SlideShare a Scribd company logo
1 of 20
Download to read offline
What	
  you	
  can	
  do	
  to	
  keep	
  your	
  
email,	
  bank	
  accounts	
  and	
  business	
  
safe	
  from	
  cybera7ack.	
  
Richard	
  Baker	
  
Nexxtep	
  Technology	
  Services	
  
h7p://nexxtep.com	
  
229-­‐671-­‐1513	
  
SMB	
  Security	
  Concerns	
  
•  Small	
  Businesses	
  are	
  the	
  path	
  of	
  least	
  resistance	
  for	
  
a7ackers.	
  
•  Generally	
  have	
  weaker	
  security	
  seOngs	
  and	
  are	
  
easier	
  to	
  penetrate.	
  
•  Last	
  year,	
  31%	
  of	
  all	
  targeted	
  a7acks	
  hit	
  businesses	
  
with	
  less	
  than	
  250	
  employees.	
  
•  On	
  average,	
  there	
  is	
  a	
  156	
  day	
  lapse	
  between	
  when	
  a	
  
system	
  is	
  compromised	
  and	
  when	
  it	
  is	
  detected.	
  
	
  
Top	
  5	
  ways	
  SMB	
  are	
  targeted	
  
•  P2P	
  applicaUons	
  
•  Drive-­‐by	
  downloads	
  
•  AcUve	
  content	
  inside	
  a7achments	
  
•  Phishing	
  a7acks	
  
•  Social	
  networking	
  
Malware?	
  
•  Short	
  for	
  malicious	
  soYware	
  
•  SoYware	
  that	
  is	
  designed	
  to	
  gain	
  access	
  or	
  
damage	
  a	
  computer	
  without	
  the	
  knowledge	
  of	
  
the	
  owner.	
  
•  Forced	
  adverUsing	
  (adware)	
  
•  Stealing	
  sensiUve	
  informaUon	
  (spyware)	
  
•  Spreading	
  email	
  (spam)	
  
•  Extort	
  money	
  (ransomware)	
  
•  Viruses	
  
How	
  to	
  prevent	
  theY	
  of	
  your	
  data	
  
•  MulU	
  layered	
  approach	
  
•  At	
  a	
  minimum:	
  
– Firewall	
  at	
  each	
  site.	
  
– Virus	
  protecUon	
  on	
  every	
  computer.	
  
– Employee	
  training.	
  
– Timely	
  Windows	
  patching.	
  
– Update	
  3rd	
  party	
  soYware.	
  
How	
  to	
  prevent	
  theY	
  of	
  your	
  data	
  
AddiUonal	
  steps	
  that	
  can	
  be	
  taken:	
  
– AcUve	
  scanning	
  at	
  the	
  firewall.	
  
– Content	
  filtering	
  at	
  the	
  firewall.	
  
– Malware	
  protecUon	
  on	
  the	
  endpoints.	
  
– UUlize	
  encrypUon.	
  
– Employee	
  training.	
  
How	
  to	
  prevent	
  theY	
  of	
  your	
  data	
  
•  Use	
  a	
  VPN	
  service	
  
hotspotshield.com	
  
-­‐	
  Offers	
  a	
  free	
  (ad	
  supported)	
  version	
  and	
  a	
  paid	
  
version.	
  
•  Check	
  your	
  links	
  before	
  you	
  click	
  
– h7p://longurl.org	
  
– h7p://virustotal.com	
  
Phishing	
  Quiz	
  
•  h7p://www.opendns.com/phishing-­‐quiz/	
  
•  h7p://www.sonicwall.com/furl/phishing/	
  
Phishing	
  Quiz	
  
	
  
Phishing	
  Quiz	
  
	
  
Phishing	
  Quiz	
  
	
  
Phishing	
  Quiz	
  
	
  
Password	
  RecommendaUons	
  
-­‐  Use	
  2	
  factor	
  authenUcaUon.	
  
-­‐  Use	
  a	
  password	
  manager.	
  (lastpass,	
  
1password,	
  keepass	
  to	
  name	
  a	
  few)	
  
-­‐  If	
  absolutely	
  can’t	
  use	
  an	
  automated	
  tool,	
  
choose	
  4	
  or	
  5	
  passwords.	
  
