Title: Top Threats and What You Can Do About Them
1Cyber Security
01110000011100100110100101101111011100100110100101
11010001111001001000000110010001100001011101000110
00010111000001110010011010010110111101110010011010
01011101000111100100100000011001000110000101110100
01100001011100000111001001101001011011110111001001
10100101110100011110010010000001100100011000010111
01000110000101110000011100100110100101101111011100
10011010010111010001111001001000000110010001100001
01110100011000010111000001110010011010010110111101
11001001101001011101000111100100100000011001000110
00010111010001100001011100000111001001101001011011
11011100100110100101110100011110010010000001100100
01100001011101000110000101110000011100100110100101
10111101110010011010010111010001111001001000000110
01000110000101110100011000010111000001110010011010
01011011110111001001101001011101000111100100100000
01100100011000010111010001100001011100000111001001
10100101101111011100100110100101110100011110010010
00000110010001100001011101000110000101110000011100
10011010010110111101110010011010010111010001111001
00100000011001000110000101110100011000010111000001
11001001101001011011110111001001101001011101000111
10010010000001100100011000010111010001100001011100
00011100100110100101101111011100100110100101110100
01111001001000000110010001100001011101000110000101
11000001110010011010010110111101110010011010010111
01000111100100100000011001000110000101110100011000
01011100000111001001101001011011110111001001101001
01110100011110010010000001100100011000010111010001
10000101110000011100100110100101101111011100100110
10010111010001111001001000000110010001100001011101
00011000010111000001110010011010010110111101110010
01101001011101000111100100100000011001000110000101
11010001100001011100000111001001101001011011110111
00100110100101110100011110010010000001100100011000
01011101000110000101110000011100100110100101101111
01110010011010010111010001111001001000000110010001
10000101110100011000010111000001110010011010010110
11110111001001101001011101000111100100100000011001
00011000010111010001100001011100000111001001101001
01101111011100100110100101110100011110010010000001
10010001100001011101000110000
- Top Threats and What You Can Do About Them
- By
2Hackers
3Cyber Warfare
4Dictators
5Your Employees
6The Bad News
- For Cyber Criminals size doesnt matter
- Successful attacks on small-midsize businesses
grew by 64 in 2014 - Smaller companies are low hanging fruit
7More Bad News
- Automated attacks mean criminals can hit
thousands of businesses
8The Really Bad News
- 60 of small businesses that suffer an attack
shut down after 6 months
9Small Business Security Threats
- Social Engineering
- Phishing
- Malware
- Viruses
- Worms
- Trojan horses
- Ransomware
10Social Engineering
- Psychological manipulation of people into
performing actions or divulging confidential
information.
11Phishing
- The attempt to acquire sensitive information
such as usernames, passwords, and credit card
details (and sometimes, indirectly, money), often
for malicious reasons, by masquerading as a
trustworthy entity in an electronic communication.
12Phishing Example A(Hello Dearest)
- Hello Dearest,
-
- Compliments of the day.
-
- I came across your contact address while
searching for someone to - help me, I lost my parents and want you to stand
as my foreign trustee - to retrive and invest USD6.5 Million which I
inherited from my late - parent.
-
- I tried to get this money out from the bank ,
but the management - refused because of my age. I am ready to give you
25 of the whole - money at the completion of the transaction, write
me back for more - details.
-
- Regards,
- Miss.Mary Anderson
13Phishing Example B(Mr. Leon)
- 1,500,000 USD A Personal Donation to you from
Mr.Leon hirtle, Contact Mr. Leon hirtle - On mrleonhirtle2_at_gmail.com . for more details.
- Greetings!!! I'm Mr Juan Colombás from Lloyds
banking Group United Kingdom. I saw your profile
and I want to have a Joint Venture with you. You
can view my website and contact me for more
details http//www.lloydsbankinggroup.com/about_us
/directors/board_directors.asp Mr. Juan
ColombásEmail lloydsbanksb_at_yahoo.co.uk
Mobile 447872219425www.lloydsbankinggroup.com
14Phishing Example C(The Official Message)
-
- THIS IS AN AUTOMATED-NOTIFICATION
. -
- 08 / 06 / 2015.
-
- .
- Public-Records Access-Correspondence.
- .
- MESSAGE ID NO.2542591623.
- .
- 82U-jW8 BACKGROUND NOTICE.
