SlideShare a Scribd company logo
 Cyber-Security Workshop
 June 26
 Time: 8 - 10 AM
 Location: Madison LakesTraining &
Conference Center
581 Olive Road
Dayton, OH
• Providing mentoring and training to those
 Preparing to start up a business
 To existing small business owners
 Wanting to grow
 Needing to improve performance
• Mentoring is “free and forever”
• Seminars are at no or a small charge
•www.daytonscore.org - 937-225-2887
Niki Chaudhry
• 35 years - business experience
• Started and Grew two businesses to $25 MM
• Owner-investor in three small businesses
• Trainer for Web-Based Marketing
• Education:
 MBA,
BS & MS Engineering,
• 25 years computer experience
Programmer
System Analyst
• President CEO and owner
Linked Technologies Inc.
• Education
 BS Computer Science
CEO, LinkedTechnologies, Inc.
Computer Services
Owner, B2B Planners Ltd.
What If?
Security is a process-not software or hardware
 You share your computer with others
 You travel and use publicWiFi
 Personal & financial data is on your
computer
 Business files are on your computer
 You use a smartphone like a computer
 You are runningWindows XP
What is Cyber-Security?
Protecting your computer,
network, and information
from online threats
What is Cyber-Crime?
Any crime conducted via
the Internet to cause
damage or steal data
 Why do hackers hack?
 Steal money
 Collect information to steal money, or
commit identity theft
 Why attack small companies?
 Least secure in general
 Unwary users
 Hardware
 UnsecuredWi-Fi (Panera)
 No Router
 Router with default password
 Software
 No anti-virus/anti-spyware
 No Firewall
 Old virus definitions
 Out of date Windows O.S.
 Personal Behavior
 Failure to use strong passwords
 Clicking on unsafe links or emails
 Downloading questionable files
 Leaving computer logged on
 Leaving your computer accessible
VirusType Impact Solution Cash Cost
MinorVirus Lose some data
2- 4 hours
Use installed
anti-virus
$75-100
MajorVirus Loss of docs
5-10 hours
Use service to
remove
$100-$130
Catastrophic
Virus
Loss of ALL data
& photos
15+ hours
Use service to
wipe & reload
entire system
$300- $$$
Also Add What isYOUR time worth? $25, $50 $75?
 Change your operating system
 No option will be fun or easy
 Done with Microsoft? Switch to Apple or Linux
 Want to stay? Update to 8.1 which works fine
You will probably need to buy a new computer
 Go to a reputable reseller and buy a used
computer loaded with Windows 7
Cyber Security Part II
Firewall
SPAM Filter
Web Filter
Anti-Malware
People!
Backup
YOUR INFO!
Passwords
1
2
3
4
. 5 6
Conceal
Deny
Detect
Filter
Decide
Router
• Closes and locks “open
doors”
• Keeps intruders and
unknowns out
• Allows the recognized
& trusted in
• Not perfect, Cyber-
criminals exploit trusted
doors
• May block desired sites
 The First Line of Defense
 “Hides” your network and computers from
being directly accessible on the Internet
 Routers Can Provide Firewall Protection
Default Usernames/Passwords for most routers can also be found at:
http://portforward.com/default_username_password
 Access Router via your web
browser
 Enter your Routers IP Address
 Enter the default username &
password
 Find administration settings
 Select Change/Reset Password
Tip:To Find IP address go to your PC’s
Control Panel > Network and Internet > Network and Sharing Center and click on your network
 Rule #1
 Require a password to access your computer
 Why?
 Prevents unauthorized access
 Provides a first line of defense
 Prevents easy access from a
network
TIP: Set up automatic lockout that requires a
password. A good timeout value is 5 to 10 minutes.
 Rule #2
 Don’t forget your cell phone
 Use strong passwords –
 >8 characters, letters, numbers and symbols
 Use “coded” phrases (e.g. H@m5t3@k!)
 Don’t store passwords in a file (unencrypted)
 Don’t keep them near the computer
 Use a password vault such as “Lastpass”
 Makes files and disks unreadable without the encryption
key
 You can encrypt:
 Hard Drive or USB Drive –Windows BitLocker
Windows 7 upgrade $139,Windows 8.1 included.
Start button>all programs>Windows anytime upgrade
 Individual Files – Axcrypt– Free open source
 Business Email – using a virtual personal network (VPN)
Windows 7 Start button > typeVPN into the program search window
 Protects against theft or loss of a computer
 Confidential Information your business is
required to protect with encryption includes:
 Medical Data defined by HIPAA
 (Health Insurance Portability and Accountability Act)
 Must also include staff training
 Financial Data defined by PIC
 (Payment Card Industry)
 Do NOT permanently store card data on your system
 Recommend using 3rd party providers
SPAM Filters
 Keeps out email from
unknown senders
 Catches majority of SPAM
 Catches non-SPAM
 Allows known email
 SPAM Filters aren’t
perfect!
WEB Filters
 Prohibits bad websites
 Pre-examines website
content and warns you
 Catches good websites
 Allows known websites
 Web filters aren’t
perfect!
• Anti-Virus & Anti-
Spyware Programs
• Scans email,
attachments files, &
downloads
• Detects threats and
Removes them
• Not perfect, does not
detect everything,
cannot remove all
threats
You and your employees are the
last line of defense
After all the layers of protection,
you are the decision maker
DENY !!!
Cyber Security Part III
 If you provide Wi-Fi for Customers
1. Your existing router may have a “guest” feature
1. Be sure to useWPA2 encryption on your Private Network
2. Verify firewall
