SlideShare une entreprise Scribd logo
1  sur  21
Télécharger pour lire hors ligne
1
Business.com Guide
to Internet Security
for Businesses
Legal Notice:
© 2014 Business.com Media, Inc. All Rights Reserved.
By reading this e-book, you agree to the following terms and conditions.
Under no circumstances should this e-book be sold, copied, or reproduced in any way
except when you have received written permission.
As with any business, your results may vary and will be based on your background,
dedication, desire, and motivation. Any testimonials and examples used are excep-
tional results, which do not apply to the average purchaser and are not intended to
represent or guarantee that anyone will achieve the same or similar results. You may
also experience unknown or unforeseeable risks which can reduce results. The au-
thors are not responsible for your actions.
The material contained in this report is strictly confidential.
Contents
Internet Security: A Large and Growing Problem	 4
Threats to Internet Security for Businesses	 7
Protecting Your Business From Internet Security Problems	 12
Considerations When Hiring Internet Security Firms	 15
Trends in Internet Security for Businesses	 18
Business.com Checklist for Internet Security for Businesses	 20
Glossary of Internet Security Terms	 21
4
Internet Security: A Large
and Growing Problem
R
ecent revelations by National Security Agency (NSA) renegade contractor
Edward Snowden have resulted in many businesses paying more attention
to how secure their computer systems are. It’s one thing to protect yourself
from hackers and thieves; it’s quite another to protect your data from being
intercepted and stored by government agencies.
News that the PRISM program operated by the NSA has access to Internet
traffic, including data and messages sent through Google, Yahoo, Microsoft
and other providers of free Internet applications and storage, has given many
businesses reason to double-check the security of their systems.
Recent revelations by National Security Agency (NSA)
renegade contractor Edward Snowden have resulted in
many businesses paying more attention to how secure
their computer systems are.
5
Even the most “cyber-savvy” businesses can have their computer networks
hacked and compromised. Companies in the business of Internet security itself
have been subject to embarrassing attacks. In 2011, according to The New York
Times, the website of ManTech International was hacked. ManTech is a $2.6
billion computer security company that held a major FBI security contract.
In a 2012 article on ZDNet, Ellyne Phneah reports that losses due to Internet
breaches are becoming significant. She quotes Jimmy Sng, partner of IT Risk
Consulting at PwC, who points out that losses result not only from direct theft,
but also from costs associated with crisis management, customer compensation,
lawsuits, and more.
It’s almost impossible to put a dollar figure on the true extent of business losses
from cyber crime, but some estimate the annual cost to be as high as $1 trillion.
A Pro Publica story from 2012 by Peter Maass and Megha Rajagopalan quoted
Gen. Keith Alexander, director of the National Security Administration, who
warned that cyber attacks are causing “the greatest transfer of wealth in history.”
It’s almost impossible to put a dollar figure on the true
extent of business losses from cyber crime, but some
estimate the annual cost to be as high as $1 trillion.
6
He urged Congress to enact cyber security legislation, but the controversial
Cyber Intelligence Sharing and Protection Act, or CISPA, now before the U.S.
Senate, has drawn criticism from privacy advocates who contend the law
contains too few limits on the government’s ability to keep an eye on private
Internet use.
Nicole Blake Johnson writes in the Federal Times about the increased
significance of data breaches, citing a report by the nonprofit Cloud Security
Alliance, Notorious Nine: Cloud Computing Threats in 2013: “In 2010, data
breaches ranked fifth on the list of top threats. This year, data breaches rose to
the top of the list.”
Today, some aspect of almost any business is conducted using the Internet,
even if it’s simply sending email. The very nature of what makes the Internet
essential to business -- the ability to store, share, and analyze data quickly
among a multitude of users located almost anywhere -- also makes it
vulnerable to acts not only of mischief, but criminal intent from identity
thieves, corporate spies, disgruntled employees, and individual and group
hackers. Even if you think your computer is turned off or you aren’t using it,
any networked device is in constant communication with other devices and
networks, and is susceptible to being compromised.
7
Threats to Internet
Security for Businesses
T
here are many different paths into a restricted computer or network.
Here is a list of the most common security breaches, and the methods
used to access, copy, change, or destroy private data.
Hacking: The actual meaning of a hack is deconstruct, debug or tweak a
software program or file. While there are legitimate reasons to hack, the popular
use of the term implies at the minimum unauthorized access to a computer
system. Hacking can encompass attempts to guess an access code or password
to a site where one does not have authorized access. When hackers gain
unauthorized access to a network with malicious intent to do damage or defraud,
they often get other names, like crackers (criminal hackers), or attackers (as in
“cyber attacks”).
Phishing: Also called “brand spoofing” or “carding,” this is a play on the word
“fishing,” in which “bait” -- i.e., a seemingly legitimate invitation or request
-- is thrown out in hopes of hooking unsuspecting users to divulge personal
information. The bait is usually in the form of an email, leading to a “pharm” or
imposter website designed to get you to reveal a username, password, and/or
account number. A variation is “social” phishing, which is when someone calls on
the telephone pretending to be a customer service representative for a company
8
you do business with, who at some point requests private access info, such as
your password. Phishing happens on social networks, too, such as Facebook
and Twitter.
Pharming: Pharming is a form of hacking that involves the creation of counterfeit
websites that masquerade as real sites. The rogue sites encourage visitors to
enter usernames and passwords that are then used to gain unauthorized access
to bank accounts or other private accounts.
Keylogging: Also called “keyboard capture programs,” these programs record
keystrokes entered into a computer and often transmit a file containing those
key captures surreptitiously over the Internet. Keylogging is legitimately used by
companies to track employee performance, measure productivity, and create
training materials. But keyloggers can be used maliciously by hackers to gain
access to sensitive information such as passwords, credit card numbers, and
bank account numbers, social security numbers, dates of birth, etc.
Pharming is a form of hacking that involves the creation
of counterfeit websites that masquerade as real sites.
9
Trojan Horses, Viruses and Worms: During the Trojan War, the Greek army
hid soldiers inside a wooden horse, which was towed inside of Troy’s fortification
to open the gates to allow the surrounding army in to destroy the city. Similarly,
a Trojan horse is any software presented as useful that, once installed in the
system, proceeds to take it over or destroy it. Unlike viruses and worms, Trojan
horses are not self-replicating.
Viruses, like the pathogens that harm humans, are harmful code spread
through multiple connected computers via the transmission from infected email
attachments, websites, flash drives, or other file-transfer mechanisms.
Worms, similar to viruses in that they are self-replicating, do not require user
interaction to spread and they don’t damage a system. What they do is siphon
the use of resources so as to slow down a system considerably, sometimes to
