SlideShare a Scribd company logo
1 of 8
Download to read offline
ARE YOU A

TARGET?
CAMetz
Security Consultant
Hackers
gained access to
Target's computer system.

CAMetz
Security Consultant
THEY STOLE
FINANCIAL DATA
PERSONAL DATA

of 110 million shoppers!
HOW DID THEY DO THAT?
CAMetz
Security Consultant
HACKERS often research which outside contractors/vendors have remote access to the networks
of large corporations because they make easier targets.

?
VENDOR

This attack method is known as "island hopping" and is more common than you’d think.

Very sophisticated cyber attack operation
CAMetz
Security Consultant
HACKERS
tricked an outside vendor employee into

URGENT!!
SUBJECT: YOUR WEDDING PHOTOS!
FROM: ABC PHOTOGRAPHY!
TO: MR. XY%(HLio!
DATE: 13 February 2014!
Dear Customer,!
We have some important information about your account. Please click the
link below to contact one of our representatives!

!

Dear Client,!
We have some important information about your account. Please
click the link below to contact one of our representatives.

clicking on a malicious email!
CAMetz
Security Consultant
The vendor employee with access to Target's network fell for a
"spear phishing” attack.

HACKERS sent malware-laced emails that appeared to come from
trusted sources, which took over vendor employee’s computer.
Once HACKERS gained access to the vendor employee’s computer,
they penetrated Target's system and stole the retailer's payment
card data.
CAMetz
Security Consultant
HACKERS
TARGET

virus

NETWORK

VENDOR

Researchers at a cloud security company found 55,000 so-called HVAC vendors that are
connected to the Internet.
Many vendors ignore basic computer security measures.
Reportedly, Target may not have realized the phishing attack initially, because the company
was using a free anti-malware program that does not offer real-time protection against
threats.
CAMetz
Security Consultant
DON’T BE A TARGET!

ELIMINATE
VULNERABILITIES TO
YOUR SYSTEMS AND
SENSITIVE DATA

INCREASE YOUR
SECURITY TRAINING
AND EDUCATION
PROGRAMS

Engage your IT personnel more frequently.
Tap into the experience of your security personnel.
Ensure you have a strong, solid anti-virus program program to guard your systems.
Implement regular employee security training and education programs and sessions.

IT’S A START!
CAMetz
Security Consultant

More Related Content

Viewers also liked

Mba education and its utility in the corporate world
Mba education and its utility in the corporate worldMba education and its utility in the corporate world
Mba education and its utility in the corporate worldRanjeet Singh
 
Rupor: PR of placemarketing
Rupor: PR of placemarketingRupor: PR of placemarketing
Rupor: PR of placemarketingMikhail Starov
 
To consider when buying a fireplace
To consider when buying a fireplaceTo consider when buying a fireplace
To consider when buying a fireplacehenrikalm
 
Evaluation for Question 2
Evaluation for Question 2Evaluation for Question 2
Evaluation for Question 2SHubbard1
 
WWW REPORT
WWW REPORTWWW REPORT
WWW REPORTalwynj
 
Plancess at a glance
Plancess at a glancePlancess at a glance
Plancess at a glanceplancess
 
مفاتيح التدوين
مفاتيح التدوينمفاتيح التدوين
مفاتيح التدوينShatha Mohammed
 
Culture shock presentation_2011
Culture shock presentation_2011Culture shock presentation_2011
Culture shock presentation_2011arnesjogren
 
2 класс. lesson 35. мир верх ногами. контроль навыков и умений по разделам 5 и 6
2 класс. lesson 35. мир верх ногами. контроль навыков и умений по разделам 5 и 62 класс. lesson 35. мир верх ногами. контроль навыков и умений по разделам 5 и 6
2 класс. lesson 35. мир верх ногами. контроль навыков и умений по разделам 5 и 6shpinat
 
