SlideShare a Scribd company logo
1 of 12
Because IT support does not equal Data Security
Small businesses in the US are losing $2 Million per WEEK to cyber crime – FBI Estimate Cyber crime take in 2009 a TRILLION dollars.  Bigger than combined sales of Walmart, Exxon and GE. – MacAfee Estimate
Common Misconceptions
I’m safe, I have Antivirus software. AV software only catches between 25% and 40% of Malware. Most of the products take an average of nearly two days to detect the latest threats. - NSS Labs
I only go to trusted web sites. Like these?  All of which have been compromised at one time or another. Anthem Blue Cross Facebook BusinessWeek Wal-Mart US Army US Postal Service Bank of India Fox Sports NASA Bill O’Reilly PBS Daily Telegraph Twitter Microsoft Hotmail Sarah Palin US Treasury Aetna World of Warcraft Apple iTunes Durham Police City of Denver Kaspersky Security Monster Godaddy Dolphin Stadium
I don’t have anything worth stealing.  I only open email from people I know. Man suspected of hacking computers arrested on Federal charges related to demands for sexually explicit videos from women and teenage girls while posing as their boyfriend on-line. Man indicted for hacking into neighbor’s wireless internet system and posing as the neighbor to email child pornography and threats to the Vice President.
Fake AV Warning that looks VERY real.
U.S. indicts Ohio man and two foreign residents in alleged Ukraine-Based "Scareware" fraud scheme that caused $100 million in losses to internet victims worldwide
Houston computer administrator sentenced to 12 Months in prison for hacking former employer’s computer network  Guess they should have changed the password.  What’s your terminated employee policy? Woman pleads guilty to hacking email accounts and deleting documents in domestic relations dispute.  Another password problem. Man arrested and charged with operating international online "Phishing" scheme to steal Income Tax Refunds.  What’s your phishing protection strategy? Mid-Sized bank compromised through job interview process.  How much information do you divulge in a supposed job interview?
I already have an IT provider  They are typically NOT security specialists. Keeping your network running is their priority, not keeping you safe. Self audit is usually NOT a good idea.
Things you can do: Keep your Operating System Patched.  Auto-Update isn’t enough. Keep your applications up-to-date.  Especially those used to deal with electronic content such as Adobe Reader, Java, your browser and any streaming media players. Limit the content you allow on your network. Teach your employees to be a little skeptical. Don’t browse the Internet with Administrative Rights.
What to do if you suspect trouble…. Pull the plug and call for help!

More Related Content

What's hot

Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-wowwFloroRaphaell
 
Email crime ppt
Email crime pptEmail crime ppt
Email crime pptOnkar1431
 
Symantec Report On Rogue Security Software
Symantec Report On Rogue Security SoftwareSymantec Report On Rogue Security Software
Symantec Report On Rogue Security SoftwareSymantec
 
Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)rayarren06
 
Cybercrime: A Primer
Cybercrime:  A PrimerCybercrime:  A Primer
Cybercrime: A Primerfwscholl
 
Cybercrime
CybercrimeCybercrime
CybercrimeKomal003
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for LawyersMark Lanterman
 
A Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comBusiness.com
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-wowwFloroRaphaell
 
Top Cyber Threats of 2009
Top Cyber Threats of 2009Top Cyber Threats of 2009
Top Cyber Threats of 2009Symantec
 

What's hot (18)

Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-woww
 
Malware
MalwareMalware
Malware
 
Email crime ppt
Email crime pptEmail crime ppt
Email crime ppt
 
Phishing
PhishingPhishing
Phishing
 
Symantec Report On Rogue Security Software
Symantec Report On Rogue Security SoftwareSymantec Report On Rogue Security Software
Symantec Report On Rogue Security Software
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)
 
Cybercrime: A Primer
Cybercrime:  A PrimerCybercrime:  A Primer
Cybercrime: A Primer
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
 
Phishing and hacking
Phishing and hackingPhishing and hacking
Phishing and hacking
 
A Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.com
 
Cyber crimes & cyber security
Cyber crimes & cyber securityCyber crimes & cyber security
Cyber crimes & cyber security
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-woww
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Phishing attack till now
Phishing attack till nowPhishing attack till now
Phishing attack till now
 
Phishing & Pharming
Phishing & PharmingPhishing & Pharming
Phishing & Pharming
 
Top Cyber Threats of 2009
Top Cyber Threats of 2009Top Cyber Threats of 2009
Top Cyber Threats of 2009
 

Viewers also liked

What Are My Risks
What Are My RisksWhat Are My Risks
What Are My Risksrothl
 
Projetos Mundiais de Internet da IASD - John Beckett, Fórum Web Adventista
Projetos Mundiais de Internet da IASD - John Beckett, Fórum Web AdventistaProjetos Mundiais de Internet da IASD - John Beckett, Fórum Web Adventista
Projetos Mundiais de Internet da IASD - John Beckett, Fórum Web AdventistaIgreja Adventista do Sétimo Dia
 
