The Top 7 (Latest) Ways Employees Cause Cybercrime Infections.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

How to protect yourself, your computer, and others on the internet
Managed Infrastructure. 2 ©2015 EarthLink. All rights reserved. IT resources are under pressure… is it time to rethink the IT staffing model? Sources:
7 Effective Habits when using the Internet Philip O’Kane 1.
Security for Today’s Threat Landscape Kat Pelak 1.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
#AVeSPresents AVeS Cyber Security Confidence in your Digital Information 2014/09/25 Charl Ueckermann Managing Director AVeS Cyber Security Lex Informatica.
Cyber Security—What you should know before it’s too late! T Jay Humphries and Trevor O’Donnal.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
A Product of Corporate Instant Messenger Enterprise Communication and Collaboration with Secure Instant Messaging Copyright © ANGLER.
Norman SecureSurf Protect your users when surfing the Internet.
Telenet for Business Mobile & Security? Brice Mees Security Services Operations Manager.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Confidential Crisis Management Innovations, LLC. CMI CrisisPad TM Product Overview Copyright © 2011, Crisis Management Innovations, LLC. All Rights Reserved.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
About Us Inception in 2001, Bitdefender has continued to raise the bar to set new standards in proactive threat prevention and virus removal. Offices.
Cyber Crimes.
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
PRIVACY BOOTCAMP YpJU.
INTEROP 2014 Mobile Issues in the Network. Mobile Issues Data loss – Hardware theft or failure – Data corruption Data theft – Hardware theft – Spyware,
Virtual techdays INDIA │ 9-11 February 2011 Security Discussion: Ask the Experts M.S.Anand │ MTC Technology Specialist │ Microsoft Corporation Anirudh.
PLUG IT IN 7 Protecting Your Information Assets. 1.How to Protect Your Assets: The Basics 2.Behavioral Actions to Protect Your Information Assets 3.Computer-Based.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
Microsoft Management Seminar Series SMS 2003 Change Management.
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
Computer Skills and Applications Computer Security.
Product Presentation. SysKit By Acceleratio Acceleratio Ltd. is a software development company based in Zagreb, Croatia, Europe founded in Technology.
Information Security In the Corporate World. About Me Graduated from Utica College with a degree in Economic Crime Investigation (ECI) in Spring 2005.
PRIVACY BOOTCAMP Jack Vale - Social Media Experiement.
INTRODUCTION & QUESTIONS.
About Us AVG is a global security software maker protecting 98 million active users in 170 countries from the ever-growing incidence of Web threats, viruses,
Craig Pringle & Derek Moir
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Cyber Security in the Mobile Era KEEPING ENTERPRISE DATA SAFE IN THE BYOD ERA.
1 #UPAugusta Today’s Topics What are Deadly IT Sins? Know them. Fear them. Fix them. #UPAugusta201 6.
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
NADAV PELEG HEAD OF MOBILE SECURITY The Mobile Threat: Consumer Devices Business Risks David Parkinson MOBILE SECURITY SPECIALIST, NER.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
Kaspersky Small Office Security INTRODUCING New for 2014!
©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Sniper Corporation. Sniper Corporation is an IT security solution company that has introduced security products for the comprehensive protection related.
The internet is a place of both useful and bad information. It has both good and bad side- and it’s all too easy for kids to stray into it. And no parents/guardian.
Technological Awareness for Teens and Young Adults.
Enterprise | education | public printing locations PrinterOn for Manufacturing.
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
Complete Cloud Security Anyone, anywhere, any app, any device.
In an increasingly competitive industry is certified by a recognized provider as Microsoft exam will dramatically improve your chances busy. Microsoft.
KASPERSKY INTERNET SECURITY FOR ANDROID. YOUR MOBILE DEVICES NEED PROTECTION More online communications and transaction are happening on tablets and phones.
BUILD SECURE PRODUCTS AND SERVICES
Trend Micro Consumer 2010 Easy. Fast. Smart.
Six Steps to Secure Access for Privileged Insiders and Vendors
The Game has Changed… Ready or Not! Andrew Willetts Technologies, Inc.
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
STOP. THINK. CONNECT. Online Safety Quiz.
SVTRAININGS. SVTRAININGS Features of SCCM  Application management  Provides a set of tools and resources that can help you create, manage, deploy, and.
It’s About Time – ScheduleMe Outlook Add-In for Office 365 Enables Users to Schedule Meetings Easily with People Outside of Your Organization Partner Logo.
Check Point Connectra NGX R60
How to Stay Safe Online Rollie Edwards.
IT Management, Simplified
IT Management, Simplified
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Presentation transcript:

The Top 7 (Latest) Ways Employees Cause Cybercrime Infections

Cynthia James Director Business Development, CISSP Alex Brandt VP Americas Jason Dettbarn Senior Technology Analyst

Founded in 1997; largest private anti-malware company – 100% focused on anti-malware Over $700M annual revenues Presence in 19 countries #1 vendor in Germany, France, Spain, Eastern Europe Protecting over 300 million end points America’s distribution: 12,000 outlets; top two vendors (revenue & units shipping) Top supplier to OEMs/ISVs of anti-malware worldwide

 Cybercrime Threatscape: Malware Growth  Current Malware: Comprehension Gap  The Top (Latest) 7 Ways Employees Cause Cyber Crime Infections  Security Solution Overview  3 Tips for CyberSafety at Home  Giveaway  Questions & Answers

200k unique malware samples PER YEAR were identified in 2006; 2M in 2007…now it’s up to 200K malware samples PER DAY. The quality of malware improves every year.

