Think Cyber - How to stay safe in an online world | May Brooks-Kempler | TEDxSavyon

TEDx Talks
4 Mar 202011:28

Summary

TLDRThis script addresses the prevalent risks of social engineering in the digital age, emphasizing the importance of online safety. The speaker, a cybersecurity professional, shares personal experiences and strategies to protect oneself from threats like sextortion, phishing, and ransomware. They stress the significance of vigilance, skepticism towards suspicious links and messages, and the practice of regular data backup to safeguard against potential cyber-attacks.

Takeaways

  • 🧑‍💻 Social engineering is a significant threat as it exploits human traits like fear, greed, curiosity, and urgency to manipulate individuals into compromising their security.
  • 🚸 Cyber skills are as essential as road safety in the 21st century, emphasizing the need for everyone to learn how to navigate the internet safely.
  • 🔒 Despite having the best security technologies, such as anti-viruses and firewalls, they are ineffective if we give away our 'keys' through actions like sharing passwords.
  • 👤 The human factor is the weakest link in security, with over 80% of security incidents involving manipulation of individuals.
  • 💔 Sextortion, a form of extortion based on threats to publish intimate photos, can have devastating real-world consequences, including driving victims to suicide.
  • 🌐 The internet never forgets, so anything posted online can be used against individuals in the future, emphasizing the importance of being cautious with online content.
  • 🏠 Sharing personal information on social media, like being on vacation, can inadvertently invite real-world threats, like burglary.
  • 📧 Phishing emails can be highly personalized and sophisticated, using data from social media to target victims effectively.
  • 💡 Always be vigilant and verify the authenticity of emails and messages, especially those that seem urgent or personalized.
  • 💾 Regularly backing up important data is crucial to mitigate the effects of ransomware attacks, even though it won't prevent the attack itself.
  • 🎯 Targeted attacks, such as spear phishing, are more dangerous as they are tailored to the individual, making them harder to detect and more likely to succeed.

Q & A

  • What is the main message the speaker is trying to convey in the script?

    -The speaker is emphasizing the importance of cybersecurity awareness and providing tools and techniques to protect oneself, family, and business online against social engineering and other online threats.

  • Why does the speaker compare cyber skills to road safety in the 20th century?

    -The speaker compares cyber skills to road safety to highlight that just as crossing the road safely is a basic life skill taught to children, so too should cybersecurity be taught as a fundamental skill in the digital age.

  • What is the role of social engineering in cybersecurity threats?

    -Social engineering is the art of manipulation, where attackers exploit human traits like fear, greed, curiosity, and urgency to get victims to perform actions against their interests, such as clicking malicious links or giving away passwords.

  • What is sextortion and how does it affect victims?

    -Sextortion is an extortion attempt based on threats to publish intimate photos and videos of the victim. It can have severe emotional and psychological impacts, with some victims even being driven to commit suicide.

  • Why is it important to search your name online?

    -Searching your name online helps you understand what information about you is publicly available and can be used against you, such as old posts or images that you may have forgotten about.

  • What is the significance of the story about the videographer and ransomware?

    -The story illustrates the real-life consequences of ransomware attacks, emphasizing the importance of having backups to minimize the impact of such an attack on one's work and life.

  • What are some common tactics used in phishing emails?

    -Common tactics in phishing emails include impersonating well-known services, using security alerts or important messages, and personalizing the content to the recipient's interests or habits to make the email seem more legitimate.

  • Why is it advised to hover over links and not download attachments from unknown sources?

    -Hovering over links can reveal the actual destination URL, which may differ from what is displayed, helping to identify phishing attempts. Not downloading attachments from unknown sources prevents the potential execution of malware.

  • What is the purpose of targeted attacks or spear phishing?

    -Targeted attacks or spear phishing are designed to deceive specific individuals or organizations by using personalized emails that appear legitimate, with the goal of stealing sensitive information or gaining unauthorized access.

  • What are the three key takeaways the speaker wants the audience to remember?

    -The three key takeaways are to think before sharing on social media, think before clicking on links or opening attachments, and to think ahead by regularly backing up important data.

  • How can individuals protect themselves against online threats like ransomware?

    -Individuals can protect themselves by being vigilant, recognizing phishing warning signs, backing up important data, and consulting a professional when in doubt about a suspicious message or request.

Outlines

00:00

🔒 The Importance of Cybersecurity Awareness

The speaker begins by highlighting the ubiquity of the Internet in daily life, mentioning platforms like Facebook, LinkedIn, Instagram, Amazon, eBay, and Pinterest. They emphasize the risks associated with social engineering, a method used by cybercriminals to manipulate individuals into revealing sensitive information. The speaker, a cybersecurity professional and parent, aims to share tools and techniques for online safety. Drawing a parallel between road safety and cybersecurity, they argue that the latter is a crucial skill for the 21st century. The paragraph concludes with a real-life story of sextortion, illustrating the severe consequences of falling victim to social engineering.

