Your SlideShare is downloading. ×
Security for Small Business
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Saving this for later?

Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime - even offline.

Text the download link to your phone

Standard text messaging rates apply

Security for Small Business

292
views

Published on

A presentation on security for small businesses presented by F-Secure.

A presentation on security for small businesses presented by F-Secure.


0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
292
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Protecting the irreplaceable | f-secure.com
  • 2. Threat Eye-OpenerBryan Ford – Head of Operator SalesAugust 15th, 2012Protecting the irreplaceable | f-secure.com
  • 3. Agenda• Definition of Terms• History of Malware• Recent Attacks – Stuxnet & Ghost Click• Online Safety Tips• Mobile Threats• Frontier Secure• Q&A| © August 15, 2012, F-Secure Corporation
  • 4. Industry Terms• Malware - Software that is intended to damage or disable computers and computer systems• Botnets - A botnet is a collection of internet-connected computers whose security defenses have been breached and control ceded to an unknown party• SSL - (Secure Sockets Layer) is the standard security technology for establishing an encrypted link between a web server and a browser| © August 15, 2012, F-Secure Corporation
  • 5. We used to be fighting these...• Chen-Ing Hau Joseph McElroy Benny Author of Hacked the Fermi lab Ex-29A the CIH virus network| © August 15, 2012, F-Secure Corporation
  • 6. Case Tariq al-Daour| © August 15, 2012, F-Secure Corporation
  • 7. Malware Trends| © August 15, 2012, F-Secure Corporation
  • 8. Malware Trends Number of malware • Numbers continue to rise exponentially| © August 15, 2012, F-Secure Corporation
  • 9. Malware Trends| © August 15, 2012, F-Secure Corporation
  • 10. Malware Trends• Malware writing is becoming more professional| © August 15, 2012, F-Secure Corporation
  • 11. Malware Trends• Malware writing is becoming more professional• Previously undiscovered vulnerabilities are worth a lot on the black market| © August 15, 2012, F-Secure Corporation
  • 12. Malware Trends• Previously undiscovered vulnerabilities are worth a lot on the black market| © August 15, 2012, F-Secure Corporation
  • 13. Malware TrendsQ: How expensive would such vulnerabilities be?| © August 15, 2012, F-Secure Corporation
  • 14. Malware TrendsA: A single form of malware in a popular version ofWindows could go for anything between $50,000 to$500,000.| © August 15, 2012, F-Secure Corporation
  • 15. Malware Trends• The aims are simple and depend on the group involved:• Money from spam, scams and fakes• Hacktivism to increase public exposure of an issue| © August 15, 2012, F-Secure Corporation
  • 16. Malware Trends• The aims are simple and depend on the group involved:• Money from spam, scams and fakes• Hacktivism to increase public exposure of an issue| © August 15, 2012, F-Secure Corporation
  • 17. Malware Trends• Money from spam, scams and fakes• Hacktivism to increase public exposure of an issue| © August 15, 2012, F-Secure Corporation
  • 18. Malware Trends• Hacktivism to increase public exposure of an issue| © August 15, 2012, F-Secure Corporation
  • 19. Malware Trends| © August 15, 2012, F-Secure Corporation
  • 20. | © August 15, 2012, F-Secure Corporation
  • 21. | © August 15, 2012, F-Secure Corporation
  • 22. Malware trends| © August 15, 2012, F-Secure Corporation
  • 23. Malware trendsCase:| © August 15, 2012, F-Secure Corporation
  • 24. Malware trendsCase:Stuxnet| © August 15, 2012, F-Secure Corporation
  • 25. Malware trendsCase:StuxnetMore information:| © August 15, 2012, F-Secure Corporation
  • 26. Malware trendsCase:StuxnetMore information:http://www.f-secure.com/weblog/archives/00002066.html| © August 15, 2012, F-Secure Corporation
  • 27. Malware trendsCase:StuxnetMore information:http://www.f-secure.com/weblog/archives/00002066.html| © August 15, 2012, F-Secure Corporation
  • 28. Malware trendsCase:”Ghost Click”More information:http://www.f-secure.com/weblog/archives/00002268.html| © August 15, 2012, F-Secure Corporation
  • 29. Malware trendsCase:”Ghost Click”More information:http://www.f-secure.com/weblog/archives/00002268.html| © August 15, 2012, F-Secure Corporation
  • 30. Safer online banking| © August 15, 2012, F-Secure Corporation
