This document summarizes a cyber security workshop covering various topics to help small businesses protect themselves from cyber threats. The workshop will take place on June 26 from 8-10 AM at the Madison Lakes Training & Conference Center in Dayton, OH. It will provide mentoring and training to business owners on topics like starting up a business, growing an existing business, and improving performance. Mentoring is free and seminars have a small or no charge. The document then introduces the speakers and their backgrounds and qualifications to discuss cyber security topics. [END SUMMARY]
This document provides a 12-point summary of tips for protecting educational records and maintaining cyber security compliance at Wilmington University. The tips include locking computers when stepped away from, destroying sensitive documents, using strong and unique passwords, not storing confidential documents in public clouds, and being wary of phishing attempts. Completing a quiz is required to receive credit for reviewing the cyber security training.
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
I developed "Cyber Security 101: Training, awareness, strategies for small to medium sized business" for the second annual Small Business Summit on Security, Privacy, and Trust, co-hosted by ADP in New Jersey, October 2013.
This document discusses security frameworks and tools for information systems. It begins by explaining why systems are vulnerable, such as accessibility of networks and software/hardware problems. It then describes organizational frameworks for security, including risk assessment, security policies, identity management, disaster recovery planning, and information systems audits. Finally, it discusses tools for safeguarding resources, such as identity management software. The document provides an overview of securing information systems from multiple perspectives.
The document discusses cyber security awareness and promotes self-protection techniques. It outlines goals of promoting awareness, discussing how to secure personal information, and providing examples of protection software. It then discusses common security threats like malware, phishing, and social engineering and offers tools and best practices for protecting against them, including using antivirus software, enabling two-step verification, and employing encryption and VPNs when online.
The document discusses various cybersecurity attack vectors and how organizations can protect themselves. It outlines common attack methods like ransomware, malicious code delivery, social engineering, and phishing. It then recommends that organizations conduct regular security audits, establish governance policies, create an incident response plan, and provide cybersecurity education to employees. The document promotes cybersecurity services from Future Point of View including vulnerability testing, forensics, and training to help organizations enhance their protections.
Cyber security refers to protecting networks, devices, programs and data from unauthorized access or cyber attacks. It involves technologies and practices to ensure security, availability and integrity of information systems. Without proper cyber security measures like risk assessments, organizations risk exposing sensitive data like intellectual property, financial information and personal data. The top five cyber risks are ransomware, phishing, data leakage from mobile devices, hacking, and insider threats from employees. Organizations should implement security best practices like access controls, malware protection, software updates, data backups and employee training to mitigate these risks.
Cybersecurity Awareness Training Presentation v1.3DallasHaselhorst
This free cybersecurity awareness training slide deck is meant to be used by organizations and end users to educate them on ways to avoid scams and attacks and become more security aware. This slide deck is based on version 1.3 of our wildly popular slide deck we originally released as open-source in September 2019. In just over 6 months, it was downloaded thousands of times and in over 150 countries!
On our website, you will also find several other related goodies. For example, we have worksheets free and downloadable worksheets referenced in the training. We have a free cybersecurity quiz that is based directly off of this material so anyone can test their awareness knowledge. We even have a downloadable 'certificate of completion' for this training, which allows attendees to fill-in their name and date so they can then print it out to show others (or even their employer) that they are now more cyber aware.
https://www.treetopsecurity.com/cat
We also have a video/webinar presentation of this material if you would like to share it with others.
https://www.treetopsecurity.com/cat#video
Want to take this content and present it in your own community? Fantastic! You may download this slide deck as editable content. This allows you to make changes and present it at your local library, business events, co-working spaces, schools, etc. The latest version is always available on our website as a Microsoft PowerPoint presentation (.pptx) or using ‘Make a Copy’ in Google Slides.
https://www.treetopsecurity.com/slides
This document provides a 12-point summary of tips for protecting educational records and maintaining cyber security compliance at Wilmington University. The tips include locking computers when stepped away from, destroying sensitive documents, using strong and unique passwords, not storing confidential documents in public clouds, and being wary of phishing attempts. Completing a quiz is required to receive credit for reviewing the cyber security training.
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
I developed "Cyber Security 101: Training, awareness, strategies for small to medium sized business" for the second annual Small Business Summit on Security, Privacy, and Trust, co-hosted by ADP in New Jersey, October 2013.
This document discusses security frameworks and tools for information systems. It begins by explaining why systems are vulnerable, such as accessibility of networks and software/hardware problems. It then describes organizational frameworks for security, including risk assessment, security policies, identity management, disaster recovery planning, and information systems audits. Finally, it discusses tools for safeguarding resources, such as identity management software. The document provides an overview of securing information systems from multiple perspectives.
