SlideShare a Scribd company logo
1 of 34
Download to read offline
Who the Heck is
Denis Wilson
and Why Should
I Listen to Him?
“I am a veteran technology strategist who
specializes in developing highly-effective
and rock-solid computing systems for
small businesses.”
▪ Worked with Microsoft and their partners for over
20 years
▪ Certified by Microsoft on cloud computing and
small business
▪ Very knowledgeable in vertical markets like
healthcare, finance and insurance, legal and CPA
firms, construction and engineering, manufacturing,
and nonprofit
▪ Experienced in compliance environment like HIPAA
and FINRA.
▪ Author and speaker on the subject of SMB
technology for SCORE, SBDCs, EDCs, WBCs, SBA, and a
variety of business associations
Slide Deck Availability
Available at:
Slide Share:
http://www.slideshare.net/dwpia/
I also have over 15 presentations that are posted at the same
location for your perusal.
Ask me to connect with you on Facebook, LinkedIn or Twitter if
you would like to get my blog posts, and curated posts on small
business technology and processes.
• Overview of Cybercrime
• IssuesThat NonprofitsHave Had
• Tips to Protect Your SmallNonprofit
93 percent of all money is digital. That’s what is at risk here. –Bill Nelson
Bill Nelson, Financial Services Information Sharing & Analysis Center
What is cybercrime?
Cybercrime is criminal activity involving the internet, a computer system, or
computer technology.
http://news.microsoft.com/stories/cybercrime/index.html
Cybercrime activity is the highest, ever
Cybercrime is a big global business
• The cybercrime industry has evolved with
the PC/computer/mobile device
ecosystem
• Today, cybercrime is more organized and
motivated than at any time in history
Insights about one group of three
Blackhats indicted in 2018
• Stole information on 100 million people
• Breached 12 companies, including
• Concealed at least $100 million in Swiss
and other accounts
• Hackers and conspirators were in more
than a dozen countries
• One of the indicted had hundreds of
employees
http://www.bloomberg.com/news/articles/2018-11-10/hackers-accused-by-u-s-of-targeting-top-banks-mutual-funds
The bad actors are not a monolithic group
Tools, techniques, motivations, and business models vary by cybercriminal region
Non-Professional
• Non-professional
cybercriminals
• Use crime kits to make
spending money
• Little to no business or
technical expertise
• Even though they are not
professional, their impact
can be significant
Blackhats
• Treatcybercrime asa
business
• Businessandtechnical
expertise
• Oftenworkinaclosed
groupofother
professional
cybercriminals
• Criminalreputationis
everything
Grayhats
• Theybelievetheyare
offeringlegitimate
services. However,their
customerscanbeboth
“legitimate”orcriminal
• Ranasabusiness
Hactivists
• Individualsorgroups
whohackforasocial
cause,without
economicmotivation
• Havebothtechnical
peopleandfollowers
State
Sponsored
• Nationalsecurityand/or
economicmotivation
• Technicalexpertise
• Work inaclosedgroupof
otherprofessionals
• OftenuseBlackhat
resourcesand/or
techniquestomasktheir
identity
Some elite Blackhats, some elite
hactivists, and most state sponsored
actors use “APT” techniques
Often defenders treat all bad actors the same
The cybercrime problem is broad
• More professional cybercrime services make
it easier for would-be attackers to become
cybercriminals
• Many cybercriminals don’t need technical abilities
when entering the world of cybercrime
• In many regions, it is socially acceptable to
steal from victims on the Internet
• The line is blurring between state sponsored
attackers and cybercriminals
• Elite teams of attackers that have the same
resources, skills, and patience as state actors
8
and getting worse
• The Urban Institute’s National Center for Charitable Statistics was