Challenge2 v2
Challenge2 v2Challenge2 v2
Challenge2 v2WeDecide
 
What Are My Risks
What Are My RisksWhat Are My Risks
What Are My Risksrothl
 
Lenox Advisors Personal CFO brochure
Lenox Advisors Personal CFO brochureLenox Advisors Personal CFO brochure
Lenox Advisors Personal CFO brochurerburger69
 
UX Design em 7 Passos - Daniel Werle, Fórum Web Adventista
UX Design em 7 Passos - Daniel Werle, Fórum Web AdventistaUX Design em 7 Passos - Daniel Werle, Fórum Web Adventista
UX Design em 7 Passos - Daniel Werle, Fórum Web AdventistaIgreja Adventista do Sétimo Dia
 

Viewers also liked (17)

What Are My Risks
What Are My RisksWhat Are My Risks
What Are My Risks
 
The Cristian trust - Joanne Davies- SAC/GAIN 2014
 The Cristian trust - Joanne Davies- SAC/GAIN 2014 The Cristian trust - Joanne Davies- SAC/GAIN 2014
The Cristian trust - Joanne Davies- SAC/GAIN 2014
 
Relaciones Públicas - Susana Cayrus - SAC/GAIN 2014
 Relaciones Públicas - Susana Cayrus - SAC/GAIN 2014 Relaciones Públicas - Susana Cayrus - SAC/GAIN 2014
Relaciones Públicas - Susana Cayrus - SAC/GAIN 2014
 
Heroes game - SAC/GAIN 2014
Heroes game - SAC/GAIN 2014Heroes game - SAC/GAIN 2014
Heroes game - SAC/GAIN 2014
 
Violencia Infantil 2
Violencia Infantil 2Violencia Infantil 2
Violencia Infantil 2
 
O PG e o Plantio de Igrejas
O PG e o Plantio de IgrejasO PG e o Plantio de Igrejas
O PG e o Plantio de Igrejas
 
Projetos Mundiais de Internet da IASD - John Beckett, Fórum Web Adventista
Projetos Mundiais de Internet da IASD - John Beckett, Fórum Web AdventistaProjetos Mundiais de Internet da IASD - John Beckett, Fórum Web Adventista
Projetos Mundiais de Internet da IASD - John Beckett, Fórum Web Adventista
 
Violencia - Internet
Violencia - InternetViolencia - Internet
Violencia - Internet
 
Palestra Inovaçào - Pablo Sánchez - SAC/GAIN 2014
Palestra Inovaçào - Pablo Sánchez - SAC/GAIN 2014Palestra Inovaçào - Pablo Sánchez - SAC/GAIN 2014
Palestra Inovaçào - Pablo Sánchez - SAC/GAIN 2014
 
Challenge2 v2
Challenge2 v2Challenge2 v2
Challenge2 v2
 
Violencia Infantil 1
Violencia Infantil 1Violencia Infantil 1
Violencia Infantil 1
 
What Are My Risks
What Are My RisksWhat Are My Risks
What Are My Risks
 
O pg e o plantio de igrejas
O pg e o plantio de igrejasO pg e o plantio de igrejas
O pg e o plantio de igrejas
 
Plantando igrejas
Plantando igrejasPlantando igrejas
Plantando igrejas
 
Tema 2 Colapso del imperio
Tema 2 Colapso del imperioTema 2 Colapso del imperio
Tema 2 Colapso del imperio
 
Lenox Advisors Personal CFO brochure
Lenox Advisors Personal CFO brochureLenox Advisors Personal CFO brochure
Lenox Advisors Personal CFO brochure
 
UX Design em 7 Passos - Daniel Werle, Fórum Web Adventista
UX Design em 7 Passos - Daniel Werle, Fórum Web AdventistaUX Design em 7 Passos - Daniel Werle, Fórum Web Adventista
UX Design em 7 Passos - Daniel Werle, Fórum Web Adventista
 

Similar to What Are My Risks

Cyber Security Incident Response Planning
Cyber Security Incident Response PlanningCyber Security Incident Response Planning
Cyber Security Incident Response PlanningPECB
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crimehomeworkping4
 
Driving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your EnemyDriving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your EnemyFirst Atlantic Commerce
 
100812 internet security2.0
100812 internet security2.0100812 internet security2.0
100812 internet security2.0dkp205
 
ACEDS-ACFCS Cybersecurity Webcast
ACEDS-ACFCS Cybersecurity WebcastACEDS-ACFCS Cybersecurity Webcast
ACEDS-ACFCS Cybersecurity WebcastLogikcull.com
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityMd Nishad
 
FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International Scott Mills
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case StudyPratham Jaiswal
 
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia LunaAviva Spectrum™
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfKALPITKALPIT1
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptBushra22
 
