Centre of Expertise - Security Securing your business against cybercrime Or surely we do not have anything to worry about...do we?

Slides:



Advertisements
Similar presentations
Cyber-Safety Instructors: Connie Hutchison & Christopher McCoy.
Advertisements

Are you Safe at Work? A look into Safety at the Workplace and Internet Security Presented by Sheila Gee.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Account HIGHJACKING & IDENTITY THEFT GPCE Credit Union has prepared a slide show presentation to examine the most prevalent financial crimes at work today.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
The impact of cybercrime High level conference on EU ISS – Brussels 2014 Ilias Chantzos, Senior Director Government Affairs EMEA.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
STOP.THINK.CONNECT™ NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
IT security Are you protected against hackers?. Why are we in danger?  The Internet is worldwide, publicly accessible  More and more companies and institutes.
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
Company LOGO Internet Safety A Community Approach.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Morris Bennett Altman Director of Network Services Internet Security Officer Queens College, CUNY Are You Exposed? Network Security.
Information about the computer By Sophia and Christina C.
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
September 2007 General Security Basics Your Responsibilities for Safe Computing.
Information Security Information Technology and Computing Services Information Technology and Computing Services
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
Network Security in a Business Setting By: Brian Haumschild.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Protecting Your Information Valuables in “Cyberspace” Charlie Russell Rappahannock Rotary Club May 30, 2012.
Protecting Your Computer & Your Information
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Mobile Technology and Cyber Threats Deon Woods Bell Office of International Affairs The Fifth Annual African Consumer Protection Dialogue Conference Livingstone,
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Cyber Security Action against cyber crime. What is cyber security?  Cyber security standards are security standards which enable organizations to practice.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
Android Mobile Security Krystal Salerno. Introductions.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
Computer Safety Sid Holder 8k Viruses Hacking Backing Up.
INTERNET SAFETY FOR KIDS
Computer security By Isabelle Cooper.
By: Asfa Khan and Huda Mukhtar
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
U.S. Small Business Administration Answers | Resources | Support For Your Small Business Cybersecurity Awareness Cybersecurity Awareness Signs You’ve Been.
What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
INTRODUCTION & QUESTIONS.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
Regional Cyber Crime Unit
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
By Kyle Bickel.  Securing a host computer is making sure that your computer is secure when it’s connected to the internet  This be done by several protective.
1 AFCOM Data Center World March 15, 2016 Moderator: Donna Jacobs, MBA Panel: Greg Hartley Bill Kiss Adam Ringle, MBA ITM 9.2 The New Security Challenge:
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Protection of Data 31 Protection of Data 31. Protection of Data 31 Having looked at threats, we’ll now look at ways to protect data: Physical Barriers.
Protecting Against Cyber Attacks PLEASE TAKE A MINUTE TO LOOK AT THIS IMPORTANT MESSAGE. THIS IS HAPPENING HERE AND NOW! LET US SAVE YOU AND YOUR INFORMATION.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Cyber Crime What’s all the fuss about?
Cybersecurity Awareness
CYBER CRIME Matthew Purchase.
Andy Hall – Cyber & Tech INSURANCE Specialist
Part 3.
Forensic and Investigative Accounting
Security week 1 Introductions Class website Syllabus review
6. Application Software Security
Threat Landscape Update
Presentation transcript:

Centre of Expertise - Security Securing your business against cybercrime Or surely we do not have anything to worry about...do we?

Centre of Expertise - Security ECU Security Research Institute Leading and largest Australian security research program based at Joondalup Campus –Digital Forensics, Information Security, Critical Infrastructure Security, Human Security We work and engage across all parts of the community We are about providing a safer place for all Australians to work, rest and play

Centre of Expertise - Security Why am I here? We are conducting research into SME cyber security readiness We have a survey running at The survey will help us target training and information for you to protect your business from cyber criminals

Centre of Expertise - Security Cyber criminals are easy to spot..

