2. HOW DO HACKERS GET ACCESS?
• KEYLOGGERS is one of the basic tools used for getting passwords and other
information. Keylogger resides in your system memory and runs at every
startup. These keyloggers log all the keystrokes you type. A log is
created and then it is sent to the Hacker. It can be customized so that
it cannot be shown in “processes” (Windows Task Manager).
• RAT (Remote Administration Tool) where a hacker can connect to your PC
without your knowledge. He can see what is going on the screen, what you
are currently doing, which sites you surf. It also has a built-in
functionality of keylogger. Hacker can copy files from your hard disk to
his computer, and all of this without your knowledge.
• TROJAN HORSE most common types of malwares. Trojans spread through warez
sites mostly. We all want FREE software right? When you download from a
warez site, all the keygens and patches and even the original trial
programs are trojaned.
• RANSOMWARE is when a malicious code locks up computer files and
cybercriminals demand a ransom to free them.
3. AS EASY AS 1…2…3
BEING AFFECTED IS EASY AS 1…2…3 How so?
Opening email (at times, even from a name that
you recognize)
Downloading an application
Downloading computer updates
Your internet and email are the two most
dangerous sources for security breaches
4. WHY SMALL BUSINESS?
• In 2014, 60% of all
online attacks
targeted small and mid
size businesses*
• Once affected, small
and mid size
businesses spent an
average of $8,700
repairing the damages*
• Small businesses are
particularly
vulnerable to attacks
because many owners
believe they don’t
have the time and
resources to invest in
setting up proactive
barriers
6. SYMPTOMS TO WATCH OUT FOR
• Highlighted links on web
pages
• Internet speed latency
• Unwanted pop-ups
• Unscheduled reboot
• Operating system
warnings that don’t come
from operating system
• Increase in junk mail
• Unrecognized files
7. OUR RANGE OF SERVICES
HANDS-ON SERVICES:
• IT Support/ Helpdesk
• Remote monitoring
• Custom-fit Firewall
solutions
• Custom-fit Anti-virus
solutions
• Network maintenance
including computers, data
backup and server
• Phone system solutions &
support
CONSULTING SERVICES:
• IT Cost Analysis
• IT Policy/ Network
Security Analysis
• Proactive Disaster
Preparation
• Web & Application
Development
• IT Contract & Direct-Hire
placement solutions
• Website Development