-­‐  Social	
  media,	
  throwaway,	
  email	
  and	
  
finance.	
  
Password	
  RecommendaUons	
  
-­‐  Use	
  a	
  password	
  with	
  at	
  least	
  12	
  characters.	
  
-­‐  Use	
  words.	
  (i.e.	
  I	
  Love	
  KoolAid!)	
  
-­‐  Be7er	
  yet:	
  I@Love@KoolAid2!!	
  
-­‐  Use	
  capital,	
  lowercase,	
  numbers	
  and	
  special	
  
characters.	
  
-­‐  Don’t	
  tell	
  anyone.	
  
2	
  Factor	
  AuthenUcaUon	
  
-­‐  Makes	
  it	
  much	
  more	
  difficult	
  for	
  the	
  a7acker	
  
to	
  impersonate	
  you	
  and	
  access	
  your	
  accounts.	
  
-­‐  Can	
  be	
  in	
  the	
  form	
  of:	
  smartcard,	
  USB	
  drive,	
  
app	
  on	
  your	
  phone,	
  text	
  message,	
  biometrics.	
  
-­‐  Sites	
  that	
  uUlize	
  2	
  factor:	
  Google,	
  MicrosoY,	
  
Yahoo,	
  Apple,	
  Twi7er,	
  Evernote,	
  LinkedIn,	
  
Dropbox	
  
Use	
  a	
  password	
  manager	
  
-­‐  Firefox	
  bu7on	
  	
  OpUons	
  	
  Security	
  	
  Saved	
  
Passwords	
  	
  Show	
  Passwords	
  
Use	
  a	
  password	
  manager	
  
-­‐  Chrome	
  seOngs	
  	
  Show	
  Advanced	
  SeOngs	
  	
  
Passwords	
  and	
  forms	
  -­‐>	
  Managed	
  saved	
  passwords	
  
2012	
  Hacking	
  Milestones	
  
•  Jan	
  1	
  –	
  24	
  million	
  idenUUes	
  stolen	
  from	
  Zappos.com	
  
•  March	
  3	
  -­‐	
  A	
  payment	
  processor	
  for	
  Visa	
  &	
  Mastercard	
  was	
  compromised;	
  exposing	
  
1.5	
  million	
  accounts.	
  
•  April	
  4	
  –	
  Over	
  600,000	
  Mac	
  computers	
  are	
  infected	
  by	
  a	
  java	
  exploit.	
  
•  June	
  6	
  –	
  LinkedIn	
  suffers	
  data	
  breach.	
  6.5	
  million	
  accounts	
  were	
  stolen	
  by	
  Russian	
  
cybercriminals.	
  
•  July	
  7	
  –	
  Japanese	
  finance	
  ministry	
  discovers	
  their	
  network	
  has	
  been	
  infected	
  for	
  2	
  
years.	
  
•  August	
  8	
  –	
  Reuters	
  news	
  service	
  is	
  hacked	
  resulUng	
  in	
  fake	
  news	
  stories	
  posted	
  on	
  
twi7er	
  and	
  it’s	
  website.	
  
•  October	
  10	
  –	
  63	
  Barnes	
  &	
  Noble	
  stores	
  had	
  their	
  credit	
  card	
  machines	
  
compromised.	
  
•  November	
  11	
  –	
  Burglars	
  discovered	
  using	
  a	
  known	
  exploit	
  in	
  hotel	
  locks	
  that	
  
effects	
  4	
  million	
  locks.	
  
•  Facebook	
  reports	
  that	
  .06%	
  of	
  log-­‐ons	
  each	
  day	
  are	
  compromised.	
  That	
  amounts	
  
to	
  600,000	
  Umes	
  daily.	
  
	
  
What	
  can	
  you	
  do	
  to	
  protect	
  yourself?	
  
-­‐  Go	
  to	
  www.annualcreditreport.com	
  
-­‐  You	
  can	
  check	
  for	
  free	
  up	
  to	
  3	
  Umes	
  a	
  year.	
  