the victim of a malicious attack that compromised 600–700
organizations.
• In Muncie, Indiana, a small nonprofit organization called the Little
Red Door had all their data stolen from their server and held
ransom for a whopping $43,000. If the nonprofit paid, the hackers
claimed, they would return the data and not publish it.
Tips to keep your
nonprofit business
safe
Our data has
to be secure.
What does
my modern
business need?
We need to reopen our
business quickly after an
emergency.
40% of businesses
hit by disaster
never reopen
FEMA 2013
60% SMB technology leaders
cited data security or privacy
as a concern
Boston Consulting Group study
Protect and control
your data
Be prepared for the
unexpected
The manageable
side of risk
management.
What my modern business does not need
Step 1
Follow best practices when using
your computer resources
Strengthen your computer’s
defenses
Keep the firewall on (work, home, and public networks)
Install legitimate anti-malware software (http:/aka.ms/wkactd )
Keep software up to date (automatically)
1 statistics noted from Flexera software
1
Get business apps up and running
now
BACK UP – BACK UP – BACK UP
Use a cost-effective disaster recovery to bring back computer
functionality
Use cloud for hosting and/or backup
Replica software, or other similar utilities
1 statistics noted from Flexera software
Step 2
Train your users
on to deal with
malware when
it happens
➢ Train your users to use
malware and phishing
protection in their
browsers.
➢ Keep Antivirus on and
updated
Don’t be tricked into downloading malware
Ctrl F4
Don’t be tricked into downloading malware
Close pop-up messages carefully
Step 3
Protect company
data and
financial assets
Controlling access
Managing mobile devices
Protecting data
Backing up your files
Ready for the unexpected
Solutions for safeguarding your business
Protect company data and financial assets
Encrypt confidential data
Use rights management solutions to handle sensitive data
Train your users to identify scams and fraud
Use HoneyTrap accounts in your domain. Notify on
successful and unsuccessful logins
How to evade scams
Look for telltale signs
Think before you click
Keep sensitive information private
Train employees to identify socially engineered
attacks
www.snopes.com
Step 4
Create strong
passwords
Keep them private
Don’t reuse them
Create strong passwords
Which passwords are strong?
Password1 123456
$wanR!ceRedD00r
qwerty
MsAw3yO!D
SwanRiceRedDoor
My son Aiden was 3 years old in December
DenisW
Strong passwords are not enough
Protect your accounts and passwords
Make passwords strong (still needed)
Keep them private (don’t share among users)
Use unique passwords for different websites
Employees should not use company e-mail accounts as their identifier
(on third-party website)
Defend against checkers
Enable disabling accounts on too many invalid login attempts
Don’t use unsure interfaces (e.g. unprotected POP/IMAP/SMTP)
Monitor for compromised account checkers
Step 5
Guard data and
devices when
you’re on the go
Guard company data when you’re on the go
Connect securely
Save sensitive activities for trusted connections
Confirm the connection
Encrypt storage on mobile devices
Flash drives: watch out for unknowns and disable auto run
Enable features like Work Folders and cloud storage to
manage work data on mobile devices
What to do if there are problems
Have a predefined process and checklist to identify company
identities, data, services, and applications on the device
Report abuse and other problems
Immediately report phishing
Immediately report missing devices or theft of company data
Change all passwords
Wipe mobile phones
bit.ly/2kQygk2
This is the link for our quick
survey and the chance at the
door-prize
bit.ly/2kQygk2
Telephone: 866-995-4488
Email: info@DWPInformationArchitects.com
Website: www.DWPInformationArchitects.com

