SlideShare a Scribd company logo
1 of 26
The Top 7 (Latest) Ways Employees
Cause Cybercrime Infections
Meet Our Speakers

Jason Dettbarn
Senior Technology
Analyst

Cynthia James
Director Business
Development, CISSP

Alex Brandt
VP Americas
About Our Experts: Kaspersky
• Founded in 1997; largest private anti-malware company –
100% focused on anti-malware
• Over $700M annual revenues
• Presence in 19 countries
• #1 vendor in Germany, France, Spain, Eastern Europe
• Protecting over 300 million end points
• America’s distribution: 12,000 outlets; top two vendors
(revenue & units shipping)
• Top supplier to OEMs/ISVs of anti-malware worldwide
Today’s Agenda










Cybercrime Threatscape: Malware Growth
Current Malware: Comprehension Gap
The Top (Latest) 7 Ways Employees Cause Cyber
Crime Infections
Security Solution Overview
3 Tips for CyberSafety at Home
Giveaway
Questions & Answers
Cybercrime Threatscape:
Malware Growth
200k unique malware samples PER YEAR were identified in 2006; 2M
in 2007…now it’s up to 200K malware samples PER DAY.

The quality of malware improves every year.
Current Malware:
Comprehension Gap
• Recent years have seen exponential growth in malware.
• Anyone can enter the cybercrime game.
• Cybercriminals earn over $100B a year.

Over 200K Per DAY

Where most employees/end users
think we still are

Where we really
are today (2013)

Cybercrime will never stop.
#1. Poor Password Management

present

The Top 7 (Latest) Ways
Employees Cause
Cybercrime Infections
#1. Poor Password Management
•

Same password, all
sites and servers
(personal and
business)

•

Easy to guess from
Facebook
#2. “Don’t Bore Me With Safety”
•

Users ignore
warnings

•

Users ignore usage
policies

•

Users don’t inform IT
of known security
issues
#3. Promiscuous Use of WIFI
•
•

On average we have 4.5
personal internet connected
devices
How many walk into work each
day?
•
How many WIFIs have we
frequented in between?
•
How secure are they?
•
To get infected only takes
ONE malicious participant
from one network OR
•
ONE device which the
owner doesn’t realize is
infected
#4. Users DEMAND
•

To be always
on, always
connected

•

To all social media

•

To get the latest
features
…regardless of the
security issues
#5. They Are Easy APT Targets
Cybercriminals target
social media for clues
• The (new) defacto
“morals clause” in
employment
agreements (don’t hurt
the brand)
• Behavior broadcasts
over social media
• Don’t upset
hacktivists!
•
#6. Companies Under-Estimate
The Insider Threat
•

•
•

1 incident of
insider fraud
per week per
year
75% caused
financial loss
It’s very easy to
sell data these
days
#7. Privileges Accumulate…
And Are Abused
•
•
•

When employees
change jobs, do rights
to data change?
Are passwords reset
when employees
leave?
Are admin passwords
or backdoors
documented and
closed?
Special Giveaway!




Kaspersky CyberSecurity Digest
- Free Security Bulletin
Free Kaseya Security Bundle Trial
Interested? Just respond to the Poll located on the
right bottom corner of your Webex platform!

Next: The Latest in Mobile Threats
The Latest in Mobile Threats


Top infection vector – infected apps


“Crackers” are widely available: open app, insert
malware, repost it
Infected via ads



Malware is downloaded for Windows or Android





Infection via SMS or email

Profit model: 1.) SMS premium messaging; 2.) theft
of assets (APTs); 3.) stealing authentication codes
 Advertisers receive the same information we
provide the app (geolocation apps for example)
Biggest problem: Android updates take 6 months to
get

Remediation Recommendations
–
–
–

Purchase apps from legitimate storefronts (“Verify
Apps”)
Use AV on smartphones to defend against APTs
Help employees with their devices:
•
•
•
•

