Are you the Next Cybercrime Headline?

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

 Malicious or unsolicited mail sent to a mailbox without the option to unsubscribe  Often used as a catch-all of any undesired or questionable mail.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
Security Version 6.1 | August Need for Complete Security Stop threats at the perimeter High volume spam, phishing, viruses and.
Kaspersky Small Office Security INTRODUCING New for 2014!
Your Office 365 Journey Prepare, Migrate, and Operate with Barracuda
Barracuda Essentials for Office 365 Barracuda Essentials combines three proven cloud-based solutions enhance Office 365 deployments, making it easy to.
FIND OUT WHY VIPRE IS STILL OUTPERFORMING ITS RIVALS! Distributed By: & Insert Your Logo Here.
FIND OUT WHY VIPRE IS STILL OUTPERFORMING ITS RIVALS! Distributed By: & Insert Your Logo Here.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
Cyber security. Malicious Code Social Engineering Detect and prevent.
Understanding and breaking the cyber kill chain
Internet Safety.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Karsten Chearis Sales Engineer.
Introducing Barracuda Essentials for Office 365
Introducing Barracuda Essentials for Office 365
Your Office 365 Journey Prepare, Migrate, and Operate with Barracuda
Exchange Online Advanced Threat Protection
3 Do you monitor for unauthorized intrusion activity?
Edexcel GCSE Cyber security threats Computer Science 1CP1
Done by… Hanoof Al-Khaldi Information Assurance
Threat Scan (ETS) for Office 365
CYBER SECURITY PANDEMIC
Threat Scan (ETS) for Office 365
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Michael Burke.
Axway MailGate Unifies “Safe-for-Work” Solutions to Keep Your Enterprise as Secure as Possible in the Azure Cloud and/or Any Hybrid Environment MICROSOFT.
Unit 4 IT Security.
Barracuda Networks Creates Next-Generation Security Solutions That Enable Customers to Accelerate Their Adoption of Microsoft Azure MICROSOFT AZURE APP.
Lesson 3 Safe Computing.
Overview 1. Phishing Scams
Information Security 101 Richard Davis, Rob Laltrello.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them David Hood Director of Technology Marketing.
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Michael Bird Team Lead, Account Executive.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Michael Vanderhoff.
9/14/2018 2:22 AM THR2026 Set up secure and efficient collaboration for your organization with Office 365 Joe Davies Senior Content Developer Brenda Carter.
Protect Your Computer Against Harmful Attacks!
Jon Peppler, Menlo Security Channels
Exchange Online Advanced Threat Protection
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Matthew Gardiner Product Marketing.
Demo Advanced Threat Protection
Cybersecurity Awareness
Call AVG Antivirus Support | Fix Your PC
Risk of the Internet At Home
Spear Phishing Ways to Minimize its Risks
Information Security Session October 24, 2005
Network Security: IP Spoofing and Firewall
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Andrew Cotton.
Securing in an Ever Changing Threat Landscape
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Matthew Gardiner Product Marketing.
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Navigating Security Seas in a Small Ship with a Limited Crew
David J. Carter, CISO Commonwealth Office of Technology
Real World Advanced Threat Protection
Secure once, run anywhere Simplify your security with Sophos
HOW DO I KEEP MY COMPUTER SAFE?
9 ways to avoid viruses and spyware
Anatomy of a Large Scale Attack
Security Hardening through Awareness August 2018
Bethesda Cybersecurity Club
3 Do you monitor for unauthorized intrusion activity?
Spear Phishing Awareness
COMPLETE BUSINESS TEXTING SOLUTION
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Introduction to Symantec Security Service
Cybersecurity Simplified: Phishing
3 Do you monitor for unauthorized intrusion activity?
Cybersecurity Simplified: Ransomware
Presentation transcript:

Are you the Next Cybercrime Headline? …and how to make sure you are not! Danny Milrad Director, Product Marketing June 2016 This webinar will discuss the how specific Barracuda products help make your journey to, and experiences with, Office 365 secure, productive, and hassle-free. Let’s take a closer look….today, we’ll look at email security.

Agenda Evolving Threat Landscape Real World Examples How To Protect Your Company Next Steps

It Starts With a Simple Email…

Phase 1: Research Research: The hacker learns as much as possible about the organization. Tracks publicly available information from…SEC filings, social media, news articles, professional networks, etc.

Phase 2: “Gone Phishing” Social Engineering: Psychological manipulation of people into performing actions or divulging confidential information Phishing: e-mail sent that appears to come from a legitimate business—a bank, or credit card company—requesting "verification" of information

Phase 3: Deploy Payload Deploy Advanced Persistent Threat: APT deployed after successful research and phishing APT deposited on target, sits in stealth mode to remain undetected APT will map organization data and defenses Identify who has access to target information

Payload Examples Typosquatting Malware Also called URL Hijacking Notion is to trick the recipient into thinking the link is genuine Dangerous to mobile users Examples: Arnazon.com vs. Amazon.com Bankamerica vs. bankofamerica.com Malware Email may or may not contain content Malware is sitting somewhere in attachment, on site (from link), waiting for a visitor The visitor – the “drive-by” – becomes infected Most Drive-by Malware is Ransomware – unseen until encryption is complete and ransom is delivered Typosquatting – also known as URL hijacking, is a popular means of social engineering, and many people fall for it. The idea behind this is to trick the recipient into thinking the link is genuine and clicking on it. The couple of examples above might seem easy to catch at first glance – but people receive hundreds of emails a day, and if they are reading emails on a cell phone, it’s very difficult sometimes to identify a deliberately malformed link. And once it’s clicked, the damage is done. And what kind of damage is that?

