge to Beat the System

This concept refers to the thrill or psychological drive that hackers experience when they outsmart security systems or law enforcement. Hofmann discusses how many hackers, especially younger ones, are motivated not just by financial gain but by the ego boost that comes with successfully evading detection and proving their superiority.

💡Authority Principle

The authority principle is a psychological manipulation tactic where hackers present themselves as credible or authoritative figures to gain trust. In the video, Hofmann describes how cybercriminals use logos, brands, or even emails from institutions like the FBI or IRS to trick individuals into believing their messages are legitimate.

💡Crime as a Service

Crime as a service refers to the professionalization of cybercrime, where hackers operate in company-like structures with defined roles, supply chains, and even customer support. Hofmann explains that modern cybercriminal organizations resemble legitimate businesses, making them highly efficient and dangerous.

💡Psychological Weak Points

Psychological weak points are vulnerabilities in human behavior that hackers exploit to execute attacks. Throughout the video, Hofmann emphasizes how hackers analyze human emotions, such as curiosity or trust, to manipulate individuals into making critical errors, like clicking on malicious links or sharing sensitive information.

Highlights

Mark T. Hofmann introduces himself as a crime and intelligence analyst, commonly known as a criminal profiler, focusing on cybercrime behavior.

The typical portrayal of hackers in media (hoodie, green text on screen) is misleading; real cybercriminals often work in structured environments.

Profilers can analyze the language and behavior of hackers to uncover clues about their identity and motives, even from digital traces.

Over 90% of cyberattacks are due to human error, making people the weakest link in cybersecurity.

Cybercrime is not just a technical issue; it’s a psychological, people-centric, and management problem.

Social engineering, the manipulation of human emotions, is a key tactic in cybercrime, making technical defenses like firewalls ineffective if the human element is compromised.

Hofmann highlights Bruce Schneier’s quote: 'Amateurs hack systems, professionals hack people,' emphasizing that people are the primary targets.

Hackers often work in 'crime as a service' structures, with hierarchical organization, supply chains, and even customer support.

The majority of black hat hackers are young, intelligent, and well-educated, with most starting between the ages of 10 and 15.

Key hacker motives are financial gain, espionage, and thrill-seeking, with the challenge of outsmarting authorities playing a significant psychological role.

Social engineers exploit human psychological vulnerabilities through tactics like misdirection and urgency to manipulate victims into making mistakes.

Hackers often use the 'authority principle,' impersonating figures of authority such as government agencies to induce compliance.

Women are increasingly used in industrial espionage, as they are less likely to be suspected, making them highly effective in intelligence roles.

Hofmann emphasizes that all companies are at risk of cyberattacks, no matter their size or perceived importance.

Raising awareness and understanding human vulnerabilities is crucial in preventing cybercrime. Awareness training can act as a 'human firewall' to minimize errors.

Transcripts

play00:00

Transcriber: Mariolina Sanfilippo Reviewer: Eunice Tan

play00:12

My name is Mark T. Hofmann, and I’m a crime and intelligence analyst

play00:16

or what most of you would most likely call “a criminal profiler.”

play00:22

If you think of cybercrime, you may have something like this in mind.

play00:28

On television, it always makes these fancy sounds,

play00:32

(Computer beeps)

play00:33

and you see the kid with a hoodie in front of a laptop,

play00:36

with green text on the screen.

play00:40

Well, reality is different.

play00:42

And on television, you never really get to see the face.

play00:45

Hackers are always presented like this or from behind,

play00:49

but you never really see the face.

play00:52

Today, I would like to unmask the face of hackers, so to say.

play00:56

I would like to talk about the profiles and motives of hackers.

play01:01

I would like to talk about psychological manipulation,

play01:05

about social engineering techniques they are using to attack us,

play01:10

and what we can do to become a human firewall.

play01:16

As a profiler, I am interested in behavior.

play01:19

I analyze behavior,

play01:20

and I try to identify the motives and the psychology behind that behavior.

play01:26

Because with everything we do, we show something of who we are;

play01:32

with every decision we make, we show something of who we are.

play01:36

And also, hackers make a series of decisions:

play01:42

They are choosing targets, they are choosing methods,

play01:45

pretty often they make phone calls,

play01:48

they write text messages, they write phishing mails.

play01:52

And with everything they do, or fail to do,

play01:55

they not only leave digital traces but also traces of their personality.

play02:02

And very often, the analysis of language is a key element in profiling hackers.

play02:08

Let me give you an example with the word “behavior” itself.

play02:12

A person from the United States,

play02:14

an American, would most likely write the word “behavior” like this,

play02:18

a person from the UK would more likely spell the word “behavior” like this,

play02:23

[BEHAVIOUR]

play02:24

and an idiot might spell the word “behavior” like this.

