SlideShare a Scribd company logo
© 2018 WSI. All rights reserved.
Your Business Can’t Afford to Ignore
5 Cybersecurity
Threats
2
© 2018 WSI. All rights reserved.
3
© 2018 WSI. All rights reserved.
1. Everyone Is A Potential Cybercrime
Victim (Yes, You Too)
2. Once The Bad Guys Get Your Stuff,
There’s No Getting It Back
3. Failing to Use Two-Factor
Authentication Can Put You At Risk
4. Cyber Criminals Prey on Weak
Passwords
5. Letting Your Guard Down on Social
Media
5 Cybersecurity Threats
4
© 2018 WSI. All rights reserved.
"Cybersecurity costs will reach 1
trillion dollars in five years - and it
still won't be nearly enough to stop
the bad guys!"
The Unfortunate Reality
- Scott Augenbaum, Retired FBI Special Agent, Cybercrime Division
5
© 2018 WSI. All rights reserved.
Everyone Is A Potential Cybercrime Victim
(Yes, You Too)
Misconception
“It will never happen to me, I have nothing of
value.”
“We have security measures in place, we’re
safe.”
“We have much bigger competitors. They’ll
get targeted, not us.”
Reality
Everyone has sensitive information they need
to safeguard.
Everyone uses common technologies that
exist outside of basic protection (e.g. email,
social media)
Whether you’re an individual with five pieces
of information or a global corporation with 50
million, you’re a potential cybercrime victim.
6
© 2018 WSI. All rights reserved.
Once the Bad Guys Get Your Stuff,
There’s No Getting it Back
• This isn’t like getting your car stolen
– There’s no insurance policy to
recover your losses
• Important to be proactive, not
reactive
• Businesses have an obligation to
protect their the online accounts of
their customers
• A cybersecurity breach isn’t a
mistake, it’s a failure that couple
have been avoided
7
© 2018 WSI. All rights reserved.
Failing to Use Two-Factor Authentication
Can Put You At Risk
• Two-factor authentication is a method or technology that confirms a user’s identity
by any combination of two different factors:
– Something they know (usually a password)
– Something they have (a text message sent to their phone)
– Or, something they are (voice or fingerprint).
• 85% of all data breaches could be prevented using
two-factor authentication
8
© 2018 WSI. All rights reserved.
Cybercriminals Prey on Weak Passwords
• 70% of people use the same password for multiple
accounts
• Reduce the chance of a cyberattack by using:
– Two-factor authentication + strong passwords
• Our recommendations:
– Have separate passwords for mission-critical accounts
– Don’t use week passwords for anything
– Come up with a password creation system and USE it
– Or, find a password management tool with two-factor
authentication
9
© 2018 WSI. All rights reserved.
• Passwords should include:
– 12 characters in length
– Both uppercase and
lowercase letters
– Special character and a
number
– Personal passphrases
• A phrase that has personal
meaning that you can
remember
Criteria for a Strong Password Creation System
Example of a strong password system:
#9ILFbtlCC9#
Special character
and number
Special character
and number
Personal passphrase
I love fall because the leaves change color
10
© 2018 WSI. All rights reserved.
Letting Your Guard Down on Social Media
• Still a lack of concern for security on social media
• Many of us often use social information to login to
third party accounts and apps
• For cybercriminals, social media is the gateway to
your more personal information
– Some people use similar passwords for social accounts
as other mission critical accounts (e.g. bank accounts)
– Can learn a lot about your personal details (e.g. job,
address) but trolling someone’s social media accounts
11
© 2018 WSI. All rights reserved.
DO’S
• Use service providers that offer two-
factor authentication
• Use our password creation system to
generate mission-critical passwords.
• Use different passwords for mission-
critical accounts
• Use different passwords for as many of
your accounts as possible
• Think before you click, no matter what
you’re doing online
• Protect yourself on social media
DON’TS
• Never believe that it can’t happen to you
– it can and it will
• Don’t assume the FBI, or anybody else,
can get your stuff back
• Never use a service provider unless they
offer two-factor authentication
• Don’t use the same password for mission-
critical accounts
• Don’t get complacent about your
cybersecurity
• Don’t let your guard down on social
media
Cybersecurity Do’s & Don’ts
12
© 2018 WSI. All rights reserved.
Please Don’t Ignore Your Cybersecurity
• Here are three takeaways I’d like you to remember:
#1 - Think before you act. Think before you click. You are your own
firewall, so question everything, and if you aren’t sure, don’t click.
#2 - Don’t do business with people or companies that don’t use
two-factor authentication. Period. No exceptions.
#3 - Use strong passwords, and don’t use the same password for
two different mission-critical accounts.
13
© 2018 WSI. All rights reserved.
Want to improve your
cybersecurity?
Request a copy of WSI’s
Cybersecurity eBook
We help ideas realize their potential by leveraging the
Internet & its many unrecognized opportunities.
© 2017 WSI. All rights reserved.