Install dedicated customer “hot spot” hardware and software
Does not require company to have anyWi-Fi exposure.
Protect private proprietary information from public users.
• Improve customer internet experience and security
• Include filtering to avoid risky or offensive websites
• Provides features such as terms of service or time limits.
2. Worry free 24x7Technical Support, Monitoring, & Maintenance
 Provide security training
 Have company policies
For email & internet use
Company & confidential information
Make them written and update them
 Limit administrative and password access
 Restrict software on company computers
Control Downloads of Software
Never allow “pirate” websites
music, games, movies (BitTorrent)
Beware of ALL free software, know the source
Danger areas
Adobe Flash files – update often
Shortened urls you can’t check – know the source
Email attachments or links – hover over “click here”
S ource of file?
T ype & size of file?
O thers recommend?
P repared to scan?
This is a fake anti-virus program. Once loaded it claims your computer
is infected and directs you to to buy the program via credit card.
Type Source Purpose Protection
Virus Email
Ads
Links
Warnings
Updates
Malicious attack
Disable your computer
Destroy your data
Anti-virus software
Firewall software
Firewall hardware
Data back-up
Phishing Email
Website
Steal Identity or money Surfing behavior
Adware Ads Virus delivery, steal
information
Good practices
Spyware Steal personal
information
Anti-spyware & firewall
software
Tip: Have both Anti-Virus AND Anti-Spyware installed on your computer..
But DO NOT install two anti-virus programs.
 These scams will come in the form of:
 Email (phishing)
 Website (pharming)
 Phone Call (vishing)
 Text Message (smishing)
 A Combination ofThese
 Requests personal information?
 Contains grammatical errors or
misspellings?
 How do they address you?
 Is it too good to be true?
 Have you checked the link?
Tip: “Mouse Over” Does the website URL look legitimate?
Tip: Legitimate companies will NEVER ask you for personal or confidential
information via email, a website, telephone, or text message.
R eceived Before?
I nside Links?
S ensible Message?
Know sender?
This email link
delivers a Trojan
Virus right to your
computer
Tip: When installing programs pay attention to
installation options.They make you think you’re
declining, but you’re approving!
 Beware of search engine results
 Do not download unknown or
free software
 “Unclick”/DECLINE any
OPTIONAL Downloads or
Toolbars
 Use Sucuri Site Check
http://sitecheck.sucuri.net/
 Only login or send personal information to websites you
know are encrypted
 A website is encrypted when you see the “lock” symbol or
https://
 Beware of websites using encryption only on the login page
 Don't stay signed in to accounts
 When you are done, log out
 Don’t do sensitive business on public WiFi
 Don’t use the same password, vary it
 Keep your browser(s) up-to-date
 Or switch to Firefox Chrome, or Apple
Tip: Don’t use your browser to store passwords, not secure.
 Do NOT friend, link, or message people you don’t know
 Do not allow untrusted applications to access your account
 Do not click on posted videos
NEVER POST
• You or your family’s full birthdates or
places of birth
• Your mother’s maiden name
• The names of young family members
• Your relationship status
Cyber Security Part IV
 Boots very slowly or hangs up
 Responds slowly, crashes
 Programs won’t run or crash
 Popups, website redirection
 Broken antivirus or security
Tip: You can “right click” on the task bar and select the “Task
Manager” to see the memory and CPU usage that is currently
taking place on your computer. Should not be constantly 100%.
http://www.youtube.com/watch?v=LGtq_el4p_8
Tip:
A foolproof way to keep a
virus from stealing your
personal info - disconnect
the network cable or turn
off theWi-Fi. THEN take
action.
 Anti-virus can’t remove it
 Computer is not unusable
 Your files are missing
 You must manually edit Windows
 Your not absolutely sure your actions
won’t make matters worse!
Home PC Security PartV
 External Hard Drive Backup
 Windows Backup
 Time Machine (Mac)
 Cloud Backup
 Carbonite
 CrashPlan
 File Sync Service
(not really a backup)
 Dropbox
 Google Drive
REGULAR BACKUP
JUST DO IT.
Step by StepTutorial at:
http://www.slideshare.net/B2BPlanner/file-back-up-using-windows-7-back
 Backup saves/restores your data files
 Backup also creates a separate system image
for restoring programs &Windows
 Overwrites EVERYTHING when restored
 Can only be used if a system repair disk was created
Hardware or
Software
Cost of
Required
Suggested Source
Router $50 Various – Netgear, Linksys, Belcan, et. Al.
Cloud backup OR
External Hard Drive
$60/year
$75 once
Carbonite - www.carbonite.com
Windows Backup Software
Anti-Virus $40/year AVG Antivirus – www.avg.com
Firewall $0 Windows Firewall
Anti-Spyware $0 Malwarebytes – www.malwarebytes.org
Anti-spam $0 Built in to Apple Mail & Outlook, need setup
Password vault $0 Great, but dangerous - Lastpass
Total cost $150 -$165 Do it yourself cost
(Complete packages, installation, and training
available from ComputerTroubleshooters)
1. Use a Router to hides your computer/network
2. Make sure yourWindows Firewall is enabled
3. Use strong passwords on your Router and Computer
4. Use anti-virus/anti-spyware to detect/remove
malware
5. Backup your files and data – regularly
6. Practice safe surfing: if you aren’t sure, don’t click!
 Questions?