The document discusses cyber security awareness and promotes self-protection techniques. It outlines goals of promoting awareness, discussing how to secure personal information, and providing examples of protection software. It then discusses common security threats like malware, phishing, and social engineering and offers tools and best practices for protecting against them, including using antivirus software, enabling two-step verification, and employing encryption and VPNs when online.
The document discusses various cybersecurity attack vectors and how organizations can protect themselves. It outlines common attack methods like ransomware, malicious code delivery, social engineering, and phishing. It then recommends that organizations conduct regular security audits, establish governance policies, create an incident response plan, and provide cybersecurity education to employees. The document promotes cybersecurity services from Future Point of View including vulnerability testing, forensics, and training to help organizations enhance their protections.
Cyber security refers to protecting networks, devices, programs and data from unauthorized access or cyber attacks. It involves technologies and practices to ensure security, availability and integrity of information systems. Without proper cyber security measures like risk assessments, organizations risk exposing sensitive data like intellectual property, financial information and personal data. The top five cyber risks are ransomware, phishing, data leakage from mobile devices, hacking, and insider threats from employees. Organizations should implement security best practices like access controls, malware protection, software updates, data backups and employee training to mitigate these risks.
Cybersecurity Awareness Training Presentation v1.3DallasHaselhorst
This free cybersecurity awareness training slide deck is meant to be used by organizations and end users to educate them on ways to avoid scams and attacks and become more security aware. This slide deck is based on version 1.3 of our wildly popular slide deck we originally released as open-source in September 2019. In just over 6 months, it was downloaded thousands of times and in over 150 countries!
On our website, you will also find several other related goodies. For example, we have worksheets free and downloadable worksheets referenced in the training. We have a free cybersecurity quiz that is based directly off of this material so anyone can test their awareness knowledge. We even have a downloadable 'certificate of completion' for this training, which allows attendees to fill-in their name and date so they can then print it out to show others (or even their employer) that they are now more cyber aware.
https://www.treetopsecurity.com/cat
We also have a video/webinar presentation of this material if you would like to share it with others.
https://www.treetopsecurity.com/cat#video
Want to take this content and present it in your own community? Fantastic! You may download this slide deck as editable content. This allows you to make changes and present it at your local library, business events, co-working spaces, schools, etc. The latest version is always available on our website as a Microsoft PowerPoint presentation (.pptx) or using ‘Make a Copy’ in Google Slides.
https://www.treetopsecurity.com/slides
You have more to secure than ever before. A data breach can happen to any organization, and it's a growing concern among companies both large and small. Take a look at these best practices and see if any of these have gotten lost as you consider your 2017 plan.
This document summarizes a security awareness training presentation that covered topics such as why security training is important, 21st century security threats, PCI compliance, security objectives and challenges, data classification, and security responsibilities. It provided examples of security incidents, the costs of data breaches, PCI DSS requirements, and outlined the company's security framework including defenses, controls, and challenges around excessive data retention, vulnerable infrastructure, lack of documentation and logging.
Cyber crime, or computer related crime, is crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. ... Cyber crime may threaten a person or a nation's security and financial health.
The document provides an overview of an employee information security awareness training. It summarizes key topics covered in the training including identifying security risks, developing good security practices, protecting classified and sensitive company information, securing workstations and mobile devices, safe email practices, and guarding against social engineering. It emphasizes the importance of protecting company information and passwords at all times.
14 tips to increase cybersecurity awarenessMichel Bitter
We used this presentation within our company to increase the cybersecurity awareness of our employees. These 14 tips should help everybody to protect themselves against the most obvious cyber attacks.
** CyberSecurity Certification Training: https://www.edureka.co/cybersecurity-certification-training **
This Edureka tutorial on "Cybersecurity Frameworks" will help you understand why and how the organizations are using the cybersecurity framework to Identify, Protect and Recover from cyber attacks.
Cybersecurity Training Playlist: https://bit.ly/2NqcTQV
This document discusses cyber security. It defines cyber security as technologies and processes designed to protect computers, networks, and data from unauthorized access and attacks over the internet. The three core principles of cyber security are confidentiality, integrity, and availability. Several types of cyber attacks are described such as malware, phishing, and denial of service attacks. Major historical cyber attacks are outlined including the Morris Worm in 1988 and the Anthem hack in 2015 that breached 80 million records. Common attack patterns and measures to prevent cyber attacks like using complex passwords and encryption are also summarized.
Cyber Security Awareness introduction. Why is Cyber Security important? What do I have to do to protect me from Cyber attacks? How to create a IT Security Awareness Plan ?
