Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Discover Cyber Security by 2 Web Design Inc.

931 views

Published on

Discover Cyber Security presentation by www.2webdesign.com from the AFOA SK "Investing in Our Future" 17th Annual Conference, AGM & Tradeshow. In honour of Canada's Cyber Security Awareness Month, presenter Mouneeb Shahid defines the top cyber security issues, showcases the impact of compromised security, and highlights the most crucial steps to reinforce cyber security.

  • Be the first to comment

  • Be the first to like this

Discover Cyber Security by 2 Web Design Inc.

  1. 1. Discover Cyber Security Presented by: Mouneeb Shahid
  2. 2. #2wd 1. @2webdesign ! Discover Cyber Security
  3. 3. #2wd 1. Top Cyber Security Issues Impact of Compromising Security 7 Most Crucial Steps to Reinforce Cyber Security Success Stories Discover Cyber Security @2webdesign
  4. 4. 1. @2webdesign 1. PHISHING • spoof emails • harvest details • stolen funds • misused identities Cyber 
 Security 
 Issue #1

  5. 5. 1. @2webdesign 2. POISONED WEBSITES • points to juicy story • destination infects computer • issue fake virus alert • buy malware to get rid of virus Cyber 
 Security 
 Issue #2

  6. 6. 1. @2webdesign 3. SOCIAL MEDIA • spread Trojans, Worms and Malware • masked links • can compromise networks • Links to your website Cyber 
 Security 
 Issue #3

  7. 7. 1. @2webdesign 4. DDOS ATTACKS (DISTRIBUTED DENIAL OF SERVICE) • flood of traffic • block real traffic Cyber 
 Security 
 Issue #4

  8. 8. 1. @2webdesign 5. DATED BROWSERS, APPLICATIONS • gain access to emails • forget to download updates for add-ons • learn about your “digital shadow” (myshadow.org) Cyber 
 Security 
 Issue #5

  9. 9. 1. @2webdesign 6. WEBSITE FILE PERMISSIONS! “lacking security configuration” • websites can be compromised • data can be stolen • blacklisted from Google Cyber 
 Security 
 Issue #6

  10. 10. 1. @2webdesign 7. OUTDATED HARDWARE • Server hardware • Firewalls and security • Nation-wide / Global accessibility Cyber 
 Security 
 Issue #7

  11. 11. 1. @2webdesign 8. MOBILE BROWSERS/APPS • may not be as secure as desktop • same device for personal and work • apps <vs> browsers Cyber 
 Security 
 Issue #8

  12. 12. 1. @2webdesign 9. ERROR HANDLING • missing pages and server errors should be handled by code • display custom page • do not divulge system information to user Cyber 
 Security 
 Issue #9

  13. 13. 1. @2webdesign 10.PRIVATE WEBSITE FILES LEAKAGE • Google permissions • File permissions • Using different servers Cyber 
 Security 
 Issue #10

  14. 14. #2wd 1. @2webdesign Impact of Compromised Cyber Security
  15. 15. #2wd 1.Government of Canada Ashley Madison Security Compromise @2webdesign
  16. 16. 1. @2webdesign • Ashley Madison Security Compromise
  17. 17. 1. @2webdesign • Government of Canada is investing $140+ million in cyber security ! • RCMP, Public Safety Canada • Communications Security Establishment • Canadian Security Intelligence Service (CSIS) Security Compromise
  18. 18. 1. @2webdesign • SVDNGOVERNANCE.com Security Compromise
  19. 19. 1. @2webdesign • Lack of Credibility & Reputation • Damage trust • Loss of revenue Security Compromise
  20. 20. #2wd 1. @2webdesign 7 Steps to Reinforce Cyber Security
  21. 21. 1. @2webdesign STEP 1 1. WEBSITE SECURITY POLICY • acceptable internet use policy • ban unrelated sites • password controls • rules for email safety & privacy • social media policy
  22. 22. 1. @2webdesign STEP 2 2. STAY UP-TO-DATE • Meet industry standards • Compliancy Standards • Accessibility Standards • Use experienced developers
  23. 23. 1. @2webdesign STEP 3 3. PROTECTION • Firewalls • Antivirus • Anti-malware • Strong encryption (HTTPS) • Display independent site certification (TRUSTe)
  24. 24. 1. @2webdesign STEP 4 4. BACKUP and BACKUP again • schedule regular backups (utilize realtime-backups) • plan for “disaster recovery”
  25. 25. 1. @2webdesign STEP 5 5. MONITOR • Hosting server use and access • Website traffic and visitors
  26. 26. 1. @2webdesign STEP 6 6. CHOOSE SECURITY OVER CONVENIENCE • build security into website design • hard to retrofit security to a website already under attack
  27. 27. 1. @2webdesign STEP 7 7. WEBSITE MANAGEMENT SYSTEM • Select the right Content Management System for your organization website • Understand the risks with free and open-source systems
  28. 28. 1. @2webdesign Risk Management • Develop a Risk Management Plan ! 1. Identify potential risks! 2. Create a Proposed Mitigation Plan
  29. 29. #2wd 1. @2webdesign www.websitesuccess.ca
  30. 30. #2WD Thank you! Converse with us on Twitter !@2webdesign @2webdesign

×