the point of shutting it off completely.
Backdoors: A backdoor is separate way of accessing a system, often installed
by programmers to protect against not being paid for a job. The same backdoor
left by a programmer can be exploited by a hacker to allow remote control
of hardware or software, usually without the permission or knowledge of the
network’s owner. While there are legitimate reasons for installing backdoors (e.g.,
testing), they can be exploited to surreptitiously collect data and install spyware
or malware.
10
Bots and Botnets: An Internet robot is an automated program that works
without a human operator. Also called “webcrawlers” or “spiders,” bots can
secretly install spyware and malware, and are frequently used to carry out
remote attacks on a network. When bots are linked together, they form a “botnet”
network of bots, installed on multiple computers running identical malware and
collaborating on attacks.
Advanced Persistent Threats (APTs): A group of hackers (or the computers
they have taken over) collectively targeting a specific network weakness. This is
increasingly popular among criminal hackers. Growing use of APT requires new
and creative security responses.
Denial of Service (DoS) Attack: The “denial of service” attack is an attempt
to shut down an online service by flooding it with redundant requests, such as
continuously reloading a home page from thousands of different computers at the
same time.The result is that the site’s services are denied to authorized users, who
can’t get in. Site response times will often slow down with DoS attacks, which is
one way of detecting them. In some cases, DoS attacks can cause a site to crash.
Cookies: Cookies are files containing small amounts of data and instructions
typically used to customize a website to the user’s personal preferences. Cookies
identify the user as someone who has visited the site before. They are often
capable of retrieving a browser’s history and preferences, tracking the browser’s
movements through the site, and tracking the browser’s online activities after
leaving the site. Thus, cookies can be a threat to privacy as well as a tool to
make using the Internet faster and more personalized.
11
Adware: Pop-up windows or advertising banners that appear within a website’s
interface. While generally not malicious, adware can be pernicious and
annoying, and can, in fact, be used to transmit malicious code (malware) to
connected devices.
Drive-By Attacks: A “drive-by attack” is the installation of rogue software without
a user’s knowledge or consent. Drive-bys are usually accomplished when an
unsuspecting user clicks on a pop-up ad on a website. Sometimes the drive-by is
initiated by clicking the “close” box on the ad, so that attempting to close the pop-
up launches the attack.
Hijacking: These software programs alter browser settings or change a default
home page to some other site. If your browser is hijacked, it will take you to sites
you didn’t ask to see. An innocent example is a hotel’s Internet access page,
which appears when you attempt to access a site before consenting to the hotel’s
terms. Another form of hijacking is when a website -- or even just a homepage --
is taken over by hackers and redirected to another site or replaced with a bogus
homepage. Sometimes hackers hijack a site to make the fact that they cracked
the system undeniable -- forcing companies to admit that they were hacked.
Rogue Antispyware: Programs that pose as legitimate virus protection or
antispyware applications. The rogue program alerts you to a nonexistent problem
on your computer and triggers a pop-up ad offering to sell you an unneeded
product that supposedly fixes it. Neither the pop-ups nor the rogue software itself
are easily removed.
12
Protecting Your Business From
Internet Security Problems
S
ome Internet security steps are relatively simple and can be
performed by the average, non-technical person. However, as the size
and complexity of a business grows, even these “routine” tasks must
be effectively managed to protect your data from compromise.
¾¾ Virus and spyware protection. Software programs installed on a
computer to protect against malware, which is unwittingly downloaded,
usually through email or a website, but sometimes through organized.
There are basically two kinds of malware:
ƒƒ self-replicating computer viruses designed to spread infection
throughout a computer network to either disrupt efficiency or outright
disable functionality
Asset ranking tools grade equipment performance
according to user and manufacturer criteria, calculating
the costs of operation and predicting probable lifespan.
13
ƒƒ spyware that does not self-replicate, but rather is surreptitiously
installed on a computer to monitor Web behavior, usually to collect
data for advertising purposes
¾¾ Firewalls. A firewall prevents unauthorized access to a private network.
A firewall can involve hardware, software or both. Data received by a
private network from other public networks (such as the Internet, other
corporate intranets, an online email service, etc.) is screened according
to certain security criteria. If the criteria aren’t met, the data is blocked
from the private network.
Firewalls have two main uses: 1) they prevent network users from accessing
inappropriate websites, such as sites containing pornography, illegal content,
or inappropriate content; 2) they prevent network users from receiving
solicitations from senders or sites that are known offenders of network rules.
While firewalls are effective against unsophisticated hacking that depends
in large part on duping legitimate network users into revealing access
information, knowledgeable hackers can breach most firewalls.
A firewall prevents unauthorized access
to a private network. A firewall can involve
hardware, software or both.
14
¾¾ Passwords and Email Security. Just about everything is password-
protected, from your computer to the websites you visit. There are certain
standards for ensuring passwords are not easily compromised (e.g., they
must include certain combinations of upper and lower alphanumeric
characters that are not easily guessed). Most corporations typically require
users to change passwords regularly as an extra security precaution.
Good security software or services can help automate the process of
password selection, changing, and verification.
Another aspect of password security is education, making sure users do
not divulge their passwords or other confidential information in emails,
over the phone, on social networks, or in other seemingly innocent
exchanges. Certain emails regularly circulate that contain malware
attachments; even opening the email without opening the attachment can
contaminate not only the user’s computer and the immediate network, but
the computer and network of every contact ever made through that user’s
email program. Periodic alerts warn users to immediately delete such
suspected email malware.
¾¾ Mobile Security. The growing popularity and prevalence of mobile
applications raise a host of security issues. Faster network connections,
more remote and mobile users using a variety of laptop, iPhone, iPad,
and Android platforms all require new, more complex solutions to protect
network integrity.
15
Considerations When Hiring
Internet Security Firms
A
n Internet security firm can perform all the following list of
functions on behalf of your employees, notifying them of automatic
downloads, performing security system updates, managing password
authorizations, training employees to be aware phishing tactics.
However, these aren’t specialized skills sets and could just as easily be provided
by your regular IT staff. What Internet security firms specialize in is the proactive
testing of a company’s network to determine vulnerabilities by which hackers
could gain unauthorized access to exploit and damage your operations. In
addition to scanning and correcting the identified vulnerabilities on either an
ad hoc or subscription basis, Internet security firms offer a range of packaged
solutions and services, such as:
