SlideShare une entreprise Scribd logo
1  sur  25
eSecurity! Keeping your Business and
Customers Safe
Michael McKinnon, Security Advisor
mmckinnon@avg.com.au
Let’s Work Together to Protect Us

A little bit about AVG Australia New Zealand
• We are an Avalanche Technology Group company, has
  been operating in Bayside suburbs for many years.

• Our AVG Free Edition product is widely known
  throughout the world with over 98 Million Users

• What will we be covering tonight?
   • How can I protect my business and customers?

   • Why is it important to do so?

   • Top 10 Practical Tips to Secure your Business

   • An exclusive offer for BBN Members, supporting local
     bayside businesses 


                                                            2
As if running a Business isn’t Hard Enough!




As more Businesses take advantage of the booming Internet
economy, so too do the criminals, intent on getting what they
can... Often at the sacrifice of your Reputation, your Money, or
even-worse your entire Business.




                                                                   3
The Stakes are Higher Than Ever




Distribute I.T. Pty
Ltd, started in 2002 and
collapsed in June 2011 due
to a Hacking Incident...




                                  4
What are the Threats?

• Vectors:                • Payloads:
   • Web Pages               • Malware

   • E-mail Attachments      • Trojan horses

   • Pop-Up Windows          • Worms

   • Network Based           • Spyware

   • Instant Messaging           • Password Stealers

   • Chat Rooms                  • Keyboard Loggers

   • Deception




                                                       5
Growth of Malicious Computer Code




                                    6
10 Tips to Secure Your Business
1.   Use Secure Passwords

2.   Control your Internet Connection

3.   Secure your Wireless Networks

4.   Secure your Mobile Devices

5.   Apply all Software Updates on all Computers

6.   Prevent Viruses & Malware

7.   Reduce Spam

8.   Smart settings on your Internet Browsers

9.   Secure Internet Banking

10. Be Aware of Scams and Social Engineering Tactics


                                                       7
#1 Passwords – Back to Basics




What should be aim for in a password?

• Should be easy to remember

• Should be hard to guess (and “brute-force”)




                                                8
#1 Passwords – World’s Top 10 Most Used

• 123456              • 12345

• 123456789           • Password123

• Password            • 1234567

• 12345678            • abc123

• 654321              • Qwerty




                                          9
Can you guess their password?




                                10
#1 Passwords – Rank in order of Strength


1. E56#av+Yb!

2. Password123

3. aaaaaAAAAA#####43

4. 123456

5. lucasjames




                                           11
#1 Passwords – Why Size Matters!

Length is more
 important than
 randomness...

0 – 9 = 10

A – Z = 26

a – z = 26

#$%^ etc. = 10

That’s 72 combinations
 for each letter of your
 password, for a 10 letter password that’s 72^10




                                                   12
#1 Passwords - Summary

• Never, never, ever give your password to someone else!

• Absolute minimum of 10 characters

• Use a mix of UPPER and lowercase; and
  at least one numeral; and
  At least one symbol character

• Remember: Length is always better than Randomness!

• MUST BE EASY TO REMEMBER – so you don’t have to
  write them down

• Strongly advise separating passwords between all
  different sites, just needs a few characters different.




                                                            13
#2 Control your Internet Connection

• Change the default password on your Routers/Firewalls

• Only allow Outgoing connections for known
  services – generally this means choosing
  the highest security level in the Firewall

• Consider turning off the Internet when
  it is not being used – i.e. Weekends

• If unsure of the setup or configuration,
  always consult with an IT Professional and
  ask for them to explain how they are making
  it secure.




                                                          14
#3 Secure your Wireless Networks

• Amazing how many

• Never use “WEP”, always use “WPA” or “WPA2”

• If you have visitors that want wireless access, have an
  IT professional setup a “DMZ” wireless network that
  only provides Internet access only – and not into your
  internal network

• Exception to our Password Rule here – the wireless
  encryption key should NOT be easy to remember (it will
  be too long), and should be written down somewhere
  safe




                                                            15
#4 Securing Mobile Devices for Business

• Use of these devices has grown at an astonishing
  rate, and attacks are starting to appear

• Always turn-on PIN number locking features

• iPhone users can use Apple’s “Find My iPhone”
  application to recover a lost/stolen device or remote
  wipe.