Centre of Expertise - Security So do you use any of these

Centre of Expertise - Security PlanDesign 556 MILLION VICTIMS PER YEAR 1.5+ MILLION VICTIMS PER DAY 18 VICTIMS PER SECOND THE GLOBAL SCALE OF CONSUMER CYBERCRIME 2012 Symantec – Internet Security Threat Report 2013

Centre of Expertise - Security PlanDesign 32% 46% $201 Norton Report: 2013 and ABS 2013 Of Australian smartphone users have experienced mobile cyber crime. Of Australians exposed overall to cyber crime The typical cost to a victim per cyber incident

Centre of Expertise - Security PlanDesign 80+% $12,500 ACMA Research Snapshot May 2013 Symantec Software Inc, Cyber Security Survey, 2012 The estimated average cost of downtime for an SME per day. 30+% Small businesses are the engine of the Australian economy Cyber attacks specifically targeting SMEs doubled in 2012, causing IT outages, data loss, and other damages of SMEs suffer an IT security incident in the course of a year. of businesses lost at least $195,000 as a result of cyber attacks Of Australian SMEs were targeted for customer data, intellectual property and bank account information.

Centre of Expertise - Security So how easy? Cyber security tools that breach systems are readily downloadable The videos on how to use these tools are likewise easy to find

Centre of Expertise - Security So protecting yourself Passwords Backup Firewall Virus scanners Encryption Wireless? Turn it OFF

Centre of Expertise - Security Passwords 12 characters or less is WEAK Do not use dictionary words Do not use dates of birth A good password is at least 12 characters long and has combinations of letters, numbers and punctuation! Agpial1clahcolnp! Or 1wltaIasootp!

Centre of Expertise - Security Backup You should DO it often as needed...which basically like your brushing your teeth is at least once a day Do not leave them in the draw under your system...take them home... Get a drive for each DAY of the week and 2 monthlies total cost ~ $700

Centre of Expertise - Security Firewall Turn it on! On every device that has it! It at least will detect and respond to known attacks and stupidity Turn on any logging (recording of events) associated with the firewall

Centre of Expertise - Security Virus Scanners Again low cost against the damage that can be caused Update them regularly Every device that supports them should have one!

Centre of Expertise - Security Encryption Takes plain text and converts into encrypted text -----BEGIN PGP MESSAGE----- Version: PGP Desktop (Build 13) Charset: utf-8 qANQR1DBwU4DcnGXooM7CFkQB/0dghq2KlQrUkALK1nP6evOGOfrNhIDu7GjG7hz5LgqeMQ6oYwPDoA1m1VLloddoa WA44jQIkGbSunxvOh7vLmfwvCBdUZ/iXxdMGccEElZWSfWX8CdMbLW/wwShBuCN7WL+0SHNoNVUbAdXCzJzTiiV GMrjjKT/FapOb8zFag5PUg0KrfKIxyIpMGLIkJuZ9p+BVCc3teDALU9RMidSPCbrOYVnFUGDW0Gqb2FpVsAjhS097tH sa+IX0NnFZCI1qxKUCN1h7eJH93kaMZgPLcJXo3CRrwsEq9hI+cItGyWABqzMQ+QkktgVHM27HPR4VJAK99uFJmFi levWGdRmnCACur3u4bMYo6Rj2s9LDtuFf72nhw0DmzoPtNTU3n/6WeH/U5Sye93wHqeWNol0UcmY2DqonF1dxLxWi iDOUmRCWlUYyVXRJrNY29NC7QbuhLcAXiv31sVTkC7u8O67Y1BYZd+fenXDcob051G3sZg2fLyDww4Uyhv0LKtCU rim7pZRGQ/gndtP6aheaZAQ4PgqtBlqdfNIC75HO0X5zXmHV3q4mINc0DkJH1KJeckvkN/7+GV3uArjhclyOBQxG0jRu 2adXGITT9Y1hWQjAAsXFilLSiQ/v2zWey2GlyakVmKBGYQuKG6zkDzKPlin/vZREiMoQ7K5ITjWAKVhuN+Hq0lcBYRk lEEStl1UUe1sn1n4kghILcEHN1DzdLf6NqIJy2beHAY8nBS1HgLdbCgok1g+Y47Bo1YilqGd4Nt81bSWzlKFpDMTi1UA RjW/Ie/IHnA2AJQmoSkU==Q82F -----END PGP MESSAGE-----

Centre of Expertise - Security Wireless?? No wireless is secure So ? do you really need it To be better secured use UTP Cat 6 cables

Centre of Expertise - Security Turn it OFF! You switch off your lights in your business, so in most cases switch off your DSL / Wireless router, computers

Centre of Expertise - Security Survey so far says... 15% do not use firewalls 25% do not use virus scanners on PCs 40% use wireless/WiFi 80% people who use a mobile phone/tablet do not use a virus scanner

Centre of Expertise - Security Next... We need you to tell your friends, associates etc go to Training FREE! is about to begin soon

Centre of Expertise - Security Questions