The Rise of the Smartphone Fueled SocialMediaAddicted Workplace

  • Slides: 53
Download presentation
The Rise of the Smartphone. Fueled Social-Media-Addicted Workplace Zombies By Daniel A. Schwartz IASA

The Rise of the Smartphone. Fueled Social-Media-Addicted Workplace Zombies By Daniel A. Schwartz IASA November 2017

Zombies

Zombies

Nazi Zombies

Nazi Zombies

And Then The Attacks Happened…Again

And Then The Attacks Happened…Again

Zombies!

Zombies!

Workplace Zombies

Workplace Zombies

Warning: They may not look like this.

Warning: They may not look like this.

These Are The Same People…

These Are The Same People…

Who Still Plays Solitaire?

Who Still Plays Solitaire?

And Made This a Top 10 App…

And Made This a Top 10 App…

So, Most of Your Employees…Are Zombies

So, Most of Your Employees…Are Zombies

Smartphone Zombies

Smartphone Zombies

Smartphone Zombies • Wikipedia - A smartphone zombie (smombie) is a pedestrian who walks

Smartphone Zombies • Wikipedia - A smartphone zombie (smombie) is a pedestrian who walks slowly and without attention to their surroundings because they are focused upon their smartphone.

In the Netherlands Pavement lights used at pedestrian crossings

In the Netherlands Pavement lights used at pedestrian crossings

It’s Spreading

It’s Spreading

Let’s Assume • The rapid adoption of smartphones is changing how people function u

Let’s Assume • The rapid adoption of smartphones is changing how people function u They receive information 24/7 u They convey information 24/7 u And they are endlessly informed and distracted

Now Add….

Now Add….

Ignore at Your Own Peril • 79 percent of online users use Facebook. u

Ignore at Your Own Peril • 79 percent of online users use Facebook. u Twitter - 24% u Pinterest - 31% u Instagram - 32% u Linked. In - 29% • Put another way: 68% of ALL U. S. Adults are Facebook users Source: Pew Internet (November 2016) © 2012 Pullman & LLC

And Messaging Apps Are Next • 29% of smartphone owners use messaging apps such

And Messaging Apps Are Next • 29% of smartphone owners use messaging apps such as Whats. App or Kik • 24% use messaging apps that automatically delete sent messages such as Snapchat or Wickr 19

Where Are The "Kids"? • Among 18 -29 yo, 56 percent of smartphone users

Where Are The "Kids"? • Among 18 -29 yo, 56 percent of smartphone users use auto-delete apps (like Snapchat) u More than 4 times the share among those 3049 yo (13%) • Similarly, 42% of those same 18 -29 yo use general messaging apps 20

And Among Teenagers…. • 94% of teens who go online do so daily •

And Among Teenagers…. • 94% of teens who go online do so daily • Piper Jaffray Fall 2016 study u 35% use Snapchat u 24% use Instagram u 13% use Twitter u Facebook is 4 th - with 12% u Pinterest - 1% 21

And Your Workers Too

And Your Workers Too

Guess What? • They’re all either in your office workforce or will soon be

Guess What? • They’re all either in your office workforce or will soon be there • Either way, you can’t destroy your employee’s brains

What Are The Legal Implications? • Data privacy • Lack of in-person communications •

What Are The Legal Implications? • Data privacy • Lack of in-person communications • Failure to integrate into culture, including business ethics • A confusion between “at work” and “outside of work” • Using outside systems

DATA PRIVACY & THE WORKPLACE

DATA PRIVACY & THE WORKPLACE

Whac-a-Mole

Whac-a-Mole

As An Aside….

As An Aside….

But Zombies In The Workplace…

But Zombies In The Workplace…

FBI’s 5/4/17 PSA • Business E-mail Compromise: “Sophisticated scam targeting businesses working with foreign

FBI’s 5/4/17 PSA • Business E-mail Compromise: “Sophisticated scam targeting businesses working with foreign suppliers or businesses that regularly perform wire transfer payments. ” u E-mail Account Compromise now similar • How does it work? Compromises legit business e-mail through social engineering to conduct unauthorized transfer of funds Source: https: //www. ic 3. gov/media/2017/170504. aspx

Five Types of BEC • Business Working with foreign supplier • Business Executive Receiving

Five Types of BEC • Business Working with foreign supplier • Business Executive Receiving or Initiating a Request for Wire Transfer • Business Contacts Receiving Fake E-mail • Business Executive/Attorney Impersonation • Data Theft – W-2 s or PII Source: https: //www. ic 3. gov/media/2017/170504. aspx

Trends • W-2 / PII Data Theft • Resurgence of Original Scheme of Int’l

Trends • W-2 / PII Data Theft • Resurgence of Original Scheme of Int’l Suppliers • Real Estate Transactions u 480 percent increase in complaints by title companies

Cyber Trends… • Business Email Compromise v Wire transfer request • Since the FBI’s