-­‐  Credit	
  score	
  is	
  $8.	
  
-­‐  Freeze	
  your	
  credit	
  for	
  $9.	
  
-­‐  h7p://consumer.georgia.gov/consumer-­‐topics/credit-­‐freeze	
  
QuesUons?	
  
	
  
Richard	
  Baker	
  
Nexxtep	
  Technology	
  Services	
  
h7p://nexxtep.com	
  
229-­‐671-­‐1513	
  
	
  

More Related Content

What's hot

Internet Security
Internet SecurityInternet Security
Internet Securitymjelson
 
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNetLockSmith
 
Internet security tutorial
Internet security tutorialInternet security tutorial
Internet security tutorialiuvmtech
 
Ethical hacking & Information Security
Ethical hacking & Information SecurityEthical hacking & Information Security
Ethical hacking & Information SecurityAjay Dhamija
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awarenessJason Murray
 
Computer security and malware by shahzad younas
Computer security and malware by shahzad younasComputer security and malware by shahzad younas
Computer security and malware by shahzad younasShahzad Younas
 
Cybersecurity Five Facts in Five Minutes - IOD - London - 20161129
Cybersecurity Five Facts in Five Minutes -  IOD - London - 20161129Cybersecurity Five Facts in Five Minutes -  IOD - London - 20161129
Cybersecurity Five Facts in Five Minutes - IOD - London - 20161129Darren Wray
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessInnocent Korie
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Jay Nagar
 
Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3DallasHaselhorst
 
Cybersecurity Cyber Usalama
Cybersecurity Cyber UsalamaCybersecurity Cyber Usalama
Cybersecurity Cyber UsalamaMuhammadRadwan10
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet SecurityGerard Lamusse
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamMohammed Adam
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & securityAvani Patel
 
CYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYCYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYFaMulan2
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber SecurityDominic Rajesh
 

What's hot (20)

Internet Security
Internet SecurityInternet Security
Internet Security
 
Internet security
Internet securityInternet security
Internet security
 
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) Posters
 
Internet security tutorial
Internet security tutorialInternet security tutorial
Internet security tutorial
 
Ethical hacking & Information Security
Ethical hacking & Information SecurityEthical hacking & Information Security
Ethical hacking & Information Security
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
Computer security and malware by shahzad younas
Computer security and malware by shahzad younasComputer security and malware by shahzad younas
Computer security and malware by shahzad younas
 
Hacking
HackingHacking
Hacking
 
Cybersecurity Five Facts in Five Minutes - IOD - London - 20161129
Cybersecurity Five Facts in Five Minutes -  IOD - London - 20161129Cybersecurity Five Facts in Five Minutes -  IOD - London - 20161129
Cybersecurity Five Facts in Five Minutes - IOD - London - 20161129
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3
 
Cybersecurity Cyber Usalama
Cybersecurity Cyber UsalamaCybersecurity Cyber Usalama
Cybersecurity Cyber Usalama
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
 
Internet security
Internet securityInternet security
Internet security
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by Adam
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
CYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYCYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTY
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 

Viewers also liked

Cult of Maria Lionza
Cult of Maria LionzaCult of Maria Lionza
Cult of Maria Lionzaaclucca
 
Mini guía ciudad de barcelona
Mini guía ciudad de barcelonaMini guía ciudad de barcelona
Mini guía ciudad de barcelonamadriderasmus.es
 
Frase francisco cajiao es urgente volver a pensar la escuela
Frase francisco cajiao es urgente volver a pensar la escuelaFrase francisco cajiao es urgente volver a pensar la escuela
Frase francisco cajiao es urgente volver a pensar la escuelapastoraledu
 
Embriología, anatomia y semiologia (urologia)
Embriología, anatomia y semiologia (urologia)Embriología, anatomia y semiologia (urologia)
Embriología, anatomia y semiologia (urologia)secretaria de salud
 
Design calibration en (1)
Design calibration en (1)Design calibration en (1)
Design calibration en (1)Ruchi Tiwari
 
