SlideShare a Scribd company logo
1 of 14
© 2018 WSI. All rights reserved.
Your Business Can’t Afford to Ignore
5 Cybersecurity
Threats
2
© 2018 WSI. All rights reserved.
3
© 2018 WSI. All rights reserved.
1. Everyone Is A Potential Cybercrime
Victim (Yes, You Too)
2. Once The Bad Guys Get Your Stuff,
There’s No Getting It Back
3. Failing to Use Two-Factor
Authentication Can Put You At Risk
4. Cyber Criminals Prey on Weak
Passwords
5. Letting Your Guard Down on Social
Media
5 Cybersecurity Threats
4
© 2018 WSI. All rights reserved.
"Cybersecurity costs will reach 1
trillion dollars in five years - and it
still won't be nearly enough to stop
the bad guys!"
The Unfortunate Reality
- Scott Augenbaum, Retired FBI Special Agent, Cybercrime Division
5
© 2018 WSI. All rights reserved.
Everyone Is A Potential Cybercrime Victim
(Yes, You Too)
Misconception
“It will never happen to me, I have nothing of
value.”
“We have security measures in place, we’re
safe.”
“We have much bigger competitors. They’ll
get targeted, not us.”
Reality
Everyone has sensitive information they need
to safeguard.
Everyone uses common technologies that
exist outside of basic protection (e.g. email,
social media)
Whether you’re an individual with five pieces
of information or a global corporation with 50
million, you’re a potential cybercrime victim.
6
© 2018 WSI. All rights reserved.
Once the Bad Guys Get Your Stuff,
There’s No Getting it Back
• This isn’t like getting your car stolen
– There’s no insurance policy to
recover your losses
• Important to be proactive, not
reactive
• Businesses have an obligation to
protect their the online accounts of
their customers
• A cybersecurity breach isn’t a
mistake, it’s a failure that couple
have been avoided
7
© 2018 WSI. All rights reserved.
Failing to Use Two-Factor Authentication
Can Put You At Risk
• Two-factor authentication is a method or technology that confirms a user’s identity
by any combination of two different factors:
– Something they know (usually a password)
– Something they have (a text message sent to their phone)
– Or, something they are (voice or fingerprint).
• 85% of all data breaches could be prevented using
two-factor authentication
8
© 2018 WSI. All rights reserved.
Cybercriminals Prey on Weak Passwords
• 70% of people use the same password for multiple
accounts
• Reduce the chance of a cyberattack by using:
– Two-factor authentication + strong passwords
• Our recommendations:
– Have separate passwords for mission-critical accounts
– Don’t use week passwords for anything
– Come up with a password creation system and USE it
– Or, find a password management tool with two-factor
authentication
9
© 2018 WSI. All rights reserved.
• Passwords should include:
– 12 characters in length
– Both uppercase and
lowercase letters
– Special character and a
number
– Personal passphrases
• A phrase that has personal
meaning that you can
remember
Criteria for a Strong Password Creation System
Example of a strong password system:
#9ILFbtlCC9#
Special character
and number
Special character
and number
Personal passphrase
I love fall because the leaves change color
10
© 2018 WSI. All rights reserved.
Letting Your Guard Down on Social Media
• Still a lack of concern for security on social media
• Many of us often use social information to login to
third party accounts and apps
• For cybercriminals, social media is the gateway to
your more personal information
– Some people use similar passwords for social accounts
as other mission critical accounts (e.g. bank accounts)
– Can learn a lot about your personal details (e.g. job,
address) but trolling someone’s social media accounts
11
© 2018 WSI. All rights reserved.
DO’S
• Use service providers that offer two-
factor authentication
• Use our password creation system to
generate mission-critical passwords.
• Use different passwords for mission-
critical accounts
• Use different passwords for as many of
your accounts as possible
• Think before you click, no matter what
you’re doing online
• Protect yourself on social media
DON’TS
• Never believe that it can’t happen to you
– it can and it will
• Don’t assume the FBI, or anybody else,
can get your stuff back
• Never use a service provider unless they
offer two-factor authentication
• Don’t use the same password for mission-
critical accounts
• Don’t get complacent about your
cybersecurity
• Don’t let your guard down on social
media
Cybersecurity Do’s & Don’ts
12
© 2018 WSI. All rights reserved.
Please Don’t Ignore Your Cybersecurity
• Here are three takeaways I’d like you to remember:
#1 - Think before you act. Think before you click. You are your own
firewall, so question everything, and if you aren’t sure, don’t click.
#2 - Don’t do business with people or companies that don’t use
two-factor authentication. Period. No exceptions.
#3 - Use strong passwords, and don’t use the same password for
two different mission-critical accounts.
13
© 2018 WSI. All rights reserved.
Want to improve your
cybersecurity?
Request a copy of WSI’s
Cybersecurity eBook
We help ideas realize their potential by leveraging the
Internet & its many unrecognized opportunities.
© 2017 WSI. All rights reserved.