play02:29

So based on the word someone is using, based on the analysis of language,

play02:34

I can try to make a probability statement about an unknown offender.

play02:40

Yes, cybercriminals are hard to catch,

play02:42

but in many cases, they are not as invisible as they might think.

play02:47

[BEHAVIAR]

play02:48

[>90%]

play02:49

So what can a profiler tell you about cybercrime?

play02:52

Well, quite a lot.

play02:55

More than 90 percent of all cyberattacks or cybersecurity breaches

play03:01

are caused by human error.

play03:04

So humans, people, are the weakest link in the cybersecurity chain.

play03:11

Let me be very clear about this:

play03:13

Cybercrime is not just a technical problem.

play03:16

It’s a psychological problem, it’s a people’s problem,

play03:20

it’s clearly a management problem.

play03:24

Computers are the weapons,

play03:26

but the perpetrators and also the victims are humans.

play03:31

Any door is only as secure

play03:35

as the person who is holding the key or the passwords.

play03:39

So you can have the best fancy high-security door in the world.

play03:43

If I manipulate you to give me the key, it’s useless.

play03:48

You can have the best fancy high-security firewall system in the world.

play03:53

If I manipulate you to give me the passwords, it’s useless.

play04:00

“Amateurs hack systems, professionals hack people.”

play04:05

This is a quote by security expert Bruce Schneier, and he is damn right.

play04:10

So what can we say about the profiles of hackers?

play04:14

Who are the people behind the attacks?

play04:17

Well, pretty often, cybercrime doesn’t look like this.

play04:21

It looks more like this.

play04:24

Law enforcement professionals and intelligence professionals

play04:27

and security professionals like to use the term “crime as a service.”

play04:33

So pretty often, cybercriminals work in company-like structures.

play04:38

They have something like a supply chain,

play04:41

they have something like quality management,

play04:43

and sometimes they even have customer support.

play04:47

So if you or your company gets attacked,

play04:50

it may not come from a kid in front of a laptop, with a hoodie.

play04:53

It may come from a call center-like structure

play04:57

anywhere in the world, like this.

play05:01

But of course, there are some individual hackers -

play05:04

we call them “black hat hackers.”

play05:06

So the ones with the black hats, these are of course the bad guys.

play05:12

According to the current state of science,

play05:14

what can we say about the profiles of black hat hackers?

play05:19

We can say this:

play05:21

Most of them - some studies say more than 90 percent - are male.

play05:25

Around about 80 percent are under 30 years old.

play05:29

[Male Under 30]

play05:31

The majority of them, around about 60 percent,

play05:33

started at a very young age - between 10 and 15 years old.

play05:38

They have above average intelligence, they are pretty often well educated,

play05:43

and 90 percent do not have a low socioeconomical status.

play05:49

So they are young, they are intelligent, and they are pretty often well educated.

play05:53

Why the hell do they do what they do?

play05:56

The main motives in descending order are money - financial gain -

play06:01

espionage,

play06:03

and fun - ideology or simply trolling.

play06:07

[Motives]

play06:08

Well, so they do it mostly for money.

play06:10

If I look at this list of motives, I’m a little bit skeptical.

play06:14

Because as we just learned,

play06:16

they are young, they are intelligent, they are well educated,

play06:19

and they do not necessarily come from difficult or broken home environments.

play06:24

So if they want to make money,

play06:27

why don’t they just work for Google or any other Silicon Valley company?

play06:32

They could make a ton of money in a legal way.

play06:35

So why are they committing crimes? Why do they make money that way?

play06:41

Another psychological motive comes into play

play06:43

which is called thrill-seeking,

play06:45

or in psychology we sometimes like to call this

play06:48

“challenge to beat the system.”

play06:51

So they like the feeling of being cleverer than the FBI.

play06:55

Never underestimate the role of ego, challenge and thrill-seeking

play07:01

in cybercrime,

play07:03

and I’m not just talking theory.

play07:05

I met hackers myself, I did my own research,

play07:09

and one of my subjects told me this:

play07:12

“I analyze people.

play07:15

In the end, human hacking works the same way that computer hacking works.

play07:20

You always look for vulnerabilities and try to exploit them.”

play07:26

So they are social engineers analyzing us.

play07:32

They are analyzing our psychological weak points,

play07:35

and they try to attack,

play07:37

they try to exploit our psychological weak points.

play07:41

But what are our psychological weak points?

play07:44

What are the psychological manipulation techniques?

play07:47

What are some of the social engineering techniques?

play07:51

I want to show you a little illusion.

play07:53

For this illusion, I just need a silk, and I put this silk in my hand.

play08:01

Then I can show my hand empty, and the silk magically turns into an egg.

play08:08

As I can see, you’re not that amazed.

play08:11

And you’re right, it’s not that clever -

play08:13

it’s just a plastic egg with a hole inside it.