More Related Content

What's hot

Cyber Security Best Practices
Cyber Security Best PracticesCyber Security Best Practices
Cyber Security Best Practices
Evolve IP
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
Daniel P Wallace
 
Cyber crime
Cyber crimeCyber crime
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
R_Yanus
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
Michel Bitter
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness training
AbdalrhmanTHassan
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Edureka!
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
Vaishak Chandran
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
Ramiro Cid
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
Jen Ruhman
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
JoshuaWisniewski3
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
sweetpeace1
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
William Mann
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
Dmitriy Scherbina
 
Cyber security
Cyber securityCyber security
Cyber security
Bhavin Shah
 
Cyber Security Overview for Small Businesses
Cyber Security Overview for Small BusinessesCyber Security Overview for Small Businesses
Cyber Security Overview for Small Businesses
Charles Cline
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber Security
Nikunj Thakkar
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness Program
Bill Gardner
 
Cyber security
Cyber securityCyber security
Cyber security
Manjushree Mashal
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)
Cyber Security Infotech
 

What's hot (20)

Cyber Security Best Practices
Cyber Security Best PracticesCyber Security Best Practices
Cyber Security Best Practices
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness training
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security Overview for Small Businesses
Cyber Security Overview for Small BusinessesCyber Security Overview for Small Businesses
Cyber Security Overview for Small Businesses
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber Security
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness Program
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)
 

Similar to Cyber security for small businesses

Cyber Security School Workshop
Cyber Security School WorkshopCyber Security School Workshop
Cyber Security School Workshop
Rahul Nayan
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
B2BPlanner Ltd.
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
amiinaaa
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Adeel Younas
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security Tips
Infusionsoft
 
Cyber Security
Cyber SecurityCyber Security
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptxORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
PiedadCES
 
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptxORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
JohnSimLabayan2
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security Seminar
Jeremy Quadri
 
Meeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeMeeting the Cybersecurity Challenge
Meeting the Cybersecurity Challenge
Net at Work
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
mateenzero
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006
Ben Rothke
 
A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet
- Mark - Fullbright
 
User security awareness
User security awarenessUser security awareness
User security awareness
K. A. M Lutfullah
 
Awareness Security 123.pptx
Awareness Security 123.pptxAwareness Security 123.pptx
Awareness Security 123.pptx
RajuSingh730938
 
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxUSG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptx
BilmyRikas
 
USG_Security_Awareness_Primer (1).pptx
USG_Security_Awareness_Primer (1).pptxUSG_Security_Awareness_Primer (1).pptx
USG_Security_Awareness_Primer (1).pptx
ssuser59e4b8
 
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxUSG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptx
sumita02
 
Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
Courion Corporation
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself Online
Gary Wagnon
 

Similar to Cyber security for small businesses (20)

Cyber Security School Workshop
Cyber Security School WorkshopCyber Security School Workshop
Cyber Security School Workshop
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security Tips
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptxORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
 
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptxORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security Seminar
 
Meeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeMeeting the Cybersecurity Challenge
Meeting the Cybersecurity Challenge
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006
 
A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet
 
User security awareness
User security awarenessUser security awareness
User security awareness
 
Awareness Security 123.pptx
Awareness Security 123.pptxAwareness Security 123.pptx
Awareness Security 123.pptx
 
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxUSG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptx
 
USG_Security_Awareness_Primer (1).pptx
USG_Security_Awareness_Primer (1).pptxUSG_Security_Awareness_Primer (1).pptx
USG_Security_Awareness_Primer (1).pptx
 
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxUSG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptx
 
Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself Online
 

More from B2BPlanner Ltd.

