• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Security for Small Business
 

Security for Small Business

on

  • 371 views

A presentation on security for small businesses presented by F-Secure.

A presentation on security for small businesses presented by F-Secure.

Statistics

Views

Total Views
371
Views on SlideShare
371
Embed Views
0

Actions

Likes
0
Downloads
1
Comments
0

0 Embeds 0

No embeds

Accessibility

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Security for Small Business Security for Small Business Presentation Transcript

    • Protecting the irreplaceable | f-secure.com
    • Threat Eye-OpenerBryan Ford – Head of Operator SalesAugust 15th, 2012Protecting the irreplaceable | f-secure.com
    • Agenda• Definition of Terms• History of Malware• Recent Attacks – Stuxnet & Ghost Click• Online Safety Tips• Mobile Threats• Frontier Secure• Q&A| © August 15, 2012, F-Secure Corporation
    • Industry Terms• Malware - Software that is intended to damage or disable computers and computer systems• Botnets - A botnet is a collection of internet-connected computers whose security defenses have been breached and control ceded to an unknown party• SSL - (Secure Sockets Layer) is the standard security technology for establishing an encrypted link between a web server and a browser| © August 15, 2012, F-Secure Corporation
    • We used to be fighting these...• Chen-Ing Hau Joseph McElroy Benny Author of Hacked the Fermi lab Ex-29A the CIH virus network| © August 15, 2012, F-Secure Corporation
    • Case Tariq al-Daour| © August 15, 2012, F-Secure Corporation
    • Malware Trends| © August 15, 2012, F-Secure Corporation
    • Malware Trends Number of malware • Numbers continue to rise exponentially| © August 15, 2012, F-Secure Corporation
    • Malware Trends| © August 15, 2012, F-Secure Corporation
    • Malware Trends• Malware writing is becoming more professional| © August 15, 2012, F-Secure Corporation
    • Malware Trends• Malware writing is becoming more professional• Previously undiscovered vulnerabilities are worth a lot on the black market| © August 15, 2012, F-Secure Corporation
    • Malware Trends• Previously undiscovered vulnerabilities are worth a lot on the black market| © August 15, 2012, F-Secure Corporation
    • Malware TrendsQ: How expensive would such vulnerabilities be?| © August 15, 2012, F-Secure Corporation
    • Malware TrendsA: A single form of malware in a popular version ofWindows could go for anything between $50,000 to$500,000.| © August 15, 2012, F-Secure Corporation
    • Malware Trends• The aims are simple and depend on the group involved:• Money from spam, scams and fakes• Hacktivism to increase public exposure of an issue| © August 15, 2012, F-Secure Corporation
    • Malware Trends• The aims are simple and depend on the group involved:• Money from spam, scams and fakes• Hacktivism to increase public exposure of an issue| © August 15, 2012, F-Secure Corporation
    • Malware Trends• Money from spam, scams and fakes• Hacktivism to increase public exposure of an issue| © August 15, 2012, F-Secure Corporation
    • Malware Trends• Hacktivism to increase public exposure of an issue| © August 15, 2012, F-Secure Corporation
    • Malware Trends| © August 15, 2012, F-Secure Corporation
    • | © August 15, 2012, F-Secure Corporation
    • | © August 15, 2012, F-Secure Corporation
    • Malware trends| © August 15, 2012, F-Secure Corporation
    • Malware trendsCase:| © August 15, 2012, F-Secure Corporation
    • Malware trendsCase:Stuxnet| © August 15, 2012, F-Secure Corporation
    • Malware trendsCase:StuxnetMore information:| © August 15, 2012, F-Secure Corporation
    • Malware trendsCase:StuxnetMore information:http://www.f-secure.com/weblog/archives/00002066.html| © August 15, 2012, F-Secure Corporation
    • Malware trendsCase:StuxnetMore information:http://www.f-secure.com/weblog/archives/00002066.html| © August 15, 2012, F-Secure Corporation
    • Malware trendsCase:”Ghost Click”More information:http://www.f-secure.com/weblog/archives/00002268.html| © August 15, 2012, F-Secure Corporation
    • Malware trendsCase:”Ghost Click”More information:http://www.f-secure.com/weblog/archives/00002268.html| © August 15, 2012, F-Secure Corporation
    • Safer online banking| © August 15, 2012, F-Secure Corporation
