PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY
What are we talking about today? 1 WHAT ARE THE THREATS? 2 WHERE DO THREATS COME FROM? 34 WHAT CAN BE DONE? WHO ARE THE TARGETS?
What are the threats? Cybersecurity, the Internet, Malware, and Internal Threats
CONFIDENTIAL 4 Cybersecurity Protecting information systems from unauthorized or criminal access
CONFIDENTIAL 5 The Internet 2.5 Quintillion (18 zeros) bytes of data added daily 90% created in the last two years The early “Internet” - sharing and innovation over security and protection The Creeper System – “I’m the creeper, catch me if you can!” Systems connected to the network should be considered to be unsecured
CONFIDENTIAL 6 What are the threats? Malware Social Engineering Hacks Internal Attackers Combinations of these 1234
CONFIDENTIAL 7 Malware Computer programs targeted at disrupting service, gaining access, or destroying/stealing data. Adware Virus Worm Spyware / Trojan Ransomware
CONFIDENTIAL 8 Adware Threat Level: Annoyance Adware generally consists of pop-up ads that appear after installing a separate piece of software.
CONFIDENTIAL 9 Virus Threat Level: Annoyance to Serious Issue Viruses affect the host system and spread to other users.
CONFIDENTIAL 10 Worm Threat Level: Serious Issue The “ILOVEYOU” worm of 2000 cost an estimated 5.5 billion in damages. 10% of all Internet connected computers were infected. Worms replicate themselves to other systems where they destroy information as they go.
CONFIDENTIAL 11 Spyware / Trojan Horse Threat Level: Dangerous Spyware is a malicious software that spies on you and tracks your internet activities. It helps the hacker to gather information about the victim’s system.
CONFIDENTIAL 12 Ransomware Threat Level: Critical Ransomware is an advanced type of malware that restricts access to the computer system until the user pays a fee.
CONFIDENTIAL 13 Ransomware How does it work? Installation of the software Phone home Digital keys created Encryption of data Extortion
CONFIDENTIAL 14 Ransomware The infamous Cryptolocker and Locky are examples of ransomware.
CONFIDENTIAL 15 Malware On average 25% of mail is for work purposes 14% is of critical importance 13% is personal non-work related 48% is SPAM, junk, potentially malware, and/or a phishing attack The shape of
CONFIDENTIAL 16 Phishing Phishing, Spear Phishing, and Whale Hunting Phishing threats are attacks that politely ask for private information while posing as a different sender.
CONFIDENTIAL 17 IoT Botnet Attack Rise of the machines "We have a Botnet army ready to take down your site. You have 48 hours to pay us 1200$. Merry Xmas!” Botnet armies are network connected devices that can be focused on taking down another network device somewhere else.
CONFIDENTIAL 18 Security Hardware and Software Backdoors Commercially available hardware Juniper firewalls Chinese components with manufacturing “flaw”
CONFIDENTIAL 19 The Internal Threat Physical security is everything User education Give access to only what is required to get the job done
Where do threats come from? Who creates them and why would they do such a thing?
CONFIDENTIAL 21 Where do these threats come from? Geographically: Russia, China, Iran, and North Korea Virus – a program written to execute with malicious intent. Written by programmers: As a challenge Out of dislike for Microsoft, Apple, or some other company To serve (the hacker brand of) justice! Criminal gain / profit Research
Who are the targets and why? Who is vulnerable to security threats?
CONFIDENTIAL 23 Who are the targets? Groups of targets include: Hospitals Businesses with a strong Internet presence Large retailers (Home Depot, Target, TJX, Office Max, etc.) Federal Agencies Small Businesses Everyone has data that is valuable to the hackers in one way or another. As security measures for larger companies improve and become more complex, small businesses and home users are being targeted more and more.
What can be done? How can I protect my data from threats?
CONFIDENTIAL 25 What can be done? Layered security Comprehensive, Encompassing solution Cloud based scanning Firewall Security Logging / event management Web filtering Antivirus Backup, backup, and more backup Educate your users
Questions
Thank You NetCenergy