Turn Bluetooth to undiscoverable
Warn them about malicious apps
Require them to register every mobile device which
uses the corporate wifi
Push data about “cybersafety at home”
3 Tips for Cyber Safety at Home
•
•

•

Go long – longer passphrases are
much more secure
No online banking except over
secured wifi
Safety/privacy - tell kids & teens:
–
–

How geolocators in photos work
Privacy doesn’t exist - don’t share
family details online
Poor Password
Management

Privileges
Accumulate…
And Are Abused

Companies
Under-Estimate
the Insider Threat

“Don’t Bore Me
With Safety”

The Top
Seven

They are Easy
APT Targets

Users DEMAND

Promiscuous Use
of WIFI
The Power of Layered Security
Kaseya Security Stack
Endpoint
Monitoring
& Hardening

Antivirus

AntiMalware

Remediation
Agent
Procedures

Monitoring

Monitoring
Kaseya
Antivirus
Passwords

Kaseya
AntiMalware

Service Desk
& PSA

USB
Block Processes

Scheduling &
Management
Layered Security:
Let’s Take a Look
About Our Experts: Kaseya

“Providing Enterprise-Class IT Systems
Management for Everybody”
www.kaseya.com
UNIFIED MANAGEMENT
Discover the State of IT

Manage the State of IT

Automate the State of
IT

•
•
•
•

• Scheduling
• Procedures
• API/Messaging

• Reporting
• Dashboards
• Interactive Data Views

Systems
Assets
Mobile Devices
Network Devices

IT Configuration Management
•
•
•

•
•
•

Remote Management
Software Deployment
Power Management

Image Deployment
Desktop Migration
Mobile Device Management

Business Continuity
•
•

Asset Management
•

Network Discover & AD

• Hardware/Software

•
•

Asset Management
Virtual Machine Management

AntiVirus
AntiMalware

•
•

Patch Management
Software Updates

•

File & Folder Backup

Service Delivery
•
•
•

Security
•
•

Image Backup
Image Virtualization

Service Desk/Ticketing
Policy Management
Service Billing

•
•

Policy Compliance
Time Tracking

Systems Monitoring
•
•
•

Systems Checks & Alerts
Agent Monitoring
Enterprise Monitoring

•
•

Agent-less Monitoring
Log Monitoring

www.kaseya.com
www.kaseya.com
Q&A / Resources
Discover:
http://www.kaseya.com/resources/webi
nars/en/kaseya-solution-overview

Contact us:
1 (877) 926-0001
sales@kaseya.com

Try Kaseya:
http://www.kaseya.com/lps/global/lp/p
roduct-preview.aspx
Use Promo Code: security072013

Visit us:
www.kaseya.com
www.kaseya.com

More Related Content

More from Kaseya

Advanced Administration: Kaseya Traverse
Advanced Administration: Kaseya TraverseAdvanced Administration: Kaseya Traverse
Advanced Administration: Kaseya TraverseKaseya
 
Advanced Administration: Kaseya BYOD Suite
Advanced Administration: Kaseya BYOD SuiteAdvanced Administration: Kaseya BYOD Suite
Advanced Administration: Kaseya BYOD SuiteKaseya
 
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...Kaseya
 
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...Kaseya
 
Security and Backup II: Vision and Direction
Security and Backup II: Vision and DirectionSecurity and Backup II: Vision and Direction
Security and Backup II: Vision and DirectionKaseya
 
Security and Backup I: OEM Architecture
Security and Backup I: OEM ArchitectureSecurity and Backup I: OEM Architecture
Security and Backup I: OEM ArchitectureKaseya
 
Kaseya Monitoring Suite Overview
Kaseya Monitoring Suite OverviewKaseya Monitoring Suite Overview
Kaseya Monitoring Suite OverviewKaseya
 
Kaseya Asset Discovery Overview
Kaseya Asset Discovery OverviewKaseya Asset Discovery Overview
Kaseya Asset Discovery OverviewKaseya
 
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...Kaseya
 
Automation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
Automation Desk I: Leveraging Service Desk as a Hub for Advanced AutomationAutomation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
Automation Desk I: Leveraging Service Desk as a Hub for Advanced AutomationKaseya
 