Major Gifts Fundraising Training 2020
Major Gifts Fundraising Training 2020 Major Gifts Fundraising Training 2020
Major Gifts Fundraising Training 2020
B2BPlanner Ltd.
 
Google Marketing Tools 2018
Google Marketing Tools 2018Google Marketing Tools 2018
Google Marketing Tools 2018
B2BPlanner Ltd.
 
Non-profit Marketing campaign template
Non-profit Marketing campaign templateNon-profit Marketing campaign template
Non-profit Marketing campaign template
B2BPlanner Ltd.
 
Basic Marketing for Nonprofit Organizations
Basic Marketing for Nonprofit OrganizationsBasic Marketing for Nonprofit Organizations
Basic Marketing for Nonprofit Organizations
B2BPlanner Ltd.
 
Marketing For Nonprofit Organizations
Marketing For Nonprofit OrganizationsMarketing For Nonprofit Organizations
Marketing For Nonprofit Organizations
B2BPlanner Ltd.
 
Web basedmarketing Dayton SCORE 12 4 2013
Web basedmarketing Dayton SCORE 12 4 2013Web basedmarketing Dayton SCORE 12 4 2013
Web basedmarketing Dayton SCORE 12 4 2013
B2BPlanner Ltd.
 
Web Based Marketing 2014
Web Based Marketing 2014Web Based Marketing 2014
Web Based Marketing 2014
B2BPlanner Ltd.
 
Low Temperature Plasma Coating of Silica Powder and Polymer Membranes
Low Temperature Plasma Coating of Silica Powder and Polymer MembranesLow Temperature Plasma Coating of Silica Powder and Polymer Membranes
Low Temperature Plasma Coating of Silica Powder and Polymer Membranes
B2BPlanner Ltd.
 
Web Based Marketing
Web Based MarketingWeb Based Marketing
Web Based Marketing
B2BPlanner Ltd.
 
Helmstetter art 01 03 2012
Helmstetter art 01 03 2012Helmstetter art 01 03 2012
Helmstetter art 01 03 2012
B2BPlanner Ltd.
 
Helmstetter art resume gm 2 23 2012
Helmstetter art resume  gm 2 23 2012Helmstetter art resume  gm 2 23 2012
Helmstetter art resume gm 2 23 2012
B2BPlanner Ltd.
 
Simple Small Business Strategic Planning Tool
Simple Small Business Strategic Planning ToolSimple Small Business Strategic Planning Tool
Simple Small Business Strategic Planning Tool
B2BPlanner Ltd.
 

More from B2BPlanner Ltd. (12)

Major Gifts Fundraising Training 2020
Major Gifts Fundraising Training 2020 Major Gifts Fundraising Training 2020
Major Gifts Fundraising Training 2020
 
Google Marketing Tools 2018
Google Marketing Tools 2018Google Marketing Tools 2018
Google Marketing Tools 2018
 
Non-profit Marketing campaign template
Non-profit Marketing campaign templateNon-profit Marketing campaign template
Non-profit Marketing campaign template
 
Basic Marketing for Nonprofit Organizations
Basic Marketing for Nonprofit OrganizationsBasic Marketing for Nonprofit Organizations
Basic Marketing for Nonprofit Organizations
 
Marketing For Nonprofit Organizations
Marketing For Nonprofit OrganizationsMarketing For Nonprofit Organizations
Marketing For Nonprofit Organizations
 
Web basedmarketing Dayton SCORE 12 4 2013
Web basedmarketing Dayton SCORE 12 4 2013Web basedmarketing Dayton SCORE 12 4 2013
Web basedmarketing Dayton SCORE 12 4 2013
 
Web Based Marketing 2014
Web Based Marketing 2014Web Based Marketing 2014
Web Based Marketing 2014
 
Low Temperature Plasma Coating of Silica Powder and Polymer Membranes
Low Temperature Plasma Coating of Silica Powder and Polymer MembranesLow Temperature Plasma Coating of Silica Powder and Polymer Membranes
Low Temperature Plasma Coating of Silica Powder and Polymer Membranes
 