Ung dung Facebook cho doanh nghiep 2013
Ung dung Facebook cho doanh nghiep 2013Ung dung Facebook cho doanh nghiep 2013
Ung dung Facebook cho doanh nghiep 2013Bui Hang
 
3.1.1 sistem ekonomi fedualisme dan kapitalisme di england abad ke18 19
3.1.1  sistem ekonomi fedualisme dan kapitalisme di england abad ke18 193.1.1  sistem ekonomi fedualisme dan kapitalisme di england abad ke18 19
3.1.1 sistem ekonomi fedualisme dan kapitalisme di england abad ke18 19Karsodikromo Yatiman
 
An ecology for systemic change. How to foster and empower disruptive innovati...
An ecology for systemic change. How to foster and empower disruptive innovati...An ecology for systemic change. How to foster and empower disruptive innovati...
An ecology for systemic change. How to foster and empower disruptive innovati...Helene Finidori
 
2 класс. lesson 39. волшебная шляпа
2 класс. lesson 39. волшебная шляпа2 класс. lesson 39. волшебная шляпа
2 класс. lesson 39. волшебная шляпаshpinat
 
Chapter08: Bank Legislation and Regulation PPT
Chapter08: Bank Legislation and Regulation PPTChapter08: Bank Legislation and Regulation PPT
Chapter08: Bank Legislation and Regulation PPTPheng Chandara
 
Scrivere un report con i video per zona wrestling
Scrivere un report con i video per zona wrestlingScrivere un report con i video per zona wrestling
Scrivere un report con i video per zona wrestlingGiuseppe Calò
 
Time for a holiday, case study DRAFT
Time for a holiday, case study DRAFTTime for a holiday, case study DRAFT
Time for a holiday, case study DRAFTClaire Owen
 

Viewers also liked (20)

Mba education and its utility in the corporate world
Mba education and its utility in the corporate worldMba education and its utility in the corporate world
Mba education and its utility in the corporate world
 
Stramz bar
Stramz barStramz bar
Stramz bar
 
Rupor: PR of placemarketing
Rupor: PR of placemarketingRupor: PR of placemarketing
Rupor: PR of placemarketing
 
To consider when buying a fireplace
To consider when buying a fireplaceTo consider when buying a fireplace
To consider when buying a fireplace
 
Evaluation for Question 2
Evaluation for Question 2Evaluation for Question 2
Evaluation for Question 2
 
WWW REPORT
WWW REPORTWWW REPORT
WWW REPORT
 
Plancess at a glance
Plancess at a glancePlancess at a glance
Plancess at a glance
 
مفاتيح التدوين
مفاتيح التدوينمفاتيح التدوين
مفاتيح التدوين
 
Culture shock presentation_2011
Culture shock presentation_2011Culture shock presentation_2011
Culture shock presentation_2011
 
2 класс. lesson 35. мир верх ногами. контроль навыков и умений по разделам 5 и 6
2 класс. lesson 35. мир верх ногами. контроль навыков и умений по разделам 5 и 62 класс. lesson 35. мир верх ногами. контроль навыков и умений по разделам 5 и 6
2 класс. lesson 35. мир верх ногами. контроль навыков и умений по разделам 5 и 6
 
Ung dung Facebook cho doanh nghiep 2013
Ung dung Facebook cho doanh nghiep 2013Ung dung Facebook cho doanh nghiep 2013
Ung dung Facebook cho doanh nghiep 2013
 
Edifícios..
Edifícios..Edifícios..
Edifícios..
 
3.1.1 sistem ekonomi fedualisme dan kapitalisme di england abad ke18 19
3.1.1  sistem ekonomi fedualisme dan kapitalisme di england abad ke18 193.1.1  sistem ekonomi fedualisme dan kapitalisme di england abad ke18 19
3.1.1 sistem ekonomi fedualisme dan kapitalisme di england abad ke18 19
 
An ecology for systemic change. How to foster and empower disruptive innovati...
An ecology for systemic change. How to foster and empower disruptive innovati...An ecology for systemic change. How to foster and empower disruptive innovati...
An ecology for systemic change. How to foster and empower disruptive innovati...
 