More Related Content

What's hot

December 2019 Part 10
December 2019 Part 10December 2019 Part 10
December 2019 Part 10
seadeloitte
 
Case Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information SecurityCase Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information Security
PECB
 
June 2017 - Your Biggest Risk Could Be You
June 2017 - Your Biggest Risk Could Be YouJune 2017 - Your Biggest Risk Could Be You
June 2017 - Your Biggest Risk Could Be You
seadeloitte
 
First Union Bank Report
First Union Bank ReportFirst Union Bank Report
First Union Bank Report
Yogesh Kumar
 
140707_Cyber-Security
140707_Cyber-Security140707_Cyber-Security
140707_Cyber-Security
Tara Gravel
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
EY
 

What's hot (20)

Security Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessSecurity Minded - Ransomware Awareness
Security Minded - Ransomware Awareness
 
Shining a Light on Cyber Threats from the Dark Web
Shining a Light on Cyber Threats from the Dark WebShining a Light on Cyber Threats from the Dark Web
Shining a Light on Cyber Threats from the Dark Web
 
December 2019 Part 10
December 2019 Part 10December 2019 Part 10
December 2019 Part 10
 
Cyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to KnowCyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to Know
 
Case Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information SecurityCase Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information Security
 
June 2017 - Your Biggest Risk Could Be You
June 2017 - Your Biggest Risk Could Be YouJune 2017 - Your Biggest Risk Could Be You
June 2017 - Your Biggest Risk Could Be You
 
First Union Bank Report
First Union Bank ReportFirst Union Bank Report
First Union Bank Report
 
Cyber Hygiene
Cyber HygieneCyber Hygiene
Cyber Hygiene
 
140707_Cyber-Security
140707_Cyber-Security140707_Cyber-Security
140707_Cyber-Security
 
Ceh intro
Ceh introCeh intro
Ceh intro
 
Cyber Security Protection
Cyber Security ProtectionCyber Security Protection
Cyber Security Protection
 
Cyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial IndustryCyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial Industry
 
Webinar cybersecurity presentation-6-2018 (final)
Webinar cybersecurity presentation-6-2018 (final)Webinar cybersecurity presentation-6-2018 (final)
Webinar cybersecurity presentation-6-2018 (final)
 
5 Top Cyber Threats That Will Ruin Your Business
5 Top Cyber Threats That Will Ruin Your Business5 Top Cyber Threats That Will Ruin Your Business
5 Top Cyber Threats That Will Ruin Your Business
 
Data security best practices for risk awareness and mitigation
Data security best practices for risk awareness and mitigationData security best practices for risk awareness and mitigation
Data security best practices for risk awareness and mitigation
 
When thieves strike: Executive briefing on SWIFT attacks
When thieves strike: Executive briefing on SWIFT attacksWhen thieves strike: Executive briefing on SWIFT attacks
When thieves strike: Executive briefing on SWIFT attacks
 
PA SB DC Cyber Brief
PA SB DC Cyber Brief PA SB DC Cyber Brief
PA SB DC Cyber Brief
 
The Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice GuideThe Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice Guide
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
 
Why Executives Underinvest In Cybersecurity
Why Executives Underinvest In CybersecurityWhy Executives Underinvest In Cybersecurity
Why Executives Underinvest In Cybersecurity
 

Similar to DWP Cybersecurity 101 for Nonprofits

A data-centric program
A data-centric program A data-centric program
A data-centric program
at MicroFocus Italy ❖✔
 
Introduction to the Current Threat Landscape
Introduction to the Current Threat LandscapeIntroduction to the Current Threat Landscape
Introduction to the Current Threat Landscape
Melbourne IT
 

Similar to DWP Cybersecurity 101 for Nonprofits (20)

Protecting Your Business from Cybercrime - Cybersecurity 101
Protecting Your Business from Cybercrime - Cybersecurity 101Protecting Your Business from Cybercrime - Cybersecurity 101
Protecting Your Business from Cybercrime - Cybersecurity 101
 
Small%20Business%20Presentation.pptx
Small%20Business%20Presentation.pptxSmall%20Business%20Presentation.pptx
Small%20Business%20Presentation.pptx
 
Protecting Your Business From Cybercrime
Protecting Your Business From CybercrimeProtecting Your Business From Cybercrime
Protecting Your Business From Cybercrime
 
nist_small_business_fundamentals_july_2019.pptx
nist_small_business_fundamentals_july_2019.pptxnist_small_business_fundamentals_july_2019.pptx
nist_small_business_fundamentals_july_2019.pptx
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...
 