Kaseya Technology Alliance Partner Landscape
Kaseya Technology Alliance Partner LandscapeKaseya Technology Alliance Partner Landscape
Kaseya Technology Alliance Partner LandscapeKaseya
 
Advanced Administration: Kaseya Virtual Administrator
Advanced Administration: Kaseya Virtual AdministratorAdvanced Administration: Kaseya Virtual Administrator
Advanced Administration: Kaseya Virtual AdministratorKaseya
 
Kaseya Corporate Update and Roadmap Q1 2014
Kaseya Corporate Update and Roadmap Q1 2014Kaseya Corporate Update and Roadmap Q1 2014
Kaseya Corporate Update and Roadmap Q1 2014Kaseya
 
The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management Kaseya
 
Kaseya BYOD Suite
Kaseya BYOD SuiteKaseya BYOD Suite
Kaseya BYOD SuiteKaseya
 
MSP Best Practice Integrating your RMM with your PSA Solution for Maximum Pr...
MSP Best Practice  Integrating your RMM with your PSA Solution for Maximum Pr...MSP Best Practice  Integrating your RMM with your PSA Solution for Maximum Pr...
MSP Best Practice Integrating your RMM with your PSA Solution for Maximum Pr...Kaseya
 
Making Money in the Cloud Part II…Is Your MSP Team Ready?
Making Money in the Cloud   Part II…Is Your MSP Team Ready?Making Money in the Cloud   Part II…Is Your MSP Team Ready?
Making Money in the Cloud Part II…Is Your MSP Team Ready?Kaseya
 
5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD Policy5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD PolicyKaseya
 
Systems Management 2.0: How to Gain Control of Unruly & Distributed Networks
Systems Management 2.0: How to Gain Control of Unruly & Distributed NetworksSystems Management 2.0: How to Gain Control of Unruly & Distributed Networks
Systems Management 2.0: How to Gain Control of Unruly & Distributed NetworksKaseya
 
Kaseya Connect 2013: A step by-step sales process guaranteed to supercharge r...
Kaseya Connect 2013: A step by-step sales process guaranteed to supercharge r...Kaseya Connect 2013: A step by-step sales process guaranteed to supercharge r...
Kaseya Connect 2013: A step by-step sales process guaranteed to supercharge r...Kaseya
 

More from Kaseya (20)

Advanced Administration: Kaseya Traverse
Advanced Administration: Kaseya TraverseAdvanced Administration: Kaseya Traverse
Advanced Administration: Kaseya Traverse
 
Advanced Administration: Kaseya BYOD Suite
Advanced Administration: Kaseya BYOD SuiteAdvanced Administration: Kaseya BYOD Suite
Advanced Administration: Kaseya BYOD Suite
 
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
 
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
 
Security and Backup II: Vision and Direction
Security and Backup II: Vision and DirectionSecurity and Backup II: Vision and Direction
Security and Backup II: Vision and Direction
 
Security and Backup I: OEM Architecture
Security and Backup I: OEM ArchitectureSecurity and Backup I: OEM Architecture
Security and Backup I: OEM Architecture
 
Kaseya Monitoring Suite Overview
Kaseya Monitoring Suite OverviewKaseya Monitoring Suite Overview
Kaseya Monitoring Suite Overview
 
Kaseya Asset Discovery Overview
Kaseya Asset Discovery OverviewKaseya Asset Discovery Overview
Kaseya Asset Discovery Overview
 
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
 
Automation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
Automation Desk I: Leveraging Service Desk as a Hub for Advanced AutomationAutomation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
Automation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
 
Kaseya Technology Alliance Partner Landscape
Kaseya Technology Alliance Partner LandscapeKaseya Technology Alliance Partner Landscape
Kaseya Technology Alliance Partner Landscape
 
Advanced Administration: Kaseya Virtual Administrator
Advanced Administration: Kaseya Virtual AdministratorAdvanced Administration: Kaseya Virtual Administrator
Advanced Administration: Kaseya Virtual Administrator
 