Recent years have seen exponential growth in malware. Anyone can enter the cybercrime game. Cybercriminals earn over $100B a year. Over 200K Per DAY Current Malware: Comprehension Gap Cybercrime will never stop. Where we really are today (2013) Where we really are today (2013) Where most employees/end users think we still are Where most employees/end users think we still are

present

Same password, all sites and servers (personal and business) Same password, all sites and servers (personal and business) Easy to guess from Facebook Easy to guess from Facebook #1. Poor Password Management

Users ignore warnings Users ignore warnings Users ignore usage policies Users ignore usage policies Users don’t inform IT of known security issues Users don’t inform IT of known security issues #2. “Don’t Bore Me With Safety”

On average we have 4.5 personal internet connected devices On average we have 4.5 personal internet connected devices How many walk into work each day? How many walk into work each day? How many WIFIs have we frequented in between? How many WIFIs have we frequented in between? How secure are they? How secure are they? To get infected only takes ONE malicious participant from one network OR To get infected only takes ONE malicious participant from one network OR ONE device which the owner doesn’t realize is infected ONE device which the owner doesn’t realize is infected #3. Promiscuous Use of WIFI

To be always on, always connected To be always on, always connected To all social media To all social media To get the latest features To get the latest features …regardless of the security issues #4. Users DEMAND

Cybercriminals target social media for clues Cybercriminals target social media for clues The (new) defacto “morals clause” in employment agreements (don’t hurt the brand) The (new) defacto “morals clause” in employment agreements (don’t hurt the brand) Behavior broadcasts over social media Behavior broadcasts over social media Don’t upset hacktivists! Don’t upset hacktivists! #5. They Are Easy APT Targets

1 incident of insider fraud per week per year 1 incident of insider fraud per week per year 75% caused financial loss 75% caused financial loss It’s very easy to sell data these days It’s very easy to sell data these days #6. Companies Under-Estimate The Insider Threat

When employees change jobs, do rights to data change? When employees change jobs, do rights to data change? Are passwords reset when employees leave? Are passwords reset when employees leave? Are admin passwords or backdoors documented and closed? Are admin passwords or backdoors documented and closed? #7. Privileges Accumulate… And Are Abused

 Kaspersky CyberSecurity Digest - Free Security Bulletin  Free Kaseya Security Bundle Trial Interested? Just respond to the Poll located on the right bottom corner of your Webex platform! Next: The Latest in Mobile Threats

 Top infection vector – infected apps  “Crackers” are widely available: open app, insert malware, repost it  Infected via ads  Infection via SMS or  Malware is downloaded for Windows or Android  Profit model: 1.) SMS premium messaging; 2.) theft of assets (APTs); 3.) stealing authentication codes  Advertisers receive the same information we provide the app (geolocation apps for example) Biggest problem: Android updates take 6 months to get

– Purchase apps from legitimate storefronts (“Verify Apps”) – Use AV on smartphones to defend against APTs – Help employees with their devices: Turn Bluetooth to undiscoverable Warn them about malicious apps Require them to register every mobile device which uses the corporate wifi Push data about “cybersafety at home”

Go long – longer passphrases are much more secure No online banking except over secured wifi Safety/privacy - tell kids & teens: – How geolocators in photos work – Privacy doesn’t exist - don’t share family details online

Poor Password Management “Don’t Bore Me With Safety” Promiscuous Use of WIFI Users DEMAND They are Easy APT Targets Companies Under-Estimate the Insider Threat Privileges Accumulate… And Are Abused The Top Seven

Kaseya Security Stack Endpoint Monitoring & Hardening Antivirus Kaseya Antivirus AntiMalware Kaseya AntiMalware Remediation Agent Procedures Monitoring Service Desk & PSA Scheduling & Management Monitoring Passwords USB Block Processes

Layered Security: Let’s Take a Look

About Our Experts: Kaseya “Providing Enterprise-Class IT Systems Management for Everybody”

Discover the State of IT Systems Assets Mobile Devices Network Devices Manage the State of IT Scheduling Procedures API/Messaging Automate the State of IT Reporting Dashboards Interactive Data Views IT Configuration Management Asset Management Security Business Continuity Service Delivery Systems Monitoring Remote Management Software Deployment Power Management Image Deployment Desktop Migration Mobile Device Management Network Discover & AD H ardware/Software Asset Management Virtual Machine Management AntiVirus AntiMalware Patch Management Software Updates Image Backup Image Virtualization File & Folder Backup Service Desk/Ticketing Policy Management Service Billing Policy Compliance Time Tracking Systems Checks & Alerts Agent Monitoring Enterprise Monitoring Agent-less Monitoring Log Monitoring UNIFIED MANAGEMENT

Discover: nars/en/kaseya-solution-overview Contact us: 1 (877) Try Kaseya: roduct-preview.aspx Use Promo Code: security Visit us: Q&A / Resources