play08:16

But I want to use this to teach you a lesson about the art of misdirection.

play08:23

So the fake egg goes in my left pocket, and the hankie goes in my right pocket.

play08:29

And then I was fiddling around with my right pocket,

play08:31

and I tried to direct your attention to the silk

play08:35

while I secretly got out the fake egg with my other hand.

play08:40

Then I told you I put the silk in my hand,

play08:43

but in fact I carefully put the silk inside the fake egg.

play08:48

Then, of course, I can show my hand empty, and then it magically turns into an egg.

play08:56

Well, not that spectacular, but as I just told you,

play09:02

I’m going to teach you a lesson about the art of misdirection.

play09:06

Explain this.

play09:08

(Egg cracks and drops)

play09:12

As I just told you, this will be a lesson about the art of misdirection.

play09:18

Well, what did just happen?

play09:20

I created an illusion inside an illusion.

play09:23

So basically, I fooled you while explaining how you have been fooled,

play09:30

and this way, I totally eliminated your critical thinking.

play09:35

In the first round, you all watched closely,

play09:38

and you tried to see the secret behind it.

play09:41

But in the second round, you relaxed.

play09:43

I told you, “Relax - now I show you how it’s done,”

play09:47

and this way, I eliminated your critical thinking.

play09:50

Again, I fooled you while explaining how you have been fooled,

play09:53

and this is what hackers do all the time.

play09:56

They hack you while telling you that you have been hacked,

play09:59

and this way, they totally eliminate your critical thinking.

play10:05

Pretty often, phishing mails and short messages start like this:

play10:09

“We have detected some unusual activity on your account.”

play10:13

And of course, now you need to click here to verify your credit card information.

play10:18

Or “Your Amazon account has been locked.

play10:20

There is some suspicious or criminal activity.

play10:23

You need to click here to regain access to your account.”

play10:27

Or “Your account was used to buy a $250 gift card.

play10:32

If you want to cancel the order and confirm your credit card information,

play10:37

click here.”

play10:38

So they tell you that you have been hacked.

play10:41

In fact, you haven’t been hacked.

play10:42

But when you click on these links, you will be hacked.

play10:45

Now, you might say, “Well, I’m smart. I won’t click on these links.”

play10:49

Well, I’m not sure.

play10:50

If you’re distracted or if you just made an Amazon order the day before,

play10:55

I’m not sure if you wouldn’t click on these links.

play10:58

But even if just two people out of 100, just two percent, click on these links,

play11:03

well, it’s enough.

play11:05

If I send 100 mails, two people are going to click on these links.

play11:09

And this is a very low estimate; it will be way more.

play11:15

And of course, it’s always urgent - you need to do it right now.

play11:19

Hackers never say, “Take your time.”

play11:21

You always need to do something now;

play11:23

otherwise, there will be a huge damage and it will have a huge negative impact.

play11:28

You need to do something now without thinking about it.

play11:33

Let me give you another example of how social engineers and how hackers

play11:37

try to exploit our psychological weak points.

play11:42

They are using the so-called “sympathy principle.”

play11:46

They exploit our tendency to trust and to like people.

play11:53

Imagine you are in the subway on your way to work and it’s a rainy Monday morning.

play11:59

It’s going to be a very, very long and boring day.

play12:04

But suddenly, she gets on the train, and you are getting nervous.

play12:09

You would love to approach her, you would love to talk to her,

play12:13

but you don’t really have the guts to do so.

play12:15

But then suddenly, she stands right next to you.

play12:18

This would be your chance to talk to her, but still you don’t really do it.

play12:23

You pretend to read something on your smartphone, but you don’t do it.

play12:28

She stands so close to you that she is almost touching you,

play12:32

which is almost a little bit weird.

play12:34

And then suddenly, she gets off the train.

play12:37

What did just happen? Is she a pickpocket or something?

play12:40

Then you reach inside your pocket, and inside your pocket,

play12:45

you find a little USB flash drive with a heart on it.

play12:50

What might be on there? A phone number? Pictures?

play12:53

Now, be honest:

play12:55

Could you stand the curiosity

play12:57

of not plugging this into your company’s computer

play13:00

to see what’s on there?

play13:01

Well, probably not.

play13:03

And this may be the beginning of a negative butterfly effect unfolding

play13:07

and a very serious cyberattack.

play13:10

I’ll tell you a little secret from the intelligence world:

play13:14

Female spies are bloody good, and it’s partly because of sexism.

play13:20

Spying, crime and hacking - this is seen as a man’s job.

play13:25

And this is why women are by far the best, because they are unsuspicious.

play13:32

If someone looks nice or sympathetic,

play13:34

it’s really hard to see this person as a potential threat.

play13:39

So you don’t see the evil if someone has a face like an angel.