05:01

📱 Social Media and the Risks of Oversharing

This paragraph delves into the dangers of oversharing on social media, which can be exploited by attackers to craft targeted phishing attacks. The speaker warns about the permanence of online content and advises reviewing privacy settings to prevent misuse of personal information. They share an anecdote about a friend who fell victim to ransomware, stressing the importance of backups to mitigate the effects of such attacks. The speaker also cautions against clicking on suspicious links or downloading attachments from unknown sources, and advises to be wary of non-personalized messages that may be phishing attempts.

10:03

🛡️ Strengthening the Human Firewall Against Cyber Threats

The final paragraph focuses on the continuous evolution of cyber threats and the importance of maintaining vigilance. The speaker discusses the sophistication of attackers and the need for individuals to be aware of social engineering tactics. They stress the importance of being cautious with emails, online ads, and text messages, and to look for signs of phishing. The speaker concludes by urging the audience to think before sharing on social media, clicking on links, and to always back up important data. The goal is to transform from being a potential weak link in cybersecurity to becoming a strong link that protects oneself and loved ones from online threats.

Mindmap

Keywords

💡Social Engineering

Social engineering is the practice of manipulating individuals to divulge confidential information or perform actions that could compromise their security. In the video, it is presented as a significant threat, where attackers exploit human traits like fear, greed, and curiosity to trick people into clicking malicious links or giving away passwords. The concept is central to the theme of cybersecurity awareness.

💡Cybersecurity

Cybersecurity refers to the protection of internet-connected systems, including hardware, software, and data, from theft, damage, or unauthorized access. The video emphasizes the importance of cybersecurity in the digital age, highlighting the speaker's role as a professional in the field and the need for everyone to develop 'cyber skills' akin to road safety in the 21st century.

💡Internet

The Internet is a global network of interconnected computers that provides a platform for various services and activities, such as social media, online shopping, and communication. The video script discusses both the benefits of the Internet and the risks associated with its use, such as exposure to social engineering and other cyber threats.

💡Phishing

Phishing is a type of online scam where attackers send seemingly legitimate emails to trick recipients into providing sensitive information or clicking on malicious links. The video provides examples of phishing, such as emails impersonating well-known services, and warns viewers to be vigilant against such attacks.

💡Ransomware

Ransomware is a form of malicious software that encrypts a user's files and demands payment to restore access. The video describes a scenario where a videographer's work was encrypted by ransomware, illustrating the devastating impact of such an attack and the importance of having backups.

💡Backup

A backup refers to the process of making copies of data to protect against data loss. The video script stresses the importance of backing up important data as a precaution against ransomware attacks, suggesting the use of cloud backup or external storage devices.

💡Sextortion

Sextortion is a form of extortion where intimate photos or videos are used as leverage to demand payment or perform other actions. The video recounts a tragic story of a young man driven to suicide after becoming a victim of sextortion, underscoring the severity of cyber threats.

💡Privacy Settings

Privacy settings are options within social media platforms and other online services that allow users to control who can see their content. The video advises viewers to review their privacy settings to prevent attackers from using personal information against them.

💡Spear Phishing

Spear phishing is a targeted form of phishing where attackers gather information about their victims to craft personalized emails that appear legitimate. The video explains how attackers can use social media to research targets and create convincing spear phishing emails.

💡Security Awareness

Security awareness refers to the consciousness and understanding of potential security threats and the measures to mitigate them. The video emphasizes the importance of security awareness as an ongoing process, encouraging viewers to think before they share, click, or engage with online content.

💡Scam

A scam is a fraudulent scheme to make money dishonestly. The video mentions various types of scams, including sextortion and phishing, which prey on human vulnerabilities and highlight the need for individuals to be aware of and protect themselves from such scams.

Highlights

The importance of online safety in the digital age, with social engineers posing a risk to those who engage in common online activities.

The speaker's background as a cybersecurity professional with nearly 20 years of experience.

The analogy between learning cyber skills and the necessity of road safety in the 20th century.

The ineffectiveness of high-tech security measures if individuals are tricked into revealing sensitive information.

The definition and explanation of social engineering as manipulation exploiting human traits.

The alarming statistic that over 80% of security incidents involve human error.

A tragic case study involving sextortion and its severe consequences.

The permanence of online content and its potential use in targeted attacks.

The dangers of oversharing on social media and its implications for personal security.

A personal anecdote about a friend who fell victim to ransomware due to a phishing email.

The critical role of backups in mitigating the effects of ransomware attacks.

