SlideShare a Scribd company logo
1 of 16
3 Tips to Stay Safe Online in 2017
For business owners, executives,
and high net worth individuals.
Today’s Speaker:
Bret Piatt, CEO & Chairman at Jungle Disk
Currently, as Chief Executive Officer of Jungle Disk, Bret is a hands-on leader
who stays actively involved in product development and customer service.
Prior to Jungle Disk, Bret was the General Manager
of Rackspace Cloud Office, a 300 person SaaS
division of Rackspace (NYSE:RAX) serving over
90,000 customers.
• Additional roles at Rackspace included Senior Director,
Corporate Strategy & Development and Product Line
Leader for Security & Compliance Services.
Before Rackspace, Bret spent nearly a decade at
AT&T (NYSE:T) as a Network and Security Engineer,
Security Network Operations Center Manager, and
Associate Director – Security Services where he
lead the Managed Premises Firewall business into
the Gartner MSSP Leadership Quadrant.
TODAY’S AGENDA
1. Stopping Ransomware
2. Preventing Drive-by-Downloads
3. Catching Spear Phishing Attacks
Speed of Business Takes Us All Online
The Internet has provided a revolution in productivity & risk
Productivity
1. Instant access to research data
(Google) vs. published paper
periodicals (e.g. The Old Farmer’s
Almanac).
2. Digital documents with legal digital
signatures vs. paper records, filing
cabinets, and wet ink signatures.
3. Online portals or mobile apps
providing 24/7 access to services
with financial or confidential
records.
Risk
1. Drive-by-download or fake
website leading to account
hijacking, ransomware, or other
spyware infection.
2. Data breaches and broad scale
records disclosures through online
attacks.
3. Account hijacking and financial
fraud or privacy violations through
spear phishing or man-in-the-
middle attacks.
“Productivity is grounded in the PC. How would you
run ‘USA Today’ without PCs? Run a hospital without
PCs?”
– Michael Dell, CEO – Dell Technologies
TODAY’S AGENDA
1. Stopping Ransomware
2. Preventing Drive-by-Downloads
3. Catching Spear Phishing Attacks
What is Ransomware?
Malware that kidnaps your files for ransom
Definition from US-CERT:
• Ransomware is a type of malware that infects computer systems, restricting users’ access to the
infected systems. Ransomware variants have been observed for several years and often attempt to
extort money from victims by displaying an on-screen alert. Typically, these alerts state that the user’s
systems have been locked or that the user’s files have been encrypted. Users are told that unless a
ransom is paid, access will not be restored. The ransom demanded from individuals varies greatly but
is frequently $200–$400 dollars and must be paid in virtual currency, such as Bitcoin.
Examples of Ransomware:
Stopping Ransomware
How can ransomware affect my
business?
Scared people, eroded customer trust, & direct costs
“CryptoLocker ransomware writers collected $30 million
in a mere 100 days. These figures represent a
conservative estimate of the number of ransoms
collected by the CryptoLocker gang.”
– Dell SecureWorks
“The number of reported
security incidents rose 48%
this year to 42.8 million–the
equivalent of 117,339 attacks
per day.”
– PwC US, with CIO & CSO Magazine
Stopping Ransomware
1. Use a network security
solution that blocks malware
and attack vectors before
they reach your computers.
2. Use host based security built
into the operating system as
a second line of defense (ex.
Windows Defender).
3. Have a data backup in place if #1 and #2 fail so you can restore – even
paying the ransom isn’t a guarantee your files come back.
Multiple layers of protection are recommended:
Stopping Ransomware
Three Steps to Stop Ransomware
Don’t let hackers kidnap your data on your computer
TODAY’S AGENDA
1. Stopping Ransomware
2. Preventing Drive-by-Downloads
3. Catching Spear Phishing Attacks
What is a Drive-by download?
Automatic attacks without user action
Definition from Wikipedia:
• Drive-by download means two things, each concerning the
unintended download of computer software from the Internet:
• Downloads which a person authorized but without understanding the consequences (e.g. downloads which install an
unknown or counterfeit executable program, ActiveX component, or Java applet) automatically.
• Any download that happens without a person's knowledge, often a computer virus, spyware, malware, or crimeware.[1]
Examples from ExtremeTech & HBR:
Preventing Drive-by-Downloads
How do I avoid becoming a drive-by
victim?
Automatic defense to block automatic attacks
1. Use a network security solution
with content filtering that
includes malware detection.
2. Install an ad blocker in your web
browser (ex. Adblock Plus open
source project).
3. Use host based security built
into the operating system as a
second line of defense (ex.
Windows Defender).
Being “smart” and not clicking on suspicious links is no
longer enough:
Preventing Drive-by-Downloads
TODAY’S AGENDA
1. Stopping Ransomware
2. Preventing Drive-by-Downloads
3. Catching Spear Phishing Attacks
Spear Phishing vs. Spear Fishing
Attackers are getting smarter, we have to as well.
Spear Phishing is a highly targeted and context aware social
engineering attack. They tried Jungle Disk in December 2016!
Set your
mail client
to show full
address!
Spear
Fishing
Why does the
attacker put, “Sent
from my iPad”?
It provides the
person reading it a
reason why the
signature doesn’t
exactly match your
normal one.
Catching Spear Phishing Attacks
How do I protect myself from spear
phishing?
Be aware, don’t hurry on anything you’ll regret
1. Be cautious and use a separate
channel to verify sensitive topics or
financial transactions.
2. Setup controls to require multiple
people to authorize access to critical
infrastructure or new payee or to
change wire transfer / account #s on
existing accounts.
3. Have a network content filtering and
anti-malware service that blocks
malicious downloads from dangerous
links.
Phishing is no longer just the infamous “419” scams with the
dead prince you’re related to.
Catching Spear Phishing Attacks
CLOSING TIPS
1. Turn on operating system updates & security
2. Install an ad-blocker in your web browser
3. Be cautious replying to emails, especially approvals
Bret Piatt, CEO of Jungle
Disk
bret@jungledisk.com
https://www.jungledisk.com
Questions?

