A Service Disabled Veteran Owned Small Business Company

Slides:



Advertisements
Similar presentations
AmadeusCybersecurity: the essentials12 th November 2014 Alex van Someren Family Office Forum 12 th November 2014, Zurich Cybersecurity: the essentials.
Advertisements

CHINESE HACKERS. Where do they come from? In 2007 private security firm Mandiant was hired by the New York Times to trace cyber-attacks on their network.
By Ashlee Parton, Kimmy McCoy, & Labdhi Shah
Emerging Trends: Cyber Threats Bryan Sheppard Cyber Security Defense Center.
How It Applies In A Virtual World
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
External Threats to Healthcare Data Joshua Spencer, CPHIMS, C | EH.
Social impacts of the use of it By: Mohamed Abdalla.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Staying Safe Online Keep your Information Secure.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.

 Introduction to Computing  Computer Programming  Terrorisom.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
Cybersecurity for the modern Commercial Brokerage Presented by Brian W. Palm.
CURRENT STATUS OF CYBERCRIME  Security is the fastest growing service in IT  Cyber Crime Costs $750 Billion annually  70% of threats arrive via .
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
Allison Gladkowski.  About privacy and why it matters  Spyware and spam vocabulary and examples  Identity theft  Unapproved access  Today's big issues.
November 14, 2016 bit.ly/nercomp_defendingyourdata16
“How to Protect Yourself”
INTERNET SAFETY FOR EVERYONE
Threat Scan (ETS) for Office 365
To Know what Cyber crime is
Threat Scan (ETS) for Office 365
Learn how to protect yourself against common attacks
Common Methods Used to Commit Computer Crimes
Unit 4 IT Security.
How to use the internet safely and How to protect my personal data?
Welcome to Milton’s Parts Express
Information Security.
How to use the internet safely and How to protect my personal data?
A Project on CYBER SECURITY
Authentication 2.0: User Generated Security
I S P S loss Prevention.
Cyber Security & IT: What’s Next?
How to build a good reputation online
As you arrive… Get a computer off of the cart and log-on.
Cyber Security Awareness Workshop
Information Security 101 Richard Davis, Rob Laltrello.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Michael Bird Team Lead, Account Executive.
Today’s Risk. Today’s Solutions. Cyber security and
Cybersecurity Awareness
Little work is accurate
Norton technical support Norton.com/Setup | Norton Setup and Install with Product Key Norton Antvirus Activation For protection against.
Information Technology Services Education and Awareness Team
Risk of the Internet At Home
Internet Safety for Everyone
Malware March 26, 2018.
Curating an Effective Security Culture
Dear Students,   The school holidays are just around the corner. When spending time online during the school holidays, you should be aware of good practices.
Navigating Security Seas in a Small Ship with a Limited Crew
Introduction to Computers
The vulnerability of the modern society
Internet Safety for Everyone
Top Ten Cyber Security Hygiene Tips
Practical tips to defend your business from cyber attacks
Cyber security and Computer Misuse
Internet Safety for Everyone
Information Technology Services Education and Awareness Team
Internet Safety for Everyone
Internet Safety for Everyone
Dark Web Domain Status Report
Marcial Quinones-Cardona
Cybersecurity Simplified: Phishing
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

A Service Disabled Veteran Owned Small Business Company State of Cyber Security (a serious security consideration for Everyone on the Internet) by Dane A. Deutsch CEO/DCS Netlink www.dcsnetlink.com ddeutsch@dcsnetlink.com 877-327-6385 A Service Disabled Veteran Owned Small Business Company © 2016 All Rights Reserved – DCS Netlink

How to Stay Secure in a Dangerous Internet Connected World Norse Attack Map © 2016 All Rights Reserved – DCS Netlink

How to Stay Secure in a Dangerous Internet Connected World DYN DDOS Attack Oct 21, 2016 © 2016 All Rights Reserved – DCS Netlink

How to Stay Secure in a Dangerous Internet Connected World Today’s Briefing: Introduction - Dane & Bobby Blackhat Mission Today - ID the enemy & Learn Protection Objective-Learn about the Human Factor (Top 3) Cyber Landscape - Dangerous + Houdini Concept © 2016 All Rights Reserved – DCS Netlink

How to Stay Secure in a Dangerous Internet Connected World Today’s Briefing (Continued): 3 Real World Examples of the Human Factor 5 Keys to Strengthen the Human Factor Top 3 Keys to better security on the Internet © 2016 All Rights Reserved – DCS Netlink

© 2016 All Rights Reserved – DCS Netlink My Background Introduction to Bobby Blackhat Dane is a US Air Force Retired Officer Last USAF Active Duty Assignment IT Chief of Maintenance for the country of Turkey All wireless in 1980's; first email server; and more Technology in Turkey was more modern than US Today! © 2016 All Rights Reserved – DCS Netlink

© 2016 All Rights Reserved – DCS Netlink My Background Last 25 years building our IT business DCS Netlink - focused on leading IT with security DCS=Dynamic Cloud Solutions FBI Secured Infragard Members © 2016 All Rights Reserved – DCS Netlink

© 2016 All Rights Reserved – DCS Netlink SECRET CLASSIFIED SECRET © 2016 All Rights Reserved – DCS Netlink

MISSION Identify the enemy on the Internet & how to protect against those threats © 2016 All Rights Reserved – DCS Netlink

Objective Learn top 3 HUMAN FACTOR threats on Internet & how to protect against those threats © 2016 All Rights Reserved – DCS Netlink