Mobile Day - Tendencias y estrategias de desarrollo movil empresarial
Mobile Day - Tendencias y estrategias de desarrollo movil empresarialMobile Day - Tendencias y estrategias de desarrollo movil empresarial
Mobile Day - Tendencias y estrategias de desarrollo movil empresarialSoftware Guru
 
3. Discrimination & Harassment Laws
3. Discrimination & Harassment Laws3. Discrimination & Harassment Laws
3. Discrimination & Harassment Lawspaulwhite1983
 
Especies tortugas marinas del mundo
Especies tortugas marinas del mundoEspecies tortugas marinas del mundo
Especies tortugas marinas del mundoMichael Castillo
 
Ciencia y Religión: Nikola Tesla
Ciencia y Religión: Nikola TeslaCiencia y Religión: Nikola Tesla
Ciencia y Religión: Nikola TeslaDaniel Lamana
 
Literatura prehispánica
Literatura prehispánicaLiteratura prehispánica
Literatura prehispánicaMarco Reyes
 
Developing a Progressive Mobile Strategy (J. Boye edition)
Developing a Progressive Mobile Strategy (J. Boye edition)Developing a Progressive Mobile Strategy (J. Boye edition)
Developing a Progressive Mobile Strategy (J. Boye edition)Dave Olsen
 
Middle face fracture
Middle face fractureMiddle face fracture
Middle face fractureEhab Napih
 
Circunferencia y Funciones Trigonométricas
Circunferencia y Funciones TrigonométricasCircunferencia y Funciones Trigonométricas
Circunferencia y Funciones TrigonométricasEstela
 
Netzwerk "Gesunder Kindergarten" ein Überblick
Netzwerk "Gesunder Kindergarten" ein ÜberblickNetzwerk "Gesunder Kindergarten" ein Überblick
Netzwerk "Gesunder Kindergarten" ein Überblickgesgemkinderagarten
 
Cuadernos de la carcel de Antonio Gramsci T2
Cuadernos de la carcel de Antonio Gramsci T2Cuadernos de la carcel de Antonio Gramsci T2
Cuadernos de la carcel de Antonio Gramsci T2Dario Augusto
 
Collare Kart E
Collare Kart ECollare Kart E
Collare Kart Edierubio
 
Joseph halow innocent in dachau-the trial and punishment of franz kofler e...
Joseph halow    innocent in dachau-the trial and punishment of franz kofler e...Joseph halow    innocent in dachau-the trial and punishment of franz kofler e...
Joseph halow innocent in dachau-the trial and punishment of franz kofler e...RareBooksnRecords
 

Viewers also liked (20)

+Q9meses nº19 trapitos y nudos
+Q9meses nº19 trapitos y nudos+Q9meses nº19 trapitos y nudos
+Q9meses nº19 trapitos y nudos
 
Cult of Maria Lionza
Cult of Maria LionzaCult of Maria Lionza
Cult of Maria Lionza
 
Mini guía ciudad de barcelona
Mini guía ciudad de barcelonaMini guía ciudad de barcelona
Mini guía ciudad de barcelona
 
Frase francisco cajiao es urgente volver a pensar la escuela
Frase francisco cajiao es urgente volver a pensar la escuelaFrase francisco cajiao es urgente volver a pensar la escuela
Frase francisco cajiao es urgente volver a pensar la escuela
 
Embriología, anatomia y semiologia (urologia)
Embriología, anatomia y semiologia (urologia)Embriología, anatomia y semiologia (urologia)
Embriología, anatomia y semiologia (urologia)
 
Design calibration en (1)
Design calibration en (1)Design calibration en (1)
Design calibration en (1)
 
Mobile Day - Tendencias y estrategias de desarrollo movil empresarial
Mobile Day - Tendencias y estrategias de desarrollo movil empresarialMobile Day - Tendencias y estrategias de desarrollo movil empresarial
Mobile Day - Tendencias y estrategias de desarrollo movil empresarial
 
3. Discrimination & Harassment Laws
3. Discrimination & Harassment Laws3. Discrimination & Harassment Laws
3. Discrimination & Harassment Laws
 
