SlideShare a Scribd company logo
UNDERSTANDING THE
RISKS & CHALLENGES
OF
Cyber Security
DAVID NIMMO InDepth IT Solutions
DAVID HIGGINS WatchGuard
NEIL PARKER BridgePoint Group
A BridgePoint Group Special Business Briefing for SMEs June 2015
HOW DO YOU KNOW IF YOU
REALLY ARE A TARGET?
“If you’re on the internet
– if you use email & you have
a bank account…
you’re a target”
DAVID HIGGINS
WatchGuard
Every single
minute
A COMPUTER ACCESSES A
MALICIOUS WEBSITE
Source: Protecting Your Business from Cyber Attacks in only 10 minutes a day
Boaz Fischer
Every 3
minutes
AN INFECTED COMPUTER IS
COMMUNICATING WITH ITS
ATTACKER
Source: Protecting Your Business from Cyber Attacks in only 10 minutes a day
Boaz Fischer
Every 10 minutes
A MALWARE IS BEING
DOWNLOADED
Source: CheckPoint Security Report 2014
Protecting Your Business from Cyber Attacks in only 10 minutes a day
Boaz Fischer
DID YOU KNOW
20% of Small Businesses fall
victim to CyberCrime each
year…
60% of those go out of
business within six
months of an attack
Source: National CyberSecurity Alliance
Protecting Your Business from Cyber Attacks in only 10 minutes a day
Boaz Fischer
Businesses with less
than 250 employees are
increasingly targeted
2013 – Target US – 80 million customer
email addresses & payment details were
hacked and stolen via a trusted small
business supplier’s IT infrastructure & their
link into Target systems
Ransomware:
A software that denies you access into your
files until you pay a ransom
Often targeting small & medium business
Ransomware seeks to get a small amount
of money from a large number of people –
often between $600 - $3000
IDENTIFYING SPECIFIC THREATS
Have you ever received an email reminder
about a traffic offence?
No … That’s
CryptoLocker
An email about a late speeding fine
payment?
Clicking on any attachment or link will
install MALWARE on your computer and
data can be ENCRYPTED – until you pay
the RANSOM
one of the most common types of ransomware
PROTECT AGAINST RANSOMWARE
Ensure you have a regular
BACK-UP of all data
SME CYBER SECURE TIP
& know how to restore it.
It’s a good idea to test your capability to restore from back-up
before you really need to do it.
Ensure you & all staff “patch”
your system regularly
A patch is a piece of software designed to update a
computer program or its supporting data, to fix or improve
it. This includes fixing security vulnerabilities and other
bugs, and improving the usability or performance.
By not applying a patch you might be leaving the door
open for malware to come in.
SME CYBER SECURE TIP
CLOUD COMPUTING SECURITY
Do you store business data
on the cloud
Is it ENCRYPTED?
Or can anybody read it if there’s
a breach?
PROTECTING YOUR DATA
SME CYBER SECURE TIP
Encrypt data you store on the cloud
CLOUD COMPUTING
Know WHERE
your data is
&HOW it is protected
SME CYBER SECURE TIP
REMOTE ACCESS
Protect “data in motion” by using a
Virtual Private Network
to encrypt the traffic between two points.
SME CYBER SECURE TIP
A PC connecting to your company network, to
access applications or data, should be
connected by a Virtual Private Network, or VPN.
PRIVACY ACT 2014
The 2014 Privacy Act brings
significant changes to the way
businesses handle personal data.
DO YOU COMPLY?
SME CYBER SECURE TIP
If you have Private Data that you don’t need –
get rid of it!
WHAT CAN YOU DO TO IMPROVE CYBER SECURITY &
DECREASE THE RISK IN 10 MINUTES A DAY
Ensure your PC operating system,
applications & anti-virus software
are all regularly updated
Turn your PC firewall on
Back-up your key data today
IMPROVE CYBER SECURITY
10 MINUTES A DAY
Use strong & unique passwords
Only download applications from trusted
websites
Lock or shutdown your PC when
not in use
IMPROVE CYBER SECURITY
10 MINUTES A DAY
Log onto your PC without admin
privileges
Treat all emails as suspicious
Practice “safe” web browsing
IMPROVE CYBER SECURITY
10 MINUTES A DAY
Do NOT respond to requests with
personal information
Never post personal information online
Never leave personal information lying
around – including passwords
The biggest threat we face is
ourselves…
TOP SME CYBER SECURE
TIP
MOST breaches can be PREVENTED by
Employee
education &
training
WHAT TO DO IF YOU ARE
BREACHED
Unplug computer from the internet
KEY CONTACTS
www.acorn.gov.au
www.acsc.gov.au
www.indepthit.com.au
Determine the extent of breach & isolate
affected computers
Begin repair process
Restore data from most recent back-up
Watch video highlights
from our business briefing
DAVID HIGGINS
WATCHGUARD
Contact us for the next steps in
managing Cyber Security & Risk
in your business
NEIL PARKER
BRIDGEPOINT GROUP
DAVID NIMMO
INDEPTH IT SOLUTIONS
www.bridgepointgroup.com.au
Ph 1300 656 141

