Download presentation
Presentation is loading. Please wait.
Published byGarey Junior Brooks Modified over 9 years ago
2
The Strickland Group Founded in 2001 25 employees Information Technology consulting – Software Development – HelpDesk Support – Network Infrastructure Management
3
About me Evan Meade, Sr. Vice President of Network Infrastructure Manage network infrastructure for SMB clients Clients in many industries from Colorado to Pennsylvania
4
we live in a post privacy world and everything is connected
5
From Lightbulbs To Thermostats
6
True Benefits Instant Credit reports Medical Records Sharing Real time access to your bank or credit card accounts Photo sharing with distant friends
7
And True Risks Target Hack of 2013 – 40 million credit cards stolen – paid $67 million to settle (http://money.cnn.com/2013/12/18/news/companies/target-credit-card/)
8
22 Million current and former government employees Fingerprints, SSN, Security Clearing info Suspected that Chinese government building a database (https://en.wikipedia.org/wiki/Office_of_Personnel_Management_data_breach(https://en.wikipedia.org/wiki/Office_of_Personnel_Management_data_breach) Office of Personnel Management
9
Journalist and two hackers remotely took control of a Jeep Grand Cherokee First turned on A/C Then Radio, blasting hip hop at full volume Hackers put their picture on his dash display Sprayed Windshield fluid Finally, the hackers cut the transmission while journalist was on the highway (http://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/(http://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/) Self Driving Car?
10
What does the future hold? Social Hacking Government sponsored hacking More and more viruses Viruses targeting mobile devices
14
RansomWare
15
Cryptowall Computer gets virus – Email attachment – Link – Compromised website – Malicious Ad – Vulnerable software like java, flash, silverlight, adobe, etc.
17
Examples of malicious ads
18
Infected computer phones home – Connects via TOR or i2p peer to peer protocol – Impossible to trace Generates unique 2048-bit RSA key pair
19
Checks location of infected computer If in Belarus, Ukraine, Russia, or Kazakhstan, uninstall and go away
20
Otherwise… Encrypts local files (spreadsheets, pictures, text files, documents, pdf files) Then scans for network drives and encrypts them Turns off windows Snapshots Drops Decrypt instructions in each folder where files were infected with “Ransom note”
22
Virus then Deletes itself What happens next?
24
Options?
25
1. You can always upgrade
26
2. Restore We recommend Datto backups Fully managed backup solution Backs up hourly to local appliance Sends offsite nightly Can virtualize on the device or in the cloud
27
3. Pay the Ransom …and cross your fingers Bitcoin – usually about $500 worth Payee is anonymous No Guarantee you’ll get your files Hard to obtain
28
Viruses are like ants at a picnic Eventually, you’re going to find one
29
What you can do – Always keep antivirus up to date – Take Regular Backups Keep them Offline / offsite – Use an external security device like a packet inspecting firewall – Don’t click on links in emails or open attachments unless you are certain they are valid – Keep all your software up to date
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.