Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

5 Network Security Threats Facing Businesses Today

1,499 views

Published on

Slides from our latest webinar "Top 5 Security Threats Facing Businesses Today." Whether or not they are truly the top 5 most dangerous threats may be debatable but the threat they pose to a businesses network are not. Enjoy!

Published in: Technology
  • Be the first to comment

5 Network Security Threats Facing Businesses Today

  1. 1. Top 5 Security Threats Facing Businesses Today Key Considerations in Protecting Your Data and Your Future Network Security Series Part 1 of 2
  2. 2. How to Interact Today Type your questions and comments here throughout the webinar. We will answer them periodically or at the end. or… Email your questions to sales@velocityns.com and we will reply to you by the end of the day.
  3. 3. Dustin Hall Sales/Marketing Manager Meet Your Presenters Stephen Nelms Senior IT Consultant
  4. 4. Who is this webinar for?  Business Owners  Executives  Office Administrators  Business Managers  IT Staff Members
  5. 5. The Key Takeaways The 5 major security threats facing your business today How these threats work Tips to protecting your network • More on Network Security Components in Part 2 of the Series
  6. 6. Today’s attendees will receive… Network Assessment + Risk Report by Velocity Network Solutions
  7. 7. The 5 threats we’ll cover… Malware Torrents (peer-to-peer networks) Snowshoe Spamming Hacking-as-a-Service Mobile Threats
  8. 8. Malware Torrents (peer-to-peer networks) Snowshoe Spamming Hacking-as-a-Service Mobile Threats
  9. 9. Malware malicious software used to gather sensitive data, infiltrate private networks or harm general operations. computer viruses ransomware worms trojan horses rootkits keyloggers dialers spyware adware malicious BHOs rogue security software
  10. 10. Tips to Protect Your Network  Use enterprise grade anti-malware software  Have a backup & disaster recovery solution in place  Limit which websites employees can visit  Educate staff on best practices
  11. 11. Malware Torrents (peer-to-peer networks) Snowshoe Spamming Hacking-as-a-Service Mobile Threats
  12. 12. Torrents (peer-to-peer networks) a way of sharing often pirated files such as music, video, software, etc. within a peer-to-peer network by simultaneously downloading and uploading segments of each file. BitTorrent The Pirate Bay Torrentz Kickass Torrents IsoHunt ExtraTorrent 1337x EZTV BitSnoop TorrentReactor
  13. 13. Tips to Protect Your Network  Safest bet…don’t use them!  Use a PC that’s off your business’s network  Scan the files for viruses and wait for results
  14. 14. Malware Torrents (peer-to-peer networks) Snowshoe Spamming Hacking-as-a-Service Mobile Threats
  15. 15. Snowshoe Spamming a spamming technique in which a spammer uses a multitude of IP addresses in order to widely disperse spam messages. This large spread of IP addresses increases the difficulty in identifying the source, allowing it to reach more email inboxes.
  16. 16. Tips to Protect Your Network  Impossible to protect yourself 100% BUT thee are still solid options  Use enterprise grade anti-spam software  Be smart about which emails you open and what files you download
  17. 17. Malware Torrents (peer-to-peer networks) Snowshoe Spamming Hacking-as-a-Service Mobile Threats
  18. 18. Hacking-as-a-Service people who wish to engage in cybercrime can pay money to gain access to hacking tools and services provided by expert hackers. attacks-as-a-service malware-as-a-service fraud-as-a-service cybercrime-as-a-service
  19. 19. Tips to Protect Your Network  Engage a well-rounded security toolset  Hire a professional IT firm or employee to stay current with upgrades and updates  DO NOT assume that hackers are not interested in your particular business!
  20. 20. Malware Torrents (peer-to-peer networks) Snowshoe Spamming Hacking-as-a-Service Mobile Threats
  21. 21. Mobile Threats hackers are increasingly targeting mobile devices from a number of different angles as mobile devices tend to store a plethora of personal and business information. Cyber attacks on mobile devices jumped by 500% in 2012* Of the 3 major cell phone manufacturers (Android, Blackberry and Apple), Android’s OS is the least secure, with Blackberry being the most secure* *Tom Kellerman - “Cybersecurity for small business: Hackers and mobile devices - 2013's top threats” – 6/12/2013 – courtesy of thestar.com
  22. 22. Tips to Protect Your Network  Enable and use passwords to access devices  Enable and use data encryption  Update OS and security items regularly
  23. 23. What we covered today Malware Torrents (peer-to-peer networks) Snowshoe Spamming Hacking-as-a-Service Mobile Threats
  24. 24. How Velocity Network Solutions can help… Develop a network security plan Proactively monitor and update your network Standardize your environment Troubleshoot potentially hazardous issues Backup and disaster recovery and much more…
  25. 25. Join us for part 2 of our Network Security Webinar Series Wednesday, October 9th @ 11:00am PT “5 Must-Have Components of a Secure Network”
  26. 26. Thank you for attending and we’ll see you at the next webinar! Phone: (818) 780-3600 x306 Email: dhall@velocityns.com www.VelocityNS.com

×