The New Data Security Risk


Published on

Published in: Technology
1 Like
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

The New Data Security Risk

  1. 1.
  2. 2. The NewSecurity Threat <br />
  3. 3. Your Computers at Risk<br />How cyber-criminals are winning the Malware wars<br />Presented by Placer Computers<br />
  4. 4. Zero Day Attacks<br />PC Magazine: A Zero-Day Attack is a virus or other malware exploit that takes advantage of a hole in a program or operating system before the software developer has made a fix available...” <br />
  5. 5. Am I At Risk?<br />Cyber-criminals create over 60,000 new Malware attacks EVERY DAY!<br />Antivirus/Antispyware software can’t protect against these new threats until AFTER they strike.<br />Once the malware gets in, it seeks and attacks program vulnerabilities<br />
  6. 6. How Did This Happen?<br />Improved Microsoft security updates make 3rd party software attacks more attractive<br />3rd party software less likely to be regularly updated by PC owner<br />Cyber-criminals know this so they seek the easiest targets<br />
  7. 7. Is There a Trend?<br />Average PC has 24-26 non-Microsoft (3rd party) apps <br />Gregg Keiser, Computer World July 2010:“While vulnerabilities in Windows XP and Vista will climb by 31% and 34% respectively this year compared to 2009, bugs in 3rd party apps will jump by 92%”<br />
  8. 8. How Will It Effect Me?<br />California Civil Code 1798.81.5A business… shall implement and maintain reasonable security procedures and practices appropriate… to protect the personal information from unauthorized access… or disclosure.<br />California Financial Code 4057An entity that negligently discloses or shares nonpublic personal information… shall be liable, irrespective of the amount of damages suffered… for a civil penalty not to exceed $2,500 per violation. ($500,000 max) <br />
  9. 9. There is a solution<br />
  10. 10.
  11. 11. Placer Computers<br />
  12. 12. Placer Computers<br />Security Management<br />KEEPING YOUR SOFTWARE UP TO DATE<br />
  13. 13. Placer Computers<br />SO WHAT CAN<br />PLACER COMPUTERS<br />DO FOR YOU?<br />
  14. 14. Placer Computers<br />STEP 1:<br />Security Scan<br />Identify software vulnerabilities<br /><br />
  15. 15. Placer Computers<br />STEP 2:<br />Locate Missing Updates<br />Microsoft critical/optional patches<br />3rd Party program updates/patches<br /><br />
  16. 16. Placer Computers<br />STEP 3:<br />Identify End-of-Life Software<br />Programs no longer supported are risky!<br /><br />
  17. 17. Placer Computers<br />STEP 4:<br />Download, install security updates<br />Ensures that all software is up-to-date<br /><br />
  18. 18. Placer Computers<br />STEP 5:<br />Find replacements for EOL programs<br />Many free options are available. We will<br />research and provide recommendations<br /><br />
  19. 19. Placer Computers<br />STEP 6:<br />Scan and repair privacy leaks<br />Most programs leave a trail of personal data<br /><br />
  20. 20. Placer Computers<br />STEP 7:<br />Spyware Scan<br />Catch any malware that gotpast your Antivirus software<br /> <br />
  21. 21. Placer Computers<br />STEP 8: <br />System Cleanup and Optimization<br />Clean your computer in/outOptimize your PC to run better<br /><br />
  22. 22. Placer Computers<br />BOOK NOW AND SAVE:<br />50% off<br />530-388-8811<br /><br />