Title: The New Data Security Threat
1(No Transcript)
2The New DataSecurity Threat
3Your Computers at Risk
How cyber-criminals are winning the Malware wars
Presented by Placer Computers
4Zero Day Attacks
- PC Magazine A Zero-Day Attack is a virus or
other malware exploit that takes advantage of a
hole in a program or operating system before the
software developer has made a fix available...
5Am I At Risk?
- Cyber-criminals create over 60,000 new Malware
attacks EVERY DAY! - Antivirus/Antispyware software doesnt protect
against new threats until AFTER they strike. - Once the malware gets in, it seeks and attacks
programs with security vulnerabilities
6So Whats New?
- Microsoft has improved its security updates while
3rd party software has not - 3rd party software is less likely to be regularly
updated by the PC owner - Cyber-criminals know this so they are focusing on
the less secure 3rd party vulnerabilities
7What About My Computer?
- The average PC has between 24-26 non-Microsoft
(3rd party) apps installed - According to Gregg Keiser of ComputerworldWhil
e vulnerabilities in Windows XP and Vista will
climb by 31 and 34 respectively this year bugs
in 3rd party apps will jump by 92
8How Will It Effect Me?
- California Civil Code 1798.81.5Requires
businesses that collect and store personal data
on their computers to enact reasonable security
measures to prevent hacking and data theft. - California Financial Code 4057If your client
data is stolen, you can be fined up to 2500 PER
RECORD, with a maximum of 500,000
9There is a solution
10(No Transcript)
11Placer Computers
12Placer Computers
Security Management KEEPING YOUR SOFTWARE UP TO
DATE
13Placer Computers
SO WHAT CAN PLACER COMPUTERS DO FOR YOU?
14Placer Computers
STEP 1 Security Scan Identify software
vulnerabilities www.PlacerComputers.com
15Placer Computers
STEP 2 Locate Missing Updates Microsoft
critical/optional patches 3rd Party program
updates/patches www.PlacerComputers.com
16Placer Computers
STEP 3 Identify End-of-Life Software Programs
no longer supported are risky! www.PlacerComput
ers.com
17Placer Computers
STEP 4 Download, install security
updates Ensures that all software is
up-to-date www.PlacerComputers.com
18Placer Computers
STEP 5 Find replacements for EOL programs Many
free options are available. We will research and
provide recommendations www.PlacerComputers.com
19Placer Computers
STEP 6 Scan and repair privacy leaks Most
programs leave a trail of personal
data www.PlacerComputers.com
20Placer Computers
STEP 7 Spyware Scan Catch any malware that
gotpast your Antivirus software www.PlacerCompu
ters.com
21Placer Computers
STEP 8 System Cleanup and Optimization Clean
your computer in/outOptimize your PC to run
better www.PlacerComputers.com
22Placer Computers
BOOK NOW AND SAVE 50 off 530-388-8811 www.Pla
cerComputers.com