Top Threats and What You Can Do About Them By Top Threats and What You Can Do About Them By Cyber Security
Hackers
Cyber Warfare
Dictators
Your Employees
The Bad News For Cyber Criminals size doesn’t matter – Successful attacks on small-midsize businesses grew by 64% in 2014 – Smaller companies are low hanging fruit
More Bad News – Automated attacks mean criminals can hit thousands of businesses
The Really Bad News 60 % of small businesses that suffer an attack shut down after 6 months
Small Business Security Threats Social Engineering – Phishing Malware – Viruses – Worms – Trojan horses – Ransomware
Social Engineering Psychological manipulation of people into performing actions or divulging confidential information.
Phishing The attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication.
Phishing Example A (Hello Dearest) Hello Dearest, Compliments of the day. I came across your contact address while searching for someone to help me, I lost my parents and want you to stand as my foreign trustee to retrive and invest USD$6.5 Million which I inherited from my late parent. I tried to get this money out from the bank, but the management refused because of my age. I am ready to give you 25% of the whole money at the completion of the transaction, write me back for more details. Regards, Miss.Mary Anderson
Phishing Example B (Mr. Leon) 1,500,000 USD A Personal Donation to you from Mr.Leon hirtle, Contact Mr. Leon hirtle On: for more Greetings!!! I'm Mr Juan Colombás from Lloyds banking Group United Kingdom. I saw your profile and I want to have a Joint Venture with you. You can view my website and contact me for more details directors/board_directors.asp Mr. Juan Colombás Mobile: www.lloydsbankinggroup.comhttp:// directors/board_directors.asp
Phishing Example C (The Official Message) ******* THIS IS AN AUTOMATED-NOTIFICATION *********. 08 / 06 / ********************************************. Public-Records Access-Correspondence. ********************************************. MESSAGE ID NO ********************************************. 82U-jW8 BACKGROUND NOTICE. ********************************************. It has just been-brought to our attention that one new-negative item was recently-added to your public-records on This new-negative line-item that was recently-posted, as well as all of your public record-file(s) are currently- accessible online & can be viewed anyone who is searching your name or any other information related to you. Go here today and review this negative-item and formally-dispute:
Phishing Example D (The Official )
Malware Malware= short for malicious software, is any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems.
Ransomware A type of malware that restricts access to a computer system that it infects in some way, and demands that the user pay a ransom to the operators of the malware to remove the restriction.
Ransomware Example A
Things To Consider Fake Wireless Access Points Browser cookies that save passwords Malicious Apps
The Good News! You don’t need to be an expert to protect yourself like an expert
More Good News Cyber Security experts What are the 3 most important things you do to protect your security online?
The Top 5 Responses Installing software updates Using unique passwords Using strong passwords Using two factor authentication Using a password manager
Anti-Phishing Tips Beware of s that try to get you to click a link in order to change your account information. Do not follow any links via to change your sensitive information. Only visit sites from known sources and always confirm suspicious information via telephone.
Anti-Phishing Tips Always use updated anti-virus software with a special anti- phishing filter. Always be very skeptical about sending any of your personal or sensitive information over the Internet. Keep informed about Phishing techniques (phishme.com) Keep link clicking to a minimum Keep your browser up to date
Anti-Phishing Tips Everyone has their own passwords! Change passwords every 3 months Backup your data
The Good News Employee Education Have a Cyber Security office policy
The Future No more passwords
Moving to the Cloud
The Future Moving to the Cloud – A worldwide growth rate of 36% – Market size = $19.6 billion by 2016
Security in the Cloud Transfer the worry to your vendor Technicians whose only job is data security Multiple technicians employing the latest technology watching your data Your data is backed up for you Built in Disaster Recovery
“Security is actually increased when using cloud solutions due to strict ISO security standards that cloud providers must adhere to, in addition to the regular security audits.”
Thank You