Your SlideShare is downloading. ×
0
The New Data Security Risk
The New Data Security Risk
The New Data Security Risk
The New Data Security Risk
The New Data Security Risk
The New Data Security Risk
The New Data Security Risk
The New Data Security Risk
The New Data Security Risk
The New Data Security Risk
The New Data Security Risk
The New Data Security Risk
The New Data Security Risk
The New Data Security Risk
The New Data Security Risk
The New Data Security Risk
The New Data Security Risk
The New Data Security Risk
The New Data Security Risk
The New Data Security Risk
The New Data Security Risk
The New Data Security Risk
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

The New Data Security Risk

333

Published on

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
333
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
3
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1.
  • 2. The NewSecurity Threat
  • 3. Your Computers at Risk
    How cyber-criminals are winning the Malware wars
    Presented by Placer Computers
  • 4. Zero Day Attacks
    PC Magazine: A Zero-Day Attack is a virus or other malware exploit that takes advantage of a hole in a program or operating system before the software developer has made a fix available...”
  • 5. Am I At Risk?
    Cyber-criminals create over 60,000 new Malware attacks EVERY DAY!
    Antivirus/Antispyware software can’t protect against these new threats until AFTER they strike.
    Once the malware gets in, it seeks and attacks program vulnerabilities
  • 6. How Did This Happen?
    Improved Microsoft security updates make 3rd party software attacks more attractive
    3rd party software less likely to be regularly updated by PC owner
    Cyber-criminals know this so they seek the easiest targets
  • 7. Is There a Trend?
    Average PC has 24-26 non-Microsoft (3rd party) apps
    Gregg Keiser, Computer World July 2010:“While vulnerabilities in Windows XP and Vista will climb by 31% and 34% respectively this year compared to 2009, bugs in 3rd party apps will jump by 92%”
  • 8. How Will It Effect Me?
    California Civil Code 1798.81.5A business… shall implement and maintain reasonable security procedures and practices appropriate… to protect the personal information from unauthorized access… or disclosure.
    California Financial Code 4057An entity that negligently discloses or shares nonpublic personal information… shall be liable, irrespective of the amount of damages suffered… for a civil penalty not to exceed $2,500 per violation. ($500,000 max)
  • 9. There is a solution
  • 10.
  • 11. Placer Computers
  • 12. Placer Computers
    Security Management
    KEEPING YOUR SOFTWARE UP TO DATE
  • 13. Placer Computers
    SO WHAT CAN
    PLACER COMPUTERS
    DO FOR YOU?
  • 14. Placer Computers
    STEP 1:
    Security Scan
    Identify software vulnerabilities
    www.PlacerComputers.com
  • 15. Placer Computers
    STEP 2:
    Locate Missing Updates
    Microsoft critical/optional patches
    3rd Party program updates/patches
    www.PlacerComputers.com
  • 16. Placer Computers
    STEP 3:
    Identify End-of-Life Software
    Programs no longer supported are risky!
    www.PlacerComputers.com
  • 17. Placer Computers
    STEP 4:
    Download, install security updates
    Ensures that all software is up-to-date
    www.PlacerComputers.com
  • 18. Placer Computers
    STEP 5:
    Find replacements for EOL programs
    Many free options are available. We will
    research and provide recommendations
    www.PlacerComputers.com
  • 19. Placer Computers
    STEP 6:
    Scan and repair privacy leaks
    Most programs leave a trail of personal data
    www.PlacerComputers.com
  • 20. Placer Computers
    STEP 7:
    Spyware Scan
    Catch any malware that gotpast your Antivirus software
    www.PlacerComputers.com
  • 21. Placer Computers
    STEP 8:
    System Cleanup and Optimization
    Clean your computer in/outOptimize your PC to run better
    www.PlacerComputers.com
  • 22. Placer Computers
    BOOK NOW AND SAVE:
    50% off
    530-388-8811
    www.PlacerComputers.com

×