Web Based Marketing
Web Based MarketingWeb Based Marketing
Web Based Marketing
 
Helmstetter art 01 03 2012
Helmstetter art 01 03 2012Helmstetter art 01 03 2012
Helmstetter art 01 03 2012
 
Helmstetter art resume gm 2 23 2012
Helmstetter art resume  gm 2 23 2012Helmstetter art resume  gm 2 23 2012
Helmstetter art resume gm 2 23 2012
 
Simple Small Business Strategic Planning Tool
Simple Small Business Strategic Planning ToolSimple Small Business Strategic Planning Tool
Simple Small Business Strategic Planning Tool
 

Recently uploaded

VYAPAR TRENDS JUNE-2024 e-EDITION (VOL-2, ISSUE-05)
VYAPAR TRENDS JUNE-2024 e-EDITION (VOL-2, ISSUE-05)VYAPAR TRENDS JUNE-2024 e-EDITION (VOL-2, ISSUE-05)
VYAPAR TRENDS JUNE-2024 e-EDITION (VOL-2, ISSUE-05)
ftiiassociation
 
Exploring the Contrast Silicone Sponge Rubber Versus Foam Rubber.pptx
Exploring the Contrast Silicone Sponge Rubber Versus Foam Rubber.pptxExploring the Contrast Silicone Sponge Rubber Versus Foam Rubber.pptx
Exploring the Contrast Silicone Sponge Rubber Versus Foam Rubber.pptx
Elastostar Rubber Corporation
 
一比一原版(UAL毕业证)伦敦艺术大学毕业证如何办理
一比一原版(UAL毕业证)伦敦艺术大学毕业证如何办理一比一原版(UAL毕业证)伦敦艺术大学毕业证如何办理
一比一原版(UAL毕业证)伦敦艺术大学毕业证如何办理
ocqunu
 
Complete Self-write Restaurant Business Plan Guide for Entrepreneurs
Complete Self-write Restaurant Business Plan Guide for EntrepreneursComplete Self-write Restaurant Business Plan Guide for Entrepreneurs
Complete Self-write Restaurant Business Plan Guide for Entrepreneurs
Kopa Global Technologies
 
1比1定做(aub毕业证书)伯恩茅斯艺术大学毕业证硕士学历证书原版一模一样
1比1定做(aub毕业证书)伯恩茅斯艺术大学毕业证硕士学历证书原版一模一样1比1定做(aub毕业证书)伯恩茅斯艺术大学毕业证硕士学历证书原版一模一样
1比1定做(aub毕业证书)伯恩茅斯艺术大学毕业证硕士学历证书原版一模一样
es4hjcss
 
在线办理(uofc毕业证书)芝加哥大学毕业证学历学位证书原版一模一样
在线办理(uofc毕业证书)芝加哥大学毕业证学历学位证书原版一模一样在线办理(uofc毕业证书)芝加哥大学毕业证学历学位证书原版一模一样
在线办理(uofc毕业证书)芝加哥大学毕业证学历学位证书原版一模一样
pv4uhplv
 
1:1制作英国伦敦大学毕业证(london毕业证书)学历学位证书原版一模一样
1:1制作英国伦敦大学毕业证(london毕业证书)学历学位证书原版一模一样1:1制作英国伦敦大学毕业证(london毕业证书)学历学位证书原版一模一样
1:1制作英国伦敦大学毕业证(london毕业证书)学历学位证书原版一模一样
es4hjcss
 

Recently uploaded (7)

VYAPAR TRENDS JUNE-2024 e-EDITION (VOL-2, ISSUE-05)
VYAPAR TRENDS JUNE-2024 e-EDITION (VOL-2, ISSUE-05)VYAPAR TRENDS JUNE-2024 e-EDITION (VOL-2, ISSUE-05)
VYAPAR TRENDS JUNE-2024 e-EDITION (VOL-2, ISSUE-05)
 
Exploring the Contrast Silicone Sponge Rubber Versus Foam Rubber.pptx
Exploring the Contrast Silicone Sponge Rubber Versus Foam Rubber.pptxExploring the Contrast Silicone Sponge Rubber Versus Foam Rubber.pptx
Exploring the Contrast Silicone Sponge Rubber Versus Foam Rubber.pptx
 
一比一原版(UAL毕业证)伦敦艺术大学毕业证如何办理
一比一原版(UAL毕业证)伦敦艺术大学毕业证如何办理一比一原版(UAL毕业证)伦敦艺术大学毕业证如何办理
一比一原版(UAL毕业证)伦敦艺术大学毕业证如何办理
 