What Small Business Can Do To Protect Themselves Now in Cybersecurity
What Small Business Can Do To Protect Themselves Now in CybersecurityWhat Small Business Can Do To Protect Themselves Now in Cybersecurity
What Small Business Can Do To Protect Themselves Now in Cybersecurity
 
A data-centric program
A data-centric program A data-centric program
A data-centric program
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Digital Outsourcing: Risks, Pitfalls, and Security Considerations
Digital Outsourcing: Risks, Pitfalls, and Security Considerations Digital Outsourcing: Risks, Pitfalls, and Security Considerations
Digital Outsourcing: Risks, Pitfalls, and Security Considerations
 
Presentation2 [Autosaved].pdf
Presentation2 [Autosaved].pdfPresentation2 [Autosaved].pdf
Presentation2 [Autosaved].pdf
 
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about CybersecurityMark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing business
 
Cyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceCyber Security for the Small Business Experience
Cyber Security for the Small Business Experience
 
Cyber Security and Data Protection
Cyber Security and Data ProtectionCyber Security and Data Protection
Cyber Security and Data Protection
 
I’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextI’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take Next
 
Quantifying Cyber Risk, Insurance and The Value of Personal Data
Quantifying Cyber Risk, Insurance and The Value of Personal DataQuantifying Cyber Risk, Insurance and The Value of Personal Data
Quantifying Cyber Risk, Insurance and The Value of Personal Data
 
Cyber Security for Financial Planners
Cyber Security for Financial PlannersCyber Security for Financial Planners
Cyber Security for Financial Planners
 
Introduction to the Current Threat Landscape
Introduction to the Current Threat LandscapeIntroduction to the Current Threat Landscape
Introduction to the Current Threat Landscape
 
Netwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldNetwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital world
 
Top 6 things_small_businesses_q12015
Top 6 things_small_businesses_q12015Top 6 things_small_businesses_q12015
Top 6 things_small_businesses_q12015
 

More from DWP Information Architects Inc.

More from DWP Information Architects Inc. (19)

DWP-Cybersecurity-2023.pdf
DWP-Cybersecurity-2023.pdfDWP-Cybersecurity-2023.pdf
DWP-Cybersecurity-2023.pdf
 
SCORE Whitepaper: Disaster Impact on Small Business
SCORE Whitepaper: Disaster Impact on Small BusinessSCORE Whitepaper: Disaster Impact on Small Business
SCORE Whitepaper: Disaster Impact on Small Business
 
Microsoft Whitepaper: Running Your Business in the Cloud
Microsoft Whitepaper: Running Your Business in the CloudMicrosoft Whitepaper: Running Your Business in the Cloud
Microsoft Whitepaper: Running Your Business in the Cloud
 
Microsoft Whitepaper: Cloud Computing Guide for Construction
Microsoft Whitepaper: Cloud Computing Guide for ConstructionMicrosoft Whitepaper: Cloud Computing Guide for Construction
Microsoft Whitepaper: Cloud Computing Guide for Construction
 
Microsoft Whitepaper: Disaster Preparedness Guide
Microsoft Whitepaper: Disaster Preparedness GuideMicrosoft Whitepaper: Disaster Preparedness Guide
Microsoft Whitepaper: Disaster Preparedness Guide
 
Microsoft Whitepaper: Cloud Privacy Guide
Microsoft Whitepaper: Cloud Privacy GuideMicrosoft Whitepaper: Cloud Privacy Guide
Microsoft Whitepaper: Cloud Privacy Guide
 
What is the Cloud: and how does it reduce cost by 50%
What is the Cloud: and how does it reduce cost by 50%What is the Cloud: and how does it reduce cost by 50%
What is the Cloud: and how does it reduce cost by 50%
 
