SlideShare uma empresa Scribd logo
1 de 63
Baixar para ler offline
UnoHighSchoolAlumniAssociation,Inc.
Ricson Singson Que
President and CEO
Sqrity Consulting
PRESENTS
May 1, 2021
4:00 p.m.
● World has changed: Covid Special
● The Threat Landscape
● Digital Hygiene practices and tips
Agenda
May 01
Happy Labor Day!
Uno High School
May 01
Happy Labor Day!
Did you notice the
change?
How do you eat?
How do you sleep?
Industry 4.0
Web 3.0
3rd Platform
Industry 4.0
Web 3.0
3rd Platform
Then came . . .
. . . COVID-19
Accelerated Activities
● Video conferencing and communications
● E-commerce
● Logistics
● Remote working / telecommuting
● Online learning / online gaming
● Online jobs
● Health research
● Planning (strategic, business continuity, riskman, and security)
● Digital lifestyle
● Cyber threats and attacks
Work from Home.
Reality Check.
Let’s face it: the future is now. We are
already living in a cyber society, so we
need to stop ignoring it or pretending that
is not affecting us.
- Marco Ciapelli
Threat Landscape
Digital Guardian Data Trends Report (5/28/2020)
● employees copied company data to USB drives 123% more than before
the pandemic
● 74% of that data marked as "classified"
● Data egress over email, USB, and cloud services leaped 80%,
● more than 50% of that data marked as "classified"
● spike in data copying is a 62% increase in malicious activity on corporate
networks and servers
● a 54% bump in incident-response investigations
COVID Cybercrime: 10 Disturbing Statistics to Keep You Awake Tonight
1. The number of unsecured remote desktop machines rose by more than 40%
2. RDP brute-force attacks grew 400% in March and April alone
3. Email scams related to COVID-19 surged 667% in March alone
4. Users are now three times more likely to click on pandemic-related phishing scams
5. Billions of COVID-19 pages on the Internet
6. Tens of thousands of new coronavirus-related domains are being created daily
7. 90% of newly created coronavirus domains are scammy
8. More than 530,000 Zoom accounts sold on dark web
9. 2000% increase in malicious files with "zoom" in name
10. COVID-19 drives 72% to 105% ransomware spike
Stats from ZDNet - Sept 14, 2020
Local Data from PNP Cybercrime
Top 3 for 2020
Online Scams – 1,842
Online Libel – 1,437
Identify Theft - 721
Online Scams
Online Libel
False statement publicly online usually in social media
Identity Theft
Not even the most powerful man in the world is
100% secure.
- Safetyquotes from birthdaywishes.expert
“Security is everyone’s responsibility.”
Malware
Hoax
Logic
Bomb Botnet
24%
25%
51%
Human Error
System Glitch
Malicious
Digital Hygiene Practices
Clean Desk Policy
Clean Desktop Policy
Passwords
Passwords
Physical Security
and
Environmental
Controls
Bring-Your-
Own-Device
(BYOD)
Policy
Bring-Home-
Your-Office-
Device (BHYOD)
Policy
Data
Management
Removable Media and Cloud
Hoaxes
• Ask for information
• Verifying information
• Ask you to install
• Ask you for money
• Ask you to forward a message
Social Networking
Dangers
Email Scams
Pop-ups
Disable Pop-up settings of your
browser.
Separate Play and Study/Work
● Use the right device
● Connect to a secured network
● Use official school LMS or online education platform
● Communicate through official channels
● Protect both digital and physical assets
● Use or activate encryption (Bitlocker for Windows, FileVault for MAC)
● Activate security features - 2FA - authenticator
● If you are not sure, ask. Parent, faculty, and friends.
● Always think that someone will hack your information . . . they will.
Safe Computing - Dunkin Donuts!
● Do not share your credentials.
● Do not use dictionary passwords for all.
● Do not use default passwords for all.
● Do not save confidential files on personal devices.
● Do not share everything in your social network.
● Do not share your desktop when presenting.
● Do not use pirated software.
● Do not turn off auto-update.
● Do not forget to logout.
How will I be
further guided?
The Dark Web is the
World Wide Web content
that exists on darknets,
overlay networks that use
the Internet but require
specific software,
configurations, or
authorization to access.
“Security is everyone’s responsibility.”
“That which does not kill us,
makes us stronger.”
- Friedrich Nietzsche
Q & A
ricson@gmail.com;
ricson@sqrity.com
www.ricson.com
All trademarks and information presented are properties by their
respective IP owners They were assimilated in this learning module
for the purpose of education and fair use. The participants are in no
way authorized to further reproduce, but may archive this copy
as reference to learning and not for commercial purposes. This
material is only for the exclusive Internal use of De La Salle University.
+639178980086
05/1/2021
DOST ICT Office
Office of Deputy Executive Director for Cybersecurity
Ground Floor, ICTO Building
Carlos P. Garcia Avenue
U.P. Campus, Diliman
1101 Quezon City
Tel: (632)920-0101 local 1200
National Bureau of Investigation
Cybercrime Division
Taft Avenue, Manila
Tel: (632)523-8231 to 38 local 3454, 3455
Email: ccd@nbi.gov.ph
Philippine National Police
PNP-ACG Operations Center
Camp Crame, Quezon City
Tel: (632)414-1560
Smart: +63 961 829 8083 and Globe: +63 9155898506
Email: info@acg.pnp.gov.ph
Prepared and presented by: Ricson Singson Que
DOJ Office of Cybercrime
Padre Faura Street
Ermita, Manila
Tel: (632)521-8345 and (632)524-
2230
Email: cybercrime@doj.gov.ph
AFP Cyber Group
Camp General Emilio Aguinaldo, EDSA,
Quezon City, Metro Manila 1100
0915 589 8506