¾¾ Email hosting, with filters to detect and quarantine viruses, spam,
spyware, malware, and other prohibited content.
¾¾ Encryption, the ability to scramble information being transmitted in a
way that can only be read by the intended receiver -- or someone who
possesses a key to decode the transmission. Good encryption practices
require additional effort to properly integrate encryption with other layers of
network security.
16
¾¾ Firewall filtering to define and limit network user access to prohibited sites
while ensuring safe Web browsing and social media use.
¾¾ Data protection that monitors employee external communications
to external and internal networks and quarantines suspicious or
unauthorized activity.
¾¾ Email archiving to automatically back up and store employee email
communications. For some organizations, email archiving is required by
law. For others, the ability to search throughout an organization’s emails
can lead to insights into what drives an organization and what erodes it.
¾¾ Cloud services with hosted networks where your company data is stored
on huge and multiply redundant servers at remote locations accessed
with a Web dashboard or interface. Cloud services offer scalability,
higher security, and easier maintenance and provisioning. The growing
popularity of cloud services, while touted as more secure than on-site
hosted networks, nonetheless introduce new access points with potential
vulnerability. They have shifted the emphasis of computer security efforts
from local networks to Web-server and Web-application protection.
¾¾ Alert services via email, text message, Twitter, chat, or RSS feed. These
alerts notify users that a security monitor has been triggered and specifies
appropriate response actions.
17
¾¾ Elasticity, which is the ability of the network to integrate with cell
networks, wireless access points, remote locations and cloud services.
Effective security solutions must address rapidly evolving changes
in network size and scope. An Internet security provider can usually
accommodate multiple interfaces while ensure accurate configurations
throughout the infrastructure.
¾¾ Employee compliance monitoring for best practices in protecting
network integrity.
¾¾ Actionable intelligence and insights about malware and other
questionable activity on the network.
An Internet security provider can usually accommodate
multiple interfaces while ensure accurate
configurations throughout the infrastructure.
18
Trends in Internet Security
for Businesses
¾¾ BYOD (Bring Your Own Device). Corporate IT departments once strictly
controlled employee hardware (remember when the only corporate cell
phone was a Blackberry?). However, particularly for mobile devices,
employees more frequently are allowed, and expect, to use their own
consumer devices within the corporate network. Consequently, network
security must encompass and coordinate a range of security levels
that address multiple kinds of devices using multiple operating systems
and platforms.
¾¾ New IPv6 Internet protocol institutes fundamental changes that require
additional security steps. The current standard -- IPv4 -- uses 32-bit
addresses for every device connected to the Internet. The new IPv6
standard uses 128-bit addressing. The shift is necessary due to the
exploding number of devices connected to the Internet. While 128-bit
addressing should enable greater security, it’s not compatible with IPv4,
meaning security experts will have to juggle both protocols.
¾¾ Emerging Web standards such as HTML5 also involve new strategies
to protect against potential security breaches. One particular feature
of HTML5 is geo-location, which can be exploited to place users and
equipment at specific times and places, which has a myriad of security,
privacy, and legal implications that are just beginning to be addressed.
19
¾¾ Mac Attack. Yes, Macs are not affected by most malware, since it is written
primarily for Windows, which remains the dominant corporate operating
system platform. And while Mac software has well-deserved reputation for
smart security, there is no such thing as invulnerability. Unfortunately, this
lures many Mac users into thinking they don’t need to worry about viruses,
despite the threat that was posed by the 2012 Mac-focused Flashback
virus. While Macs may represent only a small portion of corporate users,
the fact that these users aren’t accustomed worrying about malware
presents a growing possible entry point for a malware outbreak.
¾¾ Similarly, while Windows 8 has not been widely adopted by many
corporate IT departments, users who connect to corporate networks with
Windows 8 computers may represent a security risk due new firmware that
is attracting hacker interest.
¾¾ Internet Devices are multiplying. Beyond smartphones, tablet computers,
and e-readers, there is an advancing army of Internet-connected devices
coming that will challenge the capabilities of any Internet security system.
The list includes wearable computers, such as Internet-connected
eyeglasses, health monitors and smart watches. Then there are machines
that don’t need humans, like self-driving cars, smart thermostats, and
remote-control flying objects. And then there are devices implanted into
people, such as pacemakers and medication regulators. It’s a serious
security problem if someone can gain unauthorized access to a device
inside your body!
20
Business.com Checklist for Internet
Security for Businesses
My
Needs
Vendor 1 Vendor 2
Network Security Scanning
•	 Initial scan
•	 Subscription
•	 Ad hoc
Scan Scheduling
•	 Running continually in
background
•	 Memory scan on program
startup
•	 On-access each time file
or folder is opened
•	 On-demand
•	 Entire disk/selected files
or folders
•	 Scheduled
Network Security Services
•	 Detection and removal of
malware (cleaning)
•	 Virus/spyware protection
•	 Email hosting
•	 Spam protection
•	 Email archiving
•	 Firewall filtering
•	 Backup data protection
and recovery
•	 Real-time monitoring
•	 24/7 monitoring
My
Needs
Vendor 1 Vendor 2
Update intervals
•	 Daily
•	 Incremental, as required
•	 User-configurable
Devices Supported
•	 Private servers
•	 Workstations
•	 Desktop/Laptop
•	 Tablet computers
•	 Smartphones
•	 Other devices
Support
•	 Toll-free 24/7 telephone
•	 24/7 online chat
•	 Security alerts
•	 Video tutorials
•	 Training
•	 Compliance audits
Pricing
•	 Per user charges
•	 Per device charges
•	 Per installation charges
•	 Monthly cost
•	 Quarterly cost
•	 Annual cost
•	 Incremental, as required
21
Glossary of Internet
Security Terms
ActiveX Controls: Links to a Web-embedded object, such
as a table or mouse click button; can help users navigate
to the information they want, but they also can be pirated
to download spyware. ActiveX controls can be restricted to
“trusted,” preapproved websites only.
Bot: An Internet robot; an automated program that works
without a human operator.
Botnet: Network of bots installed on multiple computers
capable of being activated or used by one central controller.
Cookies: Small files implanted by websites on computers
to enable such services as customization, personalization,
and location-based recommendations. Cookies are often
used by websites to track visitor actions online without
direct consent.
Cracker: A hacker engaged in criminal behavior. While all
hacking could be considered criminal because it involves
gaining unauthorized access to networks, crackers engage
in hacking with criminal intent. That is, they are hacking for
the purpose of stealing, destroying, or altering data.
Spoof: A fake Web or email address very similar to a
legitimate site such as a bank or credit card company.
Victims who respond to the fake address are prompted to
divulge personal information, frequently under the guise of
ensuring security.
Zero-Day Exploit: Software and security vendors regularly
announce vulnerabilities and release patches to fix the
problem. Such “zero-day” announcements are prime
opportunities for hackers to exploit the announced flaws
before users have the opportunity to install the fix.

