Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Cybersecurity and the effect on businesses


Published on

The internet has inundated every part of our lives. As technology continues to grow, the business world struggles to keep up. Cybersecurity has become a necessity for the protection of all businesses no matter what the industry. The importance of cybersecurity increases daily. Hardly a day goes by where we do not see a story related to this subject. I have spent a great deal of time studying and applying the techniques I have learned to help safeguard my clients. I decided to put together a PowerPoint presentation to show my clients the basics and how to protect themselves.

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Cybersecurity and the effect on businesses

  2. 2. What is Cybersecurity? The art of protecting systems, networks, and programs from digital attacks. ACQUI Technology
  3. 3. Malware is short for malicious software and it is the main threat to everyone on the internet. RANSOMWARE Types of Cyber Attacks VIRUSES SPYWARE BOTNET SOCIAL ENGINEERING ACQUI Technology
  4. 4. Malicious software that holds a company’s computer system and information hostage & threatens exposure until a ransom is paid ACQUI Technology
  5. 5. Viruses • Once installed it replicates itself • Infects other computer programs by entering its own code • Once one computer is infected, it can easily transfer to other computers connected to that network ACQUI Technology
  6. 6. This malware is designed to spy It hides in the background and sees what you do online Copies passwords, credit card numbers & anything you’ve searched for or have on your computer ACQUI Technology
  7. 7. SOCIAL Attackers target a company and search for weaknesses Can go by may names: phishing, whaling attack or tailgating ACQUI Technology
  8. 8. Botnets •Gain access to your system through malicious coding •Takes advantage through direct hacking or a program that searches for weaknesses. •Ultimate goal of a Botnet is to add your computer to their system ACQUI Technology
  9. 9. The Cost of Cyberattacks According to study respondents, more than half of all attacks resulted in financial damages of more than US $500,000, including, but not limited to, lost revenue, customers, opportunities, and out-of-pocket costs(Figure 40) (Cisco 2018) ACQUI Technology
  10. 10. How to Combat Cyberattacks • Don’t plug in that USB drive • Update with the latest software package • Cybersecurity training & education • Update routers & firewalls with latest firmware • Have a cybersecurity protocol for your business • Invest in good anti-virus & anti-malware ACQUI Technology
  11. 11. Cyberattacks Defense • Perform risk assessment • Use “Paraphrases” for password (lowercase and uppercase alphabetic characters, numbers and symbols) • Invest in software and hardware • Backup, backup, backup! • Consult a Cybersecurity Expert • Open communication, awareness and education are key ACQUI Technology
  12. 12. If you need advice on how to protect yourself and your company from malware please contact us at or (562) 281-5249 Thank You! ACQUI Technology