Ch12
Ch12Ch12
Ch12
 
Especies tortugas marinas del mundo
Especies tortugas marinas del mundoEspecies tortugas marinas del mundo
Especies tortugas marinas del mundo
 
Ciencia y Religión: Nikola Tesla
Ciencia y Religión: Nikola TeslaCiencia y Religión: Nikola Tesla
Ciencia y Religión: Nikola Tesla
 
Literatura prehispánica
Literatura prehispánicaLiteratura prehispánica
Literatura prehispánica
 
Developing a Progressive Mobile Strategy (J. Boye edition)
Developing a Progressive Mobile Strategy (J. Boye edition)Developing a Progressive Mobile Strategy (J. Boye edition)
Developing a Progressive Mobile Strategy (J. Boye edition)
 
Middle face fracture
Middle face fractureMiddle face fracture
Middle face fracture
 
Circunferencia y Funciones Trigonométricas
Circunferencia y Funciones TrigonométricasCircunferencia y Funciones Trigonométricas
Circunferencia y Funciones Trigonométricas
 
Netzwerk "Gesunder Kindergarten" ein Überblick
Netzwerk "Gesunder Kindergarten" ein ÜberblickNetzwerk "Gesunder Kindergarten" ein Überblick
Netzwerk "Gesunder Kindergarten" ein Überblick
 
Cuadernos de la carcel de Antonio Gramsci T2
Cuadernos de la carcel de Antonio Gramsci T2Cuadernos de la carcel de Antonio Gramsci T2
Cuadernos de la carcel de Antonio Gramsci T2
 
Manzana S3 C 30
Manzana S3 C 30Manzana S3 C 30
Manzana S3 C 30
 
Collare Kart E
Collare Kart ECollare Kart E
Collare Kart E
 
Joseph halow innocent in dachau-the trial and punishment of franz kofler e...
Joseph halow    innocent in dachau-the trial and punishment of franz kofler e...Joseph halow    innocent in dachau-the trial and punishment of franz kofler e...
Joseph halow innocent in dachau-the trial and punishment of franz kofler e...
 

Similar to What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cyberattack

Protecting Your Business From Cybercrime
Protecting Your Business From CybercrimeProtecting Your Business From Cybercrime
Protecting Your Business From CybercrimeDavid J Rosenthal
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBCapyn
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfMansoorAhmed57263
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptOoXair
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Abzetdin Adamov
 
CyberSecurity.ppt
CyberSecurity.pptCyberSecurity.ppt
CyberSecurity.pptFork6
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityKaushal Solanki
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security InnovationPriyanka Aash
 
Forensic And Cloud Computing
Forensic And Cloud ComputingForensic And Cloud Computing
Forensic And Cloud ComputingMitesh Katira
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingSachin Saini
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraudRadiant Minds
 
Data security best practices for risk awareness and mitigation
Data security best practices for risk awareness and mitigationData security best practices for risk awareness and mitigation
Data security best practices for risk awareness and mitigationNick Chandi
 
Protecting Your Business from Cybercrime - Cybersecurity 101
Protecting Your Business from Cybercrime - Cybersecurity 101Protecting Your Business from Cybercrime - Cybersecurity 101
Protecting Your Business from Cybercrime - Cybersecurity 101David J Rosenthal
 
The Immune System of Internet
The Immune System of InternetThe Immune System of Internet
The Immune System of InternetMohit Kanwar
 

Similar to What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cyberattack (20)

Protecting Your Business From Cybercrime
Protecting Your Business From CybercrimeProtecting Your Business From Cybercrime
Protecting Your Business From Cybercrime
 
Digital Self Defense (RRLC version)
Digital Self Defense (RRLC version)Digital Self Defense (RRLC version)
Digital Self Defense (RRLC version)
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBC
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
 
CyberSecurity.ppt
CyberSecurity.pptCyberSecurity.ppt
CyberSecurity.ppt
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
PA SB DC Cyber Brief
PA SB DC Cyber Brief PA SB DC Cyber Brief
PA SB DC Cyber Brief
 
Eset cybersecurity awareness (laxman giri)
Eset cybersecurity awareness (laxman giri)Eset cybersecurity awareness (laxman giri)
Eset cybersecurity awareness (laxman giri)
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security Innovation
 