Mais conteúdo relacionado

Mais procurados

Andersen Elementary Tech Safety 2015
Andersen Elementary Tech Safety 2015Andersen Elementary Tech Safety 2015
Andersen Elementary Tech Safety 2015Scott Burnett
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersStephen Thomas, CISSP
 
The Future of Content Management - AIIM Conference 2011
The Future of Content Management - AIIM Conference 2011The Future of Content Management - AIIM Conference 2011
The Future of Content Management - AIIM Conference 2011Laurence Hart
 
Security awareness-checklist 2019
Security awareness-checklist 2019Security awareness-checklist 2019
Security awareness-checklist 2019Mustafa Kuğu
 
Cyberterrorism. Past, Present, Future
Cyberterrorism. Past, Present, FutureCyberterrorism. Past, Present, Future
Cyberterrorism. Past, Present, FuturePriyanka Aash
 
CyberTerrorism - A case study for Emergency Management
CyberTerrorism - A case study for Emergency ManagementCyberTerrorism - A case study for Emergency Management
CyberTerrorism - A case study for Emergency ManagementRicardo Reis
 
How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe onlinexlilmermaidx
 
Building a secure cyberspace for innovative enterprise, a collective responsi...
Building a secure cyberspace for innovative enterprise, a collective responsi...Building a secure cyberspace for innovative enterprise, a collective responsi...
Building a secure cyberspace for innovative enterprise, a collective responsi...Kayode Yussuf
 
osn-threats-solutions-2
osn-threats-solutions-2osn-threats-solutions-2
osn-threats-solutions-2SMITA V MORE
 
Ron_Hyams_lightning_talk_wiad2016_final2
Ron_Hyams_lightning_talk_wiad2016_final2Ron_Hyams_lightning_talk_wiad2016_final2
Ron_Hyams_lightning_talk_wiad2016_final2RonHyams
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrimepatelripal99
 
Covid 19, How A Pandemic Situation Shapes Cyber Threats
Covid 19, How A Pandemic Situation Shapes Cyber ThreatsCovid 19, How A Pandemic Situation Shapes Cyber Threats
Covid 19, How A Pandemic Situation Shapes Cyber ThreatsArun Kannoth
 
Cyber Crime - The New World Order (v1.0 - 2016)
Cyber Crime - The New World Order (v1.0 - 2016)Cyber Crime - The New World Order (v1.0 - 2016)
Cyber Crime - The New World Order (v1.0 - 2016)Rui Miguel Feio
 
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3Asad Zaman
 
Just Look Around And Ask
Just Look Around And AskJust Look Around And Ask
Just Look Around And AskBob Larrivee
 

Mais procurados (19)