• Android phone users can use AVG Mobilation to recover
  lost/stolen phone or remote wipe.




                                                          16
#5 Always Apply Software Updates

• Why are so many people afraid of Software Updates?

• Rule No. 1 – Always Install the Latest Updates

• Rule No. 2 – Refer to Rule No. 1

• Turn On Automatic Updates

• This applies to updates for EVERYTHING, including:
   • Windows or Mac OS-X

   • Adobe Flash and PDF Reader

   • Java, and Internet Web Browsers (Firefox, Chrome etc.)




                                                              17
#6 Prevent Viruses and Malware

• Use an Internet Security solution that includes:
   • Scanning of e-mail attachments

   • Scanning of web-links that blocks access to pages

   • Regular scheduled scanning of files on your computer

• Never, never, ever, use Peer to Peer networks like
  BitTorrent

• Don’t forget to install an
  Antivirus software on the
  office File Server!




                                                            18
#7 Reduce Spam

• If you don’t know who sent you and e-mail, delete it.
   • Far easier to say, much harder to do!

   • Need to be vigilant

• Have an Anti-spam software solution in place

• Reduce Spam for others as well by protecting your own
  business domain
   • Implement Sender Policy Framework (SPF) or Domain
     Keys (DKIM) – speak to an IT professional

   • Change your e-mail account passwords regulary
     (especially POP and IMAP accounts)




                                                          19
#8 Use Smart settings on Internet Browsers

• Which Browser do you use?
   • Internet Explorer, Firefox, Chrome, Safari…

• Is it up to date? Make sure it is!

• Don’t let the browser remember passwords, because if
  it gets hacked all your passwords can be stolen!




                                                         20
#9 Secure your Bank Accounts

• Know the web address (URL) of your Internet Banking
  website – be aware of any misspelling
  or anything unusual

• Always make sure your Internet
  Banking website is secured by
  HTTPS (Secure) – look for padlock

• Insist on “Two-Factor” authentication
  for Business Banking; either a security
  token or SMS response code is OK

• Contact your bank ASAP if you find anything unusual




                                                        21
#10 Be Aware, Be Very Aware

Great Sources of Information
• Latest security news
  www.avg.com.au

• Information on Scams
  www.scamwatch.org.au

• How to Clean an Infected Computer
  www.icode.net.au

• Improving Security at Home
  www.cybersmart.gov.au

• Defence Signals Directorate
  www.dsd.gov.au/infosec



                                      22
Who needs to know all of this stuff?

• Business Owners

• All Staff

• Temps and Contractors

• Everyone!



• Don’t underestimate the power of some basic IT
  knowledge when it comes to improving security!




                                                   23
What is your Business Risking?

• Data / Information
   • Trade Secrets, things you don’t want competitors to know

   • Financial Data, could be deleted or tampered with

   • Payroll Information, could be shared with staff

   • Any number of items!

• Money
   • Available through your Internet Bank Accounts

   • Credit Card Details




                                                                24
Questions?


             Thank you 

             And who won the door prize?



             Michael McKinnon
             Security Advisor

             mmckinnon@avg.com.au




                                           25

Contenu connexe

Tendances

Itsa end user 2013
Itsa end user 2013Itsa end user 2013
Itsa end user 2013salleh1n
 
Webinar On Ethical Hacking & Cybersecurity - Day2
Webinar On Ethical Hacking & Cybersecurity - Day2Webinar On Ethical Hacking & Cybersecurity - Day2
Webinar On Ethical Hacking & Cybersecurity - Day2Mohammed Adam
 
Harbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidHarbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidErnest Staats
 
Cybersecurity Awareness Training Presentation v1.2
Cybersecurity Awareness Training Presentation v1.2Cybersecurity Awareness Training Presentation v1.2
Cybersecurity Awareness Training Presentation v1.2DallasHaselhorst
 