  • 31. Safer online banking| © August 15, 2012, F-Secure Corporation
  • 32. Safer online banking • Banks provide safety instuctions • No pop-ups • PIN only asked once • https:// address (Hypertext Transfer Protocol over Secure Socket Layer) • always when banking and dealing with credit card number in an online store • Paying with credit card or online payment service provider (PayPal) is safer| © August 15, 2012, F-Secure Corporation
  • 33. Safer online banking • Banks provide safety instuctions • No pop-ups • PIN only asked once • https:// address (Hypertext Transfer Protocol over Secure Socket Layer) • always when banking and dealing with credit card number in an online store • Paying with credit card or online payment service provider (PayPal) is safer| © August 15, 2012, F-Secure Corporation
  • 34. Safer online banking • Banks provide safety instuctions • No pop-ups • PIN only asked once • https:// address (Hypertext Transfer Protocol over Secure Socket Layer) • always when banking and dealing with credit card number in an online store • Paying with credit card or online payment service provider (PayPal) is safer| © August 15, 2012, F-Secure Corporation
  • 35. Safer social networking| © August 15, 2012, F-Secure Corporation
  • 36. Safer social networking| © August 15, 2012, F-Secure Corporation
  • 37. Safer social networking • Danger of revealing too much • Caution with personal details • Pictures stay on the Internet forever • Privacy? • Privacy settings • Strong passwords • Identity theft, spam, targeted attacks • Maintaining a good reputation| © August 15, 2012, F-Secure Corporation
  • 38. Safer social networking • Danger of revealing too much • Caution with personal details • Pictures stay on the Internet forever • Privacy? • Privacy settings • Strong passwords • Identity theft, spam, targeted attacks • Maintaining a good reputation| © August 15, 2012, F-Secure Corporation
  • 39. Safer social networking • Danger of revealing too much • Caution with personal details • Pictures stay on the Internet forever • Privacy? • Privacy settings • Strong passwords • Identity theft, spam, targeted attacks • Maintaining a good reputation| © August 15, 2012, F-Secure Corporation
  • 40. Safer social networking • Danger of revealing too much • Caution with personal details • Pictures stay on the Internet forever • Privacy? • Privacy settings • Strong passwords • Identity theft, spam, targeted attacks • Maintaining a good reputation| © August 15, 2012, F-Secure Corporation
  • 41. Well-being in a mobile world| © August 15, 2012, F-Secure Corporation
  • 42. Well-being in a mobile world• Lots of information on your mobile• Crime against Android multiplying• Malware via Bluetooth and web download• Spy-tools• Recording• Monitoring calls, SMS, multimedia, email• Locating phone via GPS| © August 15, 2012, F-Secure Corporation
  • 43. Well-being in a mobile world• Lots of information on your mobile• Crime against Android multiplying• Malware via Bluetooth and web download• Spy-tools• Recording• Monitoring calls, SMS, multimedia, email• Locating phone via GPS| © August 15, 2012, F-Secure Corporation
  • 44. Well-being in a mobile world• Lots of information on your mobile• Crime against Android multiplying• Malware via Bluetooth and web download• Spy-tools• Recording• Monitoring calls, SMS, multimedia, email• Locating phone via GPS| © August 15, 2012, F-Secure Corporation
  • 45. Well-being in a mobile world• Lots of information on your mobile• Crime against Android multiplying• Malware via Bluetooth and web download• Spy-tools• Recording• Monitoring calls, SMS, multimedia, email• Locating phone via GPS| © August 15, 2012, F-Secure Corporation
  • 46. Well-being in a mobile world• Lots of information on your mobile• Crime against Android multiplying• Malware via Bluetooth and web download• Spy-tools• Recording• Monitoring calls, SMS, multimedia, email• Locating phone via GPS| © August 15, 2012, F-Secure Corporation
  • 47. Frontier Secure – Max Security• Single Integrated product : • Antivirus Protection • Anti Spyware • Personal Firewall • Browsing Protection • Spam Filtering • Automatic Updates• Live 24/7 Support• PC & Mac Support| © August 15, 2012, F-Secure Corporation
  • 48. Q&Awww.frontier.com/security| © August 15, 2012, F-Secure Corporation
  • 49. Brought to you by:A MORE DEDICATED CONNECTION Thank You Call: 1-866-408-0233