Next thing you know…You’re a Headline!!

FBI: $2.3 Billion Lost to CEO Email Scams Email security is no longer just about preventing excessive spam and viruses – the attacks are real, they are sophisticated, and they are costly. Nearly every day there is a new story about malware – and a lot of it is ransomware, which can cost you dearly.

So how do you protect your company? Educate Your employees are the first line of defense Train them what to look for and what to do Run exercises, have prepared response Be Vigilant Multi-layered Email Security Advanced Threat Detection Link Protection

Comprehensive Email Security Solution Should Have: Inbound & Outbound Email Filtering Identity/Reputation/Connection Management IP Analysis Virus, Malware Scanning Fingerprint, Intent, Image Analysis

Beyond Email Security Bulk email categorization Email Encryption CPL Ability to categorize emails based on type of email: transactional, marketing, social media, corporate, and mailing lists Email Encryption Pull based email encryption No key management required Single account/password will handle manage all encrypted messages from any Barracuda email security solution CPL Barracuda Real Time Protection

Beyond basic email security (cont.) Cloud Protection Layer Pre-filtering for spam and viruses done in the cloud before delivery to the Barracuda Spam Firewall Offloads CPU-intensive tasks like antivirus and DDoS filtering to the cloud Exchange Anti-virus Ability to leverage virus scanning for internal emails

Spear Phishing Protection Sender Spoof Protection Block incoming emails with the same to and from domain Rules to help in blocking spoofing attempts Domain name similarity To and from domain name are the same, but reply-to goes to a different domain including free email addresses Wire transfer fraud through impersonation

Advanced Defenses Phishing, Ransomware, Zero-day attacks On the increase and in the news Microsoft’s Exchange Online Protection doesn’t protect! Advanced Threat Detection (ATD) Sandboxes any suspicious attachments “Detonates” (opens) in sandbox to detect malware Optional for ESS; Standard for Essentials Link Protection Similar to ATD – redirects suspicious URLs to sandbox Detects “typosquatting” (deliberate mis-spellings) Included in ESS and Essentials

Barracuda Threat Intelligence

Barracuda Essentials Cloud-based multi-layer email security, archiving, backuo for email Works with O365, Exchange, Lotus, Google Apps, etc. Compatible with on-premises and hybrid configurations Built on proven Barracuda SaaS solutions Low cost, per user licensing Single SKU for simple quoting/bundling Centralized management Includes 90 Day PST Enterprise Comprehensive security, archiving and backup solution for on-premises Exchange & other Cloud email services Centralized administration through Barracuda Cloud Control Per User Licensing

Centralized Management

Recapping – why comprehensive security? Email is an easy target Everybody uses it Readers follow visual queues Links and attachments are ubiquitous Attackers are sophisticated Malware, such as Ransomware, is sold to attackers Attackers merely need to plant it Once attacked, nearly impossible to de-encrypt Impacted users = bottom-line business costs So why do you care about comprehensive email security? It’s simple – email is an easy target. It’s absolutely critical for business – so everybody uses it. And because people get so much email, they are easily duped by social engineering and by clever hacks. Links and attachments are ubiquitous – again, nobody is unused to seeing attachments nor to clicking on links. The problem is, how do they know this is safe? The answer s, they don’t. Attacks have become very sophisticated, and often appear very innocent. The bad actors creating the malware and the attackers are often different people – one is focused on programming, the other is focused on getting it launched by unsuspecting users. Ransomware is the flavor-of-the-month, because it’s instantly monetized. All an attacker needs to do is plant it – attacks are virtually impossible to reverse. It WILL cost you money.

Is comprehensive security easy to use? It’s virtually automatic You simply turn it on Barracuda does the rest This is modern-day security for advanced attacks Identifies and protects against socially- engineered attacks Provides Link Protection for malware-free URL clicks Advanced Threat Detection examines attachments without risk of malware / infections / ransomware The good news is that comprehensive email security is very easy to use. Because attacks have become so sophisticated, human intervention can no longer be counted upon to identify and stop these threats. So companies like Barracuda are building comprehensive threat detection that is virtually automatic – we do the work, you don’t have to. This is a modern-day approach to today’s advanced attacks. Socially-engineered attacks have little chance of success when the malicious links they depend on are opened in a sandbox, and when malicious attachments are scanned and detonated before they ever reach their targets.

Learn more about Comprehensive Email Security! Talk to your Barracuda Account Manager Talk to your Barracuda Partner Visit: www.barracuda.com/office365 www.barracuda.com/emailsecurity Ask for a demo Free 30-day Evaluation It’s simple – learn more about Comprehensive Email Security. Talk to any of our specialists, and ask for a demonstration. Even easier – sign-up for a free 30-day evaluation, you can do it right from our website. We also have solutions that can run in an on-premises environment, on virtual machines, and in public clouds like AWS or Azure. The important thing is – you need comprehensive protection!

Danny Milrad dmilrad@barracuda.com