Kaseya Corporate Update and Roadmap Q1 2014
Kaseya Corporate Update and Roadmap Q1 2014Kaseya Corporate Update and Roadmap Q1 2014
Kaseya Corporate Update and Roadmap Q1 2014
 
The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management
 
Kaseya BYOD Suite
Kaseya BYOD SuiteKaseya BYOD Suite
Kaseya BYOD Suite
 
MSP Best Practice Integrating your RMM with your PSA Solution for Maximum Pr...
MSP Best Practice  Integrating your RMM with your PSA Solution for Maximum Pr...MSP Best Practice  Integrating your RMM with your PSA Solution for Maximum Pr...
MSP Best Practice Integrating your RMM with your PSA Solution for Maximum Pr...
 
Making Money in the Cloud Part II…Is Your MSP Team Ready?
Making Money in the Cloud   Part II…Is Your MSP Team Ready?Making Money in the Cloud   Part II…Is Your MSP Team Ready?
Making Money in the Cloud Part II…Is Your MSP Team Ready?
 
5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD Policy5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD Policy
 
Systems Management 2.0: How to Gain Control of Unruly & Distributed Networks
Systems Management 2.0: How to Gain Control of Unruly & Distributed NetworksSystems Management 2.0: How to Gain Control of Unruly & Distributed Networks
Systems Management 2.0: How to Gain Control of Unruly & Distributed Networks
 
Kaseya Connect 2013: A step by-step sales process guaranteed to supercharge r...
Kaseya Connect 2013: A step by-step sales process guaranteed to supercharge r...Kaseya Connect 2013: A step by-step sales process guaranteed to supercharge r...
Kaseya Connect 2013: A step by-step sales process guaranteed to supercharge r...
 