Office 365: Why 98% of the Fortune 100 have adopted this tech
Office 365: Why 98% of the Fortune 100 have adopted this techOffice 365: Why 98% of the Fortune 100 have adopted this tech
Office 365: Why 98% of the Fortune 100 have adopted this tech
 
Must Know Cyber Security Stats of 2016
Must Know Cyber Security Stats of 2016Must Know Cyber Security Stats of 2016
Must Know Cyber Security Stats of 2016
 
Modern Workplace: Office 2016
 Modern Workplace: Office 2016 Modern Workplace: Office 2016
Modern Workplace: Office 2016
 
SEO: How to Get More People to Your Website
SEO: How to Get More People to Your WebsiteSEO: How to Get More People to Your Website
SEO: How to Get More People to Your Website
 
Windows 10: Ease-of-use, multiple platforms, and security (plus fun stuff).
Windows 10: Ease-of-use, multiple platforms, and security (plus fun stuff).Windows 10: Ease-of-use, multiple platforms, and security (plus fun stuff).
Windows 10: Ease-of-use, multiple platforms, and security (plus fun stuff).
 
ModernBiz: Business Anywhere
ModernBiz: Business AnywhereModernBiz: Business Anywhere
ModernBiz: Business Anywhere
 
Small Business Technology Trends: And They Are All Cloud
Small Business Technology Trends: And They Are All CloudSmall Business Technology Trends: And They Are All Cloud
Small Business Technology Trends: And They Are All Cloud
 
ModernBiz CRM
ModernBiz CRMModernBiz CRM
ModernBiz CRM
 
SEO and SEM
SEO and SEMSEO and SEM
SEO and SEM
 
Safeguard Your Business
Safeguard Your BusinessSafeguard Your Business
Safeguard Your Business
 
Connect With Customers: and Office 2013 Tips and Tricks
Connect With Customers: and Office 2013 Tips and TricksConnect With Customers: and Office 2013 Tips and Tricks
Connect With Customers: and Office 2013 Tips and Tricks
 
Continuum / Channelnomics Webcast
Continuum / Channelnomics WebcastContinuum / Channelnomics Webcast
Continuum / Channelnomics Webcast
 

Recently uploaded

Call Girls in Sarita Vihar Delhi Just Call 👉👉7065000506 Independent Female Es...
Call Girls in Sarita Vihar Delhi Just Call 👉👉7065000506 Independent Female Es...Call Girls in Sarita Vihar Delhi Just Call 👉👉7065000506 Independent Female Es...
Call Girls in Sarita Vihar Delhi Just Call 👉👉7065000506 Independent Female Es...
Inaayaeventcompany
 

Recently uploaded (20)

Fun all Day Call Girls in Erode { 9332606886 } VVIP NISHA Call Girls Near 5 S...
Fun all Day Call Girls in Erode { 9332606886 } VVIP NISHA Call Girls Near 5 S...Fun all Day Call Girls in Erode { 9332606886 } VVIP NISHA Call Girls Near 5 S...
Fun all Day Call Girls in Erode { 9332606886 } VVIP NISHA Call Girls Near 5 S...
 
An Atoll Futures Research Institute? Presentation for CANCC
An Atoll Futures Research Institute? Presentation for CANCCAn Atoll Futures Research Institute? Presentation for CANCC
An Atoll Futures Research Institute? Presentation for CANCC
 
Delivery in 20 Mins Call Girls Malappuram { 9332606886 } VVIP NISHA Call Girl...
Delivery in 20 Mins Call Girls Malappuram { 9332606886 } VVIP NISHA Call Girl...Delivery in 20 Mins Call Girls Malappuram { 9332606886 } VVIP NISHA Call Girl...
Delivery in 20 Mins Call Girls Malappuram { 9332606886 } VVIP NISHA Call Girl...
 
Our nurses, our future. The economic power of care.
Our nurses, our future. The economic power of care.Our nurses, our future. The economic power of care.
Our nurses, our future. The economic power of care.
 