More Related Content

What's hot

seminar report on What is ransomware
seminar report on What is ransomwareseminar report on What is ransomware
seminar report on What is ransomwareJawhar Ali
 
5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...
5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...
5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...ClearDATACloud
 
Ransomware: Attack, Human Impact and Mitigation
Ransomware: Attack, Human Impact and MitigationRansomware: Attack, Human Impact and Mitigation
Ransomware: Attack, Human Impact and MitigationMaaz Ahmed Shaikh
 
Ransomware - The Growing Threat
Ransomware - The Growing ThreatRansomware - The Growing Threat
Ransomware - The Growing ThreatNick Miller
 
How to Take the Ransom Out of Ransomware
How to Take the Ransom Out of RansomwareHow to Take the Ransom Out of Ransomware
How to Take the Ransom Out of Ransomwaremarketingunitrends
 
Ransomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your DataRansomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your DataInderjeet Singh
 
Industry reactions to wanna cry ransomware attacks
Industry reactions to wanna cry ransomware attacksIndustry reactions to wanna cry ransomware attacks
Industry reactions to wanna cry ransomware attackskevinmass30
 
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-IN
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-INWannaCry (WannaCrypt) Ransomware - Advisory from CERT-IN
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-INVijay Sarathy Rangayyan
 
How to Help Your Customers Protect Themselves from Ransomware Attacks
How to Help Your Customers Protect Themselves from Ransomware AttacksHow to Help Your Customers Protect Themselves from Ransomware Attacks
How to Help Your Customers Protect Themselves from Ransomware AttacksSolarwinds N-able
 
Ransomware: A Perilous Malware
Ransomware: A Perilous MalwareRansomware: A Perilous Malware
Ransomware: A Perilous MalwareHTS Hosting
 
Enterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entitiesEnterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entitiesQuick Heal Technologies Ltd.
 