Andersen Elementary Tech Safety 2015
Andersen Elementary Tech Safety 2015Andersen Elementary Tech Safety 2015
Andersen Elementary Tech Safety 2015
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
 
The Future of Content Management - AIIM Conference 2011
The Future of Content Management - AIIM Conference 2011The Future of Content Management - AIIM Conference 2011
The Future of Content Management - AIIM Conference 2011
 
Security awareness-checklist 2019
Security awareness-checklist 2019Security awareness-checklist 2019
Security awareness-checklist 2019
 
Personal Digital Hygiene
Personal Digital HygienePersonal Digital Hygiene
Personal Digital Hygiene
 
Cyberterrorism. Past, Present, Future
Cyberterrorism. Past, Present, FutureCyberterrorism. Past, Present, Future
Cyberterrorism. Past, Present, Future
 
Brochure
BrochureBrochure
Brochure
 
CyberTerrorism - A case study for Emergency Management
CyberTerrorism - A case study for Emergency ManagementCyberTerrorism - A case study for Emergency Management
CyberTerrorism - A case study for Emergency Management
 
How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe online
 
Building a secure cyberspace for innovative enterprise, a collective responsi...
Building a secure cyberspace for innovative enterprise, a collective responsi...Building a secure cyberspace for innovative enterprise, a collective responsi...
Building a secure cyberspace for innovative enterprise, a collective responsi...
 
osn-threats-solutions-2
osn-threats-solutions-2osn-threats-solutions-2
osn-threats-solutions-2
 
Cyber security Awareness: In perspective of Bangladesh
Cyber security Awareness: In perspective of Bangladesh Cyber security Awareness: In perspective of Bangladesh
Cyber security Awareness: In perspective of Bangladesh
 
Ron_Hyams_lightning_talk_wiad2016_final2
Ron_Hyams_lightning_talk_wiad2016_final2Ron_Hyams_lightning_talk_wiad2016_final2
Ron_Hyams_lightning_talk_wiad2016_final2
 
C3 and digital citizenship
C3 and digital citizenshipC3 and digital citizenship
C3 and digital citizenship
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
 
Covid 19, How A Pandemic Situation Shapes Cyber Threats
Covid 19, How A Pandemic Situation Shapes Cyber ThreatsCovid 19, How A Pandemic Situation Shapes Cyber Threats
Covid 19, How A Pandemic Situation Shapes Cyber Threats
 
Cyber Crime - The New World Order (v1.0 - 2016)
Cyber Crime - The New World Order (v1.0 - 2016)Cyber Crime - The New World Order (v1.0 - 2016)
Cyber Crime - The New World Order (v1.0 - 2016)
 
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
 
Just Look Around And Ask
Just Look Around And AskJust Look Around And Ask
Just Look Around And Ask
 

Semelhante a Abso lutely!

Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021Ludmila Morozova-Buss
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSPreetiDevidas
 
How COVID-19 Changed The Cyber Security Worldwide? — Cyberroot Risk Advisory
How COVID-19 Changed The Cyber Security Worldwide? — Cyberroot Risk AdvisoryHow COVID-19 Changed The Cyber Security Worldwide? — Cyberroot Risk Advisory
How COVID-19 Changed The Cyber Security Worldwide? — Cyberroot Risk AdvisoryCR Group
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessRamiro Cid
 
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...TechSoup
 
8Network Security April 2020FEATUREAre your IT staf.docx
8Network Security  April 2020FEATUREAre your IT staf.docx8Network Security  April 2020FEATUREAre your IT staf.docx
8Network Security April 2020FEATUREAre your IT staf.docxmeghanivkwserie
 
8Network Security April 2020FEATUREAre your IT staf.docx
8Network Security  April 2020FEATUREAre your IT staf.docx8Network Security  April 2020FEATUREAre your IT staf.docx
8Network Security April 2020FEATUREAre your IT staf.docxpriestmanmable
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of securityMatthew Pascucci
 
Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting TopCyberNewsMAGAZINE
 
Cyber Security at CTX15, London
Cyber Security at CTX15, LondonCyber Security at CTX15, London
Cyber Security at CTX15, LondonJohn Palfreyman
 