Differentiation
DifferentiationDifferentiation
Differentiation
 
2 класс. lesson 39. волшебная шляпа
2 класс. lesson 39. волшебная шляпа2 класс. lesson 39. волшебная шляпа
2 класс. lesson 39. волшебная шляпа
 
Chapter08: Bank Legislation and Regulation PPT
Chapter08: Bank Legislation and Regulation PPTChapter08: Bank Legislation and Regulation PPT
Chapter08: Bank Legislation and Regulation PPT
 
Scrivere un report con i video per zona wrestling
Scrivere un report con i video per zona wrestlingScrivere un report con i video per zona wrestling
Scrivere un report con i video per zona wrestling
 
Introduction into Cloud Computing - part 4
Introduction into Cloud Computing - part 4Introduction into Cloud Computing - part 4
Introduction into Cloud Computing - part 4
 
Time for a holiday, case study DRAFT
Time for a holiday, case study DRAFTTime for a holiday, case study DRAFT
Time for a holiday, case study DRAFT
 

Similar to ARE YOU VULNERABLE TO HACKERS? TARGET WAS.

Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationTriCorps Technologies
 
securityattackvectorsslidesharefinal-160405191759.pdf
securityattackvectorsslidesharefinal-160405191759.pdfsecurityattackvectorsslidesharefinal-160405191759.pdf
securityattackvectorsslidesharefinal-160405191759.pdfssuser6c59cb
 
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Steve Poole
 
Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)Sam Norallah
 
Cyber security ppt final
Cyber security ppt finalCyber security ppt final
Cyber security ppt finalSanishShrestha2
 
Common Security Issues on the Internet
Common Security Issues on the InternetCommon Security Issues on the Internet
Common Security Issues on the InternetBretz Harllynne Moltio
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1Abdelfatah hegazy
 
Computer hacking
Computer hackingComputer hacking
Computer hackingArjun Tomar
 
A Look Into Cyber Security
A Look Into Cyber SecurityA Look Into Cyber Security
A Look Into Cyber SecurityGTreasury
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internetRohan Bharadwaj
 
3rd Party Cyber Security: Manage your ecosystem!
3rd Party Cyber Security: Manage your ecosystem!3rd Party Cyber Security: Manage your ecosystem!
3rd Party Cyber Security: Manage your ecosystem!NormShield, Inc.
 
Computerworld Conference (2002)
Computerworld Conference (2002)Computerworld Conference (2002)
Computerworld Conference (2002)Skeeve Stevens
 
Train Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security BreachesTrain Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security BreachesHuman Resources & Payroll
 
How I'd hack into your business and how you can stop me!
How I'd hack into your business and how you can stop me!How I'd hack into your business and how you can stop me!
How I'd hack into your business and how you can stop me!AVG Technologies AU
 
Cybersecurity: How Safe Is Your Organization?
Cybersecurity: How Safe Is Your Organization?Cybersecurity: How Safe Is Your Organization?
Cybersecurity: How Safe Is Your Organization?CBIZ, Inc.
 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresIRJET Journal
 
An Introductory Guide To Internet Security - TechDogs
An Introductory Guide To Internet Security - TechDogsAn Introductory Guide To Internet Security - TechDogs
An Introductory Guide To Internet Security - TechDogsSophiaJohnson39
 

Similar to ARE YOU VULNERABLE TO HACKERS? TARGET WAS. (20)

Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
securityattackvectorsslidesharefinal-160405191759.pdf
securityattackvectorsslidesharefinal-160405191759.pdfsecurityattackvectorsslidesharefinal-160405191759.pdf
securityattackvectorsslidesharefinal-160405191759.pdf
 
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
 
Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)
 
