Tackling Cyber threats together

Slides:



Advertisements
Similar presentations
7 Effective Habits when using the Internet Philip O’Kane 1.
Advertisements

NCS welcome all participants on behalf of Quick Heal Anti Virus and Fortinet Firewall solution.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Internet Security PA Turnpike Commission. Internet Security Practices, rule #1: Be distrustful when using the Internet!
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Threats to I.T Internet security By Cameron Mundy.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Alisha Horsfield INTERNET SAFETY. firewall Firewall- a system made to stop unauthorised access to or from a private network Firewalls also protects your.
Your Trusted Partner In All Things IT. 20 Years of IT Experience University Automotive Food Service Banking Insurance Legal Medical Dental Software Development.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
IT Security for Users By Matthew Moody.
1.1 System Performance Security Module 1 Version 5.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
IT security By Tilly Gerlack.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Year 9 Autumn Assessment Computer system/Information security-Planning, Communicating, Information. By Louis Smith-Lassey 9k 9Y1.
PROTECTION ON THE INTERNET NADIA SNOW VIRUS Is a file made to do harm or criminal activity there are many types: -worms -Trojan horse -Spyware How they.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
Topic 5: Basic Security.
Internet Safety Internet Safety LPM
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
By Liam Wright Manga comic group Japan SAFETY on your computer.
What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
INTRODUCTION & QUESTIONS.
Information Security January What is Information Security?  Information Security is about the physical security of our equipment and networks as.
Malicious Attacks By: Jamie Woznicki Rahul-Anaadi Kurl Alexander Kaufmann Curtis Songer Daniel Cardenas Rivero.
Friday 22nd April 2016 DS Chris Greatorex SEROCU
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Safe Computing Practices. What is behind a cyber attack? 1.
Computer Security Keeping you and your computer safe in the digital world.
Cyber security. Malicious Code Social Engineering Detect and prevent.
Tackling Cyber threats together
Presented by: SBS CyberSecurity © SBS CyberSecurity, LLC
“How to Protect Yourself”
Tackling Cyber threats together
Edexcel GCSE Cyber security threats Computer Science 1CP1
3.6 Fundamentals of cyber security
Unit 4 IT Security.
Personal spaces.
Big Picture Consider this How many online threats might you be faced with a day?
Instructor Materials Chapter 7 Network Security
Level 2 Diploma Unit 11 IT Security
Cyber Crime What’s all the fuss about?
Lecture 14: Business Information Systems - ICT Security
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
The Insurance Sector & Beyond – Managing The Threat Within
Teaching Computing to GCSE
Cybersecurity Awareness
Unit 1.6 Systems security Lesson 3
Robert Leonard Information Security Manager Hamilton
Mary Kummer Jim McNall PRIMA Spring Training 2018
Risk of the Internet At Home
Cybercrime and YOU.
Shopping experience! Avoiding online fraud Ian Ramsey C of E School
DON’T GET HOOKED! YOU MAY BE UNAWARE BUT YOU ARE A PHISHING TARGET FOR CYBER CRIMINALS. A. Unknown sender address B. Offer too good to be true &
HOW DO I KEEP MY COMPUTER SAFE?
Keeping your data, money & reputation safe
Top Ten Cyber Security Hygiene Tips
Tackling Cyber threats together
Anatomy of a Large Scale Attack
Business Compromise and Cyber Threat
Tackling Cyber threats together
Information Security – Sep 18
Marcial Quinones-Cardona
Cybersecurity: Don’t Be Scared; Be Prepared Dean Choudhri, CISSP, CISM, CRISC Assistant Vice President, Cybersecurity and Information Assurance Alloya.
Defencebyte THE PERFECT SECURITY FOR YOUR COMPUTER.
Presentation transcript:

Tackling Cyber threats together Sean O’Neil

What is Cyber Crime? Of course you know what a cyber criminal looks like!

POTENTIALLY ALL OF THEM! Which of these is a cyber threat? Smart fridge anecdote… Own staff/insider Chip in hand Social engineering. Frying pan USB stick in car park POTENTIALLY ALL OF THEM!

But what are some of the biggest threats? •Insider Threat: theft/fraud/data breach i.e. deliberate non malicious act •Malware by phishing attacks •Data Breach DDoS •Social Engineering leading to scams Theft/fraud by Customers or vendors. Ultimately it depends on the business, how it is set up, the infrastructure and the policies and procedures, and protect mechanisms in place. Does your BCP include no use of IT or loss of data!

Individual targeted cyber crimes Phishing emails: fake Invoices, attachments & links. i.e. new vendors, changes to current vendors, Examples: Apple [little mix] Vouchers - Supermarkets, on line stores, leading to fake websites Account updates – amazon, Sky, Virgin, Utilities. Advice – any unsolicited emails. Do not press that link; simply delete. Go via normal website. Send to phishing email address for company Software scam: Microsoft/BT router/system faults – Dunstable case £4500. mainly older people bank accounts emptied, threats etc. July 74 yrs lost £65k, 83 yrs lost £45k; same every month; majority starts with approx. £200. Advice – Do not engage, go via normal website.

Business targeted Cyber crime Mandate fraud – originating from Phishing emails, infecting servers & computers with virus, banking Trojan, key loggers. Examples: Bedford company lost £100K put 27 staff at risk. Numerous solicitor companies targeted loosing between £50-150k a month. 14 companies in Luton loosing £1M in September. Bedford company lost £438k in Jan 2017 Bedford company had windows 365 compromised with poor PW, invoices sent out with new bank details. 6/17 lost £36k. Solicitor companies being targeted – Luton March 2017, Bedford Dec Advice - Slow down, check via second source. Get copy of our advice. 2. Ransomware – poor set ups, lack of updates, Examples: Luton Hotel attacked over New year – pay and enter suckers list. NHS – Windows 7 no updates, 4000+ computers at Lister hospital. Other hospitals shut down as precaution. Advice – Have cyber incident on your BCP/DR. Plan with IT dept./managed services. Ensure 2x back ups, have details of local IT repair company 23 in a Million phishing emails are successful 5.5 Billion in 2011 attacks world wide 42% increase in a year to £7.8 Billion in 2012 People don’t rob banks with shotguns, they now hire a hacker – lower risk and jail time if caught Peelian Principle – First duty of any Constable is to Prevent Crime

CBR - Free service to all local businesses, organisations, charities, vulnerable people Offering a review of current practices Suggesting improvements to ICT/physical security Leading to greater ability to reach ‘cyber essentials’ accreditation - Minimum standard suggested for government contracts in the future. CiSP/ regional Cyber Trust group POC Sean O’Neil Cyber Security Advisor (2219) Bedfordshire Police Headquarters, Woburn Road, Kempston, Bedfordshire, MK43 9AX (+44) 7720204358 sean.oneil@bedfordshire.pnn.police.uk cyberprotect@bedfordshire.pnn.police.uk http://www.omic.pub/cybercrime (free electronic book giving basic advice)