The prevalence of spear phishing and its customization based on personal information.

The speaker's experience with a CFO who narrowly avoided a million-dollar scam.

The significant financial losses reported by major companies due to phishing scams.

Advice on being vigilant against social engineering by scrutinizing emails and online ads.

The three key takeaways: think before sharing, clicking, and the importance of backing up data.

Transcripts

play00:00

I think I know you do you have a

play00:17

Facebook account

play00:19

how about LinkedIn Instagram so you

play00:23

probably like online shopping in Amazon

play00:27

or Ebay are you looking for recipes or

play00:31

plan your next vacation using Pinterest

play00:34

if you answered yes to even one of these

play00:38

questions then you're enjoying the

play00:40

incredible things that the Internet has

play00:42

to offer but I was right I do know you

play00:46

and so do other social engineers which

play00:50

means you're at risk I have three

play00:55

children they are born into the internet

play00:57

age and as a cyber security professional

play01:00

with almost 20 years of experience I

play01:02

have the skills to protect myself and

play01:05

them online but you don't have to be a

play01:10

master hacker or a security expert to be

play01:13

safe online my goal here today is to

play01:16

share some of the tools and techniques I

play01:18

use so that you too will be able to

play01:21

protect yourself your families and your

play01:25

business and use the internet without

play01:27

fear until the 1920s when someone wanted

play01:33

to cross the road they had to simply

play01:35

walk across to the other side

play01:38

that changed with the increase in

play01:41

automobiles and the introduction of

play01:43

pedestrian crossing to law crossing the

play01:46

road safely is a basic life skill that

play01:48

every parent teaches their kids

play01:50

I believe that cyber skills are the 21st

play01:54

century equivalent of road safety in the

play01:57

20th century if we look at our homes

play02:01

even if you install the best security

play02:04

mechanisms such as alarms CCTV cameras

play02:08

sophisticated locks all will fail if

play02:11

someone tricks us

play02:13

to giving them the keys the same is true

play02:16

for home and office networks we can use

play02:20

the best security technologies out there

play02:22

anti viruses firewalls IPS is deal piece

play02:25

I can throw on and on but it's not going

play02:28

to help us if we give away our keys for

play02:32

example give someone else our passwords

play02:36

social engineering is the art of

play02:38

manipulation getting someone to do

play02:41

something they're not supposed to do a

play02:44

social engineer exploits basic human

play02:48

traits such as fear and greed curiosity

play02:51

and urgency a social engineer uses these

play02:55

traits to get you to click a link

play02:57

download the file give someone else your

play03:00

password or pay an extortionist today

play03:04

over 80% of all security incidents

play03:07

involve the human factor us that's true

play03:12

both for organizations and home users so

play03:16

let's go from being the weakest link

play03:18

into being the strongest link on the

play03:24

fall of 2015 21 year-old Jake met a girl

play03:27

online

play03:27

they started texting each other flirting

play03:31

things heated up and Jake said his

play03:34

girlfriend and intimate photo at that

play03:38

moment everything changed his girlfriend

play03:42

demanded he pay her ransom or she'd sent

play03:45

his photo to his friends and family at

play03:48

first Jake thought it was a joke but it

play03:52

wasn't Jake paid his extortionist

play03:55

but the story did not end there the

play03:58

extorter demanded more and more money

play04:01

pushing Jake to take his own life

play04:06

unfortunately this is not an isolated

play04:08

incident

play04:09

numerous people were driven to commit

play04:11

suicide after falling victim to

play04:13

sextortion sextortion is an extortion

play04:16

attempt based on threats to publish

play04:18

intimate photos and videos of the victim

play04:21

sextortion targets everyone from

play04:24

twelve-year-old children to

play04:26

any citizens over 80 people online are

play04:30

not always who they claim to be have you

play04:36

ever searched your name online try it I

play04:40

bet you don't even remember that post

play04:44

from 2014 just like an elephant

play04:47

the Internet's never forgets what girls

play04:51

online stays online a sophisticated

play04:54

attacker can build a phishing email the

play04:56

targets used specifically for example if

play05:00

you're a runner they might send you a

play05:03

special form running shoes such attacks

play05:06

use data extracted from social media

play05:08

accounts of the victim but the threat is

play05:11

not limited to the cyber realm when we

play05:15

share an Instagram story while abroad

play05:18

we're basically inviting a burglar to

play05:20

break into our empty houses so think

play05:24

before you share your social media

play05:27

accounts can be used against you review

play05:30

your privacy settings and never upload

play05:33

something that might be used against you

play05:35

now or in the future how fun is it to

play05:42

get a message like this if I click I can

play05:46

definitely win a free flight and also

play05:50

this might happen that is exactly what

play05:54

happened to a friend of mine she's a

