ARE YOU A

TARGET?
CAMetz
Security Consultant
Hackers
gained access to
Target's computer system.

CAMetz
Security Consultant
THEY STOLE
FINANCIAL DATA
PERSONAL DATA

of 110 million shoppers!
HOW DID THEY DO THAT?
CAMetz
Security Consultant
HACKERS often research which outside contractors/vendors have remote access to the networks
of large corporations because ...
HACKERS
tricked an outside vendor employee into

URGENT!!
SUBJECT: YOUR WEDDING PHOTOS!
FROM: ABC PHOTOGRAPHY!
TO: MR. XY%...
The vendor employee with access to Target's network fell for a
"spear phishing” attack.

HACKERS sent malware-laced emails...
HACKERS
TARGET

virus

NETWORK

VENDOR

Researchers at a cloud security company found 55,000 so-called HVAC vendors that a...
DON’T BE A TARGET!

ELIMINATE
VULNERABILITIES TO
YOUR SYSTEMS AND
SENSITIVE DATA

INCREASE YOUR
SECURITY TRAINING
AND EDUC...
Upcoming SlideShare
Loading in...5
×

ARE YOU VULNERABLE TO HACKERS? TARGET WAS.

42

Published on

How to protect your company's systems from vulnerabilities.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
42
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
1
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

ARE YOU VULNERABLE TO HACKERS? TARGET WAS.

  1. 1. ARE YOU A TARGET? CAMetz Security Consultant
  2. 2. Hackers gained access to Target's computer system. CAMetz Security Consultant
  3. 3. THEY STOLE FINANCIAL DATA PERSONAL DATA of 110 million shoppers! HOW DID THEY DO THAT? CAMetz Security Consultant
  4. 4. HACKERS often research which outside contractors/vendors have remote access to the networks of large corporations because they make easier targets. ? VENDOR This attack method is known as "island hopping" and is more common than you’d think. Very sophisticated cyber attack operation CAMetz Security Consultant
  5. 5. HACKERS tricked an outside vendor employee into URGENT!! SUBJECT: YOUR WEDDING PHOTOS! FROM: ABC PHOTOGRAPHY! TO: MR. XY%(HLio! DATE: 13 February 2014! Dear Customer,! We have some important information about your account. Please click the link below to contact one of our representatives! ! Dear Client,! We have some important information about your account. Please click the link below to contact one of our representatives. clicking on a malicious email! CAMetz Security Consultant
  6. 6. The vendor employee with access to Target's network fell for a "spear phishing” attack. HACKERS sent malware-laced emails that appeared to come from trusted sources, which took over vendor employee’s computer. Once HACKERS gained access to the vendor employee’s computer, they penetrated Target's system and stole the retailer's payment card data. CAMetz Security Consultant
  7. 7. HACKERS TARGET virus NETWORK VENDOR Researchers at a cloud security company found 55,000 so-called HVAC vendors that are connected to the Internet. Many vendors ignore basic computer security measures. Reportedly, Target may not have realized the phishing attack initially, because the company was using a free anti-malware program that does not offer real-time protection against threats. CAMetz Security Consultant
  8. 8. DON’T BE A TARGET! ELIMINATE VULNERABILITIES TO YOUR SYSTEMS AND SENSITIVE DATA INCREASE YOUR SECURITY TRAINING AND EDUCATION PROGRAMS Engage your IT personnel more frequently. Tap into the experience of your security personnel. Ensure you have a strong, solid anti-virus program program to guard your systems. Implement regular employee security training and education programs and sessions. IT’S A START! CAMetz Security Consultant
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×