Complete Self-write Restaurant Business Plan Guide for Entrepreneurs
Complete Self-write Restaurant Business Plan Guide for EntrepreneursComplete Self-write Restaurant Business Plan Guide for Entrepreneurs
Complete Self-write Restaurant Business Plan Guide for Entrepreneurs
 
1比1定做(aub毕业证书)伯恩茅斯艺术大学毕业证硕士学历证书原版一模一样
1比1定做(aub毕业证书)伯恩茅斯艺术大学毕业证硕士学历证书原版一模一样1比1定做(aub毕业证书)伯恩茅斯艺术大学毕业证硕士学历证书原版一模一样
1比1定做(aub毕业证书)伯恩茅斯艺术大学毕业证硕士学历证书原版一模一样
 
在线办理(uofc毕业证书)芝加哥大学毕业证学历学位证书原版一模一样
在线办理(uofc毕业证书)芝加哥大学毕业证学历学位证书原版一模一样在线办理(uofc毕业证书)芝加哥大学毕业证学历学位证书原版一模一样
在线办理(uofc毕业证书)芝加哥大学毕业证学历学位证书原版一模一样
 
1:1制作英国伦敦大学毕业证(london毕业证书)学历学位证书原版一模一样
1:1制作英国伦敦大学毕业证(london毕业证书)学历学位证书原版一模一样1:1制作英国伦敦大学毕业证(london毕业证书)学历学位证书原版一模一样
1:1制作英国伦敦大学毕业证(london毕业证书)学历学位证书原版一模一样
 