Recently uploaded

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 

Recently uploaded (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 

Top 7 Ways Employees Cause Cybercrime Infections

  • 1. The Top 7 (Latest) Ways Employees Cause Cybercrime Infections
  • 2. Meet Our Speakers Jason Dettbarn Senior Technology Analyst Cynthia James Director Business Development, CISSP Alex Brandt VP Americas
  • 3. About Our Experts: Kaspersky • Founded in 1997; largest private anti-malware company – 100% focused on anti-malware • Over $700M annual revenues • Presence in 19 countries • #1 vendor in Germany, France, Spain, Eastern Europe • Protecting over 300 million end points • America’s distribution: 12,000 outlets; top two vendors (revenue & units shipping) • Top supplier to OEMs/ISVs of anti-malware worldwide
  • 4. Today’s Agenda        Cybercrime Threatscape: Malware Growth Current Malware: Comprehension Gap The Top (Latest) 7 Ways Employees Cause Cyber Crime Infections Security Solution Overview 3 Tips for CyberSafety at Home Giveaway Questions & Answers
  • 5. Cybercrime Threatscape: Malware Growth 200k unique malware samples PER YEAR were identified in 2006; 2M in 2007…now it’s up to 200K malware samples PER DAY. The quality of malware improves every year.
  • 6. Current Malware: Comprehension Gap • Recent years have seen exponential growth in malware. • Anyone can enter the cybercrime game. • Cybercriminals earn over $100B a year. Over 200K Per DAY Where most employees/end users think we still are Where we really are today (2013) Cybercrime will never stop.
  • 7. #1. Poor Password Management present The Top 7 (Latest) Ways Employees Cause Cybercrime Infections
  • 8. #1. Poor Password Management • Same password, all sites and servers (personal and business) • Easy to guess from Facebook
  • 9. #2. “Don’t Bore Me With Safety” • Users ignore warnings • Users ignore usage policies • Users don’t inform IT of known security issues
  • 10. #3. Promiscuous Use of WIFI • • On average we have 4.5 personal internet connected devices How many walk into work each day? • How many WIFIs have we frequented in between? • How secure are they? • To get infected only takes ONE malicious participant from one network OR • ONE device which the owner doesn’t realize is infected
  • 11. #4. Users DEMAND • To be always on, always connected • To all social media • To get the latest features …regardless of the security issues
  • 12. #5. They Are Easy APT Targets Cybercriminals target social media for clues • The (new) defacto “morals clause” in employment agreements (don’t hurt the brand) • Behavior broadcasts over social media • Don’t upset hacktivists! •
  • 13. #6. Companies Under-Estimate The Insider Threat • • • 1 incident of insider fraud per week per year 75% caused financial loss It’s very easy to sell data these days
  • 14. #7. Privileges Accumulate… And Are Abused • • • When employees change jobs, do rights to data change? Are passwords reset when employees leave? Are admin passwords or backdoors documented and closed?
  • 15. Special Giveaway!   Kaspersky CyberSecurity Digest - Free Security Bulletin Free Kaseya Security Bundle Trial Interested? Just respond to the Poll located on the right bottom corner of your Webex platform! Next: The Latest in Mobile Threats
  • 16. The Latest in Mobile Threats  Top infection vector – infected apps  “Crackers” are widely available: open app, insert malware, repost it Infected via ads  Malware is downloaded for Windows or Android   Infection via SMS or email Profit model: 1.) SMS premium messaging; 2.) theft of assets (APTs); 3.) stealing authentication codes  Advertisers receive the same information we provide the app (geolocation apps for example) Biggest problem: Android updates take 6 months to get 
  • 17. Remediation Recommendations – – – Purchase apps from legitimate storefronts (“Verify Apps”) Use AV on smartphones to defend against APTs Help employees with their devices: • • • • Turn Bluetooth to undiscoverable Warn them about malicious apps Require them to register every mobile device which uses the corporate wifi Push data about “cybersafety at home”
  • 18. 3 Tips for Cyber Safety at Home • • • Go long – longer passphrases are much more secure No online banking except over secured wifi Safety/privacy - tell kids & teens: – – How geolocators in photos work Privacy doesn’t exist - don’t share family details online
  • 19. Poor Password Management Privileges Accumulate… And Are Abused Companies Under-Estimate the Insider Threat “Don’t Bore Me With Safety” The Top Seven They are Easy APT Targets Users DEMAND Promiscuous Use of WIFI
  • 20. The Power of Layered Security
  • 21. Kaseya Security Stack Endpoint Monitoring & Hardening Antivirus AntiMalware Remediation Agent Procedures Monitoring Monitoring Kaseya Antivirus Passwords Kaseya AntiMalware Service Desk & PSA USB Block Processes Scheduling & Management
  • 23. About Our Experts: Kaseya “Providing Enterprise-Class IT Systems Management for Everybody” www.kaseya.com
  • 24. UNIFIED MANAGEMENT Discover the State of IT Manage the State of IT Automate the State of IT • • • • • Scheduling • Procedures • API/Messaging • Reporting • Dashboards • Interactive Data Views Systems Assets Mobile Devices Network Devices IT Configuration Management • • • • • • Remote Management Software Deployment Power Management Image Deployment Desktop Migration Mobile Device Management Business Continuity • • Asset Management • Network Discover & AD • Hardware/Software • • Asset Management Virtual Machine Management AntiVirus AntiMalware • • Patch Management Software Updates • File & Folder Backup Service Delivery • • • Security • • Image Backup Image Virtualization Service Desk/Ticketing Policy Management Service Billing • • Policy Compliance Time Tracking Systems Monitoring • • • Systems Checks & Alerts Agent Monitoring Enterprise Monitoring • • Agent-less Monitoring Log Monitoring www.kaseya.com
  • 26. Q&A / Resources Discover: http://www.kaseya.com/resources/webi nars/en/kaseya-solution-overview Contact us: 1 (877) 926-0001 sales@kaseya.com Try Kaseya: http://www.kaseya.com/lps/global/lp/p roduct-preview.aspx Use Promo Code: security072013 Visit us: www.kaseya.com www.kaseya.com