More Related Content

What's hot

Cyber attack
Cyber attackCyber attack
Cyber attack
Avinash Navin
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial Intelligence
Inderjeet Singh
 
Health Information Privacy and Security (October 21, 2020)
Health Information Privacy and Security (October 21, 2020)Health Information Privacy and Security (October 21, 2020)
Health Information Privacy and Security (October 21, 2020)
Nawanan Theera-Ampornpunt
 
A Comedy of Errors in Web Application Security
A Comedy of Errors in Web Application SecurityA Comedy of Errors in Web Application Security
A Comedy of Errors in Web Application Security
Rob Dudley
 
Artificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityArtificial Intelligence and Cybersecurity
Artificial Intelligence and Cybersecurity
Olivier Busolini
 
Cyberattacks the-next-healthcare-epidemic
Cyberattacks the-next-healthcare-epidemicCyberattacks the-next-healthcare-epidemic
Cyberattacks the-next-healthcare-epidemic
Kate Barney
 
Ict H A C K I N G
Ict    H A C K I N GIct    H A C K I N G
Ict H A C K I N G
Hafizra Mas
 
Presentation: True Stories from the Threat Hunting Files
Presentation: True Stories from the Threat Hunting FilesPresentation: True Stories from the Threat Hunting Files
Presentation: True Stories from the Threat Hunting Files
DomainTools
 
Cyber and Data Risks
Cyber and Data RisksCyber and Data Risks
Cyber and Data Risks
risksmith
 
Cybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive MeasuresCybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive Measures
Aditya Ratnaparkhi
 
Whitepaper Avira about Artificial Intelligence to cyber security
Whitepaper Avira  about Artificial Intelligence to cyber securityWhitepaper Avira  about Artificial Intelligence to cyber security
Whitepaper Avira about Artificial Intelligence to cyber security
GopiRajan4
 
Cybersecurity & Data Protection: Thinking About Risk & Compliance
Cybersecurity & Data Protection: Thinking About Risk & ComplianceCybersecurity & Data Protection: Thinking About Risk & Compliance
Cybersecurity & Data Protection: Thinking About Risk & Compliance
Shawn Tuma
 
Expert FSO Insider Threat Awareness
Expert FSO Insider Threat AwarenessExpert FSO Insider Threat Awareness
Expert FSO Insider Threat Awareness
Eric Schiowitz
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
JoshuaWisniewski3
 
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Black Duck by Synopsys
 
Information security
Information securityInformation security
Information security
Varshil Patel
 
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Netpluz Asia Pte Ltd
 
Ethical Hacking & IT Security Courses in SIFS
Ethical Hacking & IT Security Courses in SIFSEthical Hacking & IT Security Courses in SIFS
Ethical Hacking & IT Security Courses in SIFS
Sifs India
 
Cyber Security: The Strategic View
Cyber Security: The Strategic ViewCyber Security: The Strategic View
Cyber Security: The Strategic View
Cisco Canada
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness Infographics
NetLockSmith
 

What's hot (20)

Cyber attack
Cyber attackCyber attack
Cyber attack
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial Intelligence
 
Health Information Privacy and Security (October 21, 2020)
Health Information Privacy and Security (October 21, 2020)Health Information Privacy and Security (October 21, 2020)
Health Information Privacy and Security (October 21, 2020)
 
A Comedy of Errors in Web Application Security
A Comedy of Errors in Web Application SecurityA Comedy of Errors in Web Application Security
A Comedy of Errors in Web Application Security
 
Artificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityArtificial Intelligence and Cybersecurity
Artificial Intelligence and Cybersecurity
 
Cyberattacks the-next-healthcare-epidemic
Cyberattacks the-next-healthcare-epidemicCyberattacks the-next-healthcare-epidemic
Cyberattacks the-next-healthcare-epidemic
 
Ict H A C K I N G
Ict    H A C K I N GIct    H A C K I N G
Ict H A C K I N G
 
Presentation: True Stories from the Threat Hunting Files
Presentation: True Stories from the Threat Hunting FilesPresentation: True Stories from the Threat Hunting Files
Presentation: True Stories from the Threat Hunting Files
 
Cyber and Data Risks
Cyber and Data RisksCyber and Data Risks
Cyber and Data Risks
 
Cybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive MeasuresCybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive Measures
 
Whitepaper Avira about Artificial Intelligence to cyber security
Whitepaper Avira  about Artificial Intelligence to cyber securityWhitepaper Avira  about Artificial Intelligence to cyber security
Whitepaper Avira about Artificial Intelligence to cyber security
 
Cybersecurity & Data Protection: Thinking About Risk & Compliance
Cybersecurity & Data Protection: Thinking About Risk & ComplianceCybersecurity & Data Protection: Thinking About Risk & Compliance
Cybersecurity & Data Protection: Thinking About Risk & Compliance
 
Expert FSO Insider Threat Awareness
Expert FSO Insider Threat AwarenessExpert FSO Insider Threat Awareness
Expert FSO Insider Threat Awareness
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
 
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
 
Information security
Information securityInformation security
Information security
 
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
 
Ethical Hacking & IT Security Courses in SIFS
Ethical Hacking & IT Security Courses in SIFSEthical Hacking & IT Security Courses in SIFS
Ethical Hacking & IT Security Courses in SIFS
 
Cyber Security: The Strategic View
Cyber Security: The Strategic ViewCyber Security: The Strategic View
Cyber Security: The Strategic View
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness Infographics
 

Similar to 5 Cybersecurity Threats Your Business Can't Afford to Ignore

Cybersecurity Awareness Overview.pptx
Cybersecurity Awareness Overview.pptxCybersecurity Awareness Overview.pptx
Cybersecurity Awareness Overview.pptx
sanap6
 
Cybersecurity Awareness Overview.pptx
Cybersecurity Awareness Overview.pptxCybersecurity Awareness Overview.pptx
Cybersecurity Awareness Overview.pptx
instaeditz009
 
Cybersecurity Awareness Overview.pptx
Cybersecurity Awareness Overview.pptxCybersecurity Awareness Overview.pptx
Cybersecurity Awareness Overview.pptx
AfsanaMumal2
 
Social Engineering and Identity Theft
Social Engineering and Identity TheftSocial Engineering and Identity Theft
Social Engineering and Identity Theft
Scott Teipe, CISSP, CISM
 
Cybersecurity Awareness Overview- BSBXCS402.pptx
Cybersecurity Awareness Overview- BSBXCS402.pptxCybersecurity Awareness Overview- BSBXCS402.pptx
Cybersecurity Awareness Overview- BSBXCS402.pptx
itsamuamit11
 
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...
nexxtep
 
Masterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy BasicsMasterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy Basics
Excellence Foundation for South Sudan
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBC
apyn
 
Personal Threat Models
Personal Threat ModelsPersonal Threat Models
Personal Threat Models
Geoffrey Vaughan
 
Phishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxPhishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptx
Stephen Jesukanth Martin
 
NEDMA18 Keynote: Cyber Security – what you need to know, what you need to do
NEDMA18 Keynote: Cyber Security – what you need to know, what you need to doNEDMA18 Keynote: Cyber Security – what you need to know, what you need to do
NEDMA18 Keynote: Cyber Security – what you need to know, what you need to do
New England Direct Marketing Association, Inc.
 
How to Recognize a Fake Email.pptx
How to Recognize a Fake Email.pptxHow to Recognize a Fake Email.pptx
How to Recognize a Fake Email.pptx
Sultan593473
 
The Immune System of Internet
The Immune System of InternetThe Immune System of Internet
The Immune System of Internet
Mohit Kanwar
 
What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?
Entrance Exam Info
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
Sachin Saini
 
E commerce
E commerce E commerce
E commerce
DrSelvamohanaK
 
Are you at risk on the World Wide Web?
Are you at risk on the World Wide Web? Are you at risk on the World Wide Web?
Are you at risk on the World Wide Web?
TechGenie
 
Cyber Security - Moving Past "Best Practices"
Cyber Security - Moving Past "Best Practices"Cyber Security - Moving Past "Best Practices"
Cyber Security - Moving Past "Best Practices"
Billtrust
 
Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015
Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015
Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015
StampedeCon
 
Netwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech TalkNetwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech Talk
NetWatcher
 

Similar to 5 Cybersecurity Threats Your Business Can't Afford to Ignore (20)

Cybersecurity Awareness Overview.pptx
Cybersecurity Awareness Overview.pptxCybersecurity Awareness Overview.pptx
Cybersecurity Awareness Overview.pptx
 
Cybersecurity Awareness Overview.pptx
Cybersecurity Awareness Overview.pptxCybersecurity Awareness Overview.pptx
Cybersecurity Awareness Overview.pptx
 
Cybersecurity Awareness Overview.pptx
Cybersecurity Awareness Overview.pptxCybersecurity Awareness Overview.pptx
Cybersecurity Awareness Overview.pptx
 
Social Engineering and Identity Theft
Social Engineering and Identity TheftSocial Engineering and Identity Theft
Social Engineering and Identity Theft
 
Cybersecurity Awareness Overview- BSBXCS402.pptx
Cybersecurity Awareness Overview- BSBXCS402.pptxCybersecurity Awareness Overview- BSBXCS402.pptx
Cybersecurity Awareness Overview- BSBXCS402.pptx
 
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...
 
Masterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy BasicsMasterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy Basics
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBC
 
Personal Threat Models
Personal Threat ModelsPersonal Threat Models
Personal Threat Models
 
Phishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxPhishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptx
 
NEDMA18 Keynote: Cyber Security – what you need to know, what you need to do
NEDMA18 Keynote: Cyber Security – what you need to know, what you need to doNEDMA18 Keynote: Cyber Security – what you need to know, what you need to do
NEDMA18 Keynote: Cyber Security – what you need to know, what you need to do
 
How to Recognize a Fake Email.pptx
How to Recognize a Fake Email.pptxHow to Recognize a Fake Email.pptx
How to Recognize a Fake Email.pptx
 
The Immune System of Internet
The Immune System of InternetThe Immune System of Internet
The Immune System of Internet
 
What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
E commerce
E commerce E commerce
E commerce
 
Are you at risk on the World Wide Web?
Are you at risk on the World Wide Web? Are you at risk on the World Wide Web?
Are you at risk on the World Wide Web?
 
Cyber Security - Moving Past "Best Practices"
Cyber Security - Moving Past "Best Practices"Cyber Security - Moving Past "Best Practices"
Cyber Security - Moving Past "Best Practices"
 
Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015
Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015
Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015
 
Netwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech TalkNetwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech Talk
 

More from WSI WebAnalys

WSI Whitepaper social location mobile marketing
WSI Whitepaper social location mobile marketingWSI Whitepaper social location mobile marketing
WSI Whitepaper social location mobile marketing
WSI WebAnalys
 
Outperform your competitors with social selling
Outperform your competitors with social sellingOutperform your competitors with social selling
Outperform your competitors with social selling
WSI WebAnalys
 
Social Selling Uppsala
Social Selling UppsalaSocial Selling Uppsala
Social Selling Uppsala
WSI WebAnalys
 
Affärsnyttan med Twitter workshop gävle
Affärsnyttan med Twitter workshop gävleAffärsnyttan med Twitter workshop gävle
Affärsnyttan med Twitter workshop gävle
WSI WebAnalys
 
5 tips för att förstå och förbättra din kunds köpcykel
5 tips för att förstå och förbättra din kunds köpcykel5 tips för att förstå och förbättra din kunds köpcykel
5 tips för att förstå och förbättra din kunds köpcykel
WSI WebAnalys
 
Utbildningar i Social Selling B2B
Utbildningar i Social Selling B2BUtbildningar i Social Selling B2B
Utbildningar i Social Selling B2B
WSI WebAnalys
 
WSI:s App för Lokala Butiker, Salonger, Restauranger och Caféer.
WSI:s App för Lokala Butiker, Salonger, Restauranger och Caféer.WSI:s App för Lokala Butiker, Salonger, Restauranger och Caféer.
WSI:s App för Lokala Butiker, Salonger, Restauranger och Caféer.
WSI WebAnalys
 
15 Ways to Improve Your Website's Conversion Rate
15 Ways to Improve Your Website's Conversion Rate15 Ways to Improve Your Website's Conversion Rate
15 Ways to Improve Your Website's Conversion Rate
WSI WebAnalys
 
Marknadsföring på sociala medier
Marknadsföring på sociala medierMarknadsföring på sociala medier
Marknadsföring på sociala medier
WSI WebAnalys
 
WSI_WISDOM_BOOK_Internetmarknadsföring - kundrefererenser
WSI_WISDOM_BOOK_Internetmarknadsföring - kundrefererenserWSI_WISDOM_BOOK_Internetmarknadsföring - kundrefererenser
WSI_WISDOM_BOOK_Internetmarknadsföring - kundrefererenser
WSI WebAnalys
 

More from WSI WebAnalys (10)

WSI Whitepaper social location mobile marketing
WSI Whitepaper social location mobile marketingWSI Whitepaper social location mobile marketing
WSI Whitepaper social location mobile marketing
 