Contenu connexe

Tendances

Safeguarding PeopleSoft Against Direct Deposit Theft
Safeguarding PeopleSoft Against Direct Deposit TheftSafeguarding PeopleSoft Against Direct Deposit Theft
Safeguarding PeopleSoft Against Direct Deposit TheftAppsian
 
Countering Cyber Threats By Monitoring “Normal” Website Behavior
Countering Cyber Threats By Monitoring “Normal” Website BehaviorCountering Cyber Threats By Monitoring “Normal” Website Behavior
Countering Cyber Threats By Monitoring “Normal” Website BehaviorEMC
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crimehomeworkping4
 
E0334035040
E0334035040E0334035040
E0334035040theijes
 
Dealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In TechnologyDealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In TechnologyCSCJournals
 
Malta Economic Update 06 2008 - isec interview
Malta Economic Update 06 2008 - isec interviewMalta Economic Update 06 2008 - isec interview
Malta Economic Update 06 2008 - isec interviewFabian Borg
 
Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009Kim Jensen
 
cybercrime survival guide
cybercrime survival guidecybercrime survival guide
cybercrime survival guideGary Gray, MCSE
 
Customer Involvement in Phishing Defence
Customer Involvement in Phishing DefenceCustomer Involvement in Phishing Defence
Customer Involvement in Phishing DefenceJordan Schroeder
 
The Whys and Wherefores of Web Security – by United Security Providers
The Whys and Wherefores of Web Security – by United Security ProvidersThe Whys and Wherefores of Web Security – by United Security Providers
The Whys and Wherefores of Web Security – by United Security ProvidersUnited Security Providers AG
 
Top Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on CybersecurityTop Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on CybersecurityPixel Crayons
 
Cyber security and threats
Cyber security and threatsCyber security and threats
Cyber security and threatsHarsh Kumar
 
Data privacy over internet
Data privacy over internetData privacy over internet
Data privacy over internetdevashishicai
 

Tendances (20)

Information security
Information securityInformation security
Information security
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Safeguarding PeopleSoft Against Direct Deposit Theft
Safeguarding PeopleSoft Against Direct Deposit TheftSafeguarding PeopleSoft Against Direct Deposit Theft
Safeguarding PeopleSoft Against Direct Deposit Theft
 
Data breach
Data breachData breach
Data breach
 
Countering Cyber Threats By Monitoring “Normal” Website Behavior
Countering Cyber Threats By Monitoring “Normal” Website BehaviorCountering Cyber Threats By Monitoring “Normal” Website Behavior
Countering Cyber Threats By Monitoring “Normal” Website Behavior
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
 
E0334035040
E0334035040E0334035040
E0334035040
 
IT Sample Paper
IT Sample PaperIT Sample Paper
IT Sample Paper
 
Dealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In TechnologyDealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In Technology
 
Malta Economic Update 06 2008 - isec interview
Malta Economic Update 06 2008 - isec interviewMalta Economic Update 06 2008 - isec interview
Malta Economic Update 06 2008 - isec interview
 
Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009
 
cybercrime survival guide
cybercrime survival guidecybercrime survival guide
cybercrime survival guide
 
Customer Involvement in Phishing Defence
Customer Involvement in Phishing DefenceCustomer Involvement in Phishing Defence
Customer Involvement in Phishing Defence
 
Security Primer
Security PrimerSecurity Primer
Security Primer
 
The Whys and Wherefores of Web Security – by United Security Providers
The Whys and Wherefores of Web Security – by United Security ProvidersThe Whys and Wherefores of Web Security – by United Security Providers
The Whys and Wherefores of Web Security – by United Security Providers
 
Top Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on CybersecurityTop Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on Cybersecurity
 
Cyber security and threats
Cyber security and threatsCyber security and threats
Cyber security and threats
 
How To Catch a Phish: User Awareness and Training
How To Catch a Phish: User Awareness and TrainingHow To Catch a Phish: User Awareness and Training
How To Catch a Phish: User Awareness and Training
 
Data privacy over internet
Data privacy over internetData privacy over internet
Data privacy over internet
 
Critical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the BoardroomCritical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the Boardroom
 

Similaire à A Guide to Internet Security For Businesses- Business.com

Crimes in digital marketing..pptx
Crimes in digital marketing..pptxCrimes in digital marketing..pptx
Crimes in digital marketing..pptxRajviNikeetaRathore
 
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxThe uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxarnoldmeredith47041
 
Combating Phishing Attacks
Combating Phishing AttacksCombating Phishing Attacks
Combating Phishing AttacksRapid7
 
Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Joseph White MPA CPM
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threatsReadWrite
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Erik Ginalick
 
7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences MagazineThe Lifesciences Magazine
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingmentAswani34
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for LawyersMark Lanterman
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptBushra22
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityMd Nishad
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfKALPITKALPIT1
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptxSibyJames1
 
Internet fraud and Common modes of security threats .pptx
Internet fraud and Common modes of security threats .pptxInternet fraud and Common modes of security threats .pptx
Internet fraud and Common modes of security threats .pptxMoizAhmed398372
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfSoo Chin Hock
 
Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure" Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure" Frontier Small Business
 

Similaire à A Guide to Internet Security For Businesses- Business.com (20)

Crimes in digital marketing..pptx
Crimes in digital marketing..pptxCrimes in digital marketing..pptx
Crimes in digital marketing..pptx
 
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxThe uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
 
Combating Phishing Attacks
Combating Phishing AttacksCombating Phishing Attacks
Combating Phishing Attacks
 
Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
 
7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Hamza
HamzaHamza
Hamza
 
Internet fraud and Common modes of security threats .pptx
Internet fraud and Common modes of security threats .pptxInternet fraud and Common modes of security threats .pptx
Internet fraud and Common modes of security threats .pptx
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
 
Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure" Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure"
 
Cybercrime blog
Cybercrime blogCybercrime blog
Cybercrime blog
 

Plus de Business.com

Future Selling in B2B Media: Yes, There is a Future
Future Selling in B2B Media: Yes, There is a FutureFuture Selling in B2B Media: Yes, There is a Future
Future Selling in B2B Media: Yes, There is a FutureBusiness.com
 
Roger, Do You Copy?
Roger, Do You Copy?Roger, Do You Copy?
Roger, Do You Copy?Business.com
 
Stay Connected with the Right Phone System for Your Business
Stay Connected with the Right Phone System for Your Business Stay Connected with the Right Phone System for Your Business
Stay Connected with the Right Phone System for Your Business Business.com
 
Process Payroll Anytime, Anywhere
Process Payroll Anytime, Anywhere Process Payroll Anytime, Anywhere
Process Payroll Anytime, Anywhere Business.com
 