Information Security Awareness With Shawn Changes
Information Security Awareness With Shawn ChangesInformation Security Awareness With Shawn Changes
Information Security Awareness With Shawn ChangesMichael Dessecker
 
Security and privacy
Security and privacySecurity and privacy
Security and privacyMohammed Adam
 
BugBounty Roadmap with Mohammed Adam
BugBounty Roadmap with Mohammed AdamBugBounty Roadmap with Mohammed Adam
BugBounty Roadmap with Mohammed AdamMohammed Adam
 
Trial by Fire: Security @ DEF CON 21
Trial by Fire: Security @ DEF CON 21Trial by Fire: Security @ DEF CON 21
Trial by Fire: Security @ DEF CON 21Lookout
 
Keeping Denial of Service and Financial Fraud out of Your Contact Center
Keeping Denial of Service and Financial Fraud out of Your Contact CenterKeeping Denial of Service and Financial Fraud out of Your Contact Center
Keeping Denial of Service and Financial Fraud out of Your Contact CenterCase IQ
 
Information Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanInformation Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanAhmed Musaad
 
Computing remotely in a secure manner
Computing remotely in a secure mannerComputing remotely in a secure manner
Computing remotely in a secure mannerKevin Bryant
 
Securing Yourself in the Cyber World
Securing Yourself in the Cyber WorldSecuring Yourself in the Cyber World
Securing Yourself in the Cyber WorldEmil Tan
 

Tendances (20)

Network Security
Network SecurityNetwork Security
Network Security
 
Itsa end user 2013
Itsa end user 2013Itsa end user 2013
Itsa end user 2013
 
Personal security
Personal securityPersonal security
Personal security
 
Webinar On Ethical Hacking & Cybersecurity - Day2
Webinar On Ethical Hacking & Cybersecurity - Day2Webinar On Ethical Hacking & Cybersecurity - Day2
Webinar On Ethical Hacking & Cybersecurity - Day2
 
Cyber security and crime
Cyber security and crimeCyber security and crime
Cyber security and crime
 
INSECURITYBLANKET
INSECURITYBLANKETINSECURITYBLANKET
INSECURITYBLANKET
 
Harbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidHarbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vid
 
Cybersecurity Awareness Training Presentation v1.2
Cybersecurity Awareness Training Presentation v1.2Cybersecurity Awareness Training Presentation v1.2
Cybersecurity Awareness Training Presentation v1.2
 
Information Security Awareness With Shawn Changes
Information Security Awareness With Shawn ChangesInformation Security Awareness With Shawn Changes
Information Security Awareness With Shawn Changes
 
Security and privacy
Security and privacySecurity and privacy
Security and privacy
 
BugBounty Roadmap with Mohammed Adam
BugBounty Roadmap with Mohammed AdamBugBounty Roadmap with Mohammed Adam
BugBounty Roadmap with Mohammed Adam
 
Trial by Fire: Security @ DEF CON 21
Trial by Fire: Security @ DEF CON 21Trial by Fire: Security @ DEF CON 21
Trial by Fire: Security @ DEF CON 21
 
Internet security
Internet securityInternet security
Internet security
 
Keeping Denial of Service and Financial Fraud out of Your Contact Center
Keeping Denial of Service and Financial Fraud out of Your Contact CenterKeeping Denial of Service and Financial Fraud out of Your Contact Center
Keeping Denial of Service and Financial Fraud out of Your Contact Center
 
Information Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanInformation Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing Sudan
 
Information Security Engineering
Information Security EngineeringInformation Security Engineering
Information Security Engineering
 
Introduction to Raspberry Pi
Introduction to Raspberry PiIntroduction to Raspberry Pi
Introduction to Raspberry Pi
 
Computing remotely in a secure manner
Computing remotely in a secure mannerComputing remotely in a secure manner
Computing remotely in a secure manner
 
Securing Yourself in the Cyber World
Securing Yourself in the Cyber WorldSecuring Yourself in the Cyber World
Securing Yourself in the Cyber World
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 