Malicious threats like malware, phishing, and social engineering pose ongoing risks to organizations. To help prevent data breaches and cyberattacks, it is important to take preventive measures such as using antivirus software on all devices, implementing strong password policies and two-factor authentication, filtering web content and email attachments, and keeping devices updated. Employee education is also key to avoiding human errors like falling for phishing scams or inadvertently disclosing sensitive information.
This is a basic presentation about cybersecurity to share awareness about various security threats and how you can protect yourself from them. In the preview window the formatting is off, but when downloaded it can be viewed with no problems. This is for my Info Security Policy Management class at Governors State University.
This document discusses cyber crime and security. It begins with an overview of topics to be covered, including the history and basics of cyber crimes, various categories of cyber crimes, and motivations for cyber attacks. It then discusses the history of cyber crimes and defines cyber attacks and cyber crimes. Various types of cyber crimes are outlined, including those against persons, property, and government. Common cyber crime techniques like social engineering, viruses, and ransomware are explained. The document notes that cyber crime groups are starting to operate more like organized crime rings. It concludes by discussing how opportunities provided by Web 2.0 technologies can be exploited for cyber crimes.
This document provides training on cybersecurity best practices for Borough of West Chester personnel. It defines cybersecurity as protecting information and systems from unauthorized access, use, disclosure, disruption or destruction. It outlines common cyber threats like viruses, worms, ransomware, and social engineering. It emphasizes using strong passwords, antivirus software, firewalls, and regular software updates. It also recommends avoiding malicious emails and websites, and backing up important data.
This document discusses cyber security. It begins by defining cyber security as the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attacks, damage, or unauthorized access. It notes that cyber security is important because organizations collect, store, and process unprecedented amounts of data that needs protection. Some common cyber threats discussed include cyberterrorism, cyberwarfare, cyberspionage, and attacks targeting critical infrastructure, networks, applications, cloud systems, and internet of things devices. The document also examines cyber attack life cycles and common prevention methods.
Cyber Security Overview for Small BusinessesCharles Cline
Defining cyber security
Identifying information that your small business should secure
Identifying the types of cyber threats against small businesses
Small business risk management
Small business best practices for guarding against cyber threats
This document provides an overview of cyber security and discusses recent issues in India. It begins with definitions of cyberspace and discusses the rapid growth of internet connectivity globally and in India. It then covers cyber security challenges, the evolution of threats, and recent cyber attacks impacting India. The document concludes with 10 steps for organizations to improve cyber security, such as network security, malware protection, user education, and information risk management.
Building An Information Security Awareness ProgramBill Gardner
Most organization’s Security Awareness Programs suck. They involved ‘canned’ video presentations or someone is HR explaining computer use policies. Others are extremely expensive and beyond the reach of the budgets of smaller organizations. This talk will show you how to build a Security Awareness Program from scratch for little or no money, and how to engage your users so that they get the most out of the program.
Cyber security awareness training by cyber security infotech(csi), Information Security,
website development company,
Employee Monitoring System,
Employee Monitoring Software
Cyber Security is: “Protection of information systems against unauthorized access to or modification of information, whether in storage, processing or transit, and against the denial of service to authorized users, including those measures necessary to detect, document, and counter such threats.”
Slides produced for a workshop on measures to use to protect your computer and system security. By Computer Troubleshooters, Dayton, Ohio. February 15, 2014
You have more to secure than ever before. A data breach can happen to any organization, and it's a growing concern among companies both large and small. Take a look at these best practices and see if any of these have gotten lost as you consider your 2017 plan.
This document summarizes a security awareness training presentation that covered topics such as why security training is important, 21st century security threats, PCI compliance, security objectives and challenges, data classification, and security responsibilities. It provided examples of security incidents, the costs of data breaches, PCI DSS requirements, and outlined the company's security framework including defenses, controls, and challenges around excessive data retention, vulnerable infrastructure, lack of documentation and logging.
Cyber crime, or computer related crime, is crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. ... Cyber crime may threaten a person or a nation's security and financial health.
The document provides an overview of an employee information security awareness training. It summarizes key topics covered in the training including identifying security risks, developing good security practices, protecting classified and sensitive company information, securing workstations and mobile devices, safe email practices, and guarding against social engineering. It emphasizes the importance of protecting company information and passwords at all times.
14 tips to increase cybersecurity awarenessMichel Bitter
We used this presentation within our company to increase the cybersecurity awareness of our employees. These 14 tips should help everybody to protect themselves against the most obvious cyber attacks.
** CyberSecurity Certification Training: https://www.edureka.co/cybersecurity-certification-training **
This Edureka tutorial on "Cybersecurity Frameworks" will help you understand why and how the organizations are using the cybersecurity framework to Identify, Protect and Recover from cyber attacks.