Network Threats
Network ThreatsNetwork Threats
Network ThreatsDan Oblak
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0DallasHaselhorst
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security9784
 
Tutorial 9 - Security on the Internet
Tutorial 9 - Security on the InternetTutorial 9 - Security on the Internet
Tutorial 9 - Security on the Internetdpd
 
Ransomware Has Evolved And So Should Your Company
Ransomware Has Evolved And So Should Your CompanyRansomware Has Evolved And So Should Your Company
Ransomware Has Evolved And So Should Your CompanyVeriato
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentationKudzai Rerayi
 

What's hot (20)

seminar report on What is ransomware
seminar report on What is ransomwareseminar report on What is ransomware
seminar report on What is ransomware
 
5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...
5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...
5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...
 
Ransomware: Attack, Human Impact and Mitigation
Ransomware: Attack, Human Impact and MitigationRansomware: Attack, Human Impact and Mitigation
Ransomware: Attack, Human Impact and Mitigation
 
Ransomware - The Growing Threat
Ransomware - The Growing ThreatRansomware - The Growing Threat
Ransomware - The Growing Threat
 
How to Take the Ransom Out of Ransomware
How to Take the Ransom Out of RansomwareHow to Take the Ransom Out of Ransomware
How to Take the Ransom Out of Ransomware
 
Ransomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your DataRansomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your Data
 
Industry reactions to wanna cry ransomware attacks
Industry reactions to wanna cry ransomware attacksIndustry reactions to wanna cry ransomware attacks
Industry reactions to wanna cry ransomware attacks
 
Ransomware
RansomwareRansomware
Ransomware
 
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-IN
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-INWannaCry (WannaCrypt) Ransomware - Advisory from CERT-IN
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-IN
 
How to Help Your Customers Protect Themselves from Ransomware Attacks
How to Help Your Customers Protect Themselves from Ransomware AttacksHow to Help Your Customers Protect Themselves from Ransomware Attacks
How to Help Your Customers Protect Themselves from Ransomware Attacks
 
Ransomware: A Perilous Malware
Ransomware: A Perilous MalwareRansomware: A Perilous Malware
Ransomware: A Perilous Malware
 
Ransomware attacks 2017
Ransomware attacks 2017Ransomware attacks 2017
Ransomware attacks 2017
 
Enterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entitiesEnterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entities
 
Network Threats
Network ThreatsNetwork Threats
Network Threats
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0
 
ITPG Secure on WannaCry
ITPG Secure on WannaCryITPG Secure on WannaCry
ITPG Secure on WannaCry
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security
 
Tutorial 9 - Security on the Internet
Tutorial 9 - Security on the InternetTutorial 9 - Security on the Internet
Tutorial 9 - Security on the Internet
 
Ransomware Has Evolved And So Should Your Company
Ransomware Has Evolved And So Should Your CompanyRansomware Has Evolved And So Should Your Company
Ransomware Has Evolved And So Should Your Company
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentation
 

Similar to 3 Tips to Stay Safe Online in 2017

First Union Bank Report
First Union Bank ReportFirst Union Bank Report
First Union Bank ReportYogesh Kumar
 
Free Guide-to-cybersecurity-fundamentals.pdf
Free Guide-to-cybersecurity-fundamentals.pdfFree Guide-to-cybersecurity-fundamentals.pdf
Free Guide-to-cybersecurity-fundamentals.pdfVarinder K
 
Topic #17 IT Security ITSecurityIncidentsA.docx
Topic #17   IT Security ITSecurityIncidentsA.docxTopic #17   IT Security ITSecurityIncidentsA.docx
Topic #17 IT Security ITSecurityIncidentsA.docxjuliennehar
 
Introduction to the Current Threat Landscape
Introduction to the Current Threat LandscapeIntroduction to the Current Threat Landscape
Introduction to the Current Threat LandscapeMelbourne IT
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdfPavelVtek3
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?TechSoup
 
2016 CYBERSECURITY PLAYBOOK
2016 CYBERSECURITY PLAYBOOK2016 CYBERSECURITY PLAYBOOK
2016 CYBERSECURITY PLAYBOOKBoris Loukanov
 
Protecting Your Business From Cybercrime
Protecting Your Business From CybercrimeProtecting Your Business From Cybercrime
Protecting Your Business From CybercrimeDavid J Rosenthal
 