Outperform your competitors with social selling
Outperform your competitors with social sellingOutperform your competitors with social selling
Outperform your competitors with social selling
 
Social Selling Uppsala
Social Selling UppsalaSocial Selling Uppsala
Social Selling Uppsala
 
Affärsnyttan med Twitter workshop gävle
Affärsnyttan med Twitter workshop gävleAffärsnyttan med Twitter workshop gävle
Affärsnyttan med Twitter workshop gävle
 
5 tips för att förstå och förbättra din kunds köpcykel
5 tips för att förstå och förbättra din kunds köpcykel5 tips för att förstå och förbättra din kunds köpcykel
5 tips för att förstå och förbättra din kunds köpcykel
 
Utbildningar i Social Selling B2B
Utbildningar i Social Selling B2BUtbildningar i Social Selling B2B
Utbildningar i Social Selling B2B
 
WSI:s App för Lokala Butiker, Salonger, Restauranger och Caféer.
WSI:s App för Lokala Butiker, Salonger, Restauranger och Caféer.WSI:s App för Lokala Butiker, Salonger, Restauranger och Caféer.
WSI:s App för Lokala Butiker, Salonger, Restauranger och Caféer.
 
15 Ways to Improve Your Website's Conversion Rate
15 Ways to Improve Your Website's Conversion Rate15 Ways to Improve Your Website's Conversion Rate
15 Ways to Improve Your Website's Conversion Rate
 
Marknadsföring på sociala medier
Marknadsföring på sociala medierMarknadsföring på sociala medier
Marknadsföring på sociala medier
 
WSI_WISDOM_BOOK_Internetmarknadsföring - kundrefererenser
WSI_WISDOM_BOOK_Internetmarknadsföring - kundrefererenserWSI_WISDOM_BOOK_Internetmarknadsföring - kundrefererenser
WSI_WISDOM_BOOK_Internetmarknadsföring - kundrefererenser
 

Recently uploaded

Managing Customer & User Experience of Customers
Managing Customer & User Experience of CustomersManaging Customer & User Experience of Customers
Managing Customer & User Experience of Customers
SalmanTahir60
 
Innovation Hub_ Spotlight on Toms River's Role as a Beacon for Entrepreneuria...
Innovation Hub_ Spotlight on Toms River's Role as a Beacon for Entrepreneuria...Innovation Hub_ Spotlight on Toms River's Role as a Beacon for Entrepreneuria...
Innovation Hub_ Spotlight on Toms River's Role as a Beacon for Entrepreneuria...
Philip M Caputo
 
WAM Corporate Presentation July 2024.pdf
WAM Corporate Presentation July 2024.pdfWAM Corporate Presentation July 2024.pdf
WAM Corporate Presentation July 2024.pdf
Western Alaska Minerals Corp.
 
A STUDY OF MUTUAL FUND OF BANK OF INDIA .pdf
A STUDY OF MUTUAL FUND  OF BANK OF INDIA .pdfA STUDY OF MUTUAL FUND  OF BANK OF INDIA .pdf
A STUDY OF MUTUAL FUND OF BANK OF INDIA .pdf
rsonics22
 
Entrepreneurial mindset: An Introduction to Entrepreneurship
Entrepreneurial mindset: An Introduction to EntrepreneurshipEntrepreneurial mindset: An Introduction to Entrepreneurship
Entrepreneurial mindset: An Introduction to Entrepreneurship
Sanjay Joshi
 
PROVIDING THE WORLD WITH EFFECTIVE & EFFICIENT LIGHTING SOLUTIONS SINCE 1976
PROVIDING THE WORLD WITH EFFECTIVE & EFFICIENT LIGHTING SOLUTIONS SINCE 1976PROVIDING THE WORLD WITH EFFECTIVE & EFFICIENT LIGHTING SOLUTIONS SINCE 1976
PROVIDING THE WORLD WITH EFFECTIVE & EFFICIENT LIGHTING SOLUTIONS SINCE 1976
PYROTECH GROUP
 
You Get Me! Leveraging Communication Styles in Virtual Trainingpptx
You Get Me! Leveraging Communication Styles in Virtual TrainingpptxYou Get Me! Leveraging Communication Styles in Virtual Trainingpptx
You Get Me! Leveraging Communication Styles in Virtual Trainingpptx
Cynthia Clay
 
KineMaster Diamond APK v7.3.11.32200 (4K HD, No Watermark)
KineMaster Diamond APK v7.3.11.32200 (4K HD, No Watermark)KineMaster Diamond APK v7.3.11.32200 (4K HD, No Watermark)
KineMaster Diamond APK v7.3.11.32200 (4K HD, No Watermark)
APKs Pure
 