Cyber security for small businesses

  • 1.  Cyber-Security Workshop  June 26  Time: 8 - 10 AM  Location: Madison LakesTraining & Conference Center 581 Olive Road Dayton, OH
  • 2. • Providing mentoring and training to those  Preparing to start up a business  To existing small business owners  Wanting to grow  Needing to improve performance • Mentoring is “free and forever” • Seminars are at no or a small charge •www.daytonscore.org - 937-225-2887
  • 3. Niki Chaudhry • 35 years - business experience • Started and Grew two businesses to $25 MM • Owner-investor in three small businesses • Trainer for Web-Based Marketing • Education:  MBA, BS & MS Engineering, • 25 years computer experience Programmer System Analyst • President CEO and owner Linked Technologies Inc. • Education  BS Computer Science CEO, LinkedTechnologies, Inc. Computer Services Owner, B2B Planners Ltd.
  • 5. Security is a process-not software or hardware
  • 6.  You share your computer with others  You travel and use publicWiFi  Personal & financial data is on your computer  Business files are on your computer  You use a smartphone like a computer  You are runningWindows XP
  • 7. What is Cyber-Security? Protecting your computer, network, and information from online threats What is Cyber-Crime? Any crime conducted via the Internet to cause damage or steal data
  • 8.  Why do hackers hack?  Steal money  Collect information to steal money, or commit identity theft  Why attack small companies?  Least secure in general  Unwary users
  • 9.  Hardware  UnsecuredWi-Fi (Panera)  No Router  Router with default password  Software  No anti-virus/anti-spyware  No Firewall  Old virus definitions  Out of date Windows O.S.  Personal Behavior  Failure to use strong passwords  Clicking on unsafe links or emails  Downloading questionable files  Leaving computer logged on  Leaving your computer accessible
  • 10. VirusType Impact Solution Cash Cost MinorVirus Lose some data 2- 4 hours Use installed anti-virus $75-100 MajorVirus Loss of docs 5-10 hours Use service to remove $100-$130 Catastrophic Virus Loss of ALL data & photos 15+ hours Use service to wipe & reload entire system $300- $$$ Also Add What isYOUR time worth? $25, $50 $75?
  • 11.  Change your operating system  No option will be fun or easy  Done with Microsoft? Switch to Apple or Linux  Want to stay? Update to 8.1 which works fine You will probably need to buy a new computer  Go to a reputable reseller and buy a used computer loaded with Windows 7
  • 13. Firewall SPAM Filter Web Filter Anti-Malware People! Backup YOUR INFO! Passwords 1 2 3 4 . 5 6 Conceal Deny Detect Filter Decide Router
  • 14.
  • 15.
  • 16. • Closes and locks “open doors” • Keeps intruders and unknowns out • Allows the recognized & trusted in • Not perfect, Cyber- criminals exploit trusted doors • May block desired sites
  • 17.  The First Line of Defense  “Hides” your network and computers from being directly accessible on the Internet  Routers Can Provide Firewall Protection
  • 18. Default Usernames/Passwords for most routers can also be found at: http://portforward.com/default_username_password
  • 19.  Access Router via your web browser  Enter your Routers IP Address  Enter the default username & password  Find administration settings  Select Change/Reset Password Tip:To Find IP address go to your PC’s Control Panel > Network and Internet > Network and Sharing Center and click on your network
  • 20.  Rule #1  Require a password to access your computer  Why?  Prevents unauthorized access  Provides a first line of defense  Prevents easy access from a network TIP: Set up automatic lockout that requires a password. A good timeout value is 5 to 10 minutes.
  • 21.  Rule #2  Don’t forget your cell phone  Use strong passwords –  >8 characters, letters, numbers and symbols  Use “coded” phrases (e.g. H@m5t3@k!)  Don’t store passwords in a file (unencrypted)  Don’t keep them near the computer  Use a password vault such as “Lastpass”
  • 22.  Makes files and disks unreadable without the encryption key  You can encrypt:  Hard Drive or USB Drive –Windows BitLocker Windows 7 upgrade $139,Windows 8.1 included. Start button>all programs>Windows anytime upgrade  Individual Files – Axcrypt– Free open source  Business Email – using a virtual personal network (VPN) Windows 7 Start button > typeVPN into the program search window  Protects against theft or loss of a computer
  • 23.  Confidential Information your business is required to protect with encryption includes:  Medical Data defined by HIPAA  (Health Insurance Portability and Accountability Act)  Must also include staff training  Financial Data defined by PIC  (Payment Card Industry)  Do NOT permanently store card data on your system  Recommend using 3rd party providers
  • 24. SPAM Filters  Keeps out email from unknown senders  Catches majority of SPAM  Catches non-SPAM  Allows known email  SPAM Filters aren’t perfect! WEB Filters  Prohibits bad websites  Pre-examines website content and warns you  Catches good websites  Allows known websites  Web filters aren’t perfect!
  • 25. • Anti-Virus & Anti- Spyware Programs • Scans email, attachments files, & downloads • Detects threats and Removes them • Not perfect, does not detect everything, cannot remove all threats
  • 26. You and your employees are the last line of defense After all the layers of protection, you are the decision maker DENY !!! Cyber Security Part III
  • 27.  If you provide Wi-Fi for Customers 1. Your existing router may have a “guest” feature 1. Be sure to useWPA2 encryption on your Private Network 2. Verify firewall Install dedicated customer “hot spot” hardware and software Does not require company to have anyWi-Fi exposure. Protect private proprietary information from public users. • Improve customer internet experience and security • Include filtering to avoid risky or offensive websites • Provides features such as terms of service or time limits. 2. Worry free 24x7Technical Support, Monitoring, & Maintenance
  • 28.
  • 29.  Provide security training  Have company policies For email & internet use Company & confidential information Make them written and update them  Limit administrative and password access  Restrict software on company computers
  • 30. Control Downloads of Software Never allow “pirate” websites music, games, movies (BitTorrent) Beware of ALL free software, know the source Danger areas Adobe Flash files – update often Shortened urls you can’t check – know the source Email attachments or links – hover over “click here”
  • 31. S ource of file? T ype & size of file? O thers recommend? P repared to scan? This is a fake anti-virus program. Once loaded it claims your computer is infected and directs you to to buy the program via credit card.
  • 32. Type Source Purpose Protection Virus Email Ads Links Warnings Updates Malicious attack Disable your computer Destroy your data Anti-virus software Firewall software Firewall hardware Data back-up Phishing Email Website Steal Identity or money Surfing behavior Adware Ads Virus delivery, steal information Good practices Spyware Steal personal information Anti-spyware & firewall software Tip: Have both Anti-Virus AND Anti-Spyware installed on your computer.. But DO NOT install two anti-virus programs.
  • 33.  These scams will come in the form of:  Email (phishing)  Website (pharming)  Phone Call (vishing)  Text Message (smishing)  A Combination ofThese
  • 34.  Requests personal information?  Contains grammatical errors or misspellings?  How do they address you?  Is it too good to be true?  Have you checked the link? Tip: “Mouse Over” Does the website URL look legitimate? Tip: Legitimate companies will NEVER ask you for personal or confidential information via email, a website, telephone, or text message.
  • 35. R eceived Before? I nside Links? S ensible Message? Know sender? This email link delivers a Trojan Virus right to your computer
  • 36. Tip: When installing programs pay attention to installation options.They make you think you’re declining, but you’re approving!  Beware of search engine results  Do not download unknown or free software  “Unclick”/DECLINE any OPTIONAL Downloads or Toolbars  Use Sucuri Site Check http://sitecheck.sucuri.net/
  • 37.  Only login or send personal information to websites you know are encrypted  A website is encrypted when you see the “lock” symbol or https://  Beware of websites using encryption only on the login page
  • 38.  Don't stay signed in to accounts  When you are done, log out  Don’t do sensitive business on public WiFi  Don’t use the same password, vary it  Keep your browser(s) up-to-date  Or switch to Firefox Chrome, or Apple
  • 39. Tip: Don’t use your browser to store passwords, not secure.
  • 40.  Do NOT friend, link, or message people you don’t know  Do not allow untrusted applications to access your account  Do not click on posted videos NEVER POST • You or your family’s full birthdates or places of birth • Your mother’s maiden name • The names of young family members • Your relationship status
  • 41.
  • 43.  Boots very slowly or hangs up  Responds slowly, crashes  Programs won’t run or crash  Popups, website redirection  Broken antivirus or security Tip: You can “right click” on the task bar and select the “Task Manager” to see the memory and CPU usage that is currently taking place on your computer. Should not be constantly 100%.
  • 45. Tip: A foolproof way to keep a virus from stealing your personal info - disconnect the network cable or turn off theWi-Fi. THEN take action.
  • 46.  Anti-virus can’t remove it  Computer is not unusable  Your files are missing  You must manually edit Windows  Your not absolutely sure your actions won’t make matters worse!
  • 48.  External Hard Drive Backup  Windows Backup  Time Machine (Mac)  Cloud Backup  Carbonite  CrashPlan  File Sync Service (not really a backup)  Dropbox  Google Drive REGULAR BACKUP JUST DO IT.
  • 49. Step by StepTutorial at: http://www.slideshare.net/B2BPlanner/file-back-up-using-windows-7-back
  • 50.
  • 51.  Backup saves/restores your data files  Backup also creates a separate system image for restoring programs &Windows  Overwrites EVERYTHING when restored  Can only be used if a system repair disk was created
  • 52. Hardware or Software Cost of Required Suggested Source Router $50 Various – Netgear, Linksys, Belcan, et. Al. Cloud backup OR External Hard Drive $60/year $75 once Carbonite - www.carbonite.com Windows Backup Software Anti-Virus $40/year AVG Antivirus – www.avg.com Firewall $0 Windows Firewall Anti-Spyware $0 Malwarebytes – www.malwarebytes.org Anti-spam $0 Built in to Apple Mail & Outlook, need setup Password vault $0 Great, but dangerous - Lastpass Total cost $150 -$165 Do it yourself cost (Complete packages, installation, and training available from ComputerTroubleshooters)
  • 53. 1. Use a Router to hides your computer/network 2. Make sure yourWindows Firewall is enabled 3. Use strong passwords on your Router and Computer 4. Use anti-virus/anti-spyware to detect/remove malware 5. Backup your files and data – regularly 6. Practice safe surfing: if you aren’t sure, don’t click!

