Presentation is loading. Please wait.

Presentation is loading. Please wait.

I S P S loss Prevention.

Similar presentations


Presentation on theme: "I S P S loss Prevention."— Presentation transcript:

1 I S P S loss Prevention

2 HACKING & PHISHING - BASIC AWRENESS

3 Hacking and phishing Ways of obtaining information – Differ by choice of methods

4 Hacking Gain access to a computer/system without having authorization
Hacking  Gain access to a computer/system without having authorization

5 Hacking Information is extracted, “involuntarily”, forcing the perpetrator to take over your computer/system, through brute force or other sophisticated methods, to gain access to sensitive data

6 Phishing Masquerading as a trustworthy source in an attempt to bait a user to surrender sensitive information “voluntarily” (username, password, credit card number, etc.)

7 Phishing Scams are typically fraudulent messages or websites appearing as legitimate enterprises (e.g., university, Internet service provider, bank) attempting to gather personal, financial and sensitive information.

8 Link might connect to another website

9 Who are the victims? Any individual or organization – small or large — can be targeted.

10 Why do they do that? Just for fun Show off Ideology DOS Seize and use sensitive/important information

11 How Can We Know? Your credit cards has been compromised Your account has been compromised Computer’s passwords changed New programs are installed Redirected Internet searches Random pop-ups

12 What Should Be Done? Staff Network Procedures

13 Network Install commercial Anti-Virus software with personal firewall Keep your computer software updated Install a firewall on your office network Conduct regular scans of your network Limit remote access Perform Backups

14 Network Create a policy for password complexity and lifetime Remove x-employees users from all systems Disable pop ups Ensure that downloads are checked by anti-virus software

15 Procedures Make sure to maintain a set of updated procedures that will “cover all the bases” of your work place

16 Procedures Never respond to requests for personal information via or phone! Be leery of URLs that do not have the company name directly before the top-level domain Routinely review your credit card and bank statements for unusual activity. Do not click on links or attachments in unexpected/sender-unknown s

17 AWARNESS!!! AWARNESS!!! AWARNESS!!!
Staff AWARNESS!!! AWARNESS!!! AWARNESS!!!

18 What to do in case….? Disconnect the machine from the Internet completely Run backups Change passwords Antivirus OS re-installation Seek help from a professional Report


Download ppt "I S P S loss Prevention."

Similar presentations


Ads by Google