play13:45

But yes, female agents are, without any doubt,

play13:49

the best in the world.

play13:52

There’s a good friend of mine, a German ex-intelligence official,

play13:55

and he also confirms

play13:57

that more and more women are used in industrial espionage.

play14:01

So not just hackers try to spy on you,

play14:05

but also secret agents from intelligence agencies

play14:08

from foreign countries.

play14:10

So some of these best-trained agents in the world

play14:14

may wait for you at the hotel bar, with the face of an angel.

play14:20

This is Silk Road.

play14:22

For a very long time,

play14:23

this has been the largest online drug-dealing marketplace on the darknet.

play14:28

And this is the man behind Silk Road.

play14:31

Excuse me, but he looks like a character from High School Musical.

play14:36

I just want to make a point here:

play14:38

Many criminals and spies are very successful

play14:42

because they don't look like criminals or they don't look like spies.

play14:46

He looks pretty sympathetic -

play14:48

he’s not a hacker, but anyway -

play14:49

many criminals and many spies

play14:52

look pretty unsuspicious and pretty sympathetic.

play14:55

So they are using their appearance.

play14:58

They are using our tendency to like and to trust them against us.

play15:04

[AUTHORITY]

play15:05

The time is running and ticktocking away, but I want to give you one last example

play15:09

of how hackers try to exploit our psychological vulnerabilities:

play15:13

the authority principle.

play15:17

We are much more influenceable when we consider someone an authority.

play15:23

And many companies use this principle all the time.

play15:27

This is the Doctor’s Best TV commercial.

play15:30

They just combined all the authorities’ stereotypes

play15:35

in one TV spot.

play15:36

As you can see, it’s an elderly man with glasses, and he wears a tie,

play15:40

and he looks like a medical doctor, and he does some kind of experiment,

play15:44

and it plays in a scientific lab,

play15:47

and everything in this picture,

play15:48

and also the brand - it’s called “Doctor’s Best.”

play15:52

So they just combined all the authority symbols

play15:55

to convince us to pay much more for toothbrushes.

play15:59

And people do it.

play16:00

And cybercriminals do the same principle, the same persuasion technique,

play16:05

all the time.

play16:06

So they are using authority symbols, logos, brands

play16:11

and names of institutions or government agencies

play16:15

to convince us

play16:16

that they are the authorities and that this is a real mail.

play16:20

So they send emails from the FBI or the Bank of America or the IRS,

play16:25

and they exploit,

play16:26

they use our tendency to trust experts and to trust authorities.

play16:34

So what did you learn, hopefully?

play16:37

[SYMPATHY MISDIRECTION AUTHORITY]

play16:39

Cybercrime is a psychological problem:

play16:42

More than 90 percent of cyberattacks are caused by human error.

play16:47

Cybercriminals, hackers, social engineers play with human emotions.

play16:52

They play them like a piano.

play16:54

They know what buttons to push to get a certain reaction.

play16:58

So what can we do?

play17:00

What can we do to become a human firewall?

play17:04

Well, the cyberdefense strategy of many companies

play17:07

could be described like this:

play17:09

“Team I Don’t Care,” “I hope it won’t hit us,”

play17:13

and “I think we are too small” or “We are not interesting enough.”

play17:18

Well, guess what? You’re wrong.

play17:21

There are two types of companies:

play17:23

Companies that have been attacked, and companies that will be attacked.

play17:27

This is not a cyberdefense strategy;

play17:30

this is naive.

play17:33

The key is awareness.

play17:35

A talk like this, a speech like this, a workshop

play17:38

can definitely help to prevent crimes from happening.

play17:42

Awareness alone can be a key element in the prevention of cybercrime.

play17:49

If someone calls you and asks you for your password on the phone,

play17:54

I’m not sure if you are going to give it at this point.

play17:59

If you get an email from Amazon

play18:02

that your account has been hacked and you need to click on this link,

play18:05

I’m not sure if you are going to click on this link.

play18:09

If you find a USB flash drive on the ground,

play18:13

I’m not sure if you are going to plug it into your computer out of curiosity.

play18:18

And if you get an email by the FBI or the IRS,

play18:22

I’m not sure if you will transfer the money or click on these links.

play18:26

So awareness alone can help to prevent cybercrime.

play18:32

My name is Mark T. Hofmann, I’m a profiler and speaker,

play18:36

and I thank you.

play18:39

Stay safe, and thank you for your undivided attention.

play18:47

(Applause)

Rate This

5.0 / 5 (0 votes)

Étiquettes Connexes
CybersecurityHackersSocial EngineeringPsychological ManipulationCybercrime PreventionHuman FirewallPhishing AttacksThrill-seekingCyber DefenseCrime Profiling
Besoin d'un résumé en anglais ?