Cyber Trends… • Business Email Compromise v Wire transfer request • Since the FBI’s Internet Crime Complaint Center (IC 3) began tracking BEC scams in late 2013, it has compiled statistics on more than 22, 000 U. S. companies that have been victimized—with total dollar losses exceeding $1. 5 Billion https: //www. fbi. gov/news/stories/2015/august/business-e-mailcompromise/business-e-mail-compromise /

Common Scenario • CFO “sends” e-mail to the business office requesting the W-2 forms

Common Scenario • CFO “sends” e-mail to the business office requesting the W-2 forms on an urgent basis u u u Kindly send me the individual 2016 W-2 (PDF) and earnings summary of all W-2 of our company staff for a quick review. Can you send me the updated list of employees with full details (name, social security number, date of birth, home address, salary). I want you to send me the list of W-2 copy of employees wage and tax statement for 2016, I need them in PDF file type, you can send it as an attachment. Kindly prepare the lists and email them to me ASAP.

Cyber Trends… • Ransomware • • Most popular version, until recently is Cryptolocker Encrypts

Cyber Trends… • Ransomware • • Most popular version, until recently is Cryptolocker Encrypts user data and ransoms the key for a price • Regular backups • Patching (OS and Apps)

2017 Attack • Largest attack • 200, 000 computers by Sunday evening • And

2017 Attack • Largest attack • 200, 000 computers by Sunday evening • And growing • Patch had been available…if only the ZOMBIES knew about it

Ransomware • Companies are by far the biggest target • 21 percent related to

Ransomware • Companies are by far the biggest target • 21 percent related to espionage u u And of those, 90 percent are linked to stateaffiliated groups Competitors & former employees account for remaining 10 percent Source: Verizon Data Breach Investigations Report 2017

Cyber Trends Phishing Season • E-mail (targeted) • Phone (tech support) Reconnaissance • Social

Cyber Trends Phishing Season • E-mail (targeted) • Phone (tech support) Reconnaissance • Social Media • Linked. In Cite: https: //www. lookingglasscyber. com/blo g/phishing/weekly-phishing-activity-may -1 -2017/

Cyber Trends

Cyber Trends

Examples

Examples

Other Breaches in Workplaces • Employee downloads confidential information for more than 450 k

Other Breaches in Workplaces • Employee downloads confidential information for more than 450 k participants to home computer • Hacking of plan’s administrative system v Holding such data for ransom • SSNs on documents mailed to wrong addresses or information was made visible to others

Other Breaches of Welfare Plans • Breach resulting from unencrypted information of PHI on

Other Breaches of Welfare Plans • Breach resulting from unencrypted information of PHI on laptops • Return of photocopies to leasing agent without erasing data on copier’s hard drives • Lost documents with PHI

 • Phishing is successful…because it works • 1 in 14 phishing attacks were

• Phishing is successful…because it works • 1 in 14 phishing attacks were successful in that the victim clicked on the link in the email or opened the attachment • Spoofing websites happens, but documents with embedded macros still far more common #1 Zombie Movie? Dawn of the Dead

Workplace Security Fatigue • Over 3 BILLION e-mail addresses, usernames, passwords estimated to be

Workplace Security Fatigue • Over 3 BILLION e-mail addresses, usernames, passwords estimated to be traded and sold on dark net • Have we reached the “peak”?

Can Tech Save Us From Ourselves? • Two main paths u u One -

Can Tech Save Us From Ourselves? • Two main paths u u One - Create technology to take the “people” out of it We keep trying that Ø Spam filters Ø Firewalls Ø Policies and practices

Alternatively… • Rely on the Zombies u Training? u Password changes?

Alternatively… • Rely on the Zombies u Training? u Password changes?

But That May Not Work

But That May Not Work

Cure For Zombies? • What do we know? • Can they be cured? •

Cure For Zombies? • What do we know? • Can they be cured? • Or are we only hoping to contain them?

Bring Back from Dead? • Don’t give up on your employees, but don’t assume

Bring Back from Dead? • Don’t give up on your employees, but don’t assume they will all magically be “cured” either • Work on systems that reduce the human element u Anytime you ask an employee whether they want to “encrypt” a message, answer will be no

Develop Your Own “Zombies” • Some companies indoctrinate employees into a culture of business

Develop Your Own “Zombies” • Some companies indoctrinate employees into a culture of business ethics • “Protecting” our business has to be part of the mindset • The “Jerry Maguire” version

Solutions are Not New • But the notion that technology will save what ails

Solutions are Not New • But the notion that technology will save what ails us can’t be either • Two pronged approach u u Always keeping in mind the legal exposures that exist there Data privacy is but one of a whole host of issues

If Minecraft Can Solve It…

If Minecraft Can Solve It…

Questions? These materials have been prepared by Shipman & Goodwin LLP for informational purposes

Questions? These materials have been prepared by Shipman & Goodwin LLP for informational purposes only. They are not intended as advertising and should not be considered legal advice. This information is not intended to create, and receipt of it does not create, a lawyer-client relationship. Viewers should not act upon this information without seeking professional counsel.