play05:55

videographer specializing in creating

play05:58

family documentaries a couple of years

play06:00

ago she called me after sing a

play06:02

weird-looking message on her computer

play06:03

screen

play06:04

she had a deadline submitting a

play06:06

documentary she spent three months

play06:08

making so I came over as soon as I

play06:12

entered his studio I knew she had a

play06:14

serious problem the weird looking

play06:17

message was ransomware all her files

play06:20

were encrypted and she couldn't access

play06:22

them I immediately asked her do you have

play06:25

a backup to my dread she said she did

play06:28

not my heart sank at that point there

play06:32

were only two options pay the ransom and

play06:35

hope to get the decryption key or lose

play06:38

the work

play06:40

having your computer affected by

play06:42

ransomware is usually a result of

play06:45

clicking a link or downloading a file in

play06:47

a phishing email many phishing emails

play06:50

are designed as a security alert or

play06:52

important message and impersonate

play06:55

well-known services such as Facebook

play06:57

Amazon Google or Microsoft so please

play07:01

think before you click

play07:07

Amazon eBay PayPal all know me by name

play07:11

they would never call me dear customer

play07:14

so beware of non personalized messages

play07:18

and unknown senders hover over the links

play07:21

and never download attachments from

play07:24

unknown sources the best way to protect

play07:29

yourself against ransomware is simply

play07:32

backing up your important data you can

play07:35

use cloud backup or external storage

play07:37

devices or if you're paranoid like me

play07:39

both it won't prevent the attack but it

play07:44

will minimize its effect on your life

play07:46

think ahead and backup trying to

play07:52

technically hack a company is difficult

play07:54

their layers of security that protect

play07:57

the network but hackers are smart they

play08:01

go for the weakest link the end user

play08:04

while random non-personalized phishing

play08:07

attacks are still very common in many

play08:10

cases the attacker will do his or her

play08:13

homework an attacker can search a

play08:17

company on social media and look for

play08:18

known employees then start digging into

play08:21

an employee social media account to help

play08:23

build a targeted attack the attacker

play08:26

then creates a phishing email that will

play08:29

load the user to verify their

play08:31

credentials using the stolen credentials

play08:34

the attacker can auto forward all emails

play08:37

received by the user thus gain

play08:39

foreknowledge of everything that goes on

play08:41

in that users life and workplace a few

play08:46

months ago I was contacted by a CFO in a

play08:49

large financial company they almost fell

play08:52

victim to

play08:53

million-dollar scam my team and I ran a

play08:56

few tests and found that an attacker

play08:58

used phishing to gain access to an email

play09:01

account of one of the executives in the

play09:03

company

play09:03

the attacker followed email exchange at

play09:06

the company and when an interesting deal

play09:08

came along he made his move forging an

play09:12

email from the executive asking that an

play09:14

upcoming bank transfer will be made to a

play09:17

new bank account the company got lucky

play09:20

and identified the attack on time but

play09:23

other companies were not that lucky

play09:25

Facebook and Google reported losing over

play09:28

a hundred million dollars due to such

play09:31

scams a Belgium bank lost over seventy

play09:34

five million dollars and many more so

play09:37

again think before you click we just

play09:42

reviewed three examples of online

play09:44

threats extortion ransomware and spear

play09:48

phishing personalized attacks obviously

play09:52

this talk is not nearly long enough to

play09:54

go through all existing online threats

play09:56

but to be honest it almost always comes

play09:59

down to the same thing social

play10:02

engineering security awareness is an

play10:05

ongoing process

play10:07

the attackers grow in sophistication

play10:09

every day so if you feel someone is

play10:13

trying to manipulate you get you to do

play10:16

something now tap into your innermost

play10:19

fears or pixel curiosity be vigilant

play10:23

review emails online ads text messages

play10:26

with a grain of salt look for red flags

play10:30

like non personalized emails unknown

play10:33

senders or suspicious-looking links and

play10:35

if something that doesn't feel right

play10:38

don't ignore your instincts and consult

play10:41

a professional when you go home today I

play10:46

urge you to remember three things think

play10:49

before you share before posting on

play10:52

social media think if this is something

play10:55

that you should share with the world

play10:57

think before you click

play10:59

look for phishing warning signs and

play11:01

think ahead and back up your important

play11:05

data

play11:06

I am confident that by using the tools

play11:09

and techniques I shared with you today

play11:10

you can use the Internet while keeping

play11:13

yourselves and your loved ones safe

play11:15

online now and forever thank you

Rate This

5.0 / 5 (0 votes)

Related Tags
CybersecuritySocial EngineeringOnline SafetyPhishing AwarenessRansomware ProtectionData BackupSextortionScam PreventionInternet SecurityCyber Threats