Mandated reporting powerpoint to help with understanding your role
Mandated reporting powerpoint to help with understanding your roleMandated reporting powerpoint to help with understanding your role
Mandated reporting powerpoint to help with understanding your role
khidalgo2
 
Cryptocurrency KYC Policies: Comparing Binance KYC Bypass with Rivals
Cryptocurrency KYC Policies: Comparing Binance KYC Bypass with RivalsCryptocurrency KYC Policies: Comparing Binance KYC Bypass with Rivals
Cryptocurrency KYC Policies: Comparing Binance KYC Bypass with Rivals
Any kyc Account
 
MEA Union Budget 2024-25 Final Presentation
MEA Union Budget 2024-25 Final PresentationMEA Union Budget 2024-25 Final Presentation
MEA Union Budget 2024-25 Final Presentation
PhysicsUtu
 
NewBase 05 July 2024 Energy News issue - 1736 by Khaled Al Awadi_compresse...
NewBase   05 July 2024  Energy News issue - 1736 by Khaled Al Awadi_compresse...NewBase   05 July 2024  Energy News issue - 1736 by Khaled Al Awadi_compresse...
NewBase 05 July 2024 Energy News issue - 1736 by Khaled Al Awadi_compresse...
Khaled Al Awadi
 
ConvertKit: Best Email Marketing Tool for 2024
ConvertKit: Best Email Marketing Tool for 2024ConvertKit: Best Email Marketing Tool for 2024
ConvertKit: Best Email Marketing Tool for 2024
Rakesh Jalan
 
Pricing sophistication - auto insurance telematics
Pricing sophistication - auto insurance telematicsPricing sophistication - auto insurance telematics
Pricing sophistication - auto insurance telematics
Matteo Carbone
 
BBA Final SML 501 INTERNATIONAL BUSINESS .pdf
BBA Final SML 501 INTERNATIONAL BUSINESS .pdfBBA Final SML 501 INTERNATIONAL BUSINESS .pdf
BBA Final SML 501 INTERNATIONAL BUSINESS .pdf
mcdopex6
 
Growth Buyouts - The Dawn of the GBO (Slow Ventures)
Growth Buyouts - The  Dawn of the GBO (Slow Ventures)Growth Buyouts - The  Dawn of the GBO (Slow Ventures)
Growth Buyouts - The Dawn of the GBO (Slow Ventures)
Razin Mustafiz
 
Corporate Governance for South African Mining Companies
Corporate Governance for South African Mining CompaniesCorporate Governance for South African Mining Companies
Corporate Governance for South African Mining Companies
James AH Campbell
 
Best Practices in Negotiation for Business Management Students
Best Practices in Negotiation for Business Management StudentsBest Practices in Negotiation for Business Management Students
Best Practices in Negotiation for Business Management Students
zoyaws1
 
Business model Lean format - sample Feb23.pdf
Business model Lean format - sample Feb23.pdfBusiness model Lean format - sample Feb23.pdf
Business model Lean format - sample Feb23.pdf
Thales Jacobi
 
Transforming the Future of Limo Services.pptx
Transforming the Future of Limo Services.pptxTransforming the Future of Limo Services.pptx
Transforming the Future of Limo Services.pptx
limocaptaincom
 

Recently uploaded (20)

Managing Customer & User Experience of Customers
Managing Customer & User Experience of CustomersManaging Customer & User Experience of Customers
Managing Customer & User Experience of Customers
 
Innovation Hub_ Spotlight on Toms River's Role as a Beacon for Entrepreneuria...
Innovation Hub_ Spotlight on Toms River's Role as a Beacon for Entrepreneuria...Innovation Hub_ Spotlight on Toms River's Role as a Beacon for Entrepreneuria...
Innovation Hub_ Spotlight on Toms River's Role as a Beacon for Entrepreneuria...
 