Everything You Need to Know About Taking Plastic
Everything You Need to Know About Taking PlasticEverything You Need to Know About Taking Plastic
Everything You Need to Know About Taking PlasticBusiness.com
 
Business.com Guide to POS Systems
Business.com Guide to POS SystemsBusiness.com Guide to POS Systems
Business.com Guide to POS SystemsBusiness.com
 
Overview of Recruitment Management Systems- Business.com
Overview of Recruitment Management Systems- Business.comOverview of Recruitment Management Systems- Business.com
Overview of Recruitment Management Systems- Business.comBusiness.com
 
A Guide to Web Design- Business.com
A Guide to Web Design- Business.comA Guide to Web Design- Business.com
A Guide to Web Design- Business.comBusiness.com
 
Time and Attendance Software- A Business.com Guide
Time and Attendance Software- A Business.com GuideTime and Attendance Software- A Business.com Guide
Time and Attendance Software- A Business.com GuideBusiness.com
 
Guide to Promotional Items- Business.com
Guide to Promotional Items- Business.com Guide to Promotional Items- Business.com
Guide to Promotional Items- Business.com Business.com
 
Postage Meters Guide- Business.com
Postage Meters Guide- Business.comPostage Meters Guide- Business.com
Postage Meters Guide- Business.comBusiness.com
 
Business.com POS Systems Guide
Business.com POS Systems GuideBusiness.com POS Systems Guide
Business.com POS Systems GuideBusiness.com
 
Order Fulfillment Services- A Business.com Guide
Order Fulfillment Services- A Business.com GuideOrder Fulfillment Services- A Business.com Guide
Order Fulfillment Services- A Business.com GuideBusiness.com
 
A Guide to IT Consulting- Business.com
A Guide to IT Consulting- Business.comA Guide to IT Consulting- Business.com
A Guide to IT Consulting- Business.comBusiness.com
 
Document Management Software- The Business.com Guide
Document Management Software- The Business.com GuideDocument Management Software- The Business.com Guide
Document Management Software- The Business.com GuideBusiness.com
 
Commercial Security Systems- The Business.com Guide
Commercial Security Systems- The Business.com GuideCommercial Security Systems- The Business.com Guide
Commercial Security Systems- The Business.com GuideBusiness.com
 
Business.com guide to 401k
Business.com guide to 401kBusiness.com guide to 401k
Business.com guide to 401kBusiness.com
 
Solving Payroll Problems With The New Employee Management System- Business.c...
 Solving Payroll Problems With The New Employee Management System- Business.c... Solving Payroll Problems With The New Employee Management System- Business.c...
Solving Payroll Problems With The New Employee Management System- Business.c...Business.com
 
What the Document Management System Revolution Means for Your Business- Busin...
What the Document Management System Revolution Means for Your Business- Busin...What the Document Management System Revolution Means for Your Business- Busin...
What the Document Management System Revolution Means for Your Business- Busin...Business.com
 
Business.com Small Business Pulse 2013 Lead Generation Insights
Business.com Small Business Pulse 2013 Lead Generation InsightsBusiness.com Small Business Pulse 2013 Lead Generation Insights
Business.com Small Business Pulse 2013 Lead Generation InsightsBusiness.com
 

Plus de Business.com (20)

Future Selling in B2B Media: Yes, There is a Future
Future Selling in B2B Media: Yes, There is a FutureFuture Selling in B2B Media: Yes, There is a Future
Future Selling in B2B Media: Yes, There is a Future
 
Roger, Do You Copy?
Roger, Do You Copy?Roger, Do You Copy?
Roger, Do You Copy?
 
Stay Connected with the Right Phone System for Your Business
Stay Connected with the Right Phone System for Your Business Stay Connected with the Right Phone System for Your Business
Stay Connected with the Right Phone System for Your Business
 
Process Payroll Anytime, Anywhere
Process Payroll Anytime, Anywhere Process Payroll Anytime, Anywhere
Process Payroll Anytime, Anywhere
 
Everything You Need to Know About Taking Plastic
Everything You Need to Know About Taking PlasticEverything You Need to Know About Taking Plastic
Everything You Need to Know About Taking Plastic
 
Business.com Guide to POS Systems
Business.com Guide to POS SystemsBusiness.com Guide to POS Systems
Business.com Guide to POS Systems
 
Overview of Recruitment Management Systems- Business.com
Overview of Recruitment Management Systems- Business.comOverview of Recruitment Management Systems- Business.com
Overview of Recruitment Management Systems- Business.com
 
A Guide to Web Design- Business.com
A Guide to Web Design- Business.comA Guide to Web Design- Business.com
A Guide to Web Design- Business.com
 
Time and Attendance Software- A Business.com Guide
Time and Attendance Software- A Business.com GuideTime and Attendance Software- A Business.com Guide
Time and Attendance Software- A Business.com Guide
 
Guide to Promotional Items- Business.com
Guide to Promotional Items- Business.com Guide to Promotional Items- Business.com
Guide to Promotional Items- Business.com
 
Postage Meters Guide- Business.com
Postage Meters Guide- Business.comPostage Meters Guide- Business.com
Postage Meters Guide- Business.com
 
Business.com POS Systems Guide
Business.com POS Systems GuideBusiness.com POS Systems Guide
Business.com POS Systems Guide
 
Order Fulfillment Services- A Business.com Guide
Order Fulfillment Services- A Business.com GuideOrder Fulfillment Services- A Business.com Guide
Order Fulfillment Services- A Business.com Guide
 
A Guide to IT Consulting- Business.com
A Guide to IT Consulting- Business.comA Guide to IT Consulting- Business.com
A Guide to IT Consulting- Business.com
 
Document Management Software- The Business.com Guide
Document Management Software- The Business.com GuideDocument Management Software- The Business.com Guide
Document Management Software- The Business.com Guide
 
Commercial Security Systems- The Business.com Guide
Commercial Security Systems- The Business.com GuideCommercial Security Systems- The Business.com Guide
Commercial Security Systems- The Business.com Guide
 
Business.com guide to 401k
Business.com guide to 401kBusiness.com guide to 401k
Business.com guide to 401k
 
Solving Payroll Problems With The New Employee Management System- Business.c...
 Solving Payroll Problems With The New Employee Management System- Business.c... Solving Payroll Problems With The New Employee Management System- Business.c...
Solving Payroll Problems With The New Employee Management System- Business.c...
 
What the Document Management System Revolution Means for Your Business- Busin...
What the Document Management System Revolution Means for Your Business- Busin...What the Document Management System Revolution Means for Your Business- Busin...
What the Document Management System Revolution Means for Your Business- Busin...
 