The Outlook for the Budget and the Economy
The Outlook for the Budget and the EconomyThe Outlook for the Budget and the Economy
The Outlook for the Budget and the Economy
 
AHMR volume 10 number 1 January-April 2024
AHMR volume 10 number 1 January-April 2024AHMR volume 10 number 1 January-April 2024
AHMR volume 10 number 1 January-April 2024
 
Lorain Road Business District Revitalization Plan Final Presentation
Lorain Road Business District Revitalization Plan Final PresentationLorain Road Business District Revitalization Plan Final Presentation
Lorain Road Business District Revitalization Plan Final Presentation
 
Just Call VIP Call Girls In Bangalore Kr Puram ☎️ 6378878445 Independent Fem...
Just Call VIP Call Girls In  Bangalore Kr Puram ☎️ 6378878445 Independent Fem...Just Call VIP Call Girls In  Bangalore Kr Puram ☎️ 6378878445 Independent Fem...
Just Call VIP Call Girls In Bangalore Kr Puram ☎️ 6378878445 Independent Fem...
 
Finance strategies for adaptation. Presentation for CANCC
Finance strategies for adaptation. Presentation for CANCCFinance strategies for adaptation. Presentation for CANCC
Finance strategies for adaptation. Presentation for CANCC
 
Call Girl Service in West Tripura 9332606886Call Girls Advance Cash On Deliv...
Call Girl Service in West Tripura  9332606886Call Girls Advance Cash On Deliv...Call Girl Service in West Tripura  9332606886Call Girls Advance Cash On Deliv...
Call Girl Service in West Tripura 9332606886Call Girls Advance Cash On Deliv...
 
Coastal Protection Measures in Hulhumale'
Coastal Protection Measures in Hulhumale'Coastal Protection Measures in Hulhumale'
Coastal Protection Measures in Hulhumale'
 
Scaling up coastal adaptation in Maldives through the NAP process
Scaling up coastal adaptation in Maldives through the NAP processScaling up coastal adaptation in Maldives through the NAP process
Scaling up coastal adaptation in Maldives through the NAP process
 
PPT Item # 7&8 6900 Broadway P&Z Case # 438
PPT Item # 7&8 6900 Broadway P&Z Case # 438PPT Item # 7&8 6900 Broadway P&Z Case # 438
PPT Item # 7&8 6900 Broadway P&Z Case # 438
 
2024 UN Civil Society Conference in Support of the Summit of the Future.
2024 UN Civil Society Conference in Support of the Summit of the Future.2024 UN Civil Society Conference in Support of the Summit of the Future.
2024 UN Civil Society Conference in Support of the Summit of the Future.
 
Call Girl Service in Korba 9332606886 High Profile Call Girls You Can Get ...
Call Girl Service in Korba   9332606886  High Profile Call Girls You Can Get ...Call Girl Service in Korba   9332606886  High Profile Call Girls You Can Get ...
Call Girl Service in Korba 9332606886 High Profile Call Girls You Can Get ...
 
Call Girls in Sarita Vihar Delhi Just Call 👉👉7065000506 Independent Female Es...
Call Girls in Sarita Vihar Delhi Just Call 👉👉7065000506 Independent Female Es...Call Girls in Sarita Vihar Delhi Just Call 👉👉7065000506 Independent Female Es...
Call Girls in Sarita Vihar Delhi Just Call 👉👉7065000506 Independent Female Es...
 
Managing large-scale outbreaks at Farrow-to-Weaner Farms
Managing large-scale outbreaks at Farrow-to-Weaner FarmsManaging large-scale outbreaks at Farrow-to-Weaner Farms
Managing large-scale outbreaks at Farrow-to-Weaner Farms
 
Call Girls Koregaon Park - 8250092165 Our call girls are sure to provide you ...
Call Girls Koregaon Park - 8250092165 Our call girls are sure to provide you ...Call Girls Koregaon Park - 8250092165 Our call girls are sure to provide you ...
Call Girls Koregaon Park - 8250092165 Our call girls are sure to provide you ...
 