WAM Corporate Presentation July 2024.pdf
WAM Corporate Presentation July 2024.pdfWAM Corporate Presentation July 2024.pdf
WAM Corporate Presentation July 2024.pdf
 
A STUDY OF MUTUAL FUND OF BANK OF INDIA .pdf
A STUDY OF MUTUAL FUND  OF BANK OF INDIA .pdfA STUDY OF MUTUAL FUND  OF BANK OF INDIA .pdf
A STUDY OF MUTUAL FUND OF BANK OF INDIA .pdf
 
Entrepreneurial mindset: An Introduction to Entrepreneurship
Entrepreneurial mindset: An Introduction to EntrepreneurshipEntrepreneurial mindset: An Introduction to Entrepreneurship
Entrepreneurial mindset: An Introduction to Entrepreneurship
 
PROVIDING THE WORLD WITH EFFECTIVE & EFFICIENT LIGHTING SOLUTIONS SINCE 1976
PROVIDING THE WORLD WITH EFFECTIVE & EFFICIENT LIGHTING SOLUTIONS SINCE 1976PROVIDING THE WORLD WITH EFFECTIVE & EFFICIENT LIGHTING SOLUTIONS SINCE 1976
PROVIDING THE WORLD WITH EFFECTIVE & EFFICIENT LIGHTING SOLUTIONS SINCE 1976
 
You Get Me! Leveraging Communication Styles in Virtual Trainingpptx
You Get Me! Leveraging Communication Styles in Virtual TrainingpptxYou Get Me! Leveraging Communication Styles in Virtual Trainingpptx
You Get Me! Leveraging Communication Styles in Virtual Trainingpptx
 
KineMaster Diamond APK v7.3.11.32200 (4K HD, No Watermark)
KineMaster Diamond APK v7.3.11.32200 (4K HD, No Watermark)KineMaster Diamond APK v7.3.11.32200 (4K HD, No Watermark)
KineMaster Diamond APK v7.3.11.32200 (4K HD, No Watermark)
 
Mandated reporting powerpoint to help with understanding your role
Mandated reporting powerpoint to help with understanding your roleMandated reporting powerpoint to help with understanding your role
Mandated reporting powerpoint to help with understanding your role
 
Cryptocurrency KYC Policies: Comparing Binance KYC Bypass with Rivals
Cryptocurrency KYC Policies: Comparing Binance KYC Bypass with RivalsCryptocurrency KYC Policies: Comparing Binance KYC Bypass with Rivals
Cryptocurrency KYC Policies: Comparing Binance KYC Bypass with Rivals
 
MEA Union Budget 2024-25 Final Presentation
MEA Union Budget 2024-25 Final PresentationMEA Union Budget 2024-25 Final Presentation
MEA Union Budget 2024-25 Final Presentation
 
NewBase 05 July 2024 Energy News issue - 1736 by Khaled Al Awadi_compresse...
NewBase   05 July 2024  Energy News issue - 1736 by Khaled Al Awadi_compresse...NewBase   05 July 2024  Energy News issue - 1736 by Khaled Al Awadi_compresse...
NewBase 05 July 2024 Energy News issue - 1736 by Khaled Al Awadi_compresse...
 
ConvertKit: Best Email Marketing Tool for 2024
ConvertKit: Best Email Marketing Tool for 2024ConvertKit: Best Email Marketing Tool for 2024
ConvertKit: Best Email Marketing Tool for 2024
 
Pricing sophistication - auto insurance telematics
Pricing sophistication - auto insurance telematicsPricing sophistication - auto insurance telematics
Pricing sophistication - auto insurance telematics
 
BBA Final SML 501 INTERNATIONAL BUSINESS .pdf
BBA Final SML 501 INTERNATIONAL BUSINESS .pdfBBA Final SML 501 INTERNATIONAL BUSINESS .pdf
BBA Final SML 501 INTERNATIONAL BUSINESS .pdf
 
Growth Buyouts - The Dawn of the GBO (Slow Ventures)
Growth Buyouts - The  Dawn of the GBO (Slow Ventures)Growth Buyouts - The  Dawn of the GBO (Slow Ventures)
Growth Buyouts - The Dawn of the GBO (Slow Ventures)
 
Corporate Governance for South African Mining Companies
Corporate Governance for South African Mining CompaniesCorporate Governance for South African Mining Companies
Corporate Governance for South African Mining Companies
 
Best Practices in Negotiation for Business Management Students
Best Practices in Negotiation for Business Management StudentsBest Practices in Negotiation for Business Management Students
Best Practices in Negotiation for Business Management Students
 
Business model Lean format - sample Feb23.pdf
Business model Lean format - sample Feb23.pdfBusiness model Lean format - sample Feb23.pdf
Business model Lean format - sample Feb23.pdf
 
Transforming the Future of Limo Services.pptx
Transforming the Future of Limo Services.pptxTransforming the Future of Limo Services.pptx
Transforming the Future of Limo Services.pptx
 

