SlideShare une entreprise Scribd logo
1  sur  24
The Coronavirus effect on business
How to prepare for remote working & targeted
attacks
Brought to you by
Your Presenters
Frances Dewing
CEO, Rubica
José-Miguel Maldonado
VP Security, Rubica
Rubica Cybersecurity
Rubica protects your devices, internet connections, and accounts all in one
app – from anywhere, at work, at home, or on-the-go. Think of us as your
digital bodyguard.
Rubica is advanced cybersecurity for individuals & teams.
Enterprise-grade
Easy to use
Mobile-first security
1. Cybercriminals are taking advantage of chaos & fear by creating pandemic-
specific phishing & malware campaigns.
2. Local quarantines mean more people working remotely, away from the
protection of the office & corporate firewalls.
The Coronavirus Effect on Business
Why is this happening?
Context: Cybercrime is global & sophisticated.
Leader $
Money
Manager
Cash Withdrawals
$
Money
Mules
Malware
Programmer
Malware
Packaging
Service
System
Admin
Assistant
Server Setup
Traffic
Dealer
Spammer Downloads
Distributors
Everyone is a target.
Cybercrime is a $600 Billion business.
Structured like a corporation,
it feeds a supply chain
and a sophisticated economy.
Cybercrime
is organized crime.
Coronavirus:
Old tricks, new hooks
Cybercriminals create new lookalike websites & domains to host attacks.
4,000+ new website domains related to Corona in last 3 months.
Corona-themed domains are 50% more likely to be malicious.
Cybercriminals reuse old malware in new packaging.
Coronavirus Phishing Examples
It’s not just email…
Links to Coronavirus maps can
contain malware.
Other tactics:
• SMS: “Your shipment has been
delayed due to the coronavirus”
• Company remote working
policy from your HR/IT
department
• Deals for “cures” or supplies
SMS
PHISHBAIT
EMAIL
LAUNCHES YOUR DATA
Threats in Action
Coronavirus phishing
• Attachment
• Bad link
• Login creds
• RAT
• Trojan
• Keyloggers
• Screenshots
• Capture
credentials
Malware doesn’t always require a click
If it’s Corona-related, be extra suspicious.
TLDR:
Three Zones of Security
Devices
Internet
Connections
Accounts
To protect your business, all three must be secure.
Three Zones of Security
1. Devices
3. Accounts
& Online Services
Protection Layer 1:
Harden your laptop
Patch all devices. Schedule automatic updates & book reminders on your
calendar.
Run as a standard user, not an admin. This limits the scope of damage if your
device gets hacked.
Enable full-disk encryption. It doesn’t help much if only part of your disk is
encrypted.
Back up your data. Use a combination of physical and cloud backups. Make
sure they are both encrypted.
Enable software firewalls for an extra layer of protection.
Protection Layer 2:
Harden your phone
• Audit app permissions – customize access to location,
microphone, camera, contacts, and e-mail.
• Use your VPN when on wifi.
• Updates apply to phones as well – OS, browser, and all
apps.
• You are more susceptible to phishing and social
engineering on your phone, think before you click.
A Corporate VPN is used to access files and services locally hosted in the office but doesn’t cover all
digital tools.
A personal VPN protects your connection away from the office while working offsite, meant to protect
all tools and all devices (including phones).
WORK FILE
SERVER
• EMAIL
• SLACK
• WEB SEARCHES
• BROWSING?
Secure Your Internet Connection
Protection Layer 3:
Secure Your Internet Connection
• Choose a VPN that doesn’t sell your data and keep it turned on – for all devices.
• Keep work devices on their own network, preventing the spread of malware from
reaching your home network and your own personal devices.
• Change default router credentials and update your firmware.
• Ensure your WPA2 key is unique, long, and strong.
Protection Layer 4:
Use MFA Everywhere
• Multi-factor authentication protects data theft at the
account access level. With MFA for account login, it’s
just much harder to hack.
• Protect your iCloud & Google Play accounts with
MFA. And protect your cell phone account with
your carrier.
• Use it everywhere that it’s offered, especially key
accounts like email, financial accounts, and social
media.
Rubica makes it easy to secure your business
 Designed for remote work
 Built mobile first, and works for all devices
 Catches what Antivirus can’t
 Brings peace of mind
 No hardware needed; download the app and
you’re done
 Maintains your privacy
Enterprise-level security that follows you &
your devices
Rubica makes it easy to secure your business
Secures your devices +
internet connections + accounts
• Threat detection via anomaly & behavioral traffic
analysis
• Anti-malware
• Anti-phishing (DNS sinkhole)
• Encrypted VPN; secures any cell or wifi network
• Intrusion detection & prevention (IDS/IPS) –
automated threat blocking
• Malicious app detection
Every person deserves access to meaningful security and
privacy. Rubica empowers people to protect their digital life.
Protect yourself, protect your team.
Join the waitlist!
Get.Rubica.com/teams
How Rubica Works
1. Download the Rubica App in minutes
2. Turn on your VPN connection to the Rubica
security stack, from anywhere
3. Rubica security stack blocks malware, phishing
and other cyber threats
4. Notifies both the Admin & User about threats
that require action or attention
5. Rubica provides on-call support to the Admin
for any remediation needs
VPN
Threat notifications
3
IPS
IDS
Continuous rule
enhancement
1
2
On-call support
45

Contenu connexe

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 

En vedette

Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Saba Software
 
Introduction to C Programming Language
Introduction to C Programming LanguageIntroduction to C Programming Language
Introduction to C Programming Language
Simplilearn
 