Editor's Notes

  1. How many people in the audience have fire insurance? How many people in the audience have Cyber Insurance? The degree of devastation to your business could actually be greater from Cyber attack than a fire.
  2. Like a fire, prevention is the best way to protect yourself from damage from Cyber attack. An the best way to prevent Cyber attack is to have a plan for an ongoing process that continuously checked and updated, just like fire extinguishers are checked and updated.
  3. Although everyone is at risk of attack, certain situations place your computer at higher risk. How many people have 4 or more of these risk factors
  4. In-Home Threats (internal - Physical) Computer Theft Unauthorized access Tampering Online Threats (external – Internet) Hackers Malware Scams
  5. Types of information stolen: Credit card info Online bank account information Confidential information like SSN, addresses, phone #s Stock trading data, brokerage statements Tax return information Medical information Email addresses for SPAM and SCAMs
  6. Your PC security system can be viewed as a series of protective layers that each provide protection against specific threats. Most of them depend on you being knowledgeable and diligent in using good practices when using the internet.
  7. Router is the First Line of Defense “Hides” your network and computers from being directly accessible on the Internet Routers Can Provide Firewall Protection
  8. Prevents unauthorized access when your not around Provides a first line of defense in case of computer theft Prevent hackers from gaining easy access if they get inside your network
  9. What AntiVirus do you use? The big boys concentrate on advertising (Norton, McAfee) Not as efficient as others
  10. This helps detect/protect you from more kinds of malware than just Anti-Virus
  11. Sometimes a scam artist will first contact you “benignly” as bait to lure you into a conversation. They then follow that up with the scam after gaining your trust. Other times, the scam artist will contact you directly asking for information for a seemingly valid reason.
  12. High or zero network activity High CPU and/or memory usage