More Related Content

What's hot

1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
Animesh Roy
 
Cyber Security: Threats and Needed Actions
Cyber Security: Threats and Needed ActionsCyber Security: Threats and Needed Actions
Cyber Security: Threats and Needed Actions
John Gilligan
 
Cybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-convertedCybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-converted
Prof .Pragati Khade
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
WeSecureApp
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
NebiyeLioul
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
karanramani4
 
Basic knowledge of cyber security
Basic knowledge of cyber securityBasic knowledge of cyber security
Basic knowledge of cyber security
mahendra_chauhan
 
Cybersecurity technology adoption survey
Cybersecurity technology adoption surveyCybersecurity technology adoption survey
Cybersecurity technology adoption survey
Paperjam_redaction
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber security
SAHANAHK
 
What is Cyber Security - Avantika University
What is Cyber Security - Avantika UniversityWhat is Cyber Security - Avantika University
What is Cyber Security - Avantika University
Avantika University
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
sommerville-videos
 
Cyber Security Research Project Topics
Cyber Security Research Project TopicsCyber Security Research Project Topics
Cyber Security Research Project Topics
Matlab Simulation
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security tools
Vicky Fernandes
 
Cyber security
Cyber securityCyber security
Cyber security
abithajayavel
 
Cyber security
Cyber securityCyber security
Cyber security
RavikantGautam8
 
Cyber Security
Cyber Security Cyber Security
Cyber Security
Emily Clarke
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
A. Shamel
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
Priyanshu Ratnakar
 
Threats of Public Wi-Fi
Threats of Public Wi-Fi Threats of Public Wi-Fi
Threats of Public Wi-Fi
The TNS Group
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
Gareth Davies
 

What's hot (20)

1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Cyber Security: Threats and Needed Actions
Cyber Security: Threats and Needed ActionsCyber Security: Threats and Needed Actions
Cyber Security: Threats and Needed Actions
 
Cybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-convertedCybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-converted
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
 
Basic knowledge of cyber security
Basic knowledge of cyber securityBasic knowledge of cyber security
Basic knowledge of cyber security
 
Cybersecurity technology adoption survey
Cybersecurity technology adoption surveyCybersecurity technology adoption survey
Cybersecurity technology adoption survey
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber security
 
What is Cyber Security - Avantika University
What is Cyber Security - Avantika UniversityWhat is Cyber Security - Avantika University
What is Cyber Security - Avantika University
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
Cyber Security Research Project Topics
Cyber Security Research Project TopicsCyber Security Research Project Topics
Cyber Security Research Project Topics
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security tools
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security
Cyber Security Cyber Security
Cyber Security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Threats of Public Wi-Fi
Threats of Public Wi-Fi Threats of Public Wi-Fi
Threats of Public Wi-Fi
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 

Viewers also liked

Privacy & cyber-physical security in eu cities 2016
Privacy & cyber-physical security in eu cities 2016Privacy & cyber-physical security in eu cities 2016
Privacy & cyber-physical security in eu cities 2016
Martin Tom-Petersen
 