Cybersecurity Training Playlist: https://bit.ly/2NqcTQV
This document discusses cyber security. It defines cyber security as technologies and processes designed to protect computers, networks, and data from unauthorized access and attacks over the internet. The three core principles of cyber security are confidentiality, integrity, and availability. Several types of cyber attacks are described such as malware, phishing, and denial of service attacks. Major historical cyber attacks are outlined including the Morris Worm in 1988 and the Anthem hack in 2015 that breached 80 million records. Common attack patterns and measures to prevent cyber attacks like using complex passwords and encryption are also summarized.
Cyber Security Awareness introduction. Why is Cyber Security important? What do I have to do to protect me from Cyber attacks? How to create a IT Security Awareness Plan ?
Malicious threats like malware, phishing, and social engineering pose ongoing risks to organizations. To help prevent data breaches and cyberattacks, it is important to take preventive measures such as using antivirus software on all devices, implementing strong password policies and two-factor authentication, filtering web content and email attachments, and keeping devices updated. Employee education is also key to avoiding human errors like falling for phishing scams or inadvertently disclosing sensitive information.
This is a basic presentation about cybersecurity to share awareness about various security threats and how you can protect yourself from them. In the preview window the formatting is off, but when downloaded it can be viewed with no problems. This is for my Info Security Policy Management class at Governors State University.
This document discusses cyber crime and security. It begins with an overview of topics to be covered, including the history and basics of cyber crimes, various categories of cyber crimes, and motivations for cyber attacks. It then discusses the history of cyber crimes and defines cyber attacks and cyber crimes. Various types of cyber crimes are outlined, including those against persons, property, and government. Common cyber crime techniques like social engineering, viruses, and ransomware are explained. The document notes that cyber crime groups are starting to operate more like organized crime rings. It concludes by discussing how opportunities provided by Web 2.0 technologies can be exploited for cyber crimes.
This document provides training on cybersecurity best practices for Borough of West Chester personnel. It defines cybersecurity as protecting information and systems from unauthorized access, use, disclosure, disruption or destruction. It outlines common cyber threats like viruses, worms, ransomware, and social engineering. It emphasizes using strong passwords, antivirus software, firewalls, and regular software updates. It also recommends avoiding malicious emails and websites, and backing up important data.
This document discusses cyber security. It begins by defining cyber security as the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attacks, damage, or unauthorized access. It notes that cyber security is important because organizations collect, store, and process unprecedented amounts of data that needs protection. Some common cyber threats discussed include cyberterrorism, cyberwarfare, cyberspionage, and attacks targeting critical infrastructure, networks, applications, cloud systems, and internet of things devices. The document also examines cyber attack life cycles and common prevention methods.
Cyber Security Overview for Small BusinessesCharles Cline
Defining cyber security
Identifying information that your small business should secure
Identifying the types of cyber threats against small businesses
Small business risk management
Small business best practices for guarding against cyber threats
This document provides an overview of cyber security and discusses recent issues in India. It begins with definitions of cyberspace and discusses the rapid growth of internet connectivity globally and in India. It then covers cyber security challenges, the evolution of threats, and recent cyber attacks impacting India. The document concludes with 10 steps for organizations to improve cyber security, such as network security, malware protection, user education, and information risk management.
Building An Information Security Awareness ProgramBill Gardner
Most organization’s Security Awareness Programs suck. They involved ‘canned’ video presentations or someone is HR explaining computer use policies. Others are extremely expensive and beyond the reach of the budgets of smaller organizations. This talk will show you how to build a Security Awareness Program from scratch for little or no money, and how to engage your users so that they get the most out of the program.
Cyber security awareness training by cyber security infotech(csi), Information Security,
website development company,
Employee Monitoring System,
Employee Monitoring Software
Cyber Security is: “Protection of information systems against unauthorized access to or modification of information, whether in storage, processing or transit, and against the denial of service to authorized users, including those measures necessary to detect, document, and counter such threats.”
Slides produced for a workshop on measures to use to protect your computer and system security. By Computer Troubleshooters, Dayton, Ohio. February 15, 2014
This document provides best practices for online security and protecting personal information. It discusses the risks of sharing personal data online like passwords being cracked, social engineering, phishing emails, malware, and man-in-the-middle attacks. The document recommends using strong, unique passwords, two-factor authentication, privacy screens, firewalls, antivirus software, web filtering, encrypted backups, HTTPS browsing, and avoiding phishing. Following these practices can help better secure personal information in an increasingly connected digital world.
Cybersafety is the safe and responsible use of information and communication technology. It is about keeping information safe and secure, but also about being responsible with that information, being respectful of other people online, and using good 'netiquette' (internet etiquette).