- .
-
- It has just been-brought to our attention that
one new-negative item was recently-added to your
public-records on 08 - 06 - 2015. -
- This new-negative line-item that was
recently-posted, as well as all of your public
record-file(s) are currently-accessible online
can be viewed anyone who is searching your name
or any other information related to you. -
-
- Go here today and review this negative-item and
formally-dispute http//updatedscans.updatedonlin
escaninfo.work
15Phishing Example D(The Official Email)
16Malware
- Malware short for malicious software, is any
software used to disrupt computer operation,
gather sensitive information, or gain access to
private computer systems.
17Ransomware
- A type of malware that restricts access to a
computer system that it infects in some way, and
demands that the user pay a ransom to the
operators of the malware to remove the
restriction.
18Ransomware Example A
19Things To Consider
- Fake Wireless Access Points
- Browser cookies that save passwords
- Malicious Apps
20The Good News!
- You dont need to be an expert to protect
yourself like an expert
21More Good News
- Cyber Security experts
- What are the 3 most important things you do to
protect your security online?
22The Top 5 Responses
- Installing software updates
- Using unique passwords
- Using strong passwords
- Using two factor authentication
- Using a password manager
23Anti-Phishing Tips
- Beware of emails that try to get you to click a
link in order to change your account information. - Do not follow any links via email to change your
sensitive information. - Only visit sites from known sources and always
confirm suspicious information via telephone.
24Anti-Phishing Tips
- Always use updated anti-virus software with a
special anti-phishing filter. - Always be very skeptical about sending any of
your personal or sensitive information over the
Internet. - Keep informed about Phishing techniques
(phishme.com) - Keep link clicking to a minimum
- Keep your browser up to date
25Anti-Phishing Tips
- Everyone has their own passwords!
- Change passwords every 3 months
- Backup your data
26The Good News
- Employee Education
- Have a Cyber Security office policy
- https//www.fcc.gov/cyberforsmallbiz
27The Future
28Moving to the Cloud
29The Future
- Moving to the Cloud
- A worldwide growth rate of 36
- Market size 19.6 billion by 2016
30Security in the Cloud
- Transfer the worry to your vendor
- Technicians whose only job is data security
- Multiple technicians employing the latest
technology watching your data - Your data is backed up for you
- Built in Disaster Recovery
31- Security is actually increased when using cloud
solutions due to strict ISO security standards
that cloud providers must adhere to, in addition
to the regular security audits.
32Thank You
01110000011100100110100101101111011100100110100101
11010001111001001000000110010001100001011101000110
00010111000001110010011010010110111101110010011010
01011101000111100100100000011001000110000101110100
01100001011100000111001001101001011011110111001001
10100101110100011110010010000001100100011000010111
01000110000101110000011100100110100101101111011100
10011010010111010001111001001000000110010001100001
01110100011000010111000001110010011010010110111101
11001001101001011101000111100100100000011001000110
00010111010001100001011100000111001001101001011011
11011100100110100101110100011110010010000001100100
01100001011101000110000101110000011100100110100101
10111101110010011010010111010001111001001000000110
01000110000101110100011000010111000001110010011010
01011011110111001001101001011101000111100100100000
01100100011000010111010001100001011100000111001001
10100101101111011100100110100101110100011110010010
00000110010001100001011101000110000101110000011100
10011010010110111101110010011010010111010001111001
00100000011001000110000101110100011000010111000001
11001001101001011011110111001001101001011101000111
10010010000001100100011000010111010001100001011100
00011100100110100101101111011100100110100101110100
01111001001000000110010001100001011101000110000101
11000001110010011010010110111101110010011010010111
01000111100100100000011001000110000101110100011000
01011100000111001001101001011011110111001001101001
01110100011110010010000001100100011000010111010001
10000101110000011100100110100101101111011100100110
10010111010001111001001000000110010001100001011101
00011000010111000001110010011010010110111101110010
01101001011101000111100100100000011001000110000101
11010001100001011100000111001001101001011011110111
00100110100101110100011110010010000001100100011000
01011101000110000101110000011100100110100101101111
01110010011010010111010001111001001000000110010001
10000101110100011000010111000001110010011010010110
11110111001001101001011101000111100100100000011001
00011000010111010001100001011100000111001001101001
01101111011100100110100101110100011110010010000001
10010001100001011101000110000