Post ATjslu9U8AwIGvc2PA by mutebird@collapsitarian.io
(DIR) More posts by mutebird@collapsitarian.io
(DIR) Post #ATjr74WOZYl2bbIIu8 by ultem@brotka.st
2023-03-18T11:30:51.298476Z
1 likes, 2 repeats
I'm preparing a Cybersecurity lecture for middle-aged or older people with topics like password security, 2FA, device security, online banking, contactless credit cards etc. I only have an hour or two and I have to dumb it down so the basic concepts will stick. However, I also don't want to scare these people into a fatalism where they believe everything is insecure and any measures do not suffice.What would you focus on? What topics should I introduce and what measures should I recommend?Thank you!
(DIR) Post #ATjslu9U8AwIGvc2PA by mutebird@collapsitarian.io
2023-03-18T11:49:26.735655Z
0 likes, 0 repeats
@ultem Is the lecture for a business or some other thing?
(DIR) Post #ATjsyoxSkkGLvb9FNA by ultem@brotka.st
2023-03-18T11:51:46.645723Z
0 likes, 0 repeats
@mutebird It's for a place I volunteer at, a one-world-shop that collects funds for aid projects. I already gave a talk on credit card fraud, since we had that in the past in the shop.This talk should focus more on people's everyday issues. The audience is very non-technical, but smarter than societal average.
(DIR) Post #ATjtIDF4goYekIdHhg by josemanuel@qoto.org
2023-03-18T11:55:15Z
0 likes, 0 repeats
@ultem For the overview, you can start with something like this: https://tilvids.com/videos/watch/c05c550f-9c8d-4751-80ac-ba516f66f9c3.For the rest, use #infosec. Those who read the hashtag can probably help you better than I.
(DIR) Post #ATjugrfk7fq32eQR5k by amerika@noagendasocial.com
2023-03-18T12:10:55Z
1 likes, 0 repeats
@ultem Focus on general principles. Never trust an email, go to the website. Keep passwords high entropy. Eliminate any services you do not need. Avoid Microsoft.
(DIR) Post #ATjwUIgKagW2xCpxia by mutebird@collapsitarian.io
2023-03-18T12:31:05.032568Z
1 likes, 0 repeats
@ultem This might not be an issue in your case but people dont seem to understand why it matters to them in particular.My last job had a lot of cybersecurity training but the overall sentiment was "yeah but were a small company, no one would bother with us". I changed a few peoples minds by explaining what a supply chain attack is and how most people know our customers (Raytheon, Northrop, Lockheed, etc)I think people grasp the broad strokes of what we are doing, but not many understand why we are doing it. If that makes sense.
(DIR) Post #ATjwjija0j9Y67i3VY by ultem@brotka.st
2023-03-18T12:33:52.030609Z
0 likes, 0 repeats
@mutebird Makes sense. Then I should introduce the topic with what could go wrong for the particular person if they mess up 🤔
(DIR) Post #ATjwlmdeSuSymnv82S by ultem@brotka.st
2023-03-18T12:34:14.487841Z
0 likes, 0 repeats
@amerika Sounds reasonable, thank you!
(DIR) Post #ATjzsS4xbSowuZZ6UC by p@raru.re
2023-03-18T13:09:03Z
1 likes, 0 repeats
phishing and scammers@ultem
(DIR) Post #ATkCPywxbrB3rhZuKG by not_br549@jollyville.net
2023-03-18T15:29:34.659256Z
1 likes, 0 repeats
have them log-in, tell them to guess the password, accept anything they type in, and prepare a spreadsheet of the guessed passwords.
(DIR) Post #ATmmEiKv1W0tosdA4u by mangeurdenuage@shitposter.club
2023-03-19T21:20:20.351426Z
1 likes, 0 repeats
@ultem >I also don't want to scare these people into a fatalism where they believe everything is insecure and any measures do not suffice.:kekw: >What would you focus on?-Password manager-Legal security vs technical security (legal is trust but it's no guaranty, technical is the only real tangible guaranty).-Proprietary (blackbox un-trustworthy, only is a legal human trust) vs Free/libre (publicly, technically, understandable work).
(DIR) Post #ATmmUNAXUVf6nsF5Cy by crafti@akkoma.0x68756773.moe
2023-03-18T11:37:51.416572Z
0 likes, 0 repeats
@ultem 2fa and social engineering
(DIR) Post #ATmmUPaqTftQK2Z7UO by mangeurdenuage@shitposter.club
2023-03-19T21:23:07.314743Z
0 likes, 0 repeats
@crafti @ultem >2fa:thatswhereyourewrongkiddo2: >social engineeringToucher but go explain that soon some AI will phone them and will emulate perfectly the voice of someone they know because they installed proprietary software on their phone and legally let it access all of the audio records to scam them.