Ransomware and email security ver - 1.3
Ransomware and email security   ver - 1.3Ransomware and email security   ver - 1.3
Ransomware and email security ver - 1.3Denise Bailey
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataAccellis Technology Group
 
Saiyed_Crypto_Article_ISSA
Saiyed_Crypto_Article_ISSASaiyed_Crypto_Article_ISSA
Saiyed_Crypto_Article_ISSACarl Saiyed
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
9 Security Threats Everyone Should Be Aware Of
9 Security Threats Everyone Should Be Aware Of9 Security Threats Everyone Should Be Aware Of
9 Security Threats Everyone Should Be Aware OfAditya Prakhar Singh
 
Cyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APTCyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APTSimone Onofri
 

Similar to 3 Tips to Stay Safe Online in 2017 (20)

First Union Bank Report
First Union Bank ReportFirst Union Bank Report
First Union Bank Report
 
Free Guide-to-cybersecurity-fundamentals.pdf
Free Guide-to-cybersecurity-fundamentals.pdfFree Guide-to-cybersecurity-fundamentals.pdf
Free Guide-to-cybersecurity-fundamentals.pdf
 
Topic #17 IT Security ITSecurityIncidentsA.docx
Topic #17   IT Security ITSecurityIncidentsA.docxTopic #17   IT Security ITSecurityIncidentsA.docx
Topic #17 IT Security ITSecurityIncidentsA.docx
 
Network monitoring white paper
Network monitoring white paperNetwork monitoring white paper
Network monitoring white paper
 
Introduction to the Current Threat Landscape
Introduction to the Current Threat LandscapeIntroduction to the Current Threat Landscape
Introduction to the Current Threat Landscape
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdf
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
 
2016 CYBERSECURITY PLAYBOOK
2016 CYBERSECURITY PLAYBOOK2016 CYBERSECURITY PLAYBOOK
2016 CYBERSECURITY PLAYBOOK
 
Information security
Information securityInformation security
Information security
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Protecting Your Business From Cybercrime
Protecting Your Business From CybercrimeProtecting Your Business From Cybercrime
Protecting Your Business From Cybercrime
 
Ransomware and email security ver - 1.3
Ransomware and email security   ver - 1.3Ransomware and email security   ver - 1.3
Ransomware and email security ver - 1.3
 
Web Security.pptx
Web Security.pptxWeb Security.pptx
Web Security.pptx
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Ransomware
RansomwareRansomware
Ransomware
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
 
Saiyed_Crypto_Article_ISSA
Saiyed_Crypto_Article_ISSASaiyed_Crypto_Article_ISSA
Saiyed_Crypto_Article_ISSA
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
9 Security Threats Everyone Should Be Aware Of
9 Security Threats Everyone Should Be Aware Of9 Security Threats Everyone Should Be Aware Of
9 Security Threats Everyone Should Be Aware Of
 
Cyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APTCyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APT
 

More from Bret Piatt

OpenStack Tutorial
OpenStack TutorialOpenStack Tutorial
OpenStack TutorialBret Piatt
 
Future of Data Storage in the Cloud
Future of Data Storage in the CloudFuture of Data Storage in the Cloud
Future of Data Storage in the CloudBret Piatt
 
How Open Source Cloud Platforms Can Solve Big Data Needs in a Location-Aware,...
How Open Source Cloud Platforms Can Solve Big Data Needs in a Location-Aware,...How Open Source Cloud Platforms Can Solve Big Data Needs in a Location-Aware,...
How Open Source Cloud Platforms Can Solve Big Data Needs in a Location-Aware,...Bret Piatt
 
Alternative Database Technology in the Cloud
Alternative Database Technology in the CloudAlternative Database Technology in the Cloud
Alternative Database Technology in the CloudBret Piatt
 
Drupal In The Cloud
Drupal In The CloudDrupal In The Cloud
Drupal In The CloudBret Piatt
 
Cloud Deployment Toolkit
Cloud Deployment ToolkitCloud Deployment Toolkit
Cloud Deployment ToolkitBret Piatt
 