En vedette (20)

How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
 
Introduction to C Programming Language
Introduction to C Programming LanguageIntroduction to C Programming Language
Introduction to C Programming Language
 

Cyber Effects of Coronavirus on Business: How to prepare for remote work and targeted attacks

  • 1. The Coronavirus effect on business How to prepare for remote working & targeted attacks Brought to you by
  • 2. Your Presenters Frances Dewing CEO, Rubica José-Miguel Maldonado VP Security, Rubica
  • 3. Rubica Cybersecurity Rubica protects your devices, internet connections, and accounts all in one app – from anywhere, at work, at home, or on-the-go. Think of us as your digital bodyguard. Rubica is advanced cybersecurity for individuals & teams. Enterprise-grade Easy to use Mobile-first security
  • 4. 1. Cybercriminals are taking advantage of chaos & fear by creating pandemic- specific phishing & malware campaigns. 2. Local quarantines mean more people working remotely, away from the protection of the office & corporate firewalls. The Coronavirus Effect on Business
  • 5. Why is this happening? Context: Cybercrime is global & sophisticated.
  • 6. Leader $ Money Manager Cash Withdrawals $ Money Mules Malware Programmer Malware Packaging Service System Admin Assistant Server Setup Traffic Dealer Spammer Downloads Distributors Everyone is a target. Cybercrime is a $600 Billion business. Structured like a corporation, it feeds a supply chain and a sophisticated economy. Cybercrime is organized crime.
  • 7. Coronavirus: Old tricks, new hooks Cybercriminals create new lookalike websites & domains to host attacks. 4,000+ new website domains related to Corona in last 3 months. Corona-themed domains are 50% more likely to be malicious. Cybercriminals reuse old malware in new packaging.
  • 9. It’s not just email… Links to Coronavirus maps can contain malware. Other tactics: • SMS: “Your shipment has been delayed due to the coronavirus” • Company remote working policy from your HR/IT department • Deals for “cures” or supplies
  • 10. SMS PHISHBAIT EMAIL LAUNCHES YOUR DATA Threats in Action Coronavirus phishing • Attachment • Bad link • Login creds • RAT • Trojan • Keyloggers • Screenshots • Capture credentials
  • 11. Malware doesn’t always require a click
  • 12. If it’s Corona-related, be extra suspicious. TLDR:
  • 13. Three Zones of Security Devices Internet Connections Accounts To protect your business, all three must be secure.
  • 14. Three Zones of Security 1. Devices 3. Accounts & Online Services
  • 15. Protection Layer 1: Harden your laptop Patch all devices. Schedule automatic updates & book reminders on your calendar. Run as a standard user, not an admin. This limits the scope of damage if your device gets hacked. Enable full-disk encryption. It doesn’t help much if only part of your disk is encrypted. Back up your data. Use a combination of physical and cloud backups. Make sure they are both encrypted. Enable software firewalls for an extra layer of protection.
  • 16. Protection Layer 2: Harden your phone • Audit app permissions – customize access to location, microphone, camera, contacts, and e-mail. • Use your VPN when on wifi. • Updates apply to phones as well – OS, browser, and all apps. • You are more susceptible to phishing and social engineering on your phone, think before you click.
  • 17. A Corporate VPN is used to access files and services locally hosted in the office but doesn’t cover all digital tools. A personal VPN protects your connection away from the office while working offsite, meant to protect all tools and all devices (including phones). WORK FILE SERVER • EMAIL • SLACK • WEB SEARCHES • BROWSING? Secure Your Internet Connection
  • 18. Protection Layer 3: Secure Your Internet Connection • Choose a VPN that doesn’t sell your data and keep it turned on – for all devices. • Keep work devices on their own network, preventing the spread of malware from reaching your home network and your own personal devices. • Change default router credentials and update your firmware. • Ensure your WPA2 key is unique, long, and strong.
  • 19. Protection Layer 4: Use MFA Everywhere • Multi-factor authentication protects data theft at the account access level. With MFA for account login, it’s just much harder to hack. • Protect your iCloud & Google Play accounts with MFA. And protect your cell phone account with your carrier. • Use it everywhere that it’s offered, especially key accounts like email, financial accounts, and social media.
  • 20. Rubica makes it easy to secure your business  Designed for remote work  Built mobile first, and works for all devices  Catches what Antivirus can’t  Brings peace of mind  No hardware needed; download the app and you’re done  Maintains your privacy Enterprise-level security that follows you & your devices
  • 21. Rubica makes it easy to secure your business Secures your devices + internet connections + accounts • Threat detection via anomaly & behavioral traffic analysis • Anti-malware • Anti-phishing (DNS sinkhole) • Encrypted VPN; secures any cell or wifi network • Intrusion detection & prevention (IDS/IPS) – automated threat blocking • Malicious app detection
  • 22. Every person deserves access to meaningful security and privacy. Rubica empowers people to protect their digital life.
  • 23. Protect yourself, protect your team. Join the waitlist! Get.Rubica.com/teams
  • 24. How Rubica Works 1. Download the Rubica App in minutes 2. Turn on your VPN connection to the Rubica security stack, from anywhere 3. Rubica security stack blocks malware, phishing and other cyber threats 4. Notifies both the Admin & User about threats that require action or attention 5. Rubica provides on-call support to the Admin for any remediation needs VPN Threat notifications 3 IPS IDS Continuous rule enhancement 1 2 On-call support 45