Staying Ahead in the Cybersecurity Game: What Matters Now
Staying Ahead in the Cybersecurity Game: What Matters NowStaying Ahead in the Cybersecurity Game: What Matters Now
Staying Ahead in the Cybersecurity Game: What Matters NowCapgemini
 
Raise The Cybersecurity Curtain! Be The Voice!
Raise The Cybersecurity Curtain! Be The Voice!Raise The Cybersecurity Curtain! Be The Voice!
Raise The Cybersecurity Curtain! Be The Voice!Ludmila Morozova-Buss
 
Digital Footprint in our world
Digital Footprint in our worldDigital Footprint in our world
Digital Footprint in our worldJustino Lourenço
 
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...Cyber Security Alliance
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfInfinityGroup5
 
Deepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
Deepfake Technology's Emergence: Exploring Its Impact on CybersecurityDeepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
Deepfake Technology's Emergence: Exploring Its Impact on CybersecurityPC Doctors NET
 

Semelhante a Abso lutely! (20)

Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
 
How COVID-19 Changed The Cyber Security Worldwide? — Cyberroot Risk Advisory
How COVID-19 Changed The Cyber Security Worldwide? — Cyberroot Risk AdvisoryHow COVID-19 Changed The Cyber Security Worldwide? — Cyberroot Risk Advisory
How COVID-19 Changed The Cyber Security Worldwide? — Cyberroot Risk Advisory
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
 
INTERNET
INTERNETINTERNET
INTERNET
 
8Network Security April 2020FEATUREAre your IT staf.docx
8Network Security  April 2020FEATUREAre your IT staf.docx8Network Security  April 2020FEATUREAre your IT staf.docx
8Network Security April 2020FEATUREAre your IT staf.docx
 
8Network Security April 2020FEATUREAre your IT staf.docx
8Network Security  April 2020FEATUREAre your IT staf.docx8Network Security  April 2020FEATUREAre your IT staf.docx
8Network Security April 2020FEATUREAre your IT staf.docx
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
 
Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting
 
The Digital Dilemma - Igor Verhoeven, Bindung
The Digital Dilemma - Igor Verhoeven, BindungThe Digital Dilemma - Igor Verhoeven, Bindung
The Digital Dilemma - Igor Verhoeven, Bindung
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
1402.1842.pdf
1402.1842.pdf1402.1842.pdf
1402.1842.pdf
 
Cyber Security at CTX15, London
Cyber Security at CTX15, LondonCyber Security at CTX15, London
Cyber Security at CTX15, London
 
Staying Ahead in the Cybersecurity Game: What Matters Now
Staying Ahead in the Cybersecurity Game: What Matters NowStaying Ahead in the Cybersecurity Game: What Matters Now
Staying Ahead in the Cybersecurity Game: What Matters Now
 
Raise The Cybersecurity Curtain! Be The Voice!
Raise The Cybersecurity Curtain! Be The Voice!Raise The Cybersecurity Curtain! Be The Voice!
Raise The Cybersecurity Curtain! Be The Voice!
 
Digital Footprint in our world
Digital Footprint in our worldDigital Footprint in our world
Digital Footprint in our world
 
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
 
Deepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
Deepfake Technology's Emergence: Exploring Its Impact on CybersecurityDeepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
Deepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 

Último (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 

Abso lutely!

