On 15th of April "Data Security Solutions" participated in international conference held by "BalticSecurity.org" and made a presentation to raise awareness of importance of risks of cyber crime and data protection.
Boost PC performance: How more available memory can improve productivity
Data security solutions 2011 @Society.Person.Security.
1. Cybercrime – the biggest threat of the 21st Century Andris Soroka Managing director Data Security Solutions 15.04.2011
2. Where to start from? Internet has been compared to America’s Wild Wild West countless times – now the analogy holds more weight than ever.No DNA forensics, no overarching laws – just lawlessness.
3. The 21st Century – the age of cybercrime “Year 2010 was the year of cybercrime and cyberwars. Year of Wikileaks” “The New York Times”, “Guardian”, “Der Spiegel”, “El Pais”, “Le Monde” and more. 2010, 2011.. FBI warns Congress that cybercriminals can hack any internet-linked system Gordon M. Snow, assistant director of the FBI’s Cyber Division (13th of April, 2011)
4. Background - technology development IT continues taking the lead in business (ERP, CRM, document management, digital prototyping etc.) Importance and development of e-World (e-Health, e-government, e-services, social networking, Web 2.0, unified communications and tools for thatetc.) Mobility and borderless enterprise Cyber culture develops faster than cyber security
6. New threats – targeted,professional, silent There are Internet shops full of credit card, bank account, privacy, businessand other confidential data. Also there are available services to rent a botnet, malicious code and attack anyone. Cybercriminal«CV Online» Video trainings and eLearning available in social media, such as YouTube «Black market community» (forums, blogs, interest groups, conferences etc.)
9. Why hackers might want to “contact” You? Private person You have the infrastructure for tests of new viruses and robots You have server where to store illegal stuff (programs, files etc.) They can do criminal activities using your computer WiFi – they can just borrow the internet You have the information which could be sold in black market Business Commercial espionage (financial, business and personal data) An attack can stop the business, services (competition) You are spam target Your home page could be damaged They can control and monitor you They can change data in systems Home page cross-scripting The results of damage Financial(costs, data, market, value) Reputation (customer, partner, HR) Development and competitiveness
12. “Data Security Solutions” can help Specialization– IT Security IT Security consulting (vulnerability assessmenttests, security audit, new systems integration, HR training, technical support) Innovative & selected software / hardware & hybrid solutions from leading technology vendors from over 10 different countries