This document discusses various computing ethics and security best practices. It recommends regularly updating software, using antivirus software, strong and unique passwords, and caution when downloading files or entering personal information online. It warns about phishing scams, social engineering tricks, and protecting information in public places like internet cafes. The overall message is that practicing basic online safety and being wary of potential threats can help avoid most cyber dangers.
The document provides information on information security awareness and basic training. It covers topics such as why information security is important, data classification, the 90/10 rule of security, phishing, email attachments, spam, passwords, malware, internet safety, public Wi-Fi, IoT devices, HTTPS, web content filtering, and search engine safety. The document provides tips and explanations for each topic to help improve user security practices.
Company names mentioned herein are the property of, and may be trademarks of, their respective owners and are for educational purposes only.
*
Compiled and designed by Mark Fullbright, Certified Identity Theft Risk Management Specialist™ (CITRMS) as a free service for consumers to protect themselves online and reduce their exposure to identity theft. Stay Safe, Stay Secure
User awareness and security practices are important for protecting against cyber threats. It is not possible to ensure 100% security through technology alone. Individual responsibility and following best practices are key to a successful security program. The document outlines various cyber threats like viruses, social engineering, and password cracking. It emphasizes the importance of security awareness, strong passwords, keeping systems updated, anti-virus software, and careful handling of personal information. Multiple layers of security through practices like firewalls, access control, and backups can help bolster defenses.
This document provides an overview of cybersecurity topics including the importance of cybersecurity, leading threats such as viruses, worms, and social engineering, best practices to avoid threats such as using strong passwords and antivirus software, and what to do if a cybersecurity incident is suspected. Key points covered include the risks of identity theft and data loss if security is not followed, common vectors for vulnerabilities exploited by cyber criminals, and the need to protect systems in the same way doors are secured at home.
This document provides an overview of cybersecurity topics including the importance of cybersecurity, leading threats such as viruses, worms, and social engineering, best practices to avoid threats such as using strong passwords and antivirus software, and what to do if a cybersecurity incident is suspected. Key points covered include the risks of identity theft and data loss if security is not followed, common vectors for vulnerabilities exploited by cyber criminals, and the need to protect systems using multiple layers of defense.
Cybersecurity is important to protect individuals and organizations from threats on the internet. The top threats include viruses, worms, Trojan horses, social engineering, rootkits, and botnets. To avoid these threats, best practices include using strong passwords, keeping systems updated, using firewalls and antivirus software, avoiding suspicious emails and downloads, and practicing cybersecurity awareness. Following guidelines for passwords, software updates, and caution with emails and downloads can help reduce cybersecurity risks.
This document provides an overview of cybersecurity topics including the importance of cybersecurity, leading threats such as viruses, worms, and social engineering, best practices to avoid threats such as using strong passwords and antivirus software, and what to do if a cybersecurity incident is suspected. Key points covered include the risks of identity theft and data loss if security is not followed, common vectors for vulnerabilities exploited by cyber criminals, and the need to protect systems in the same way doors are secured at home.
The document provides recommendations for building a culture of security within an organization. It discusses 10 key areas of focus: social engineering, phishing and spear phishing, internet browsing, social networking, bring your own devices, passwords, encryption, data retention, Wi-Fi security, and insider threats. For each area, it provides tips to train employees such as being wary of urgent requests, using strong and unique passwords, only accessing approved networks, and reporting suspicious insider behavior. The overall recommendations are aimed at establishing security best practices for employees across how they manage credentials, share data, and connect both inside and outside the workplace.
The document provides tips for protecting yourself online, including using firewall and antivirus software, strong and unique passwords, being wary of email attachments, links and requests for sensitive information. It warns that public WiFi connections are not secure and outlines common phishing scams targeting banking credentials and sensitive personal information through social media.
Similar to Cyber security for small businesses (20)
This presentation shows 5 basic Google marketing tools for small businesses and nonprofit organization. Prepared by #OhioBusinessHelp.com and Rob Bunting of CIG
This marketing plan template was developed as a marketing tool for small businesses and nonprofit organizations to create successful marketing campaigns. Online or telephone assistance can be obtained using the enclosed links. In person consulting is available in the Dayton area.
A more complete slide presentation is available by request to art@ohiobusinesshelp.com
A workshop designed for small non-profit organizations to help them use online marketing to increase donations, attract Board Members and Volunteers. Audience targeting, developing compelling messaging, and selecting the right media are demonstrated in this presentation. A template is provided to be used as an aid to implementing effective online marketing. Contact Art@ohiobusinesshelp.com
Marketing methods for nonprofit organizations of all types to build effective relationships with donors, volunteers, and clients. Addresses how to create effective social media, email, and web-based marketing programs at low cost and time requirements.
An orientation to internet based marketing for small business owners. Topics addressed include building a website, good website design practices, website search engine optimization, use of google SEO, and social media marketing. This is the first of a series of 5 workshops. Contact b2bplanner for more information.