Protecting Your Law Office Against Data Breaches and Other Cyber Threats
Protecting Your Law Office Against Data Breaches and Other Cyber ThreatsProtecting Your Law Office Against Data Breaches and Other Cyber Threats
Protecting Your Law Office Against Data Breaches and Other Cyber ThreatsBlake A. Klinkner
 
Year of pawnage - Ian trump
Year of pawnage  - Ian trumpYear of pawnage  - Ian trump
Year of pawnage - Ian trumpMAXfocus
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself OnlineGary Wagnon
 
Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018Ronak Jain
 
Cyber crime: A Quick Survey
Cyber crime: A Quick SurveyCyber crime: A Quick Survey
Cyber crime: A Quick SurveyArindam Sarkar
 
eCrime Conference March 2006
eCrime Conference March 2006eCrime Conference March 2006
eCrime Conference March 2006Alan Mather
 

Similar to What Are My Risks (20)

Cyber Security Incident Response Planning
Cyber Security Incident Response PlanningCyber Security Incident Response Planning
Cyber Security Incident Response Planning
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Driving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your EnemyDriving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your Enemy
 
100812 internet security2.0
100812 internet security2.0100812 internet security2.0
100812 internet security2.0
 
ACEDS-ACFCS Cybersecurity Webcast
ACEDS-ACFCS Cybersecurity WebcastACEDS-ACFCS Cybersecurity Webcast
ACEDS-ACFCS Cybersecurity Webcast
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case Study
 
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber security
Cyber securityCyber security
Cyber security
 
Protecting Your Law Office Against Data Breaches and Other Cyber Threats
Protecting Your Law Office Against Data Breaches and Other Cyber ThreatsProtecting Your Law Office Against Data Breaches and Other Cyber Threats
Protecting Your Law Office Against Data Breaches and Other Cyber Threats
 
Year of pawnage - Ian trump
Year of pawnage  - Ian trumpYear of pawnage  - Ian trump
Year of pawnage - Ian trump
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself Online
 
Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018
 
Cyber crime: A Quick Survey
Cyber crime: A Quick SurveyCyber crime: A Quick Survey
Cyber crime: A Quick Survey
 
eCrime Conference March 2006
eCrime Conference March 2006eCrime Conference March 2006
eCrime Conference March 2006
 

What Are My Risks

  • 1. Because IT support does not equal Data Security
  • 2. Small businesses in the US are losing $2 Million per WEEK to cyber crime – FBI Estimate Cyber crime take in 2009 a TRILLION dollars. Bigger than combined sales of Walmart, Exxon and GE. – MacAfee Estimate
  • 4. I’m safe, I have Antivirus software. AV software only catches between 25% and 40% of Malware. Most of the products take an average of nearly two days to detect the latest threats. - NSS Labs
  • 5. I only go to trusted web sites. Like these? All of which have been compromised at one time or another. Anthem Blue Cross Facebook BusinessWeek Wal-Mart US Army US Postal Service Bank of India Fox Sports NASA Bill O’Reilly PBS Daily Telegraph Twitter Microsoft Hotmail Sarah Palin US Treasury Aetna World of Warcraft Apple iTunes Durham Police City of Denver Kaspersky Security Monster Godaddy Dolphin Stadium
  • 6. I don’t have anything worth stealing. I only open email from people I know. Man suspected of hacking computers arrested on Federal charges related to demands for sexually explicit videos from women and teenage girls while posing as their boyfriend on-line. Man indicted for hacking into neighbor’s wireless internet system and posing as the neighbor to email child pornography and threats to the Vice President.
  • 7. Fake AV Warning that looks VERY real.
  • 8. U.S. indicts Ohio man and two foreign residents in alleged Ukraine-Based "Scareware" fraud scheme that caused $100 million in losses to internet victims worldwide
  • 9. Houston computer administrator sentenced to 12 Months in prison for hacking former employer’s computer network Guess they should have changed the password. What’s your terminated employee policy? Woman pleads guilty to hacking email accounts and deleting documents in domestic relations dispute. Another password problem. Man arrested and charged with operating international online "Phishing" scheme to steal Income Tax Refunds. What’s your phishing protection strategy? Mid-Sized bank compromised through job interview process. How much information do you divulge in a supposed job interview?
  • 10. I already have an IT provider They are typically NOT security specialists. Keeping your network running is their priority, not keeping you safe. Self audit is usually NOT a good idea.
  • 11. Things you can do: Keep your Operating System Patched. Auto-Update isn’t enough. Keep your applications up-to-date. Especially those used to deal with electronic content such as Adobe Reader, Java, your browser and any streaming media players. Limit the content you allow on your network. Teach your employees to be a little skeptical. Don’t browse the Internet with Administrative Rights.
  • 12. What to do if you suspect trouble…. Pull the plug and call for help!