The Federation of Small Businesses Small Business and Phishing 9 th May 2007 Presented by Simon Swords Copyright © 2007 Federation of Small Businesses.

Slides:



Advertisements
Similar presentations
Jennifer Perry. We help victims of e-crime and other online incidents – Web based service – Providing practical, plain language advice – No-nonsense advice.
Advertisements

Online Examination System CLASS MARKER University of Pune Helios Cloud Services.
Phishing Scams use spoofed s and websites as lures to prompt people to voluntarily hand over sensitive information Phishing s may contain.
1 of 13 Back to Start Working Remotely Your company’s Windows SBS computer network makes it easy for you and your coworkers to work remotely—and to stay.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Remote Assistance  Using this program you can allow someone to work on your computer, chat with you and view your screen with your permission  The other.
Internet safety By Lydia Snowden.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
© 2006 Consumer Jungle Minimizing Online Risks. © 2006 Consumer Jungle 15 Steps to Minimizing Online Risks 1.Update your operating system 2.Use a firewall.
STAY SAFE ONLINE. STAY SAFE ONLINE! PLEASE MAKE SURE YOU LOGIN AT THE CORRECT BANK URL / ADDRESS 1.NEVER LOGIN VIA LINKS 2.NEVER REVEAL YOUR PIN.
Phishing Rising to the challenge Amy Marasco Microsoft.
GONE PHISHING ECE 4112 Final Lab Project Group #19 Enid Brown & Linda Larmore.
Phish your victims in 5 quick steps. Phish yourself today In less than 5 minutes What is Phish5? Phish5 is a Security Awareness service With Phish5, a.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
How to choose an solution August 2008 Maxine Miller Robert Petrilak.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Learning Objective The students should be able to: a. state the definition of software b. state the usage of software c. list different types of software.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Internet Dangers Technology Communication Tools E-Literate.
Florida Athlete Leadership Technology 1 Presenters:
Overview In this tutorial you will: identify different ways to access review your own skills identify rules to follow when using . There.
WHAT IS IDENTITY THEFT?  Identity thieves take your personal information and use it to harm you in various ways, including these:  User names, passwords,
Vulnerabilities in Operating Systems Michael Gaydeski COSC December 2008.
Free Computer Antivirus Protection Download Free Antivirus for PC Now Protect your device or your banking details with the.
ICT in Product Manufacture ISDN, LAN, WAN, Intranets and extranets, global networks
How to download the latest version of AVAST Antivirus for free?
INTERNET SAFETY FOR EVERYONE
MICROSOFT OUTLOOK and Outlook service Provider
McAfee Activate  McAfee offers advanced security solutions to the computer users across the globe.  It offers a wide selection of antivirus and internet.
Find out Advantages of Outlook/Hotmail Account Outlook/Hotmail developed by Microsoft offers a great number of beneficial features and functions nevertheless.
Direct Internet 3 Iridium Proprietary and Confidential 9/18/2018.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
ACROSS THE WORLD MCAFEE PROVIDING THE UPDATE PROTECTION SOLUTIONS TO THE COMPUTER USERS. AS SAME TO THE ERROR ABOVE, WAIT FOR FEW MINUTES AND THINK SOME.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
ACROSS THE WORLD MCAFEE PROVIDING THE UPDATE PROTECTION SOLUTIONS TO THE COMPUTER USERS. AS SAME TO THE ERROR ABOVE, WAIT FOR FEW MINUTES AND THINK SOME.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
ACROSS THE WORLD MCAFEE PROVIDING THE UPDATE PROTECTION SOLUTIONS TO THE COMPUTER USERS. AS SAME TO THE ERROR ABOVE, WAIT FOR FEW MINUTES AND THINK SOME.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
HOW TO DOWNLOAD THE LATEST VERSION OF AVAST ANTIVIRUS FOR FREE?
“CYBER SPACE” - THE UNDERGROUND ECONOMY
Internet Safety for Everyone
Phishing.
Welcome and thank you for choosing SharkGate
HOW TO QUICKLY ADD A CONTACT IN GMAIL Add a contact in Gmail Once opened, you just need to move your cursor to the top of the and over the sender.
Internet Safety for Everyone
Implementing Client Security on Windows 2000 and Windows XP Level 150
Internet Safety for Everyone
Internet Safety for Everyone
Internet Safety for Everyone
Internet Safety for Everyone
Communicating in the IT Industry
Presentation transcript:

The Federation of Small Businesses Small Business and Phishing 9 th May 2007 Presented by Simon Swords Copyright © 2007 Federation of Small Businesses

A brief overview of small business and their I.T. usage Copyright © 2007 Federation of Small Businesses

How do you access the Internet / ? Dial up2.8% ISDN1.5% Broadband96.2% Satellite0.2% Copyright © 2007 Federation of Small Businesses

Internet access speed 512Mb or below8% 1Mb11.6% 2Mb31.1% 8Mb or Higher31.2% Unknown18.1% Copyright © 2007 Federation of Small Businesses

Operating System Windows96.2% Mac6.8% Linux4.6% None of the above0.3% Copyright © 2007 Federation of Small Businesses

clients Microsoft Outlook41.8% Outlook Express37.7% Web mail (i.e. AOL)9.5% Google Mail3.7% Hotmail8.3% Other18.3% Copyright © 2007 Federation of Small Businesses

Phishing and Small Business Copyright © 2007 Federation of Small Businesses

Do you know what phishing is? No28.3% Yes71.7% Copyright © 2007 Federation of Small Businesses

Are you aware of the threat phishing poses? No3.5% Yes96.5% Copyright © 2007 Federation of Small Businesses

Are you concerned about the threat phishing poses to you and your business? No36.2% Yes63.8% Copyright © 2007 Federation of Small Businesses

Do you feel comfortable entering your personal details on a secure website No27.9% Yes72.1% Copyright © 2007 Federation of Small Businesses

Have you or any of your business associates been the subjects of a Phishing scam No87.8% Yes12.2% Copyright © 2007 Federation of Small Businesses

Did you report the scam to any authority? Yes55.6% No44.4% Copyright © 2007 Federation of Small Businesses

If you did not report the scam, why not? Did not know who to report it to56.7% Did not think the police would be interested 39.2% Did not think Trading Standards would be interested 26.2% Copyright © 2007 Federation of Small Businesses

Do you think you could be hoaxed again? No48.8% Yes51.2% Copyright © 2007 Federation of Small Businesses

Do you think Nominet and the like could do more to promote awareness of phishing? Who is Nominet?49.6% No8.5% Yes41.9% Copyright © 2007 Federation of Small Businesses

Who do you think should take ultimate responsibility for phishing? ISP’s56.9% Banks and other online organisations25.7% Nominet and ICANN18.4% Police19.8% Government24.3% None of the above11.3% Copyright © 2007 Federation of Small Businesses

Summary Technology is now catching up with phishing scams, and the latest browsers and clients provide built in anti-phishing technology This new technology must be promoted to end users to stop the phishing problem at the source The best protection from fraud is knowledge Small businesses are aware of phishing and the threat it poses, however they do not know how or who to report phishing attacks to With this in mind standardised phishing reporting procedures should be put in place wherever possible Nominet should not be involved in deterring phishing, however Nominet should use its position to co-ordinate the organisations that can make a difference Copyright © 2007 Federation of Small Businesses

Questions & Answers Copyright © 2007 Federation of Small Businesses

Simon Swords T: Thank you Copyright © 2007 Federation of Small Businesses