Cyber security ppt final
Cyber security ppt finalCyber security ppt final
Cyber security ppt final
 
Common Security Issues on the Internet
Common Security Issues on the InternetCommon Security Issues on the Internet
Common Security Issues on the Internet
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
 
A Look Into Cyber Security
A Look Into Cyber SecurityA Look Into Cyber Security
A Look Into Cyber Security
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
 
E commerce-securityy
E commerce-securityyE commerce-securityy
E commerce-securityy
 
3rd Party Cyber Security: Manage your ecosystem!
3rd Party Cyber Security: Manage your ecosystem!3rd Party Cyber Security: Manage your ecosystem!
3rd Party Cyber Security: Manage your ecosystem!
 
Computerworld Conference (2002)
Computerworld Conference (2002)Computerworld Conference (2002)
Computerworld Conference (2002)
 
Train Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security BreachesTrain Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security Breaches
 
How I'd hack into your business and how you can stop me!
How I'd hack into your business and how you can stop me!How I'd hack into your business and how you can stop me!
How I'd hack into your business and how you can stop me!
 
Cybersecurity: How Safe Is Your Organization?
Cybersecurity: How Safe Is Your Organization?Cybersecurity: How Safe Is Your Organization?
Cybersecurity: How Safe Is Your Organization?
 
CYBER51-FYLER
CYBER51-FYLERCYBER51-FYLER
CYBER51-FYLER
 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and Countermeasures
 
An Introductory Guide To Internet Security - TechDogs
An Introductory Guide To Internet Security - TechDogsAn Introductory Guide To Internet Security - TechDogs
An Introductory Guide To Internet Security - TechDogs
 

Recently uploaded

SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 

Recently uploaded (20)

SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 

ARE YOU VULNERABLE TO HACKERS? TARGET WAS.

  • 2. Hackers gained access to Target's computer system. CAMetz Security Consultant
  • 3. THEY STOLE FINANCIAL DATA PERSONAL DATA of 110 million shoppers! HOW DID THEY DO THAT? CAMetz Security Consultant
  • 4. HACKERS often research which outside contractors/vendors have remote access to the networks of large corporations because they make easier targets. ? VENDOR This attack method is known as "island hopping" and is more common than you’d think. Very sophisticated cyber attack operation CAMetz Security Consultant
  • 5. HACKERS tricked an outside vendor employee into URGENT!! SUBJECT: YOUR WEDDING PHOTOS! FROM: ABC PHOTOGRAPHY! TO: MR. XY%(HLio! DATE: 13 February 2014! Dear Customer,! We have some important information about your account. Please click the link below to contact one of our representatives! ! Dear Client,! We have some important information about your account. Please click the link below to contact one of our representatives. clicking on a malicious email! CAMetz Security Consultant
  • 6. The vendor employee with access to Target's network fell for a "spear phishing” attack. HACKERS sent malware-laced emails that appeared to come from trusted sources, which took over vendor employee’s computer. Once HACKERS gained access to the vendor employee’s computer, they penetrated Target's system and stole the retailer's payment card data. CAMetz Security Consultant
  • 7. HACKERS TARGET virus NETWORK VENDOR Researchers at a cloud security company found 55,000 so-called HVAC vendors that are connected to the Internet. Many vendors ignore basic computer security measures. Reportedly, Target may not have realized the phishing attack initially, because the company was using a free anti-malware program that does not offer real-time protection against threats. CAMetz Security Consultant
  • 8. DON’T BE A TARGET! ELIMINATE VULNERABILITIES TO YOUR SYSTEMS AND SENSITIVE DATA INCREASE YOUR SECURITY TRAINING AND EDUCATION PROGRAMS Engage your IT personnel more frequently. Tap into the experience of your security personnel. Ensure you have a strong, solid anti-virus program program to guard your systems. Implement regular employee security training and education programs and sessions. IT’S A START! CAMetz Security Consultant