More Related Content

What's hot

Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceInderjeet Singh
 
Health Information Privacy and Security (October 21, 2020)
Health Information Privacy and Security (October 21, 2020)Health Information Privacy and Security (October 21, 2020)
Health Information Privacy and Security (October 21, 2020)Nawanan Theera-Ampornpunt
 
A Comedy of Errors in Web Application Security
A Comedy of Errors in Web Application SecurityA Comedy of Errors in Web Application Security
A Comedy of Errors in Web Application SecurityRob Dudley
 
Artificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityArtificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityOlivier Busolini
 
Cyberattacks the-next-healthcare-epidemic
Cyberattacks the-next-healthcare-epidemicCyberattacks the-next-healthcare-epidemic
Cyberattacks the-next-healthcare-epidemicKate Barney
 
Ict H A C K I N G
Ict    H A C K I N GIct    H A C K I N G
Ict H A C K I N GHafizra Mas
 
Presentation: True Stories from the Threat Hunting Files
Presentation: True Stories from the Threat Hunting FilesPresentation: True Stories from the Threat Hunting Files
Presentation: True Stories from the Threat Hunting FilesDomainTools
 
Cyber and Data Risks
Cyber and Data RisksCyber and Data Risks
Cyber and Data Risksrisksmith
 
Cybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive MeasuresCybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive MeasuresAditya Ratnaparkhi
 
Whitepaper Avira about Artificial Intelligence to cyber security
Whitepaper Avira  about Artificial Intelligence to cyber securityWhitepaper Avira  about Artificial Intelligence to cyber security
Whitepaper Avira about Artificial Intelligence to cyber securityGopiRajan4
 
Cybersecurity & Data Protection: Thinking About Risk & Compliance
Cybersecurity & Data Protection: Thinking About Risk & ComplianceCybersecurity & Data Protection: Thinking About Risk & Compliance
Cybersecurity & Data Protection: Thinking About Risk & ComplianceShawn Tuma
 
Expert FSO Insider Threat Awareness
Expert FSO Insider Threat AwarenessExpert FSO Insider Threat Awareness
Expert FSO Insider Threat AwarenessEric Schiowitz
 
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...Black Duck by Synopsys
 
Information security
Information securityInformation security
Information securityVarshil Patel
 
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...Netpluz Asia Pte Ltd
 
Ethical Hacking & IT Security Courses in SIFS
Ethical Hacking & IT Security Courses in SIFSEthical Hacking & IT Security Courses in SIFS
Ethical Hacking & IT Security Courses in SIFSSifs India
 
Cyber Security: The Strategic View
Cyber Security: The Strategic ViewCyber Security: The Strategic View
Cyber Security: The Strategic ViewCisco Canada
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsNetLockSmith
 

What's hot (20)

Cyber attack
Cyber attackCyber attack
Cyber attack
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial Intelligence
 
Health Information Privacy and Security (October 21, 2020)
Health Information Privacy and Security (October 21, 2020)Health Information Privacy and Security (October 21, 2020)
Health Information Privacy and Security (October 21, 2020)
 
