Sophos ThreatBeaters Social Media

Document Sample
Sophos ThreatBeaters Social Media Powered By Docstoc
					Social media threats
     Warning!
May contain mild peril
                                Contents


•   What is social media?
•   Risks associated with social media
•   How the threats work
         •   Social media spam
         •   Social media phishing
         •   Social media malware
•   Using social media safely
What is social media?
           Social media has arrived

Social networking sites are now more popular than web-based email
              Social media – key features

•   Allows users to become a member of an online community
•   Key features are “Profiles” and “Friend lists”
•   The most commonly used social network is still Facebook
•   2009 saw the rapid emergence of Twitter
•   Also called social networking
Risks associated with social media
     Two main types of threat



   Users                    Social
 publishing               networking
information                attacks
     Users publishing information


•   Reveal sensitive information
•   Defamation of others/school system


This can be inadvertent or deliberate


And the repercussions include:
•   Reputation damage
•   Fines
        Social networking attacks




  Hobby/                   Financially-motivated
showing off                   organized crime
           Social networking attacks


Social networking accounts
are valuable to hackers

They can use them to send spam,
spread malware, steal identities...

… in the quest to acquire personal
information for financial gain
                            Data = $$$

•   Steal your money directly
•   Sell your data
•   Trick your friends and family into
    supplying personal data
•   Sell your identity
•   Use your accounts to spread spam,
    malware and more data theft scams!
•   Sell your school’s data or
    sensitive information
•   Blackmail individuals and organizations
How the threats work
           How the threats work



•   Spam
•   Phishing
•   Malware
Social networking spam
Social networking spam
Social networking spam
Social networking spam
Social networking spam
Social networking spam
              Social networking spam



57%
of social networking users
report being hit by spam
                             That’s an increase of


                             70.6%
via the services



                             from a year ago
Social networking phishing
Social networking phishing
Social networking phishing
Social networking phishing
           Social networking phishing



30%
of social networking users
report phishing attacks
                             That’s an increase of


                             42.9%
via the sites



                             from a year ago
Social networking malware
Social networking malware
Social networking malware
Social networking malware
Social networking malware
Social networking malware
Using social media safely
             Top tips for staying secure

•   KNOW THE RULES - check your organization’s policy on social
    networking
•   USE SECURE PASSWORDS - minimum 14 characters including non-
    letters
•   CHECK THE DEFAULT SETTINGS - don’t providing personal information
    by default
•   BE PICTURE PRUDENT - think before posting images that might cause
    embarrassment
•   BEWARE OF BIG BROTHER - assume everyone can read your posts,
    including hackers!
•   SECURE YOUR COMPUTERS - use up-to-date security software and
    firewalls
•   THINK BEFORE YOU CLICK - if the email looks dodgy it probably is
•   STRANGER DANGER - beware of unsolicited invitations from spammers
                           Summary


•   Financially-motivated criminals are increasingly using social
    media sites to steal identities, spread malware and send spam

•   Social networks are getting better at protecting users against
    these threats – but there’s a long way to go


•   The onus is on YOU to use social media sites safely –
    follow the top tips for staying secure
Thank you

				
DOCUMENT INFO
Shared By:
Categories:
Tags:
Stats:
views:27
posted:1/17/2012
language:
pages:36