Time, Stress & Work Life Balance for Clerks with Beckie Whitehouse
Time, Stress & Work Life Balance for Clerks with Beckie WhitehouseTime, Stress & Work Life Balance for Clerks with Beckie Whitehouse
Time, Stress & Work Life Balance for Clerks with Beckie Whitehouse
 
BioandPicforRepKendrick_LastUpdatedMay2024
BioandPicforRepKendrick_LastUpdatedMay2024BioandPicforRepKendrick_LastUpdatedMay2024
BioandPicforRepKendrick_LastUpdatedMay2024
 

DWP Cybersecurity 101 for Nonprofits

  • 1.
  • 2. Who the Heck is Denis Wilson and Why Should I Listen to Him? “I am a veteran technology strategist who specializes in developing highly-effective and rock-solid computing systems for small businesses.” ▪ Worked with Microsoft and their partners for over 20 years ▪ Certified by Microsoft on cloud computing and small business ▪ Very knowledgeable in vertical markets like healthcare, finance and insurance, legal and CPA firms, construction and engineering, manufacturing, and nonprofit ▪ Experienced in compliance environment like HIPAA and FINRA. ▪ Author and speaker on the subject of SMB technology for SCORE, SBDCs, EDCs, WBCs, SBA, and a variety of business associations
  • 3. Slide Deck Availability Available at: Slide Share: http://www.slideshare.net/dwpia/ I also have over 15 presentations that are posted at the same location for your perusal. Ask me to connect with you on Facebook, LinkedIn or Twitter if you would like to get my blog posts, and curated posts on small business technology and processes.
  • 4. • Overview of Cybercrime • IssuesThat NonprofitsHave Had • Tips to Protect Your SmallNonprofit
  • 5. 93 percent of all money is digital. That’s what is at risk here. –Bill Nelson Bill Nelson, Financial Services Information Sharing & Analysis Center What is cybercrime? Cybercrime is criminal activity involving the internet, a computer system, or computer technology. http://news.microsoft.com/stories/cybercrime/index.html
  • 6. Cybercrime activity is the highest, ever Cybercrime is a big global business • The cybercrime industry has evolved with the PC/computer/mobile device ecosystem • Today, cybercrime is more organized and motivated than at any time in history Insights about one group of three Blackhats indicted in 2018 • Stole information on 100 million people • Breached 12 companies, including • Concealed at least $100 million in Swiss and other accounts • Hackers and conspirators were in more than a dozen countries • One of the indicted had hundreds of employees http://www.bloomberg.com/news/articles/2018-11-10/hackers-accused-by-u-s-of-targeting-top-banks-mutual-funds
  • 7. The bad actors are not a monolithic group Tools, techniques, motivations, and business models vary by cybercriminal region Non-Professional • Non-professional cybercriminals • Use crime kits to make spending money • Little to no business or technical expertise • Even though they are not professional, their impact can be significant Blackhats • Treatcybercrime asa business • Businessandtechnical expertise • Oftenworkinaclosed groupofother professional cybercriminals • Criminalreputationis everything Grayhats • Theybelievetheyare offeringlegitimate services. However,their customerscanbeboth “legitimate”orcriminal • Ranasabusiness Hactivists • Individualsorgroups whohackforasocial cause,without economicmotivation • Havebothtechnical peopleandfollowers State Sponsored • Nationalsecurityand/or economicmotivation • Technicalexpertise • Work inaclosedgroupof otherprofessionals • OftenuseBlackhat resourcesand/or techniquestomasktheir identity Some elite Blackhats, some elite hactivists, and most state sponsored actors use “APT” techniques Often defenders treat all bad actors the same
  • 8. The cybercrime problem is broad • More professional cybercrime services make it easier for would-be attackers to become cybercriminals • Many cybercriminals don’t need technical abilities when entering the world of cybercrime • In many regions, it is socially acceptable to steal from victims on the Internet • The line is blurring between state sponsored attackers and cybercriminals • Elite teams of attackers that have the same resources, skills, and patience as state actors 8 and getting worse