A Comedy of Errors in Web Application Security
A Comedy of Errors in Web Application SecurityA Comedy of Errors in Web Application Security
A Comedy of Errors in Web Application Security
 
Artificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityArtificial Intelligence and Cybersecurity
Artificial Intelligence and Cybersecurity
 
Cyberattacks the-next-healthcare-epidemic
Cyberattacks the-next-healthcare-epidemicCyberattacks the-next-healthcare-epidemic
Cyberattacks the-next-healthcare-epidemic
 
Ict H A C K I N G
Ict    H A C K I N GIct    H A C K I N G
Ict H A C K I N G
 
Presentation: True Stories from the Threat Hunting Files
Presentation: True Stories from the Threat Hunting FilesPresentation: True Stories from the Threat Hunting Files
Presentation: True Stories from the Threat Hunting Files
 
Cyber and Data Risks
Cyber and Data RisksCyber and Data Risks
Cyber and Data Risks
 
Cybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive MeasuresCybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive Measures
 
Whitepaper Avira about Artificial Intelligence to cyber security
Whitepaper Avira  about Artificial Intelligence to cyber securityWhitepaper Avira  about Artificial Intelligence to cyber security
Whitepaper Avira about Artificial Intelligence to cyber security
 
Cybersecurity & Data Protection: Thinking About Risk & Compliance
Cybersecurity & Data Protection: Thinking About Risk & ComplianceCybersecurity & Data Protection: Thinking About Risk & Compliance
Cybersecurity & Data Protection: Thinking About Risk & Compliance
 
Expert FSO Insider Threat Awareness
Expert FSO Insider Threat AwarenessExpert FSO Insider Threat Awareness
Expert FSO Insider Threat Awareness
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
 
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
 
Information security
Information securityInformation security
Information security
 
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
 
Ethical Hacking & IT Security Courses in SIFS
Ethical Hacking & IT Security Courses in SIFSEthical Hacking & IT Security Courses in SIFS
Ethical Hacking & IT Security Courses in SIFS
 
Cyber Security: The Strategic View
Cyber Security: The Strategic ViewCyber Security: The Strategic View
Cyber Security: The Strategic View
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness Infographics
 

Similar to 5 Cybersecurity Threats Your Business Can't Afford to Ignore

Cybersecurity Awareness Overview.pptx
Cybersecurity Awareness Overview.pptxCybersecurity Awareness Overview.pptx
Cybersecurity Awareness Overview.pptxsanap6
 
Cybersecurity Awareness Overview.pptx
Cybersecurity Awareness Overview.pptxCybersecurity Awareness Overview.pptx
Cybersecurity Awareness Overview.pptxinstaeditz009
 
Cybersecurity Awareness Overview.pptx
Cybersecurity Awareness Overview.pptxCybersecurity Awareness Overview.pptx
Cybersecurity Awareness Overview.pptxAfsanaMumal2
 
Cybersecurity Awareness Overview- BSBXCS402.pptx
Cybersecurity Awareness Overview- BSBXCS402.pptxCybersecurity Awareness Overview- BSBXCS402.pptx
Cybersecurity Awareness Overview- BSBXCS402.pptxitsamuamit11
 
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...nexxtep
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBCapyn
 
Phishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxPhishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxStephen Jesukanth Martin
 
How to Recognize a Fake Email.pptx
How to Recognize a Fake Email.pptxHow to Recognize a Fake Email.pptx
How to Recognize a Fake Email.pptxSultan593473
 
The Immune System of Internet
The Immune System of InternetThe Immune System of Internet
The Immune System of InternetMohit Kanwar
 
What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?Entrance Exam Info
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingSachin Saini
 
Are you at risk on the World Wide Web?
Are you at risk on the World Wide Web? Are you at risk on the World Wide Web?
Are you at risk on the World Wide Web? TechGenie
 
Cyber Security - Moving Past "Best Practices"
Cyber Security - Moving Past "Best Practices"Cyber Security - Moving Past "Best Practices"
Cyber Security - Moving Past "Best Practices"Billtrust
 
Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015
Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015
Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015StampedeCon
 
Netwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech TalkNetwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech TalkNetWatcher
 

Similar to 5 Cybersecurity Threats Your Business Can't Afford to Ignore (20)

Cybersecurity Awareness Overview.pptx
Cybersecurity Awareness Overview.pptxCybersecurity Awareness Overview.pptx
Cybersecurity Awareness Overview.pptx
 
Cybersecurity Awareness Overview.pptx
Cybersecurity Awareness Overview.pptxCybersecurity Awareness Overview.pptx
Cybersecurity Awareness Overview.pptx
 
Cybersecurity Awareness Overview.pptx
Cybersecurity Awareness Overview.pptxCybersecurity Awareness Overview.pptx
Cybersecurity Awareness Overview.pptx
 
Social Engineering and Identity Theft
Social Engineering and Identity TheftSocial Engineering and Identity Theft
Social Engineering and Identity Theft
 
Cybersecurity Awareness Overview- BSBXCS402.pptx
Cybersecurity Awareness Overview- BSBXCS402.pptxCybersecurity Awareness Overview- BSBXCS402.pptx
Cybersecurity Awareness Overview- BSBXCS402.pptx
 
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...
 
Masterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy BasicsMasterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy Basics
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBC
 
Personal Threat Models
Personal Threat ModelsPersonal Threat Models
Personal Threat Models
 
Phishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxPhishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptx
 
NEDMA18 Keynote: Cyber Security – what you need to know, what you need to do
NEDMA18 Keynote: Cyber Security – what you need to know, what you need to doNEDMA18 Keynote: Cyber Security – what you need to know, what you need to do
NEDMA18 Keynote: Cyber Security – what you need to know, what you need to do
 
How to Recognize a Fake Email.pptx
How to Recognize a Fake Email.pptxHow to Recognize a Fake Email.pptx
How to Recognize a Fake Email.pptx
 
The Immune System of Internet
The Immune System of InternetThe Immune System of Internet
The Immune System of Internet
 
What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
E commerce
E commerce E commerce
E commerce
 
Are you at risk on the World Wide Web?
Are you at risk on the World Wide Web? Are you at risk on the World Wide Web?
Are you at risk on the World Wide Web?
 
Cyber Security - Moving Past "Best Practices"
Cyber Security - Moving Past "Best Practices"Cyber Security - Moving Past "Best Practices"
Cyber Security - Moving Past "Best Practices"
 
Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015
Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015
Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015
 
Netwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech TalkNetwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech Talk
 

More from WSI WebAnalys

WSI Whitepaper social location mobile marketing
WSI Whitepaper social location mobile marketingWSI Whitepaper social location mobile marketing
WSI Whitepaper social location mobile marketingWSI WebAnalys
 
Outperform your competitors with social selling
Outperform your competitors with social sellingOutperform your competitors with social selling
Outperform your competitors with social sellingWSI WebAnalys
 
Social Selling Uppsala
Social Selling UppsalaSocial Selling Uppsala
Social Selling UppsalaWSI WebAnalys
 
Affärsnyttan med Twitter workshop gävle
Affärsnyttan med Twitter workshop gävleAffärsnyttan med Twitter workshop gävle
Affärsnyttan med Twitter workshop gävleWSI WebAnalys
 
5 tips för att förstå och förbättra din kunds köpcykel
5 tips för att förstå och förbättra din kunds köpcykel5 tips för att förstå och förbättra din kunds köpcykel
5 tips för att förstå och förbättra din kunds köpcykelWSI WebAnalys
 
Utbildningar i Social Selling B2B
Utbildningar i Social Selling B2BUtbildningar i Social Selling B2B
Utbildningar i Social Selling B2BWSI WebAnalys
 
WSI:s App för Lokala Butiker, Salonger, Restauranger och Caféer.
WSI:s App för Lokala Butiker, Salonger, Restauranger och Caféer.WSI:s App för Lokala Butiker, Salonger, Restauranger och Caféer.
WSI:s App för Lokala Butiker, Salonger, Restauranger och Caféer.WSI WebAnalys
 