Forensic And Cloud Computing
Forensic And Cloud ComputingForensic And Cloud Computing
Forensic And Cloud Computing
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraud
 
Phishing
PhishingPhishing
Phishing
 
Data security best practices for risk awareness and mitigation
Data security best practices for risk awareness and mitigationData security best practices for risk awareness and mitigation
Data security best practices for risk awareness and mitigation
 
Drooger, jack cyber security
Drooger, jack   cyber securityDrooger, jack   cyber security
Drooger, jack cyber security
 
Protecting Your Business from Cybercrime - Cybersecurity 101
Protecting Your Business from Cybercrime - Cybersecurity 101Protecting Your Business from Cybercrime - Cybersecurity 101
Protecting Your Business from Cybercrime - Cybersecurity 101
 
The Immune System of Internet
The Immune System of InternetThe Immune System of Internet
The Immune System of Internet
 

More from nexxtep

Password Management Tips
Password Management TipsPassword Management Tips
Password Management Tipsnexxtep
 
5-Step Email Marketing Plan
5-Step Email Marketing Plan5-Step Email Marketing Plan
5-Step Email Marketing Plannexxtep
 
10 Tips and Tricks Every iPhone and iPad User Should Know
10 Tips and Tricks Every iPhone and iPad User Should Know10 Tips and Tricks Every iPhone and iPad User Should Know
10 Tips and Tricks Every iPhone and iPad User Should Knownexxtep
 
The Modern Office
The Modern OfficeThe Modern Office
The Modern Officenexxtep
 
iPhone and iPad Tips and Tricks
iPhone and iPad Tips and TricksiPhone and iPad Tips and Tricks
iPhone and iPad Tips and Tricksnexxtep
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Securitynexxtep
 

More from nexxtep (6)

Password Management Tips
Password Management TipsPassword Management Tips
Password Management Tips
 
5-Step Email Marketing Plan
5-Step Email Marketing Plan5-Step Email Marketing Plan
5-Step Email Marketing Plan
 
10 Tips and Tricks Every iPhone and iPad User Should Know
10 Tips and Tricks Every iPhone and iPad User Should Know10 Tips and Tricks Every iPhone and iPad User Should Know
10 Tips and Tricks Every iPhone and iPad User Should Know
 
The Modern Office
The Modern OfficeThe Modern Office
The Modern Office
 
iPhone and iPad Tips and Tricks
iPhone and iPad Tips and TricksiPhone and iPad Tips and Tricks
iPhone and iPad Tips and Tricks
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 

Recently uploaded

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 

Recently uploaded (20)