  • 1. UnoHighSchoolAlumniAssociation,Inc. Ricson Singson Que President and CEO Sqrity Consulting PRESENTS May 1, 2021 4:00 p.m.
  • 2.
  • 3. ● World has changed: Covid Special ● The Threat Landscape ● Digital Hygiene practices and tips Agenda
  • 7. Did you notice the change?
  • 8. How do you eat?
  • 9. How do you sleep?
  • 10. Industry 4.0 Web 3.0 3rd Platform Industry 4.0 Web 3.0 3rd Platform
  • 11. Then came . . . . . . COVID-19
  • 12.
  • 13. Accelerated Activities ● Video conferencing and communications ● E-commerce ● Logistics ● Remote working / telecommuting ● Online learning / online gaming ● Online jobs ● Health research ● Planning (strategic, business continuity, riskman, and security) ● Digital lifestyle ● Cyber threats and attacks
  • 15.
  • 16.
  • 18. Let’s face it: the future is now. We are already living in a cyber society, so we need to stop ignoring it or pretending that is not affecting us. - Marco Ciapelli
  • 20. Digital Guardian Data Trends Report (5/28/2020) ● employees copied company data to USB drives 123% more than before the pandemic ● 74% of that data marked as "classified" ● Data egress over email, USB, and cloud services leaped 80%, ● more than 50% of that data marked as "classified" ● spike in data copying is a 62% increase in malicious activity on corporate networks and servers ● a 54% bump in incident-response investigations
  • 21. COVID Cybercrime: 10 Disturbing Statistics to Keep You Awake Tonight 1. The number of unsecured remote desktop machines rose by more than 40% 2. RDP brute-force attacks grew 400% in March and April alone 3. Email scams related to COVID-19 surged 667% in March alone 4. Users are now three times more likely to click on pandemic-related phishing scams 5. Billions of COVID-19 pages on the Internet 6. Tens of thousands of new coronavirus-related domains are being created daily 7. 90% of newly created coronavirus domains are scammy 8. More than 530,000 Zoom accounts sold on dark web 9. 2000% increase in malicious files with "zoom" in name 10. COVID-19 drives 72% to 105% ransomware spike Stats from ZDNet - Sept 14, 2020
  • 22. Local Data from PNP Cybercrime Top 3 for 2020 Online Scams – 1,842 Online Libel – 1,437 Identify Theft - 721
  • 24. Online Libel False statement publicly online usually in social media
  • 26. Not even the most powerful man in the world is 100% secure. - Safetyquotes from birthdaywishes.expert
  • 27. “Security is everyone’s responsibility.”
  • 30.
  • 38.
  • 39.
  • 43.
  • 46. • Ask for information • Verifying information • Ask you to install • Ask you for money • Ask you to forward a message
  • 48.
  • 50.
  • 52. Separate Play and Study/Work ● Use the right device ● Connect to a secured network ● Use official school LMS or online education platform ● Communicate through official channels ● Protect both digital and physical assets ● Use or activate encryption (Bitlocker for Windows, FileVault for MAC) ● Activate security features - 2FA - authenticator ● If you are not sure, ask. Parent, faculty, and friends. ● Always think that someone will hack your information . . . they will.
  • 53. Safe Computing - Dunkin Donuts! ● Do not share your credentials. ● Do not use dictionary passwords for all. ● Do not use default passwords for all. ● Do not save confidential files on personal devices. ● Do not share everything in your social network. ● Do not share your desktop when presenting. ● Do not use pirated software. ● Do not turn off auto-update. ● Do not forget to logout.
  • 54. How will I be further guided?
  • 55.
  • 56.
  • 57. The Dark Web is the World Wide Web content that exists on darknets, overlay networks that use the Internet but require specific software, configurations, or authorization to access.
  • 58. “Security is everyone’s responsibility.”
  • 59. “That which does not kill us, makes us stronger.” - Friedrich Nietzsche
  • 60. Q & A ricson@gmail.com; ricson@sqrity.com www.ricson.com All trademarks and information presented are properties by their respective IP owners They were assimilated in this learning module for the purpose of education and fair use. The participants are in no way authorized to further reproduce, but may archive this copy as reference to learning and not for commercial purposes. This material is only for the exclusive Internal use of De La Salle University. +639178980086
  • 62.
  • 63. DOST ICT Office Office of Deputy Executive Director for Cybersecurity Ground Floor, ICTO Building Carlos P. Garcia Avenue U.P. Campus, Diliman 1101 Quezon City Tel: (632)920-0101 local 1200 National Bureau of Investigation Cybercrime Division Taft Avenue, Manila Tel: (632)523-8231 to 38 local 3454, 3455 Email: ccd@nbi.gov.ph Philippine National Police PNP-ACG Operations Center Camp Crame, Quezon City Tel: (632)414-1560 Smart: +63 961 829 8083 and Globe: +63 9155898506 Email: info@acg.pnp.gov.ph Prepared and presented by: Ricson Singson Que DOJ Office of Cybercrime Padre Faura Street Ermita, Manila Tel: (632)521-8345 and (632)524- 2230 Email: cybercrime@doj.gov.ph AFP Cyber Group Camp General Emilio Aguinaldo, EDSA, Quezon City, Metro Manila 1100 0915 589 8506