Business.com Small Business Pulse 2013 Lead Generation Insights
Business.com Small Business Pulse 2013 Lead Generation InsightsBusiness.com Small Business Pulse 2013 Lead Generation Insights
Business.com Small Business Pulse 2013 Lead Generation Insights
 

Dernier

原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查ydyuyu
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"growthgrids
 
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...kumargunjan9515
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsMonica Sydney
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制pxcywzqs
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasDigicorns Technologies
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsMonica Sydney
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge GraphsEleniIlkou
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...gajnagarg
 
一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理F
 
一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理F
 
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime BalliaBallia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Balliameghakumariji156
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdfMatthew Sinclair
 
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...meghakumariji156
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样ayvbos
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdfMatthew Sinclair
 
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call GirlsMira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call GirlsPriya Reddy
 
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu DhabiAbu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu DhabiMonica Sydney
 

Dernier (20)

原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency Dallas
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
 
一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理
 
一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理
 
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime BalliaBallia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
 
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call GirlsMira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
 
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu DhabiAbu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
 

A Guide to Internet Security For Businesses- Business.com

  • 1. 1 Business.com Guide to Internet Security for Businesses
  • 2. Legal Notice: © 2014 Business.com Media, Inc. All Rights Reserved. By reading this e-book, you agree to the following terms and conditions. Under no circumstances should this e-book be sold, copied, or reproduced in any way except when you have received written permission. As with any business, your results may vary and will be based on your background, dedication, desire, and motivation. Any testimonials and examples used are excep- tional results, which do not apply to the average purchaser and are not intended to represent or guarantee that anyone will achieve the same or similar results. You may also experience unknown or unforeseeable risks which can reduce results. The au- thors are not responsible for your actions. The material contained in this report is strictly confidential.
  • 3. Contents Internet Security: A Large and Growing Problem 4 Threats to Internet Security for Businesses 7 Protecting Your Business From Internet Security Problems 12 Considerations When Hiring Internet Security Firms 15 Trends in Internet Security for Businesses 18 Business.com Checklist for Internet Security for Businesses 20 Glossary of Internet Security Terms 21
  • 4. 4 Internet Security: A Large and Growing Problem R ecent revelations by National Security Agency (NSA) renegade contractor Edward Snowden have resulted in many businesses paying more attention to how secure their computer systems are. It’s one thing to protect yourself from hackers and thieves; it’s quite another to protect your data from being intercepted and stored by government agencies. News that the PRISM program operated by the NSA has access to Internet traffic, including data and messages sent through Google, Yahoo, Microsoft and other providers of free Internet applications and storage, has given many businesses reason to double-check the security of their systems. Recent revelations by National Security Agency (NSA) renegade contractor Edward Snowden have resulted in many businesses paying more attention to how secure their computer systems are.
  • 5. 5 Even the most “cyber-savvy” businesses can have their computer networks hacked and compromised. Companies in the business of Internet security itself have been subject to embarrassing attacks. In 2011, according to The New York Times, the website of ManTech International was hacked. ManTech is a $2.6 billion computer security company that held a major FBI security contract. In a 2012 article on ZDNet, Ellyne Phneah reports that losses due to Internet breaches are becoming significant. She quotes Jimmy Sng, partner of IT Risk Consulting at PwC, who points out that losses result not only from direct theft, but also from costs associated with crisis management, customer compensation, lawsuits, and more. It’s almost impossible to put a dollar figure on the true extent of business losses from cyber crime, but some estimate the annual cost to be as high as $1 trillion. A Pro Publica story from 2012 by Peter Maass and Megha Rajagopalan quoted Gen. Keith Alexander, director of the National Security Administration, who warned that cyber attacks are causing “the greatest transfer of wealth in history.” It’s almost impossible to put a dollar figure on the true extent of business losses from cyber crime, but some estimate the annual cost to be as high as $1 trillion.
  • 6. 6 He urged Congress to enact cyber security legislation, but the controversial Cyber Intelligence Sharing and Protection Act, or CISPA, now before the U.S. Senate, has drawn criticism from privacy advocates who contend the law contains too few limits on the government’s ability to keep an eye on private Internet use. Nicole Blake Johnson writes in the Federal Times about the increased significance of data breaches, citing a report by the nonprofit Cloud Security Alliance, Notorious Nine: Cloud Computing Threats in 2013: “In 2010, data breaches ranked fifth on the list of top threats. This year, data breaches rose to the top of the list.” Today, some aspect of almost any business is conducted using the Internet, even if it’s simply sending email. The very nature of what makes the Internet essential to business -- the ability to store, share, and analyze data quickly among a multitude of users located almost anywhere -- also makes it vulnerable to acts not only of mischief, but criminal intent from identity thieves, corporate spies, disgruntled employees, and individual and group hackers. Even if you think your computer is turned off or you aren’t using it, any networked device is in constant communication with other devices and networks, and is susceptible to being compromised.
  • 7. 7 Threats to Internet Security for Businesses T here are many different paths into a restricted computer or network. Here is a list of the most common security breaches, and the methods used to access, copy, change, or destroy private data. Hacking: The actual meaning of a hack is deconstruct, debug or tweak a software program or file. While there are legitimate reasons to hack, the popular use of the term implies at the minimum unauthorized access to a computer system. Hacking can encompass attempts to guess an access code or password to a site where one does not have authorized access. When hackers gain unauthorized access to a network with malicious intent to do damage or defraud, they often get other names, like crackers (criminal hackers), or attackers (as in “cyber attacks”). Phishing: Also called “brand spoofing” or “carding,” this is a play on the word “fishing,” in which “bait” -- i.e., a seemingly legitimate invitation or request -- is thrown out in hopes of hooking unsuspecting users to divulge personal information. The bait is usually in the form of an email, leading to a “pharm” or imposter website designed to get you to reveal a username, password, and/or account number. A variation is “social” phishing, which is when someone calls on the telephone pretending to be a customer service representative for a company
