SlideShare a Scribd company logo
1 of 24
The Coronavirus effect on business
How to prepare for remote working & targeted
attacks
Brought to you by
Your Presenters
Frances Dewing
CEO, Rubica
José-Miguel Maldonado
VP Security, Rubica
Rubica Cybersecurity
Rubica protects your devices, internet connections, and accounts all in one
app – from anywhere, at work, at home, or on-the-go. Think of us as your
digital bodyguard.
Rubica is advanced cybersecurity for individuals & teams.
Enterprise-grade
Easy to use
Mobile-first security
1. Cybercriminals are taking advantage of chaos & fear by creating pandemic-
specific phishing & malware campaigns.
2. Local quarantines mean more people working remotely, away from the
protection of the office & corporate firewalls.
The Coronavirus Effect on Business
Why is this happening?
Context: Cybercrime is global & sophisticated.
Leader $
Money
Manager
Cash Withdrawals
$
Money
Mules
Malware
Programmer
Malware
Packaging
Service
System
Admin
Assistant
Server Setup
Traffic
Dealer
Spammer Downloads
Distributors
Everyone is a target.
Cybercrime is a $600 Billion business.
Structured like a corporation,
it feeds a supply chain
and a sophisticated economy.
Cybercrime
is organized crime.
Coronavirus:
Old tricks, new hooks
Cybercriminals create new lookalike websites & domains to host attacks.
4,000+ new website domains related to Corona in last 3 months.
Corona-themed domains are 50% more likely to be malicious.
Cybercriminals reuse old malware in new packaging.
Coronavirus Phishing Examples
It’s not just email…
Links to Coronavirus maps can
contain malware.
Other tactics:
• SMS: “Your shipment has been
delayed due to the coronavirus”
• Company remote working
policy from your HR/IT
department
• Deals for “cures” or supplies
SMS
PHISHBAIT
EMAIL
LAUNCHES YOUR DATA
Threats in Action
Coronavirus phishing
• Attachment
• Bad link
• Login creds
• RAT
• Trojan
• Keyloggers
• Screenshots
• Capture
credentials
Malware doesn’t always require a click
If it’s Corona-related, be extra suspicious.
TLDR:
Three Zones of Security
Devices
Internet
Connections
Accounts
To protect your business, all three must be secure.
Three Zones of Security
1. Devices
3. Accounts
& Online Services
Protection Layer 1:
Harden your laptop
Patch all devices. Schedule automatic updates & book reminders on your
calendar.
Run as a standard user, not an admin. This limits the scope of damage if your
device gets hacked.
Enable full-disk encryption. It doesn’t help much if only part of your disk is
encrypted.
Back up your data. Use a combination of physical and cloud backups. Make
sure they are both encrypted.
Enable software firewalls for an extra layer of protection.
Protection Layer 2:
Harden your phone
• Audit app permissions – customize access to location,
microphone, camera, contacts, and e-mail.
• Use your VPN when on wifi.
• Updates apply to phones as well – OS, browser, and all
apps.
• You are more susceptible to phishing and social
engineering on your phone, think before you click.
A Corporate VPN is used to access files and services locally hosted in the office but doesn’t cover all
digital tools.
A personal VPN protects your connection away from the office while working offsite, meant to protect
all tools and all devices (including phones).
WORK FILE
SERVER
• EMAIL
• SLACK
• WEB SEARCHES
• BROWSING?
Secure Your Internet Connection
Protection Layer 3:
Secure Your Internet Connection
• Choose a VPN that doesn’t sell your data and keep it turned on – for all devices.
• Keep work devices on their own network, preventing the spread of malware from
reaching your home network and your own personal devices.
• Change default router credentials and update your firmware.
• Ensure your WPA2 key is unique, long, and strong.
Protection Layer 4:
Use MFA Everywhere
• Multi-factor authentication protects data theft at the
account access level. With MFA for account login, it’s
just much harder to hack.
• Protect your iCloud & Google Play accounts with
MFA. And protect your cell phone account with
your carrier.
• Use it everywhere that it’s offered, especially key
accounts like email, financial accounts, and social
media.
Rubica makes it easy to secure your business
 Designed for remote work
 Built mobile first, and works for all devices
 Catches what Antivirus can’t
 Brings peace of mind
 No hardware needed; download the app and
you’re done
 Maintains your privacy
Enterprise-level security that follows you &
your devices
Rubica makes it easy to secure your business
Secures your devices +
internet connections + accounts
• Threat detection via anomaly & behavioral traffic
analysis
• Anti-malware
• Anti-phishing (DNS sinkhole)
• Encrypted VPN; secures any cell or wifi network
• Intrusion detection & prevention (IDS/IPS) –
automated threat blocking
• Malicious app detection
Every person deserves access to meaningful security and
privacy. Rubica empowers people to protect their digital life.
Protect yourself, protect your team.
Join the waitlist!
Get.Rubica.com/teams
How Rubica Works
1. Download the Rubica App in minutes
2. Turn on your VPN connection to the Rubica
security stack, from anywhere
3. Rubica security stack blocks malware, phishing
and other cyber threats
4. Notifies both the Admin & User about threats
that require action or attention
5. Rubica provides on-call support to the Admin
for any remediation needs
VPN
Threat notifications
3
IPS
IDS
Continuous rule
enhancement
1
2
On-call support
45

More Related Content

Recently uploaded

Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
UXDXConf
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
UK Journal
 

Recently uploaded (20)

Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4j
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at Comcast
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 