  • 9.
  • 10. • The Urban Institute’s National Center for Charitable Statistics was the victim of a malicious attack that compromised 600–700 organizations. • In Muncie, Indiana, a small nonprofit organization called the Little Red Door had all their data stolen from their server and held ransom for a whopping $43,000. If the nonprofit paid, the hackers claimed, they would return the data and not publish it.
  • 11.
  • 12.
  • 13. Tips to keep your nonprofit business safe
  • 14. Our data has to be secure. What does my modern business need? We need to reopen our business quickly after an emergency. 40% of businesses hit by disaster never reopen FEMA 2013 60% SMB technology leaders cited data security or privacy as a concern Boston Consulting Group study
  • 15. Protect and control your data Be prepared for the unexpected The manageable side of risk management.
  • 16. What my modern business does not need
  • 17. Step 1 Follow best practices when using your computer resources
  • 18. Strengthen your computer’s defenses Keep the firewall on (work, home, and public networks) Install legitimate anti-malware software (http:/aka.ms/wkactd ) Keep software up to date (automatically) 1 statistics noted from Flexera software 1
  • 19. Get business apps up and running now BACK UP – BACK UP – BACK UP Use a cost-effective disaster recovery to bring back computer functionality Use cloud for hosting and/or backup Replica software, or other similar utilities 1 statistics noted from Flexera software
  • 20. Step 2 Train your users on to deal with malware when it happens
  • 21. ➢ Train your users to use malware and phishing protection in their browsers. ➢ Keep Antivirus on and updated Don’t be tricked into downloading malware
  • 22. Ctrl F4 Don’t be tricked into downloading malware Close pop-up messages carefully
  • 23. Step 3 Protect company data and financial assets
  • 24. Controlling access Managing mobile devices Protecting data Backing up your files Ready for the unexpected Solutions for safeguarding your business
  • 25. Protect company data and financial assets Encrypt confidential data Use rights management solutions to handle sensitive data Train your users to identify scams and fraud Use HoneyTrap accounts in your domain. Notify on successful and unsuccessful logins
  • 26. How to evade scams Look for telltale signs Think before you click Keep sensitive information private Train employees to identify socially engineered attacks www.snopes.com
  • 27. Step 4 Create strong passwords Keep them private Don’t reuse them
  • 28. Create strong passwords Which passwords are strong? Password1 123456 $wanR!ceRedD00r qwerty MsAw3yO!D SwanRiceRedDoor My son Aiden was 3 years old in December DenisW
  • 29. Strong passwords are not enough Protect your accounts and passwords Make passwords strong (still needed) Keep them private (don’t share among users) Use unique passwords for different websites Employees should not use company e-mail accounts as their identifier (on third-party website) Defend against checkers Enable disabling accounts on too many invalid login attempts Don’t use unsure interfaces (e.g. unprotected POP/IMAP/SMTP) Monitor for compromised account checkers
  • 30. Step 5 Guard data and devices when you’re on the go
  • 31. Guard company data when you’re on the go Connect securely Save sensitive activities for trusted connections Confirm the connection Encrypt storage on mobile devices Flash drives: watch out for unknowns and disable auto run Enable features like Work Folders and cloud storage to manage work data on mobile devices
  • 32. What to do if there are problems Have a predefined process and checklist to identify company identities, data, services, and applications on the device Report abuse and other problems Immediately report phishing Immediately report missing devices or theft of company data Change all passwords Wipe mobile phones
  • 33. bit.ly/2kQygk2 This is the link for our quick survey and the chance at the door-prize