Future of Open Source in a Cloudy World
Future of Open Source in a Cloudy WorldFuture of Open Source in a Cloudy World
Future of Open Source in a Cloudy WorldBret Piatt
 
Cloudops fundamentals management, tdd, test driven design, continuous integra...
Cloudops fundamentals management, tdd, test driven design, continuous integra...Cloudops fundamentals management, tdd, test driven design, continuous integra...
Cloudops fundamentals management, tdd, test driven design, continuous integra...Bret Piatt
 

More from Bret Piatt (8)

OpenStack Tutorial
OpenStack TutorialOpenStack Tutorial
OpenStack Tutorial
 
Future of Data Storage in the Cloud
Future of Data Storage in the CloudFuture of Data Storage in the Cloud
Future of Data Storage in the Cloud
 
How Open Source Cloud Platforms Can Solve Big Data Needs in a Location-Aware,...
How Open Source Cloud Platforms Can Solve Big Data Needs in a Location-Aware,...How Open Source Cloud Platforms Can Solve Big Data Needs in a Location-Aware,...
How Open Source Cloud Platforms Can Solve Big Data Needs in a Location-Aware,...
 
Alternative Database Technology in the Cloud
Alternative Database Technology in the CloudAlternative Database Technology in the Cloud
Alternative Database Technology in the Cloud
 
Drupal In The Cloud
Drupal In The CloudDrupal In The Cloud
Drupal In The Cloud
 
Cloud Deployment Toolkit
Cloud Deployment ToolkitCloud Deployment Toolkit
Cloud Deployment Toolkit
 
Future of Open Source in a Cloudy World
Future of Open Source in a Cloudy WorldFuture of Open Source in a Cloudy World
Future of Open Source in a Cloudy World
 
Cloudops fundamentals management, tdd, test driven design, continuous integra...
Cloudops fundamentals management, tdd, test driven design, continuous integra...Cloudops fundamentals management, tdd, test driven design, continuous integra...
Cloudops fundamentals management, tdd, test driven design, continuous integra...
 

Recently uploaded

Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 

Recently uploaded (20)

Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 

3 Tips to Stay Safe Online in 2017

  • 1. 3 Tips to Stay Safe Online in 2017 For business owners, executives, and high net worth individuals.
  • 2. Today’s Speaker: Bret Piatt, CEO & Chairman at Jungle Disk Currently, as Chief Executive Officer of Jungle Disk, Bret is a hands-on leader who stays actively involved in product development and customer service. Prior to Jungle Disk, Bret was the General Manager of Rackspace Cloud Office, a 300 person SaaS division of Rackspace (NYSE:RAX) serving over 90,000 customers. • Additional roles at Rackspace included Senior Director, Corporate Strategy & Development and Product Line Leader for Security & Compliance Services. Before Rackspace, Bret spent nearly a decade at AT&T (NYSE:T) as a Network and Security Engineer, Security Network Operations Center Manager, and Associate Director – Security Services where he lead the Managed Premises Firewall business into the Gartner MSSP Leadership Quadrant.
  • 3. TODAY’S AGENDA 1. Stopping Ransomware 2. Preventing Drive-by-Downloads 3. Catching Spear Phishing Attacks
  • 4. Speed of Business Takes Us All Online The Internet has provided a revolution in productivity & risk Productivity 1. Instant access to research data (Google) vs. published paper periodicals (e.g. The Old Farmer’s Almanac). 2. Digital documents with legal digital signatures vs. paper records, filing cabinets, and wet ink signatures. 3. Online portals or mobile apps providing 24/7 access to services with financial or confidential records. Risk 1. Drive-by-download or fake website leading to account hijacking, ransomware, or other spyware infection. 2. Data breaches and broad scale records disclosures through online attacks. 3. Account hijacking and financial fraud or privacy violations through spear phishing or man-in-the- middle attacks. “Productivity is grounded in the PC. How would you run ‘USA Today’ without PCs? Run a hospital without PCs?” – Michael Dell, CEO – Dell Technologies
  • 5. TODAY’S AGENDA 1. Stopping Ransomware 2. Preventing Drive-by-Downloads 3. Catching Spear Phishing Attacks
  • 6. What is Ransomware? Malware that kidnaps your files for ransom Definition from US-CERT: • Ransomware is a type of malware that infects computer systems, restricting users’ access to the infected systems. Ransomware variants have been observed for several years and often attempt to extort money from victims by displaying an on-screen alert. Typically, these alerts state that the user’s systems have been locked or that the user’s files have been encrypted. Users are told that unless a ransom is paid, access will not be restored. The ransom demanded from individuals varies greatly but is frequently $200–$400 dollars and must be paid in virtual currency, such as Bitcoin. Examples of Ransomware: Stopping Ransomware
  • 7. How can ransomware affect my business? Scared people, eroded customer trust, & direct costs “CryptoLocker ransomware writers collected $30 million in a mere 100 days. These figures represent a conservative estimate of the number of ransoms collected by the CryptoLocker gang.” – Dell SecureWorks “The number of reported security incidents rose 48% this year to 42.8 million–the equivalent of 117,339 attacks per day.” – PwC US, with CIO & CSO Magazine Stopping Ransomware
  • 8. 1. Use a network security solution that blocks malware and attack vectors before they reach your computers. 2. Use host based security built into the operating system as a second line of defense (ex. Windows Defender). 3. Have a data backup in place if #1 and #2 fail so you can restore – even paying the ransom isn’t a guarantee your files come back. Multiple layers of protection are recommended: Stopping Ransomware Three Steps to Stop Ransomware Don’t let hackers kidnap your data on your computer
  • 9. TODAY’S AGENDA 1. Stopping Ransomware 2. Preventing Drive-by-Downloads 3. Catching Spear Phishing Attacks
  • 10. What is a Drive-by download? Automatic attacks without user action Definition from Wikipedia: • Drive-by download means two things, each concerning the unintended download of computer software from the Internet: • Downloads which a person authorized but without understanding the consequences (e.g. downloads which install an unknown or counterfeit executable program, ActiveX component, or Java applet) automatically. • Any download that happens without a person's knowledge, often a computer virus, spyware, malware, or crimeware.[1] Examples from ExtremeTech & HBR: Preventing Drive-by-Downloads
  • 11. How do I avoid becoming a drive-by victim? Automatic defense to block automatic attacks 1. Use a network security solution with content filtering that includes malware detection. 2. Install an ad blocker in your web browser (ex. Adblock Plus open source project). 3. Use host based security built into the operating system as a second line of defense (ex. Windows Defender). Being “smart” and not clicking on suspicious links is no longer enough: Preventing Drive-by-Downloads
  • 12. TODAY’S AGENDA 1. Stopping Ransomware 2. Preventing Drive-by-Downloads 3. Catching Spear Phishing Attacks
  • 13. Spear Phishing vs. Spear Fishing Attackers are getting smarter, we have to as well. Spear Phishing is a highly targeted and context aware social engineering attack. They tried Jungle Disk in December 2016! Set your mail client to show full address! Spear Fishing Why does the attacker put, “Sent from my iPad”? It provides the person reading it a reason why the signature doesn’t exactly match your normal one. Catching Spear Phishing Attacks
  • 14. How do I protect myself from spear phishing? Be aware, don’t hurry on anything you’ll regret 1. Be cautious and use a separate channel to verify sensitive topics or financial transactions. 2. Setup controls to require multiple people to authorize access to critical infrastructure or new payee or to change wire transfer / account #s on existing accounts. 3. Have a network content filtering and anti-malware service that blocks malicious downloads from dangerous links. Phishing is no longer just the infamous “419” scams with the dead prince you’re related to. Catching Spear Phishing Attacks
  • 15. CLOSING TIPS 1. Turn on operating system updates & security 2. Install an ad-blocker in your web browser 3. Be cautious replying to emails, especially approvals
  • 16. Bret Piatt, CEO of Jungle Disk bret@jungledisk.com https://www.jungledisk.com Questions?