15 Ways to Improve Your Website's Conversion Rate
15 Ways to Improve Your Website's Conversion Rate15 Ways to Improve Your Website's Conversion Rate
15 Ways to Improve Your Website's Conversion RateWSI WebAnalys
 
Marknadsföring på sociala medier
Marknadsföring på sociala medierMarknadsföring på sociala medier
Marknadsföring på sociala medierWSI WebAnalys
 
WSI_WISDOM_BOOK_Internetmarknadsföring - kundrefererenser
WSI_WISDOM_BOOK_Internetmarknadsföring - kundrefererenserWSI_WISDOM_BOOK_Internetmarknadsföring - kundrefererenser
WSI_WISDOM_BOOK_Internetmarknadsföring - kundrefererenserWSI WebAnalys
 

More from WSI WebAnalys (10)

WSI Whitepaper social location mobile marketing
WSI Whitepaper social location mobile marketingWSI Whitepaper social location mobile marketing
WSI Whitepaper social location mobile marketing
 
Outperform your competitors with social selling
Outperform your competitors with social sellingOutperform your competitors with social selling
Outperform your competitors with social selling
 
Social Selling Uppsala
Social Selling UppsalaSocial Selling Uppsala
Social Selling Uppsala
 
Affärsnyttan med Twitter workshop gävle
Affärsnyttan med Twitter workshop gävleAffärsnyttan med Twitter workshop gävle
Affärsnyttan med Twitter workshop gävle
 
5 tips för att förstå och förbättra din kunds köpcykel
5 tips för att förstå och förbättra din kunds köpcykel5 tips för att förstå och förbättra din kunds köpcykel
5 tips för att förstå och förbättra din kunds köpcykel
 
Utbildningar i Social Selling B2B
Utbildningar i Social Selling B2BUtbildningar i Social Selling B2B
Utbildningar i Social Selling B2B
 
WSI:s App för Lokala Butiker, Salonger, Restauranger och Caféer.
WSI:s App för Lokala Butiker, Salonger, Restauranger och Caféer.WSI:s App för Lokala Butiker, Salonger, Restauranger och Caféer.
WSI:s App för Lokala Butiker, Salonger, Restauranger och Caféer.
 
15 Ways to Improve Your Website's Conversion Rate
15 Ways to Improve Your Website's Conversion Rate15 Ways to Improve Your Website's Conversion Rate
15 Ways to Improve Your Website's Conversion Rate
 
Marknadsföring på sociala medier
Marknadsföring på sociala medierMarknadsföring på sociala medier
Marknadsföring på sociala medier
 
WSI_WISDOM_BOOK_Internetmarknadsföring - kundrefererenser
WSI_WISDOM_BOOK_Internetmarknadsföring - kundrefererenserWSI_WISDOM_BOOK_Internetmarknadsföring - kundrefererenser
WSI_WISDOM_BOOK_Internetmarknadsföring - kundrefererenser
 

Recently uploaded

7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfOnline Income Engine
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
A305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdfA305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdftbatkhuu1
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdftbatkhuu1
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 

Recently uploaded (20)

7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdf
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
A305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdfA305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdf
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdf
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 