    • Safer online banking| © August 15, 2012, F-Secure Corporation
    • Safer online banking • Banks provide safety instuctions • No pop-ups • PIN only asked once • https:// address (Hypertext Transfer Protocol over Secure Socket Layer) • always when banking and dealing with credit card number in an online store • Paying with credit card or online payment service provider (PayPal) is safer| © August 15, 2012, F-Secure Corporation
    • Safer online banking • Banks provide safety instuctions • No pop-ups • PIN only asked once • https:// address (Hypertext Transfer Protocol over Secure Socket Layer) • always when banking and dealing with credit card number in an online store • Paying with credit card or online payment service provider (PayPal) is safer| © August 15, 2012, F-Secure Corporation
    • Safer online banking • Banks provide safety instuctions • No pop-ups • PIN only asked once • https:// address (Hypertext Transfer Protocol over Secure Socket Layer) • always when banking and dealing with credit card number in an online store • Paying with credit card or online payment service provider (PayPal) is safer| © August 15, 2012, F-Secure Corporation
    • Safer social networking| © August 15, 2012, F-Secure Corporation
    • Safer social networking| © August 15, 2012, F-Secure Corporation
    • Safer social networking • Danger of revealing too much • Caution with personal details • Pictures stay on the Internet forever • Privacy? • Privacy settings • Strong passwords • Identity theft, spam, targeted attacks • Maintaining a good reputation| © August 15, 2012, F-Secure Corporation
    • Safer social networking • Danger of revealing too much • Caution with personal details • Pictures stay on the Internet forever • Privacy? • Privacy settings • Strong passwords • Identity theft, spam, targeted attacks • Maintaining a good reputation| © August 15, 2012, F-Secure Corporation
    • Safer social networking • Danger of revealing too much • Caution with personal details • Pictures stay on the Internet forever • Privacy? • Privacy settings • Strong passwords • Identity theft, spam, targeted attacks • Maintaining a good reputation| © August 15, 2012, F-Secure Corporation
    • Safer social networking • Danger of revealing too much • Caution with personal details • Pictures stay on the Internet forever • Privacy? • Privacy settings • Strong passwords • Identity theft, spam, targeted attacks • Maintaining a good reputation| © August 15, 2012, F-Secure Corporation
    • Well-being in a mobile world| © August 15, 2012, F-Secure Corporation
    • Well-being in a mobile world• Lots of information on your mobile• Crime against Android multiplying• Malware via Bluetooth and web download• Spy-tools• Recording• Monitoring calls, SMS, multimedia, email• Locating phone via GPS| © August 15, 2012, F-Secure Corporation
    • Well-being in a mobile world• Lots of information on your mobile• Crime against Android multiplying• Malware via Bluetooth and web download• Spy-tools• Recording• Monitoring calls, SMS, multimedia, email• Locating phone via GPS| © August 15, 2012, F-Secure Corporation
    • Well-being in a mobile world• Lots of information on your mobile• Crime against Android multiplying• Malware via Bluetooth and web download• Spy-tools• Recording• Monitoring calls, SMS, multimedia, email• Locating phone via GPS| © August 15, 2012, F-Secure Corporation
    • Well-being in a mobile world• Lots of information on your mobile• Crime against Android multiplying• Malware via Bluetooth and web download• Spy-tools• Recording• Monitoring calls, SMS, multimedia, email• Locating phone via GPS| © August 15, 2012, F-Secure Corporation
    • Well-being in a mobile world• Lots of information on your mobile• Crime against Android multiplying• Malware via Bluetooth and web download• Spy-tools• Recording• Monitoring calls, SMS, multimedia, email• Locating phone via GPS| © August 15, 2012, F-Secure Corporation
    • Frontier Secure – Max Security• Single Integrated product : • Antivirus Protection • Anti Spyware • Personal Firewall • Browsing Protection • Spam Filtering • Automatic Updates• Live 24/7 Support• PC & Mac Support| © August 15, 2012, F-Secure Corporation
    • Q&Awww.frontier.com/security| © August 15, 2012, F-Secure Corporation
    • Brought to you by:A MORE DEDICATED CONNECTION Thank You Call: 1-866-408-0233