Similaire à eSecurity! Keeping your Business and Customers Safe

Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online PrivacyKazi Sarwar Hossain
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraudRadiant Minds
 
Online reputation
Online reputationOnline reputation
Online reputationesl2m
 
How I'd hack into your business and how you can stop me!
How I'd hack into your business and how you can stop me!How I'd hack into your business and how you can stop me!
How I'd hack into your business and how you can stop me!AVG Technologies AU
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Abzetdin Adamov
 
Let me in! 10 tips to better passwords
Let me in! 10 tips to better passwordsLet me in! 10 tips to better passwords
Let me in! 10 tips to better passwordsMarian Merritt
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProRonald Soh
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security SeminarJeremy Quadri
 
ICT and end user security awareness slides
ICT and end user security awareness slidesICT and end user security awareness slides
ICT and end user security awareness slidesjubke
 
Data security best practices for risk awareness and mitigation
Data security best practices for risk awareness and mitigationData security best practices for risk awareness and mitigation
Data security best practices for risk awareness and mitigationNick Chandi
 
Keeping hackers out of your POS!
Keeping hackers out of your POS!Keeping hackers out of your POS!
Keeping hackers out of your POS!AVG Technologies AU
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital AgeMarian Merritt
 
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...Tom Eston
 
Iron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyIron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyGabor Szathmari
 

Similaire à eSecurity! Keeping your Business and Customers Safe (20)

Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
 
Online reputation
Online reputationOnline reputation
Online reputation
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraud
 
Online reputation
Online reputationOnline reputation
Online reputation
 
How I'd hack into your business and how you can stop me!
How I'd hack into your business and how you can stop me!How I'd hack into your business and how you can stop me!
How I'd hack into your business and how you can stop me!
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
 
Let me in! 10 tips to better passwords
Let me in! 10 tips to better passwordsLet me in! 10 tips to better passwords
Let me in! 10 tips to better passwords
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security Seminar
 
ICT and end user security awareness slides
ICT and end user security awareness slidesICT and end user security awareness slides
ICT and end user security awareness slides
 
Data security best practices for risk awareness and mitigation
Data security best practices for risk awareness and mitigationData security best practices for risk awareness and mitigation
Data security best practices for risk awareness and mitigation
 
Keeping hackers out of your POS!
Keeping hackers out of your POS!Keeping hackers out of your POS!
Keeping hackers out of your POS!
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Judy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 PresentationJudy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 Presentation
 
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
Iron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyIron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data Responsibly
 
security.ppt
security.pptsecurity.ppt
security.ppt
 

Plus de AVG Technologies AU

How To Be Facebook Friends With The Boss & Keep Your Job
How To Be Facebook Friends With The Boss & Keep Your JobHow To Be Facebook Friends With The Boss & Keep Your Job
How To Be Facebook Friends With The Boss & Keep Your JobAVG Technologies AU
 
Computing on the Move - Mobile Security
Computing on the Move - Mobile SecurityComputing on the Move - Mobile Security
Computing on the Move - Mobile SecurityAVG Technologies AU
 
The Endless Wave of Online Threats - Protecting our Community
The Endless Wave of Online Threats - Protecting our CommunityThe Endless Wave of Online Threats - Protecting our Community
The Endless Wave of Online Threats - Protecting our CommunityAVG Technologies AU
 
AVG Community Powered Threat Report: Q1 2012
AVG Community Powered Threat Report: Q1 2012AVG Community Powered Threat Report: Q1 2012
AVG Community Powered Threat Report: Q1 2012AVG Technologies AU
 
Emerging Threats and Trends in Online Security
Emerging Threats and Trends in Online SecurityEmerging Threats and Trends in Online Security
Emerging Threats and Trends in Online SecurityAVG Technologies AU
 

Plus de AVG Technologies AU (7)

AVG Threat Report Q4 2012
AVG Threat Report Q4 2012AVG Threat Report Q4 2012
AVG Threat Report Q4 2012
 
