SlideShare a Scribd company logo
1 of 22
The NewSecurity Threat
Your Computers at Risk How cyber-criminals are winning the Malware wars Presented by Placer Computers
Zero Day Attacks PC Magazine: A Zero-Day Attack is a virus or other malware exploit that takes advantage of a hole in a program or operating system before the software developer has made a fix available...”
Am I At Risk? Cyber-criminals create over 60,000 new Malware attacks EVERY DAY! Antivirus/Antispyware software can’t protect against these new threats until AFTER they strike. Once the malware gets in, it seeks and attacks program vulnerabilities
How Did This Happen? Improved Microsoft security updates make 3rd party software attacks more attractive 3rd party software less likely to be regularly updated by PC owner Cyber-criminals know this so they seek the easiest targets
Is There a Trend? Average PC has 24-26 non-Microsoft (3rd party) apps  Gregg Keiser, Computer World July 2010:“While vulnerabilities in Windows XP and Vista will climb by 31% and 34% respectively this year compared to 2009, bugs in 3rd party apps will jump by 92%”
How Will It Effect Me? California Civil Code 1798.81.5A business… shall implement and maintain reasonable security procedures and practices appropriate… to protect the personal information from unauthorized access… or disclosure. California Financial Code 4057An entity that negligently discloses or shares nonpublic personal information… shall be liable, irrespective of the amount of damages suffered… for a civil penalty not to exceed $2,500 per violation. ($500,000 max)
There is a solution
Placer Computers
Placer Computers Security Management KEEPING YOUR SOFTWARE UP TO DATE
Placer Computers SO WHAT CAN PLACER COMPUTERS DO FOR YOU?
Placer Computers STEP 1: Security Scan Identify software vulnerabilities www.PlacerComputers.com
Placer Computers STEP 2: Locate Missing Updates Microsoft critical/optional patches 3rd Party program updates/patches www.PlacerComputers.com
Placer Computers STEP 3: Identify End-of-Life Software Programs no longer supported are risky! www.PlacerComputers.com
Placer Computers STEP 4: Download, install security updates Ensures that all software is up-to-date www.PlacerComputers.com
Placer Computers STEP 5: Find replacements for EOL programs Many free options are available. We will research and provide recommendations www.PlacerComputers.com
Placer Computers STEP 6: Scan and repair privacy leaks Most programs leave a trail of personal data www.PlacerComputers.com
Placer Computers STEP 7: Spyware Scan Catch any malware that gotpast your Antivirus software www.PlacerComputers.com
Placer Computers STEP 8:  System Cleanup and Optimization Clean your computer in/outOptimize your PC to run better www.PlacerComputers.com
Placer Computers BOOK NOW AND SAVE: 50% off 530-388-8811 www.PlacerComputers.com

More Related Content

What's hot

Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
Mario Reascos
 
N U R S Y A H I R A R O S L A N
N U R  S Y A H I R A  R O S L A NN U R  S Y A H I R A  R O S L A N
N U R S Y A H I R A R O S L A N
nasya
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
galaxy201
 
Viruses worms trojan horses lisa
Viruses worms  trojan horses lisaViruses worms  trojan horses lisa
Viruses worms trojan horses lisa
Dom Mike
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
ainizbahari97
 

What's hot (20)

Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
 
Worm
WormWorm
Worm
 
Computer Virus and Spyware
Computer Virus and SpywareComputer Virus and Spyware
Computer Virus and Spyware
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 
Cyberstorm[1]
Cyberstorm[1]Cyberstorm[1]
Cyberstorm[1]
 
Adware
AdwareAdware
Adware
 
Hacking and virus presentation
Hacking and virus presentationHacking and virus presentation
Hacking and virus presentation
 
Tt 06-ck
Tt 06-ckTt 06-ck
Tt 06-ck
 
Avoiding email viruses
Avoiding email virusesAvoiding email viruses
Avoiding email viruses
 
N U R S Y A H I R A R O S L A N
N U R  S Y A H I R A  R O S L A NN U R  S Y A H I R A  R O S L A N
N U R S Y A H I R A R O S L A N
 
Malware
MalwareMalware
Malware
 
Report on Rogue Security Software: a summary
Report on Rogue Security Software: a summaryReport on Rogue Security Software: a summary
Report on Rogue Security Software: a summary
 
Seven Effective Habits When Using The Internet
Seven Effective Habits When Using The InternetSeven Effective Habits When Using The Internet
Seven Effective Habits When Using The Internet
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Zimperium Enterprise Mobile Threats
Zimperium Enterprise Mobile ThreatsZimperium Enterprise Mobile Threats
Zimperium Enterprise Mobile Threats
 
Mjtanasas1
Mjtanasas1Mjtanasas1
Mjtanasas1
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 
Viruses worms trojan horses lisa
Viruses worms  trojan horses lisaViruses worms  trojan horses lisa
Viruses worms trojan horses lisa
 
presentation on Virus
presentation on Viruspresentation on Virus
presentation on Virus
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 

Viewers also liked (8)

Cs3430 lecture 16
Cs3430 lecture 16Cs3430 lecture 16
Cs3430 lecture 16
 
Automated posting on facebook and twitter for IIMnet members
Automated posting on facebook and twitter for IIMnet membersAutomated posting on facebook and twitter for IIMnet members
Automated posting on facebook and twitter for IIMnet members
 
Ub0203 developing the skills of academic numeracy & it 2
Ub0203 developing the skills of academic numeracy & it 2Ub0203 developing the skills of academic numeracy & it 2
Ub0203 developing the skills of academic numeracy & it 2
 
Exercicisdetransmissidemovimentambpolitges
Exercicisdetransmissidemovimentambpolitges Exercicisdetransmissidemovimentambpolitges
Exercicisdetransmissidemovimentambpolitges
 
Python lecture 05
Python lecture 05Python lecture 05
Python lecture 05
 
UB0203 Developing the skills of Academic Numeracy & IT
UB0203 Developing the skills of Academic Numeracy & IT UB0203 Developing the skills of Academic Numeracy & IT
UB0203 Developing the skills of Academic Numeracy & IT
 
Jb slideshow!!
Jb slideshow!!Jb slideshow!!
Jb slideshow!!
 