Business Development, Industry Solutions, Internet of Everything Cisco India ...
Business Development, Industry Solutions, Internet of Everything Cisco India ...Business Development, Industry Solutions, Internet of Everything Cisco India ...
Business Development, Industry Solutions, Internet of Everything Cisco India ...
IPPAI
 
Smart & Secure City Solutions by Rupinder Singh
Smart & Secure City Solutions by Rupinder SinghSmart & Secure City Solutions by Rupinder Singh
Smart & Secure City Solutions by Rupinder SinghIPPAI
 
C-SEC|2016 Session 1 Addressing Cyber Threats with Modern Security Framework_...
C-SEC|2016 Session 1 Addressing Cyber Threats with Modern Security Framework_...C-SEC|2016 Session 1 Addressing Cyber Threats with Modern Security Framework_...
C-SEC|2016 Session 1 Addressing Cyber Threats with Modern Security Framework_...
acinfotec
 
Cyber security for smart cities an architecture model for public transport
Cyber security for smart cities   an architecture model for public transportCyber security for smart cities   an architecture model for public transport
Cyber security for smart cities an architecture model for public transport
Andrey Apuhtin
 
Cyber security in smart cities
Cyber security in smart cities  Cyber security in smart cities
Cyber security in smart cities
Aboul Ella Hassanien
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence Index
IBM Security
 
Cyber services IoT Security
Cyber services IoT Security Cyber services IoT Security
Cyber services IoT Security
Gábor Nagymajtényi
 
Project soli
Project  soliProject  soli
Project soli
ankit kaim
 
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le..."Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
Dataconomy Media
 
7 Strategies for Reducing IoT Cyber Risk
7 Strategies for Reducing IoT Cyber Risk 7 Strategies for Reducing IoT Cyber Risk
7 Strategies for Reducing IoT Cyber Risk
Hector Del Castillo, CPM, CPMM
 
[Bucharest] From SCADA to IoT Cyber Security
[Bucharest] From SCADA to IoT Cyber Security[Bucharest] From SCADA to IoT Cyber Security
[Bucharest] From SCADA to IoT Cyber Security
OWASP EEE
 
CyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoTCyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoT
Creekside Marketing Group, LLC
 
Principals of IoT security
Principals of IoT securityPrincipals of IoT security
Principals of IoT security
IoT613
 
Smart Cities in the IoT Era
Smart Cities in the IoT EraSmart Cities in the IoT Era
Smart Cities in the IoT Era
Opposing Force S.r.l.
 
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
ClicTest
 
Smart Grid Cyber Security
Smart Grid Cyber SecuritySmart Grid Cyber Security
Smart Grid Cyber Security
JAZEEL K T
 
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT EcosystemProtecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
CA Technologies
 
Introduction to IOT & Smart City
Introduction to IOT & Smart CityIntroduction to IOT & Smart City
Introduction to IOT & Smart City
Dr. Mazlan Abbas
 
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...SlideShare
 

Viewers also liked (20)

Privacy & cyber-physical security in eu cities 2016
Privacy & cyber-physical security in eu cities 2016Privacy & cyber-physical security in eu cities 2016
Privacy & cyber-physical security in eu cities 2016
 
Business Development, Industry Solutions, Internet of Everything Cisco India ...
Business Development, Industry Solutions, Internet of Everything Cisco India ...Business Development, Industry Solutions, Internet of Everything Cisco India ...
Business Development, Industry Solutions, Internet of Everything Cisco India ...
 
Smart & Secure City Solutions by Rupinder Singh
Smart & Secure City Solutions by Rupinder SinghSmart & Secure City Solutions by Rupinder Singh
Smart & Secure City Solutions by Rupinder Singh
 
C-SEC|2016 Session 1 Addressing Cyber Threats with Modern Security Framework_...
C-SEC|2016 Session 1 Addressing Cyber Threats with Modern Security Framework_...C-SEC|2016 Session 1 Addressing Cyber Threats with Modern Security Framework_...
C-SEC|2016 Session 1 Addressing Cyber Threats with Modern Security Framework_...
 