© 2016 All Rights Reserved – DCS Netlink Cyber Landscape Today Dangerous! What if I told you...? First time in history that the US Government & military can't protect us as citizens 4 Star Generals still can't stand up a Cyber Command Past NSA person says, "Chinese are in every one of our systems....it is only a matter of time." Media has reported government and business being hacked at one time or another (i.e.- US Army, US Senate) Cyber threats are increasing in quantity and severity © 2016 All Rights Reserved – DCS Netlink

© 2016 All Rights Reserved – DCS Netlink Cyber Landscape Today Houdini Concept - If built by mankind, then it can be broken into by mankind. “Business is Combat….eBusiness is .COMbat” HUMAN FACTOR is the Weakest Link! © 2016 All Rights Reserved – DCS Netlink

FBI Director - Robert Mueller Story of The Human Factor https://www.youtube.com/watch?v=M1PzM51JF5s&feature=youtu.be © 2016 All Rights Reserved – DCS Netlink

Ubiquity Hacked-$47 Mil Hackers siphon $47 million out of tech company's accounts A tech company has made an unusual admission to its investors: A hacker posed as one of its employees online and stole $46.7 million from the company's accounts. http://money.cnn.com/2015/08/10/technology/ubiquiti-hacked/

Cate Machine & Welding Small Wisconsin Manufacturing Company taken over by Chinese! And like many small businesses, they have a dusty old computer humming away in the back office. On this one, however, an unusual spy-versus-spy battle is playing out: The machine has been taken over by Chinese hackers. The hackers use it to plan and stage attacks. http://www.nytimes.com/2016/06/12/technology/the-chinese-hackers-in-the-back-office.html

Top 3 HUMAN FACTOR threats (on Internet & how to protect against those threats) Your Beliefs: that you are not hackable or have nothing anyone would want! Passwords: Lastpass & 2 Factor Authentication (i.e.- MFA or 2FA) Social Engineering: Scareware/Phishing/Vishing/Smishing (SMS Phishing) © 2016 All Rights Reserved – DCS Netlink

5 Keys to strengthen Human Factor 1. Beliefs Firewalls & Antivirus are good enough! NOT! 77% Of Ransomware Attacks Bypass Email Filtering 95% of the attacks bypassed the victims’ firewall(s) and 52% bypassed anti-malware solutions. 90% decided to beef up security awareness training... © 2016 All Rights Reserved – DCS Netlink

5 Keys to strengthen Human Factor 1. Beliefs - Continued We Trust and then Verify - but the rest of the world says: “Verify First and Trust after that, but each & every time” “My IT takes care of that, I am NOT techy” - CEO/COO/CFO said! “I have nothing on my computer anyone wants.” Ostrich Complex - “Nothing to worry about. It is like Life Insurance...If it hasn’t happened yet, it most likely won’t happen at all.” © 2016 All Rights Reserved – DCS Netlink

5 Keys to strengthen Human Factor 2. Passwords Lastpass.com - Free & automated strong passwords 2 Factor 2 of 3 Factors to be secure Turn it on everywhere (i.e.- FB,Twitter,Amazon,Banks) © 2016 All Rights Reserved – DCS Netlink

5 Keys to strengthen Human Factor 3. Social Engineering - KnowBe4 you click Phishing/Vishing/SmShing - links & attachments in emails/calls/Text Msgs Mouse over the address Delete if not expected-(i.e.-Microsoft pop-ups, wrong time) © 2016 All Rights Reserved – DCS Netlink

Social Engineering Example Famous Phishing Email: John Podesta (Hillary Clinton Campaign Manager) http://www.businessinsider.com/hillary-clinton-campaign-john-podesta-got-hacked-by-phishing-2016-10 IT people can be the greatest Threat! (Note: if you are only 1 person deep in IT - then it is possible you may be one person deep in - - IT! © 2016 All Rights Reserved – DCS Netlink

Ransomware = Greatest Threat Ransomware - Phishing is primary attack vector! 90% of all phishing emails deliver Ransomware now! Make sure you are doing image backups and the backups are stored in a secondary facility! Can you actually “spin up” that image in the Cloud? © 2016 All Rights Reserved – DCS Netlink

Hospitals = Major Target Underground credit cards worth less than $.50 ea Health records are selling at $11 or more each © 2016 All Rights Reserved – DCS Netlink

US may give up the rights to control of the internet to the UN: What happens IF? US may give up the rights to control of the internet to the UN: http://www.cbsnews.com/news/donald-trump-campaign-fact-check-is-us-giving-away-the-internet/ © 2016 All Rights Reserved – DCS Netlink

“US - You and I” WE are The Human Factor MISSION Identify the enemy on the Internet & how to protect against those threats “US - You and I” WE are The Human Factor © 2016 All Rights Reserved – DCS Netlink

How to Stay Secure in a Dangerous Internet Connected World Today’s Briefing: Introduction - Dane & Bobby Blackhat Mission Today - ID the enemy & Learn Protection Objective-Learn about the Human Factor (Top 3) Cyber Landscape - Dangerous + Houdini Concept 3 Real World Examples of the Human Factor 5 Keys to Strengthen the Human Factor Top 3 Keys to better security on the Internet © 2016 All Rights Reserved – DCS Netlink

© 2016 All Rights Reserved – DCS Netlink SECRET CLASSIFIED SECRET © 2016 All Rights Reserved – DCS Netlink

A Service Disabled Veteran Owned Small Business Company State of Cyber Security (a serious security consideration for Everyone on the Internet) by Dane A. Deutsch CEO/DCS Netlink www.dcsnetlink.com ddeutsch@dcsnetlink.com 877-327-6385 A Service Disabled Veteran Owned Small Business Company © 2016 All Rights Reserved – DCS Netlink