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 

What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cyberattack

  • 1. What  you  can  do  to  keep  your   email,  bank  accounts  and  business   safe  from  cybera7ack.   Richard  Baker   Nexxtep  Technology  Services   h7p://nexxtep.com   229-­‐671-­‐1513  
  • 2. SMB  Security  Concerns   •  Small  Businesses  are  the  path  of  least  resistance  for   a7ackers.   •  Generally  have  weaker  security  seOngs  and  are   easier  to  penetrate.   •  Last  year,  31%  of  all  targeted  a7acks  hit  businesses   with  less  than  250  employees.   •  On  average,  there  is  a  156  day  lapse  between  when  a   system  is  compromised  and  when  it  is  detected.    
  • 3. Top  5  ways  SMB  are  targeted   •  P2P  applicaUons   •  Drive-­‐by  downloads   •  AcUve  content  inside  a7achments   •  Phishing  a7acks   •  Social  networking  
  • 4. Malware?   •  Short  for  malicious  soYware   •  SoYware  that  is  designed  to  gain  access  or   damage  a  computer  without  the  knowledge  of   the  owner.   •  Forced  adverUsing  (adware)   •  Stealing  sensiUve  informaUon  (spyware)   •  Spreading  email  (spam)   •  Extort  money  (ransomware)   •  Viruses  
  • 5. How  to  prevent  theY  of  your  data   •  MulU  layered  approach   •  At  a  minimum:   – Firewall  at  each  site.   – Virus  protecUon  on  every  computer.   – Employee  training.   – Timely  Windows  patching.   – Update  3rd  party  soYware.  
  • 6. How  to  prevent  theY  of  your  data   AddiUonal  steps  that  can  be  taken:   – AcUve  scanning  at  the  firewall.   – Content  filtering  at  the  firewall.   – Malware  protecUon  on  the  endpoints.   – UUlize  encrypUon.   – Employee  training.  
  • 7. How  to  prevent  theY  of  your  data   •  Use  a  VPN  service   hotspotshield.com   -­‐  Offers  a  free  (ad  supported)  version  and  a  paid   version.   •  Check  your  links  before  you  click   – h7p://longurl.org   – h7p://virustotal.com  
  • 8. Phishing  Quiz   •  h7p://www.opendns.com/phishing-­‐quiz/   •  h7p://www.sonicwall.com/furl/phishing/  
  • 13. Password  RecommendaUons   -­‐  Use  2  factor  authenUcaUon.   -­‐  Use  a  password  manager.  (lastpass,   1password,  keepass  to  name  a  few)   -­‐  If  absolutely  can’t  use  an  automated  tool,   choose  4  or  5  passwords.   -­‐  Social  media,  throwaway,  email  and   finance.  
  • 14. Password  RecommendaUons   -­‐  Use  a  password  with  at  least  12  characters.   -­‐  Use  words.  (i.e.  I  Love  KoolAid!)   -­‐  Be7er  yet:  I@Love@KoolAid2!!   -­‐  Use  capital,  lowercase,  numbers  and  special   characters.   -­‐  Don’t  tell  anyone.  
  • 15. 2  Factor  AuthenUcaUon   -­‐  Makes  it  much  more  difficult  for  the  a7acker   to  impersonate  you  and  access  your  accounts.   -­‐  Can  be  in  the  form  of:  smartcard,  USB  drive,   app  on  your  phone,  text  message,  biometrics.   -­‐  Sites  that  uUlize  2  factor:  Google,  MicrosoY,   Yahoo,  Apple,  Twi7er,  Evernote,  LinkedIn,   Dropbox  
  • 16. Use  a  password  manager   -­‐  Firefox  bu7on    OpUons    Security    Saved   Passwords    Show  Passwords  
  • 17. Use  a  password  manager   -­‐  Chrome  seOngs    Show  Advanced  SeOngs     Passwords  and  forms  -­‐>  Managed  saved  passwords  
  • 18. 2012  Hacking  Milestones   •  Jan  1  –  24  million  idenUUes  stolen  from  Zappos.com   •  March  3  -­‐  A  payment  processor  for  Visa  &  Mastercard  was  compromised;  exposing   1.5  million  accounts.   •  April  4  –  Over  600,000  Mac  computers  are  infected  by  a  java  exploit.   •  June  6  –  LinkedIn  suffers  data  breach.  6.5  million  accounts  were  stolen  by  Russian   cybercriminals.   •  July  7  –  Japanese  finance  ministry  discovers  their  network  has  been  infected  for  2   years.   •  August  8  –  Reuters  news  service  is  hacked  resulUng  in  fake  news  stories  posted  on   twi7er  and  it’s  website.   •  October  10  –  63  Barnes  &  Noble  stores  had  their  credit  card  machines   compromised.   •  November  11  –  Burglars  discovered  using  a  known  exploit  in  hotel  locks  that   effects  4  million  locks.   •  Facebook  reports  that  .06%  of  log-­‐ons  each  day  are  compromised.  That  amounts   to  600,000  Umes  daily.    
  • 19. What  can  you  do  to  protect  yourself?   -­‐  Go  to  www.annualcreditreport.com   -­‐  You  can  check  for  free  up  to  3  Umes  a  year.   -­‐  Credit  score  is  $8.   -­‐  Freeze  your  credit  for  $9.   -­‐  h7p://consumer.georgia.gov/consumer-­‐topics/credit-­‐freeze  
  • 20. QuesUons?     Richard  Baker   Nexxtep  Technology  Services   h7p://nexxtep.com   229-­‐671-­‐1513