Cyber security for smart cities an architecture model for public transport
Cyber security for smart cities   an architecture model for public transportCyber security for smart cities   an architecture model for public transport
Cyber security for smart cities an architecture model for public transport
 
Cyber security in smart cities
Cyber security in smart cities  Cyber security in smart cities
Cyber security in smart cities
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence Index
 
Cyber services IoT Security
Cyber services IoT Security Cyber services IoT Security
Cyber services IoT Security
 
Project soli
Project  soliProject  soli
Project soli
 
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le..."Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
 
7 Strategies for Reducing IoT Cyber Risk
7 Strategies for Reducing IoT Cyber Risk 7 Strategies for Reducing IoT Cyber Risk
7 Strategies for Reducing IoT Cyber Risk
 
[Bucharest] From SCADA to IoT Cyber Security
[Bucharest] From SCADA to IoT Cyber Security[Bucharest] From SCADA to IoT Cyber Security
[Bucharest] From SCADA to IoT Cyber Security
 
CyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoTCyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoT
 
Principals of IoT security
Principals of IoT securityPrincipals of IoT security
Principals of IoT security
 
Smart Cities in the IoT Era
Smart Cities in the IoT EraSmart Cities in the IoT Era
Smart Cities in the IoT Era
 
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
 
Smart Grid Cyber Security
Smart Grid Cyber SecuritySmart Grid Cyber Security
Smart Grid Cyber Security
 
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT EcosystemProtecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
 
Introduction to IOT & Smart City
Introduction to IOT & Smart CityIntroduction to IOT & Smart City
Introduction to IOT & Smart City
 
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
 

Similar to Understanding the Risk & Challenges of Cyber Security

Kaspersky 2017 Thailand Launch
Kaspersky 2017 Thailand LaunchKaspersky 2017 Thailand Launch
Kaspersky 2017 Thailand Launch
Worapol Limsiriwong (Nex)
 
A Beginner's Guide To Cybersecurity For Startups
A Beginner's Guide To Cybersecurity For StartupsA Beginner's Guide To Cybersecurity For Startups
A Beginner's Guide To Cybersecurity For Startups
InvoZone
 
The Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice GuideThe Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice Guide
Inspiring Women
 
Cybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To KnowCybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To Know
Shantam Goel
 
A Guide To Cyber Insurance
A Guide To Cyber InsuranceA Guide To Cyber Insurance
A Guide To Cyber Insurance
John Ryan
 
Netwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldNetwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital world
netwealthInvest
 
10 Components of Business Cyber Security
10 Components of Business Cyber Security10 Components of Business Cyber Security
10 Components of Business Cyber Security
Comodo SSL Store
 
Cyber Risks & Liabilities - Cyber Security for Small Businesses
Cyber Risks & Liabilities - Cyber Security for Small BusinessesCyber Risks & Liabilities - Cyber Security for Small Businesses
Cyber Risks & Liabilities - Cyber Security for Small Businesses
ntoscano50
 
Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?
SOCVault
 
15 Way to Protect Your Business From a Cyberattack .pdf
15 Way to Protect Your Business From a Cyberattack .pdf15 Way to Protect Your Business From a Cyberattack .pdf
15 Way to Protect Your Business From a Cyberattack .pdf
Borja ARRIZABALAGA URIARTE
 
Security Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessSecurity Minded - Ransomware Awareness
Security Minded - Ransomware Awareness
Greg Wartes, MCP
 
Convince your board - cyber attack prevention is better than cure
Convince your board - cyber attack prevention is better than cureConvince your board - cyber attack prevention is better than cure
Convince your board - cyber attack prevention is better than cure
Dave James
 
Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)Sam Norallah
 
Information and Cyber Warfare
Information and Cyber WarfareInformation and Cyber Warfare
Information and Cyber Warfare
Swapnil Jagtap
 
Cyber Security Magazine
Cyber Security MagazineCyber Security Magazine
Cyber Security Magazine
Quentin Brown
 
Why You Need An Antivirus For Your Business?
Why You Need An Antivirus For Your Business?Why You Need An Antivirus For Your Business?
Why You Need An Antivirus For Your Business?
SoftwareDeals
 
Ransomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksRansomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacks
dinCloud Inc.
 