5 Cybersecurity Threats Your Business Can't Afford to Ignore

  • 1. © 2018 WSI. All rights reserved. Your Business Can’t Afford to Ignore 5 Cybersecurity Threats
  • 2. 2 © 2018 WSI. All rights reserved.
  • 3. 3 © 2018 WSI. All rights reserved. 1. Everyone Is A Potential Cybercrime Victim (Yes, You Too) 2. Once The Bad Guys Get Your Stuff, There’s No Getting It Back 3. Failing to Use Two-Factor Authentication Can Put You At Risk 4. Cyber Criminals Prey on Weak Passwords 5. Letting Your Guard Down on Social Media 5 Cybersecurity Threats
  • 4. 4 © 2018 WSI. All rights reserved. "Cybersecurity costs will reach 1 trillion dollars in five years - and it still won't be nearly enough to stop the bad guys!" The Unfortunate Reality - Scott Augenbaum, Retired FBI Special Agent, Cybercrime Division
  • 5. 5 © 2018 WSI. All rights reserved. Everyone Is A Potential Cybercrime Victim (Yes, You Too) Misconception “It will never happen to me, I have nothing of value.” “We have security measures in place, we’re safe.” “We have much bigger competitors. They’ll get targeted, not us.” Reality Everyone has sensitive information they need to safeguard. Everyone uses common technologies that exist outside of basic protection (e.g. email, social media) Whether you’re an individual with five pieces of information or a global corporation with 50 million, you’re a potential cybercrime victim.
  • 6. 6 © 2018 WSI. All rights reserved. Once the Bad Guys Get Your Stuff, There’s No Getting it Back • This isn’t like getting your car stolen – There’s no insurance policy to recover your losses • Important to be proactive, not reactive • Businesses have an obligation to protect their the online accounts of their customers • A cybersecurity breach isn’t a mistake, it’s a failure that couple have been avoided
  • 7. 7 © 2018 WSI. All rights reserved. Failing to Use Two-Factor Authentication Can Put You At Risk • Two-factor authentication is a method or technology that confirms a user’s identity by any combination of two different factors: – Something they know (usually a password) – Something they have (a text message sent to their phone) – Or, something they are (voice or fingerprint). • 85% of all data breaches could be prevented using two-factor authentication
  • 8. 8 © 2018 WSI. All rights reserved. Cybercriminals Prey on Weak Passwords • 70% of people use the same password for multiple accounts • Reduce the chance of a cyberattack by using: – Two-factor authentication + strong passwords • Our recommendations: – Have separate passwords for mission-critical accounts – Don’t use week passwords for anything – Come up with a password creation system and USE it – Or, find a password management tool with two-factor authentication
  • 9. 9 © 2018 WSI. All rights reserved. • Passwords should include: – 12 characters in length – Both uppercase and lowercase letters – Special character and a number – Personal passphrases • A phrase that has personal meaning that you can remember Criteria for a Strong Password Creation System Example of a strong password system: #9ILFbtlCC9# Special character and number Special character and number Personal passphrase I love fall because the leaves change color
  • 10. 10 © 2018 WSI. All rights reserved. Letting Your Guard Down on Social Media • Still a lack of concern for security on social media • Many of us often use social information to login to third party accounts and apps • For cybercriminals, social media is the gateway to your more personal information – Some people use similar passwords for social accounts as other mission critical accounts (e.g. bank accounts) – Can learn a lot about your personal details (e.g. job, address) but trolling someone’s social media accounts
  • 11. 11 © 2018 WSI. All rights reserved. DO’S • Use service providers that offer two- factor authentication • Use our password creation system to generate mission-critical passwords. • Use different passwords for mission- critical accounts • Use different passwords for as many of your accounts as possible • Think before you click, no matter what you’re doing online • Protect yourself on social media DON’TS • Never believe that it can’t happen to you – it can and it will • Don’t assume the FBI, or anybody else, can get your stuff back • Never use a service provider unless they offer two-factor authentication • Don’t use the same password for mission- critical accounts • Don’t get complacent about your cybersecurity • Don’t let your guard down on social media Cybersecurity Do’s & Don’ts
  • 12. 12 © 2018 WSI. All rights reserved. Please Don’t Ignore Your Cybersecurity • Here are three takeaways I’d like you to remember: #1 - Think before you act. Think before you click. You are your own firewall, so question everything, and if you aren’t sure, don’t click. #2 - Don’t do business with people or companies that don’t use two-factor authentication. Period. No exceptions. #3 - Use strong passwords, and don’t use the same password for two different mission-critical accounts.
  • 13. 13 © 2018 WSI. All rights reserved. Want to improve your cybersecurity? Request a copy of WSI’s Cybersecurity eBook
  • 14. We help ideas realize their potential by leveraging the Internet & its many unrecognized opportunities. © 2017 WSI. All rights reserved.