AVG Q3 2012 Threat Report
AVG Q3 2012 Threat ReportAVG Q3 2012 Threat Report
AVG Q3 2012 Threat Report
 
How To Be Facebook Friends With The Boss & Keep Your Job
How To Be Facebook Friends With The Boss & Keep Your JobHow To Be Facebook Friends With The Boss & Keep Your Job
How To Be Facebook Friends With The Boss & Keep Your Job
 
Computing on the Move - Mobile Security
Computing on the Move - Mobile SecurityComputing on the Move - Mobile Security
Computing on the Move - Mobile Security
 
The Endless Wave of Online Threats - Protecting our Community
The Endless Wave of Online Threats - Protecting our CommunityThe Endless Wave of Online Threats - Protecting our Community
The Endless Wave of Online Threats - Protecting our Community
 
AVG Community Powered Threat Report: Q1 2012
AVG Community Powered Threat Report: Q1 2012AVG Community Powered Threat Report: Q1 2012
AVG Community Powered Threat Report: Q1 2012
 
Emerging Threats and Trends in Online Security
Emerging Threats and Trends in Online SecurityEmerging Threats and Trends in Online Security
Emerging Threats and Trends in Online Security
 

Dernier

Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 

Dernier (20)

Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 

eSecurity! Keeping your Business and Customers Safe

  • 1. eSecurity! Keeping your Business and Customers Safe Michael McKinnon, Security Advisor mmckinnon@avg.com.au
  • 2. Let’s Work Together to Protect Us A little bit about AVG Australia New Zealand • We are an Avalanche Technology Group company, has been operating in Bayside suburbs for many years. • Our AVG Free Edition product is widely known throughout the world with over 98 Million Users • What will we be covering tonight? • How can I protect my business and customers? • Why is it important to do so? • Top 10 Practical Tips to Secure your Business • An exclusive offer for BBN Members, supporting local bayside businesses  2
  • 3. As if running a Business isn’t Hard Enough! As more Businesses take advantage of the booming Internet economy, so too do the criminals, intent on getting what they can... Often at the sacrifice of your Reputation, your Money, or even-worse your entire Business. 3
  • 4. The Stakes are Higher Than Ever Distribute I.T. Pty Ltd, started in 2002 and collapsed in June 2011 due to a Hacking Incident... 4
  • 5. What are the Threats? • Vectors: • Payloads: • Web Pages • Malware • E-mail Attachments • Trojan horses • Pop-Up Windows • Worms • Network Based • Spyware • Instant Messaging • Password Stealers • Chat Rooms • Keyboard Loggers • Deception 5
  • 6. Growth of Malicious Computer Code 6
  • 7. 10 Tips to Secure Your Business 1. Use Secure Passwords 2. Control your Internet Connection 3. Secure your Wireless Networks 4. Secure your Mobile Devices 5. Apply all Software Updates on all Computers 6. Prevent Viruses & Malware 7. Reduce Spam 8. Smart settings on your Internet Browsers 9. Secure Internet Banking 10. Be Aware of Scams and Social Engineering Tactics 7
  • 8. #1 Passwords – Back to Basics What should be aim for in a password? • Should be easy to remember • Should be hard to guess (and “brute-force”) 8
  • 9. #1 Passwords – World’s Top 10 Most Used • 123456 • 12345 • 123456789 • Password123 • Password • 1234567 • 12345678 • abc123 • 654321 • Qwerty 9
  • 10. Can you guess their password? 10
  • 11. #1 Passwords – Rank in order of Strength 1. E56#av+Yb! 2. Password123 3. aaaaaAAAAA#####43 4. 123456 5. lucasjames 11
  • 12. #1 Passwords – Why Size Matters! Length is more important than randomness... 0 – 9 = 10 A – Z = 26 a – z = 26 #$%^ etc. = 10 That’s 72 combinations for each letter of your password, for a 10 letter password that’s 72^10 12
  • 13. #1 Passwords - Summary • Never, never, ever give your password to someone else! • Absolute minimum of 10 characters • Use a mix of UPPER and lowercase; and at least one numeral; and At least one symbol character • Remember: Length is always better than Randomness! • MUST BE EASY TO REMEMBER – so you don’t have to write them down • Strongly advise separating passwords between all different sites, just needs a few characters different. 13