5 Cybersecurity Threats Your Business Can't Afford to Ignore

  • 1. © 2018 WSI. All rights reserved. Your Business Can’t Afford to Ignore 5 Cybersecurity Threats
  • 2. 2 © 2018 WSI. All rights reserved.
  • 3. 3 © 2018 WSI. All rights reserved. 1. Everyone Is A Potential Cybercrime Victim (Yes, You Too) 2. Once The Bad Guys Get Your Stuff, There’s No Getting It Back 3. Failing to Use Two-Factor Authentication Can Put You At Risk 4. Cyber Criminals Prey on Weak Passwords 5. Letting Your Guard Down on Social Media 5 Cybersecurity Threats
  • 4. 4 © 2018 WSI. All rights reserved. "Cybersecurity costs will reach 1 trillion dollars in five years - and it still won't be nearly enough to stop the bad guys!" The Unfortunate Reality - Scott Augenbaum, Retired FBI Special Agent, Cybercrime Division
  • 5. 5 © 2018 WSI. All rights reserved. Everyone Is A Potential Cybercrime Victim (Yes, You Too) Misconception “It will never happen to me, I have nothing of value.” “We have security measures in place, we’re safe.” “We have much bigger competitors. They’ll get targeted, not us.” Reality Everyone has sensitive information they need to safeguard. Everyone uses common technologies that exist outside of basic protection (e.g. email, social media) Whether you’re an individual with five pieces of information or a global corporation with 50 million, you’re a potential cybercrime victim.
  • 6. 6 © 2018 WSI. All rights reserved. Once the Bad Guys Get Your Stuff, There’s No Getting it Back • This isn’t like getting your car stolen – There’s no insurance policy to recover your losses • Important to be proactive, not reactive • Businesses have an obligation to protect their the online accounts of their customers • A cybersecurity breach isn’t a mistake, it’s a failure that couple have been avoided
  • 7. 7 © 2018 WSI. All rights reserved. Failing to Use Two-Factor Authentication Can Put You At Risk • Two-factor authentication is a method or technology that confirms a user’s identity by any combination of two different factors: – Something they know (usually a password) – Something they have (a text message sent to their phone) – Or, something they are (voice or fingerprint). • 85% of all data breaches could be prevented using two-factor authentication
  • 8. 8 © 2018 WSI. All rights reserved. Cybercriminals Prey on Weak Passwords • 70% of people use the same password for multiple accounts • Reduce the chance of a cyberattack by using: – Two-factor authentication + strong passwords • Our recommendations: – Have separate passwords for mission-critical accounts – Don’t use week passwords for anything – Come up with a password creation system and USE it – Or, find a password management tool with two-factor authentication
  • 9. 9 © 2018 WSI. All rights reserved. • Passwords should include: – 12 characters in length – Both uppercase and lowercase letters – Special character and a number – Personal passphrases • A phrase that has personal meaning that you can remember Criteria for a Strong Password Creation System Example of a strong password system: #9ILFbtlCC9# Special character and number Special character and number Personal passphrase I love fall because the leaves change color
  • 10. 10 © 2018 WSI. All rights reserved. Letting Your Guard Down on Social Media • Still a lack of concern for security on social media • Many of us often use social information to login to third party accounts and apps • For cybercriminals, social media is the gateway to your more personal information – Some people use similar passwords for social accounts as other mission critical accounts (e.g. bank accounts) – Can learn a lot about your personal details (e.g. job, address) but trolling someone’s social media accounts
  • 11. 11 © 2018 WSI. All rights reserved. DO’S • Use service providers that offer two- factor authentication • Use our password creation system to generate mission-critical passwords. • Use different passwords for mission- critical accounts • Use different passwords for as many of your accounts as possible • Think before you click, no matter what you’re doing online • Protect yourself on social media DON’TS • Never believe that it can’t happen to you – it can and it will • Don’t assume the FBI, or anybody else, can get your stuff back • Never use a service provider unless they offer two-factor authentication • Don’t use the same password for mission- critical accounts • Don’t get complacent about your cybersecurity • Don’t let your guard down on social media Cybersecurity Do’s & Don’ts
  • 12. 12 © 2018 WSI. All rights reserved. Please Don’t Ignore Your Cybersecurity • Here are three takeaways I’d like you to remember: #1 - Think before you act. Think before you click. You are your own firewall, so question everything, and if you aren’t sure, don’t click. #2 - Don’t do business with people or companies that don’t use two-factor authentication. Period. No exceptions. #3 - Use strong passwords, and don’t use the same password for two different mission-critical accounts.
  • 13. 13 © 2018 WSI. All rights reserved. Want to improve your cybersecurity? Request a copy of WSI’s Cybersecurity eBook
  • 14. We help ideas realize their potential by leveraging the Internet & its many unrecognized opportunities. © 2017 WSI. All rights reserved.