Presentación1
Presentación1Presentación1
Presentación1
 

Similar to The New Data Security Risk

Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
Sejahtera Affif
 

Similar to The New Data Security Risk (20)

Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Identifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting MalwareIdentifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting Malware
 
It's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityIt's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint Security
 
Ethical hacking.docx
Ethical hacking.docxEthical hacking.docx
Ethical hacking.docx
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
C3
C3C3
C3
 
Bitdefender - Solution Paper - Active Threat Control
Bitdefender - Solution Paper - Active Threat ControlBitdefender - Solution Paper - Active Threat Control
Bitdefender - Solution Paper - Active Threat Control
 
What Businesses Entrepreneurs Are Imperative To Know About Ransomware
What Businesses Entrepreneurs Are Imperative To Know About RansomwareWhat Businesses Entrepreneurs Are Imperative To Know About Ransomware
What Businesses Entrepreneurs Are Imperative To Know About Ransomware
 
Panda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion GuidePanda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion Guide
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 
Securing Your Small Business Network
Securing Your Small Business NetworkSecuring Your Small Business Network
Securing Your Small Business Network
 
Cyber security
Cyber securityCyber security
Cyber security
 
Open Source Insight: Securing Software Stacks, Election Security, FDA Pacema...
Open Source Insight:  Securing Software Stacks, Election Security, FDA Pacema...Open Source Insight:  Securing Software Stacks, Election Security, FDA Pacema...
Open Source Insight: Securing Software Stacks, Election Security, FDA Pacema...
 
Cyber Security Company.docx
Cyber Security Company.docxCyber Security Company.docx
Cyber Security Company.docx
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
 
8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
185
185185
185
 

Recently uploaded

Recently uploaded (20)

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

The New Data Security Risk

  • 1.
  • 3. Your Computers at Risk How cyber-criminals are winning the Malware wars Presented by Placer Computers
  • 4. Zero Day Attacks PC Magazine: A Zero-Day Attack is a virus or other malware exploit that takes advantage of a hole in a program or operating system before the software developer has made a fix available...”
  • 5. Am I At Risk? Cyber-criminals create over 60,000 new Malware attacks EVERY DAY! Antivirus/Antispyware software can’t protect against these new threats until AFTER they strike. Once the malware gets in, it seeks and attacks program vulnerabilities
  • 6. How Did This Happen? Improved Microsoft security updates make 3rd party software attacks more attractive 3rd party software less likely to be regularly updated by PC owner Cyber-criminals know this so they seek the easiest targets
  • 7. Is There a Trend? Average PC has 24-26 non-Microsoft (3rd party) apps Gregg Keiser, Computer World July 2010:“While vulnerabilities in Windows XP and Vista will climb by 31% and 34% respectively this year compared to 2009, bugs in 3rd party apps will jump by 92%”
  • 8. How Will It Effect Me? California Civil Code 1798.81.5A business… shall implement and maintain reasonable security procedures and practices appropriate… to protect the personal information from unauthorized access… or disclosure. California Financial Code 4057An entity that negligently discloses or shares nonpublic personal information… shall be liable, irrespective of the amount of damages suffered… for a civil penalty not to exceed $2,500 per violation. ($500,000 max)
  • 9. There is a solution
  • 10.
  • 12. Placer Computers Security Management KEEPING YOUR SOFTWARE UP TO DATE
  • 13. Placer Computers SO WHAT CAN PLACER COMPUTERS DO FOR YOU?
  • 14. Placer Computers STEP 1: Security Scan Identify software vulnerabilities www.PlacerComputers.com
  • 15. Placer Computers STEP 2: Locate Missing Updates Microsoft critical/optional patches 3rd Party program updates/patches www.PlacerComputers.com
  • 16. Placer Computers STEP 3: Identify End-of-Life Software Programs no longer supported are risky! www.PlacerComputers.com
  • 17. Placer Computers STEP 4: Download, install security updates Ensures that all software is up-to-date www.PlacerComputers.com
  • 18. Placer Computers STEP 5: Find replacements for EOL programs Many free options are available. We will research and provide recommendations www.PlacerComputers.com
  • 19. Placer Computers STEP 6: Scan and repair privacy leaks Most programs leave a trail of personal data www.PlacerComputers.com
  • 20. Placer Computers STEP 7: Spyware Scan Catch any malware that gotpast your Antivirus software www.PlacerComputers.com
  • 21. Placer Computers STEP 8: System Cleanup and Optimization Clean your computer in/outOptimize your PC to run better www.PlacerComputers.com
  • 22. Placer Computers BOOK NOW AND SAVE: 50% off 530-388-8811 www.PlacerComputers.com