This document provides an overview of effective web-based marketing strategies for small businesses. It discusses using a combination of digital marketing techniques, including building an optimized website, search engine optimization, social media engagement, and paid advertising. The presentation recommends starting with defining the target audience and unique value proposition, then developing content and an online presence across multiple digital channels. Metrics and ongoing optimization are important to measure success and improve digital marketing efforts over time.
Low Temperature Plasma Coating of Silica Powder and Polymer MembranesB2BPlanner Ltd.
Nanocoating for silica powder and polymer membranes using low temperature plasma in a vacuum to modify hydrophobicity. Capabilities of Ecosil Technologies LLC.
An orientation workshop presentation for people new to digital marketing. The first of a series of 5 workshops on web-based marketing. Contact me for worksheets on this workshop and other materials. www.ohiobusinesshelp.com
Sales and marketing manager in Dayton and Cincinnati area of Ohio. Experience in business to business sales in manufacturing and chemical industries. Leadership and management skills. Bachelors and Masters degrees in engineering, MBA, and Registered Professional Engineer.
Arthur Helmstetter has over 30 years of experience in general management, distribution, marketing, and business strategy roles. He is currently the Director of Strategic Partner Development at Ecosil Technologies, where he identifies markets and develops distribution partners. Previously, he held director roles at Quaker Chemical Corporation, growing sales and managing distribution networks. Earlier in his career, he co-founded and led Seiler Pollution Control Systems and held several management positions with Sytech Environmental Corporation. He has an MBA and MS in Mechanical Engineering.
Simple Small Business Strategic Planning ToolB2BPlanner Ltd.
The document outlines a small business strategy development process. It begins with understanding the current situation, analyzing internal and external factors, deciding on a strategy, and taking action. A SWOT analysis and consideration of goals, objectives, strategies, and action items are key parts of the planning process. Regular monitoring and updates are needed as strategies can fail due to a lack of focus, inaccurate information, or not adapting to changes.
Explore the key differences between silicone sponge rubber and foam rubber in this comprehensive presentation. Learn about their unique properties, manufacturing processes, and applications across various industries. Discover how each material performs in terms of temperature resistance, chemical resistance, and cost-effectiveness. Gain insights from real-world case studies and make informed decisions for your projects.
1. Cyber-Security Workshop
June 26
Time: 8 - 10 AM
Location: Madison LakesTraining &
Conference Center
581 Olive Road
Dayton, OH
2. • Providing mentoring and training to those
Preparing to start up a business
To existing small business owners
Wanting to grow
Needing to improve performance
• Mentoring is “free and forever”
• Seminars are at no or a small charge
•www.daytonscore.org - 937-225-2887
3. Niki Chaudhry
• 35 years - business experience
• Started and Grew two businesses to $25 MM
• Owner-investor in three small businesses
• Trainer for Web-Based Marketing
• Education:
MBA,
BS & MS Engineering,
• 25 years computer experience
Programmer
System Analyst
• President CEO and owner
Linked Technologies Inc.
• Education
BS Computer Science
CEO, LinkedTechnologies, Inc.
Computer Services
Owner, B2B Planners Ltd.
6. You share your computer with others
You travel and use publicWiFi
Personal & financial data is on your
computer
Business files are on your computer
You use a smartphone like a computer
You are runningWindows XP
7. What is Cyber-Security?
Protecting your computer,
network, and information
from online threats
What is Cyber-Crime?
Any crime conducted via
the Internet to cause
damage or steal data
8. Why do hackers hack?
Steal money
Collect information to steal money, or
commit identity theft
Why attack small companies?
Least secure in general
Unwary users
9. Hardware
UnsecuredWi-Fi (Panera)
No Router
Router with default password
Software
No anti-virus/anti-spyware
No Firewall
Old virus definitions
Out of date Windows O.S.
Personal Behavior
Failure to use strong passwords
Clicking on unsafe links or emails
Downloading questionable files
Leaving computer logged on
Leaving your computer accessible
10. VirusType Impact Solution Cash Cost
MinorVirus Lose some data
2- 4 hours
Use installed
anti-virus
$75-100
MajorVirus Loss of docs
5-10 hours
Use service to
remove
$100-$130
Catastrophic
Virus
Loss of ALL data
& photos
15+ hours
Use service to
wipe & reload
entire system
$300- $$$
Also Add What isYOUR time worth? $25, $50 $75?