Featured

Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Saba Software
 
Introduction to C Programming Language
Introduction to C Programming LanguageIntroduction to C Programming Language
Introduction to C Programming Language
Simplilearn
 

Featured (20)

How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
 
Introduction to C Programming Language
Introduction to C Programming LanguageIntroduction to C Programming Language
Introduction to C Programming Language
 

Cyber Effects of Coronavirus on Business: How to prepare for remote work and targeted attacks

  • 1. The Coronavirus effect on business How to prepare for remote working & targeted attacks Brought to you by
  • 2. Your Presenters Frances Dewing CEO, Rubica José-Miguel Maldonado VP Security, Rubica
  • 3. Rubica Cybersecurity Rubica protects your devices, internet connections, and accounts all in one app – from anywhere, at work, at home, or on-the-go. Think of us as your digital bodyguard. Rubica is advanced cybersecurity for individuals & teams. Enterprise-grade Easy to use Mobile-first security
  • 4. 1. Cybercriminals are taking advantage of chaos & fear by creating pandemic- specific phishing & malware campaigns. 2. Local quarantines mean more people working remotely, away from the protection of the office & corporate firewalls. The Coronavirus Effect on Business
  • 5. Why is this happening? Context: Cybercrime is global & sophisticated.
  • 6. Leader $ Money Manager Cash Withdrawals $ Money Mules Malware Programmer Malware Packaging Service System Admin Assistant Server Setup Traffic Dealer Spammer Downloads Distributors Everyone is a target. Cybercrime is a $600 Billion business. Structured like a corporation, it feeds a supply chain and a sophisticated economy. Cybercrime is organized crime.
  • 7. Coronavirus: Old tricks, new hooks Cybercriminals create new lookalike websites & domains to host attacks. 4,000+ new website domains related to Corona in last 3 months. Corona-themed domains are 50% more likely to be malicious. Cybercriminals reuse old malware in new packaging.
  • 9. It’s not just email… Links to Coronavirus maps can contain malware. Other tactics: • SMS: “Your shipment has been delayed due to the coronavirus” • Company remote working policy from your HR/IT department • Deals for “cures” or supplies
  • 10. SMS PHISHBAIT EMAIL LAUNCHES YOUR DATA Threats in Action Coronavirus phishing • Attachment • Bad link • Login creds • RAT • Trojan • Keyloggers • Screenshots • Capture credentials
  • 11. Malware doesn’t always require a click
  • 12. If it’s Corona-related, be extra suspicious. TLDR:
  • 13. Three Zones of Security Devices Internet Connections Accounts To protect your business, all three must be secure.
  • 14. Three Zones of Security 1. Devices 3. Accounts & Online Services
  • 15. Protection Layer 1: Harden your laptop Patch all devices. Schedule automatic updates & book reminders on your calendar. Run as a standard user, not an admin. This limits the scope of damage if your device gets hacked. Enable full-disk encryption. It doesn’t help much if only part of your disk is encrypted. Back up your data. Use a combination of physical and cloud backups. Make sure they are both encrypted. Enable software firewalls for an extra layer of protection.
  • 16. Protection Layer 2: Harden your phone • Audit app permissions – customize access to location, microphone, camera, contacts, and e-mail. • Use your VPN when on wifi. • Updates apply to phones as well – OS, browser, and all apps. • You are more susceptible to phishing and social engineering on your phone, think before you click.
  • 17. A Corporate VPN is used to access files and services locally hosted in the office but doesn’t cover all digital tools. A personal VPN protects your connection away from the office while working offsite, meant to protect all tools and all devices (including phones). WORK FILE SERVER • EMAIL • SLACK • WEB SEARCHES • BROWSING? Secure Your Internet Connection
  • 18. Protection Layer 3: Secure Your Internet Connection • Choose a VPN that doesn’t sell your data and keep it turned on – for all devices. • Keep work devices on their own network, preventing the spread of malware from reaching your home network and your own personal devices. • Change default router credentials and update your firmware. • Ensure your WPA2 key is unique, long, and strong.
  • 19. Protection Layer 4: Use MFA Everywhere • Multi-factor authentication protects data theft at the account access level. With MFA for account login, it’s just much harder to hack. • Protect your iCloud & Google Play accounts with MFA. And protect your cell phone account with your carrier. • Use it everywhere that it’s offered, especially key accounts like email, financial accounts, and social media.
  • 20. Rubica makes it easy to secure your business  Designed for remote work  Built mobile first, and works for all devices  Catches what Antivirus can’t  Brings peace of mind  No hardware needed; download the app and you’re done  Maintains your privacy Enterprise-level security that follows you & your devices
  • 21. Rubica makes it easy to secure your business Secures your devices + internet connections + accounts • Threat detection via anomaly & behavioral traffic analysis • Anti-malware • Anti-phishing (DNS sinkhole) • Encrypted VPN; secures any cell or wifi network • Intrusion detection & prevention (IDS/IPS) – automated threat blocking • Malicious app detection
  • 22. Every person deserves access to meaningful security and privacy. Rubica empowers people to protect their digital life.
  • 23. Protect yourself, protect your team. Join the waitlist! Get.Rubica.com/teams
  • 24. How Rubica Works 1. Download the Rubica App in minutes 2. Turn on your VPN connection to the Rubica security stack, from anywhere 3. Rubica security stack blocks malware, phishing and other cyber threats 4. Notifies both the Admin & User about threats that require action or attention 5. Rubica provides on-call support to the Admin for any remediation needs VPN Threat notifications 3 IPS IDS Continuous rule enhancement 1 2 On-call support 45