  • 8. 8 you do business with, who at some point requests private access info, such as your password. Phishing happens on social networks, too, such as Facebook and Twitter. Pharming: Pharming is a form of hacking that involves the creation of counterfeit websites that masquerade as real sites. The rogue sites encourage visitors to enter usernames and passwords that are then used to gain unauthorized access to bank accounts or other private accounts. Keylogging: Also called “keyboard capture programs,” these programs record keystrokes entered into a computer and often transmit a file containing those key captures surreptitiously over the Internet. Keylogging is legitimately used by companies to track employee performance, measure productivity, and create training materials. But keyloggers can be used maliciously by hackers to gain access to sensitive information such as passwords, credit card numbers, and bank account numbers, social security numbers, dates of birth, etc. Pharming is a form of hacking that involves the creation of counterfeit websites that masquerade as real sites.
  • 9. 9 Trojan Horses, Viruses and Worms: During the Trojan War, the Greek army hid soldiers inside a wooden horse, which was towed inside of Troy’s fortification to open the gates to allow the surrounding army in to destroy the city. Similarly, a Trojan horse is any software presented as useful that, once installed in the system, proceeds to take it over or destroy it. Unlike viruses and worms, Trojan horses are not self-replicating. Viruses, like the pathogens that harm humans, are harmful code spread through multiple connected computers via the transmission from infected email attachments, websites, flash drives, or other file-transfer mechanisms. Worms, similar to viruses in that they are self-replicating, do not require user interaction to spread and they don’t damage a system. What they do is siphon the use of resources so as to slow down a system considerably, sometimes to the point of shutting it off completely. Backdoors: A backdoor is separate way of accessing a system, often installed by programmers to protect against not being paid for a job. The same backdoor left by a programmer can be exploited by a hacker to allow remote control of hardware or software, usually without the permission or knowledge of the network’s owner. While there are legitimate reasons for installing backdoors (e.g., testing), they can be exploited to surreptitiously collect data and install spyware or malware.
  • 10. 10 Bots and Botnets: An Internet robot is an automated program that works without a human operator. Also called “webcrawlers” or “spiders,” bots can secretly install spyware and malware, and are frequently used to carry out remote attacks on a network. When bots are linked together, they form a “botnet” network of bots, installed on multiple computers running identical malware and collaborating on attacks. Advanced Persistent Threats (APTs): A group of hackers (or the computers they have taken over) collectively targeting a specific network weakness. This is increasingly popular among criminal hackers. Growing use of APT requires new and creative security responses. Denial of Service (DoS) Attack: The “denial of service” attack is an attempt to shut down an online service by flooding it with redundant requests, such as continuously reloading a home page from thousands of different computers at the same time.The result is that the site’s services are denied to authorized users, who can’t get in. Site response times will often slow down with DoS attacks, which is one way of detecting them. In some cases, DoS attacks can cause a site to crash. Cookies: Cookies are files containing small amounts of data and instructions typically used to customize a website to the user’s personal preferences. Cookies identify the user as someone who has visited the site before. They are often capable of retrieving a browser’s history and preferences, tracking the browser’s movements through the site, and tracking the browser’s online activities after leaving the site. Thus, cookies can be a threat to privacy as well as a tool to make using the Internet faster and more personalized.
  • 11. 11 Adware: Pop-up windows or advertising banners that appear within a website’s interface. While generally not malicious, adware can be pernicious and annoying, and can, in fact, be used to transmit malicious code (malware) to connected devices. Drive-By Attacks: A “drive-by attack” is the installation of rogue software without a user’s knowledge or consent. Drive-bys are usually accomplished when an unsuspecting user clicks on a pop-up ad on a website. Sometimes the drive-by is initiated by clicking the “close” box on the ad, so that attempting to close the pop- up launches the attack. Hijacking: These software programs alter browser settings or change a default home page to some other site. If your browser is hijacked, it will take you to sites you didn’t ask to see. An innocent example is a hotel’s Internet access page, which appears when you attempt to access a site before consenting to the hotel’s terms. Another form of hijacking is when a website -- or even just a homepage -- is taken over by hackers and redirected to another site or replaced with a bogus homepage. Sometimes hackers hijack a site to make the fact that they cracked the system undeniable -- forcing companies to admit that they were hacked. Rogue Antispyware: Programs that pose as legitimate virus protection or antispyware applications. The rogue program alerts you to a nonexistent problem on your computer and triggers a pop-up ad offering to sell you an unneeded product that supposedly fixes it. Neither the pop-ups nor the rogue software itself are easily removed.
  • 12. 12 Protecting Your Business From Internet Security Problems S ome Internet security steps are relatively simple and can be performed by the average, non-technical person. However, as the size and complexity of a business grows, even these “routine” tasks must be effectively managed to protect your data from compromise. ¾¾ Virus and spyware protection. Software programs installed on a computer to protect against malware, which is unwittingly downloaded, usually through email or a website, but sometimes through organized. There are basically two kinds of malware: ƒƒ self-replicating computer viruses designed to spread infection throughout a computer network to either disrupt efficiency or outright disable functionality Asset ranking tools grade equipment performance according to user and manufacturer criteria, calculating the costs of operation and predicting probable lifespan.
  • 13. 13 ƒƒ spyware that does not self-replicate, but rather is surreptitiously installed on a computer to monitor Web behavior, usually to collect data for advertising purposes ¾¾ Firewalls. A firewall prevents unauthorized access to a private network. A firewall can involve hardware, software or both. Data received by a private network from other public networks (such as the Internet, other corporate intranets, an online email service, etc.) is screened according to certain security criteria. If the criteria aren’t met, the data is blocked from the private network. Firewalls have two main uses: 1) they prevent network users from accessing inappropriate websites, such as sites containing pornography, illegal content, or inappropriate content; 2) they prevent network users from receiving solicitations from senders or sites that are known offenders of network rules. While firewalls are effective against unsophisticated hacking that depends in large part on duping legitimate network users into revealing access information, knowledgeable hackers can breach most firewalls. A firewall prevents unauthorized access to a private network. A firewall can involve hardware, software or both.
  • 14. 14 ¾¾ Passwords and Email Security. Just about everything is password- protected, from your computer to the websites you visit. There are certain standards for ensuring passwords are not easily compromised (e.g., they must include certain combinations of upper and lower alphanumeric characters that are not easily guessed). Most corporations typically require users to change passwords regularly as an extra security precaution. Good security software or services can help automate the process of password selection, changing, and verification. Another aspect of password security is education, making sure users do not divulge their passwords or other confidential information in emails, over the phone, on social networks, or in other seemingly innocent exchanges. Certain emails regularly circulate that contain malware attachments; even opening the email without opening the attachment can contaminate not only the user’s computer and the immediate network, but the computer and network of every contact ever made through that user’s email program. Periodic alerts warn users to immediately delete such suspected email malware. ¾¾ Mobile Security. The growing popularity and prevalence of mobile applications raise a host of security issues. Faster network connections, more remote and mobile users using a variety of laptop, iPhone, iPad, and Android platforms all require new, more complex solutions to protect network integrity.