  • 14. #2 Control your Internet Connection • Change the default password on your Routers/Firewalls • Only allow Outgoing connections for known services – generally this means choosing the highest security level in the Firewall • Consider turning off the Internet when it is not being used – i.e. Weekends • If unsure of the setup or configuration, always consult with an IT Professional and ask for them to explain how they are making it secure. 14
  • 15. #3 Secure your Wireless Networks • Amazing how many • Never use “WEP”, always use “WPA” or “WPA2” • If you have visitors that want wireless access, have an IT professional setup a “DMZ” wireless network that only provides Internet access only – and not into your internal network • Exception to our Password Rule here – the wireless encryption key should NOT be easy to remember (it will be too long), and should be written down somewhere safe 15
  • 16. #4 Securing Mobile Devices for Business • Use of these devices has grown at an astonishing rate, and attacks are starting to appear • Always turn-on PIN number locking features • iPhone users can use Apple’s “Find My iPhone” application to recover a lost/stolen device or remote wipe. • Android phone users can use AVG Mobilation to recover lost/stolen phone or remote wipe. 16
  • 17. #5 Always Apply Software Updates • Why are so many people afraid of Software Updates? • Rule No. 1 – Always Install the Latest Updates • Rule No. 2 – Refer to Rule No. 1 • Turn On Automatic Updates • This applies to updates for EVERYTHING, including: • Windows or Mac OS-X • Adobe Flash and PDF Reader • Java, and Internet Web Browsers (Firefox, Chrome etc.) 17
  • 18. #6 Prevent Viruses and Malware • Use an Internet Security solution that includes: • Scanning of e-mail attachments • Scanning of web-links that blocks access to pages • Regular scheduled scanning of files on your computer • Never, never, ever, use Peer to Peer networks like BitTorrent • Don’t forget to install an Antivirus software on the office File Server! 18
  • 19. #7 Reduce Spam • If you don’t know who sent you and e-mail, delete it. • Far easier to say, much harder to do! • Need to be vigilant • Have an Anti-spam software solution in place • Reduce Spam for others as well by protecting your own business domain • Implement Sender Policy Framework (SPF) or Domain Keys (DKIM) – speak to an IT professional • Change your e-mail account passwords regulary (especially POP and IMAP accounts) 19
  • 20. #8 Use Smart settings on Internet Browsers • Which Browser do you use? • Internet Explorer, Firefox, Chrome, Safari… • Is it up to date? Make sure it is! • Don’t let the browser remember passwords, because if it gets hacked all your passwords can be stolen! 20
  • 21. #9 Secure your Bank Accounts • Know the web address (URL) of your Internet Banking website – be aware of any misspelling or anything unusual • Always make sure your Internet Banking website is secured by HTTPS (Secure) – look for padlock • Insist on “Two-Factor” authentication for Business Banking; either a security token or SMS response code is OK • Contact your bank ASAP if you find anything unusual 21
  • 22. #10 Be Aware, Be Very Aware Great Sources of Information • Latest security news www.avg.com.au • Information on Scams www.scamwatch.org.au • How to Clean an Infected Computer www.icode.net.au • Improving Security at Home www.cybersmart.gov.au • Defence Signals Directorate www.dsd.gov.au/infosec 22
  • 23. Who needs to know all of this stuff? • Business Owners • All Staff • Temps and Contractors • Everyone! • Don’t underestimate the power of some basic IT knowledge when it comes to improving security! 23
  • 24. What is your Business Risking? • Data / Information • Trade Secrets, things you don’t want competitors to know • Financial Data, could be deleted or tampered with • Payroll Information, could be shared with staff • Any number of items! • Money • Available through your Internet Bank Accounts • Credit Card Details 24
  • 25. Questions? Thank you  And who won the door prize? Michael McKinnon Security Advisor mmckinnon@avg.com.au 25