The Strickland Group Founded in 2001 25 employees Information Technology consulting – Software Development – HelpDesk Support – Network Infrastructure.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

Copyright 2006 Mid-City Offices Systems. Busy people… How would your business be affected, if you suddenly lost all of your computer data? Rush through.
Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access and attacks delivered.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Computer Maintenance & Safety Spring Internet Safety Keeping your computer safe What is a computer virus? A computer program that can copy itself.
Trojan Horse Program Presented by : Lori Agrawal.
Computer Viruses.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Data Security Issues in IR Eileen Driscoll Institutional Planning and Research Cornell University
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
Protecting Yourself Online. VIRUSES, TROJANS, & WORMS Computer viruses are the "common cold" of modern technology. One in every 200 containing.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Identity-Theft is the fastest growing crime in America; 9.9 MILLION victims were reported last year, according to a Federal Trade Commission survey!
Threats to I.T Internet security By Cameron Mundy.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
eScan Total Security Suite with Cloud Security
Elite Networking & Consulting Presents: Everything You Wanted To Know About Data Insurance* * But Were Afraid To Ask Elite Networking & Consulting, LLC,
Your Trusted Partner In All Things IT. 20 Years of IT Experience University Automotive Food Service Banking Insurance Legal Medical Dental Software Development.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
IT Security for Users By Matthew Moody.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Networks and Hackers Copyright © Texas Education Agency, All rights reserved. 1.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
Cyber crime & Security Prepared by : Rughani Zarana.
Staying Safe Online Keep your Information Secure.
PLUG IT IN 7 Protecting Your Information Assets. 1.How to Protect Your Assets: The Basics 2.Behavioral Actions to Protect Your Information Assets 3.Computer-Based.
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
DIGITAL SECURITY PART 2 TOOLS. phising  Internet criminals can steal your personal and banking information without you ever noticing – they can do it.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
A Growing Threat Debbie Russ 1/28/2015. What is Ransomware? A type of malware which restricts access to the computer system that it infects, and demands.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Cyber Security Action against cyber crime. What is cyber security?  Cyber security standards are security standards which enable organizations to practice.
Jan 11 Encryption and Hacking. Your Answer Data encryption is used to keep information safe from unauthorised users. Data encryption software makes the.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Computer Security... By Kate Robinson 8P Viruses Hackers Backups Stuxnet Gary Mckinnon.
Computer Safety Sid Holder 8k Viruses Hacking Backing Up.
INTERNET SAFETY FOR KIDS
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
All about viruses, hacking and backups By Harriet Thomas.
Safety and Security issues of using ICT Alys brooks.
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
What is a Virus? A virus is something that you get in any shape or form. You could receive an that has an interesting title, but not know who is.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
By Liam Wright Manga comic group Japan SAFETY on your computer.
What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point.
1 REMOTE CONTROL SYSTEM V7 2 Introduction.
Cyber Safety Jamie Salazar.
Society & Computers PowerPoint
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
CDAC ITS Security Awareness How to help your daily computer activities remain safe and sane.
Phillip Schneider Information Services Librarian Gail Borden Public Library District Cybersecurity: Keeping Your Computers & Devices Safe.
Get2Modern A plan for Windows XP & Office 2003 EOS migration in SMB Microsoft Confidential. NDA required.
Ransomware BISD Technology Department. Ransomware Ransomware is a type of malicious software (malware) that infects a computer and/or mobile device and.
Information Technology Security Office of the Vice President for Information Technology New Employee Orientation II.
Protecting Against Cyber Attacks PLEASE TAKE A MINUTE TO LOOK AT THIS IMPORTANT MESSAGE. THIS IS HAPPENING HERE AND NOW! LET US SAVE YOU AND YOUR INFORMATION.
What they are and how to protect against them
Ways to protect yourself against hackers
The Internet of Unsecure Things
Top Ten Cyber Security Hygiene Tips
Connecting Remotely Winter 2014.
Cybersecurity Simplified: Ransomware
Presentation transcript:

The Strickland Group Founded in employees Information Technology consulting – Software Development – HelpDesk Support – Network Infrastructure Management

About me Evan Meade, Sr. Vice President of Network Infrastructure Manage network infrastructure for SMB clients Clients in many industries from Colorado to Pennsylvania

we live in a post privacy world and everything is connected

From Lightbulbs To Thermostats

True Benefits Instant Credit reports Medical Records Sharing Real time access to your bank or credit card accounts Photo sharing with distant friends

And True Risks Target Hack of 2013 – 40 million credit cards stolen – paid $67 million to settle (

22 Million current and former government employees Fingerprints, SSN, Security Clearing info Suspected that Chinese government building a database ( Office of Personnel Management

Journalist and two hackers remotely took control of a Jeep Grand Cherokee First turned on A/C Then Radio, blasting hip hop at full volume Hackers put their picture on his dash display Sprayed Windshield fluid Finally, the hackers cut the transmission while journalist was on the highway ( Self Driving Car?

What does the future hold? Social Hacking Government sponsored hacking More and more viruses Viruses targeting mobile devices

RansomWare

Cryptowall Computer gets virus – attachment – Link – Compromised website – Malicious Ad – Vulnerable software like java, flash, silverlight, adobe, etc.

Examples of malicious ads

Infected computer phones home – Connects via TOR or i2p peer to peer protocol – Impossible to trace Generates unique 2048-bit RSA key pair

Checks location of infected computer If in Belarus, Ukraine, Russia, or Kazakhstan, uninstall and go away

Otherwise… Encrypts local files (spreadsheets, pictures, text files, documents, pdf files) Then scans for network drives and encrypts them Turns off windows Snapshots Drops Decrypt instructions in each folder where files were infected with “Ransom note”

Virus then Deletes itself What happens next?

Options?

1. You can always upgrade

2. Restore We recommend Datto backups Fully managed backup solution Backs up hourly to local appliance Sends offsite nightly Can virtualize on the device or in the cloud

3. Pay the Ransom …and cross your fingers Bitcoin – usually about $500 worth Payee is anonymous No Guarantee you’ll get your files Hard to obtain

Viruses are like ants at a picnic Eventually, you’re going to find one

What you can do – Always keep antivirus up to date – Take Regular Backups Keep them Offline / offsite – Use an external security device like a packet inspecting firewall – Don’t click on links in s or open attachments unless you are certain they are valid – Keep all your software up to date