  • 15. 15 Considerations When Hiring Internet Security Firms A n Internet security firm can perform all the following list of functions on behalf of your employees, notifying them of automatic downloads, performing security system updates, managing password authorizations, training employees to be aware phishing tactics. However, these aren’t specialized skills sets and could just as easily be provided by your regular IT staff. What Internet security firms specialize in is the proactive testing of a company’s network to determine vulnerabilities by which hackers could gain unauthorized access to exploit and damage your operations. In addition to scanning and correcting the identified vulnerabilities on either an ad hoc or subscription basis, Internet security firms offer a range of packaged solutions and services, such as: ¾¾ Email hosting, with filters to detect and quarantine viruses, spam, spyware, malware, and other prohibited content. ¾¾ Encryption, the ability to scramble information being transmitted in a way that can only be read by the intended receiver -- or someone who possesses a key to decode the transmission. Good encryption practices require additional effort to properly integrate encryption with other layers of network security.
  • 16. 16 ¾¾ Firewall filtering to define and limit network user access to prohibited sites while ensuring safe Web browsing and social media use. ¾¾ Data protection that monitors employee external communications to external and internal networks and quarantines suspicious or unauthorized activity. ¾¾ Email archiving to automatically back up and store employee email communications. For some organizations, email archiving is required by law. For others, the ability to search throughout an organization’s emails can lead to insights into what drives an organization and what erodes it. ¾¾ Cloud services with hosted networks where your company data is stored on huge and multiply redundant servers at remote locations accessed with a Web dashboard or interface. Cloud services offer scalability, higher security, and easier maintenance and provisioning. The growing popularity of cloud services, while touted as more secure than on-site hosted networks, nonetheless introduce new access points with potential vulnerability. They have shifted the emphasis of computer security efforts from local networks to Web-server and Web-application protection. ¾¾ Alert services via email, text message, Twitter, chat, or RSS feed. These alerts notify users that a security monitor has been triggered and specifies appropriate response actions.
  • 17. 17 ¾¾ Elasticity, which is the ability of the network to integrate with cell networks, wireless access points, remote locations and cloud services. Effective security solutions must address rapidly evolving changes in network size and scope. An Internet security provider can usually accommodate multiple interfaces while ensure accurate configurations throughout the infrastructure. ¾¾ Employee compliance monitoring for best practices in protecting network integrity. ¾¾ Actionable intelligence and insights about malware and other questionable activity on the network. An Internet security provider can usually accommodate multiple interfaces while ensure accurate configurations throughout the infrastructure.
  • 18. 18 Trends in Internet Security for Businesses ¾¾ BYOD (Bring Your Own Device). Corporate IT departments once strictly controlled employee hardware (remember when the only corporate cell phone was a Blackberry?). However, particularly for mobile devices, employees more frequently are allowed, and expect, to use their own consumer devices within the corporate network. Consequently, network security must encompass and coordinate a range of security levels that address multiple kinds of devices using multiple operating systems and platforms. ¾¾ New IPv6 Internet protocol institutes fundamental changes that require additional security steps. The current standard -- IPv4 -- uses 32-bit addresses for every device connected to the Internet. The new IPv6 standard uses 128-bit addressing. The shift is necessary due to the exploding number of devices connected to the Internet. While 128-bit addressing should enable greater security, it’s not compatible with IPv4, meaning security experts will have to juggle both protocols. ¾¾ Emerging Web standards such as HTML5 also involve new strategies to protect against potential security breaches. One particular feature of HTML5 is geo-location, which can be exploited to place users and equipment at specific times and places, which has a myriad of security, privacy, and legal implications that are just beginning to be addressed.
  • 19. 19 ¾¾ Mac Attack. Yes, Macs are not affected by most malware, since it is written primarily for Windows, which remains the dominant corporate operating system platform. And while Mac software has well-deserved reputation for smart security, there is no such thing as invulnerability. Unfortunately, this lures many Mac users into thinking they don’t need to worry about viruses, despite the threat that was posed by the 2012 Mac-focused Flashback virus. While Macs may represent only a small portion of corporate users, the fact that these users aren’t accustomed worrying about malware presents a growing possible entry point for a malware outbreak. ¾¾ Similarly, while Windows 8 has not been widely adopted by many corporate IT departments, users who connect to corporate networks with Windows 8 computers may represent a security risk due new firmware that is attracting hacker interest. ¾¾ Internet Devices are multiplying. Beyond smartphones, tablet computers, and e-readers, there is an advancing army of Internet-connected devices coming that will challenge the capabilities of any Internet security system. The list includes wearable computers, such as Internet-connected eyeglasses, health monitors and smart watches. Then there are machines that don’t need humans, like self-driving cars, smart thermostats, and remote-control flying objects. And then there are devices implanted into people, such as pacemakers and medication regulators. It’s a serious security problem if someone can gain unauthorized access to a device inside your body!
  • 20. 20 Business.com Checklist for Internet Security for Businesses My Needs Vendor 1 Vendor 2 Network Security Scanning • Initial scan • Subscription • Ad hoc Scan Scheduling • Running continually in background • Memory scan on program startup • On-access each time file or folder is opened • On-demand • Entire disk/selected files or folders • Scheduled Network Security Services • Detection and removal of malware (cleaning) • Virus/spyware protection • Email hosting • Spam protection • Email archiving • Firewall filtering • Backup data protection and recovery • Real-time monitoring • 24/7 monitoring My Needs Vendor 1 Vendor 2 Update intervals • Daily • Incremental, as required • User-configurable Devices Supported • Private servers • Workstations • Desktop/Laptop • Tablet computers • Smartphones • Other devices Support • Toll-free 24/7 telephone • 24/7 online chat • Security alerts • Video tutorials • Training • Compliance audits Pricing • Per user charges • Per device charges • Per installation charges • Monthly cost • Quarterly cost • Annual cost • Incremental, as required
  • 21. 21 Glossary of Internet Security Terms ActiveX Controls: Links to a Web-embedded object, such as a table or mouse click button; can help users navigate to the information they want, but they also can be pirated to download spyware. ActiveX controls can be restricted to “trusted,” preapproved websites only. Bot: An Internet robot; an automated program that works without a human operator. Botnet: Network of bots installed on multiple computers capable of being activated or used by one central controller. Cookies: Small files implanted by websites on computers to enable such services as customization, personalization, and location-based recommendations. Cookies are often used by websites to track visitor actions online without direct consent. Cracker: A hacker engaged in criminal behavior. While all hacking could be considered criminal because it involves gaining unauthorized access to networks, crackers engage in hacking with criminal intent. That is, they are hacking for the purpose of stealing, destroying, or altering data. Spoof: A fake Web or email address very similar to a legitimate site such as a bank or credit card company. Victims who respond to the fake address are prompted to divulge personal information, frequently under the guise of ensuring security. Zero-Day Exploit: Software and security vendors regularly announce vulnerabilities and release patches to fix the problem. Such “zero-day” announcements are prime opportunities for hackers to exploit the announced flaws before users have the opportunity to install the fix.