11. Change your operating system
No option will be fun or easy
Done with Microsoft? Switch to Apple or Linux
Want to stay? Update to 8.1 which works fine
You will probably need to buy a new computer
Go to a reputable reseller and buy a used
computer loaded with Windows 7
16. • Closes and locks “open
doors”
• Keeps intruders and
unknowns out
• Allows the recognized
& trusted in
• Not perfect, Cyber-
criminals exploit trusted
doors
• May block desired sites
17. The First Line of Defense
“Hides” your network and computers from
being directly accessible on the Internet
Routers Can Provide Firewall Protection
19. Access Router via your web
browser
Enter your Routers IP Address
Enter the default username &
password
Find administration settings
Select Change/Reset Password
Tip:To Find IP address go to your PC’s
Control Panel > Network and Internet > Network and Sharing Center and click on your network
20. Rule #1
Require a password to access your computer
Why?
Prevents unauthorized access
Provides a first line of defense
Prevents easy access from a
network
TIP: Set up automatic lockout that requires a
password. A good timeout value is 5 to 10 minutes.
21. Rule #2
Don’t forget your cell phone
Use strong passwords –
>8 characters, letters, numbers and symbols
Use “coded” phrases (e.g. H@m5t3@k!)
Don’t store passwords in a file (unencrypted)
Don’t keep them near the computer
Use a password vault such as “Lastpass”
22. Makes files and disks unreadable without the encryption
key
You can encrypt:
Hard Drive or USB Drive –Windows BitLocker
Windows 7 upgrade $139,Windows 8.1 included.
Start button>all programs>Windows anytime upgrade
Individual Files – Axcrypt– Free open source
Business Email – using a virtual personal network (VPN)
Windows 7 Start button > typeVPN into the program search window
Protects against theft or loss of a computer
23. Confidential Information your business is
required to protect with encryption includes:
Medical Data defined by HIPAA
(Health Insurance Portability and Accountability Act)
Must also include staff training
Financial Data defined by PIC
(Payment Card Industry)
Do NOT permanently store card data on your system
Recommend using 3rd party providers
24. SPAM Filters
Keeps out email from
unknown senders
Catches majority of SPAM
Catches non-SPAM
Allows known email
SPAM Filters aren’t
perfect!
WEB Filters
Prohibits bad websites
Pre-examines website
content and warns you
Catches good websites
Allows known websites
Web filters aren’t
perfect!
25. • Anti-Virus & Anti-
Spyware Programs
• Scans email,
attachments files, &
downloads
• Detects threats and
Removes them
• Not perfect, does not
detect everything,
cannot remove all
threats
26. You and your employees are the
last line of defense
After all the layers of protection,
you are the decision maker
DENY !!!
Cyber Security Part III
27. If you provide Wi-Fi for Customers
1. Your existing router may have a “guest” feature
1. Be sure to useWPA2 encryption on your Private Network
2. Verify firewall
Install dedicated customer “hot spot” hardware and software
Does not require company to have anyWi-Fi exposure.
Protect private proprietary information from public users.
• Improve customer internet experience and security
• Include filtering to avoid risky or offensive websites
• Provides features such as terms of service or time limits.
2. Worry free 24x7Technical Support, Monitoring, & Maintenance
28.
29. Provide security training
Have company policies
For email & internet use
Company & confidential information
Make them written and update them
Limit administrative and password access
Restrict software on company computers
30. Control Downloads of Software
Never allow “pirate” websites
music, games, movies (BitTorrent)
Beware of ALL free software, know the source
Danger areas
Adobe Flash files – update often
Shortened urls you can’t check – know the source
Email attachments or links – hover over “click here”
31. S ource of file?
T ype & size of file?
O thers recommend?
P repared to scan?
This is a fake anti-virus program. Once loaded it claims your computer
is infected and directs you to to buy the program via credit card.
32. Type Source Purpose Protection
Virus Email
Ads
Links
Warnings
Updates
Malicious attack
Disable your computer
Destroy your data
Anti-virus software
Firewall software
Firewall hardware
Data back-up
Phishing Email
Website
Steal Identity or money Surfing behavior
Adware Ads Virus delivery, steal
information
Good practices
Spyware Steal personal
information
Anti-spyware & firewall
software
Tip: Have both Anti-Virus AND Anti-Spyware installed on your computer..
But DO NOT install two anti-virus programs.
33. These scams will come in the form of:
Email (phishing)
Website (pharming)
Phone Call (vishing)
Text Message (smishing)
A Combination ofThese
34. Requests personal information?
Contains grammatical errors or
misspellings?
How do they address you?
Is it too good to be true?
Have you checked the link?
Tip: “Mouse Over” Does the website URL look legitimate?
Tip: Legitimate companies will NEVER ask you for personal or confidential
information via email, a website, telephone, or text message.
35. R eceived Before?
I nside Links?
S ensible Message?
Know sender?
This email link
delivers a Trojan
Virus right to your
computer
36. Tip: When installing programs pay attention to
installation options.They make you think you’re
declining, but you’re approving!
Beware of search engine results
Do not download unknown or
free software
“Unclick”/DECLINE any
OPTIONAL Downloads or
Toolbars
Use Sucuri Site Check
http://sitecheck.sucuri.net/
37. Only login or send personal information to websites you
know are encrypted
A website is encrypted when you see the “lock” symbol or
https://
Beware of websites using encryption only on the login page
38. Don't stay signed in to accounts
When you are done, log out
Don’t do sensitive business on public WiFi
Don’t use the same password, vary it
Keep your browser(s) up-to-date
Or switch to Firefox Chrome, or Apple
39. Tip: Don’t use your browser to store passwords, not secure.
40. Do NOT friend, link, or message people you don’t know
Do not allow untrusted applications to access your account
Do not click on posted videos
NEVER POST
• You or your family’s full birthdates or
places of birth
• Your mother’s maiden name
• The names of young family members
• Your relationship status
43. Boots very slowly or hangs up
Responds slowly, crashes
Programs won’t run or crash
Popups, website redirection
Broken antivirus or security
Tip: You can “right click” on the task bar and select the “Task
Manager” to see the memory and CPU usage that is currently
taking place on your computer. Should not be constantly 100%.
45. Tip:
A foolproof way to keep a
virus from stealing your
personal info - disconnect
the network cable or turn
off theWi-Fi. THEN take
action.
46. Anti-virus can’t remove it
Computer is not unusable
Your files are missing
You must manually edit Windows
Your not absolutely sure your actions
won’t make matters worse!
48. External Hard Drive Backup
Windows Backup
Time Machine (Mac)
Cloud Backup
Carbonite
CrashPlan
File Sync Service
(not really a backup)
Dropbox
Google Drive
REGULAR BACKUP
JUST DO IT.
49. Step by StepTutorial at:
http://www.slideshare.net/B2BPlanner/file-back-up-using-windows-7-back
50.
51. Backup saves/restores your data files
Backup also creates a separate system image
for restoring programs &Windows
Overwrites EVERYTHING when restored
Can only be used if a system repair disk was created
52. Hardware or
Software
Cost of
Required
Suggested Source
Router $50 Various – Netgear, Linksys, Belcan, et. Al.
Cloud backup OR
External Hard Drive
$60/year
$75 once
Carbonite - www.carbonite.com
Windows Backup Software
Anti-Virus $40/year AVG Antivirus – www.avg.com
Firewall $0 Windows Firewall
Anti-Spyware $0 Malwarebytes – www.malwarebytes.org
Anti-spam $0 Built in to Apple Mail & Outlook, need setup
Password vault $0 Great, but dangerous - Lastpass
Total cost $150 -$165 Do it yourself cost
(Complete packages, installation, and training
available from ComputerTroubleshooters)
53. 1. Use a Router to hides your computer/network
2. Make sure yourWindows Firewall is enabled
3. Use strong passwords on your Router and Computer
4. Use anti-virus/anti-spyware to detect/remove
malware
5. Backup your files and data – regularly
6. Practice safe surfing: if you aren’t sure, don’t click!
How many people in the audience have fire insurance?
How many people in the audience have Cyber Insurance?
The degree of devastation to your business could actually be greater from Cyber attack than a fire.
Like a fire, prevention is the best way to protect yourself from damage from Cyber attack.
An the best way to prevent Cyber attack is to have a plan for an ongoing process that continuously checked and updated, just like fire extinguishers are checked and updated.
Although everyone is at risk of attack, certain situations place your computer at higher risk.
How many people have 4 or more of these risk factors
Types of information stolen:
Credit card info
Online bank account information
Confidential information like SSN, addresses, phone #s
Stock trading data, brokerage statements
Tax return information
Medical information
Email addresses for SPAM and SCAMs
Your PC security system can be viewed as a series of protective layers that each provide protection against specific threats. Most of them depend on you being knowledgeable and diligent in using good practices when using the internet.
Router is the First Line of Defense
“Hides” your network and computers from being directly accessible on the Internet
Routers Can Provide Firewall Protection
Prevents unauthorized access when your not around
Provides a first line of defense in case of computer theft
Prevent hackers from gaining easy access if they get inside your network
What AntiVirus do you use?
The big boys concentrate on advertising (Norton, McAfee)
Not as efficient as others
This helps detect/protect you from more kinds of malware than just Anti-Virus
Sometimes a scam artist will first contact you “benignly” as bait to lure you into a conversation. They then follow that up with the scam after gaining your trust.
Other times, the scam artist will contact you directly asking for information for a seemingly valid reason.
High or zero network activity
High CPU and/or memory usage