How to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudHow to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the Cloud
Nordic Backup
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
Sanjana Agarwal
 
parabcswithout-front-200320113631.pdf
parabcswithout-front-200320113631.pdfparabcswithout-front-200320113631.pdf
parabcswithout-front-200320113631.pdf
NirGoldstein5
 

Similar to Understanding the Risk & Challenges of Cyber Security (20)

Kaspersky 2017 Thailand Launch
Kaspersky 2017 Thailand LaunchKaspersky 2017 Thailand Launch
Kaspersky 2017 Thailand Launch
 
A Beginner's Guide To Cybersecurity For Startups
A Beginner's Guide To Cybersecurity For StartupsA Beginner's Guide To Cybersecurity For Startups
A Beginner's Guide To Cybersecurity For Startups
 
The Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice GuideThe Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice Guide
 
Cybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To KnowCybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To Know
 
A Guide To Cyber Insurance
A Guide To Cyber InsuranceA Guide To Cyber Insurance
A Guide To Cyber Insurance
 
Netwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldNetwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital world
 
10 Components of Business Cyber Security
10 Components of Business Cyber Security10 Components of Business Cyber Security
10 Components of Business Cyber Security
 
Cyber Risks & Liabilities - Cyber Security for Small Businesses
Cyber Risks & Liabilities - Cyber Security for Small BusinessesCyber Risks & Liabilities - Cyber Security for Small Businesses
Cyber Risks & Liabilities - Cyber Security for Small Businesses
 
Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?
 
15 Way to Protect Your Business From a Cyberattack .pdf
15 Way to Protect Your Business From a Cyberattack .pdf15 Way to Protect Your Business From a Cyberattack .pdf
15 Way to Protect Your Business From a Cyberattack .pdf
 
Security Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessSecurity Minded - Ransomware Awareness
Security Minded - Ransomware Awareness
 
Convince your board - cyber attack prevention is better than cure
Convince your board - cyber attack prevention is better than cureConvince your board - cyber attack prevention is better than cure
Convince your board - cyber attack prevention is better than cure
 
Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)
 
Information and Cyber Warfare
Information and Cyber WarfareInformation and Cyber Warfare
Information and Cyber Warfare
 
Cyber Security Magazine
Cyber Security MagazineCyber Security Magazine
Cyber Security Magazine
 
Why You Need An Antivirus For Your Business?
Why You Need An Antivirus For Your Business?Why You Need An Antivirus For Your Business?
Why You Need An Antivirus For Your Business?
 
Ransomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksRansomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacks
 
How to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudHow to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the Cloud
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
parabcswithout-front-200320113631.pdf
parabcswithout-front-200320113631.pdfparabcswithout-front-200320113631.pdf
parabcswithout-front-200320113631.pdf
 

More from Neil Parker

Economic Update 2018 - BridgePoint Group
Economic Update 2018 - BridgePoint GroupEconomic Update 2018 - BridgePoint Group
Economic Update 2018 - BridgePoint Group
Neil Parker
 
Employment Law for SMEs
Employment Law for SMEsEmployment Law for SMEs
Employment Law for SMEs
Neil Parker
 
Economic Market Update 2016
Economic Market Update 2016Economic Market Update 2016
Economic Market Update 2016
Neil Parker
 
Six Sigma
Six SigmaSix Sigma
Six Sigma
Neil Parker
 
Directions 2015
Directions 2015Directions 2015
Directions 2015
Neil Parker
 
New retail
New retailNew retail
New retail
Neil Parker
 

More from Neil Parker (6)

Economic Update 2018 - BridgePoint Group
Economic Update 2018 - BridgePoint GroupEconomic Update 2018 - BridgePoint Group
Economic Update 2018 - BridgePoint Group
 
Employment Law for SMEs
Employment Law for SMEsEmployment Law for SMEs
Employment Law for SMEs
 
Economic Market Update 2016
Economic Market Update 2016Economic Market Update 2016
Economic Market Update 2016
 
Six Sigma
Six SigmaSix Sigma
Six Sigma
 
Directions 2015
Directions 2015Directions 2015
Directions 2015
 
New retail
New retailNew retail
New retail
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 

Understanding the Risk & Challenges of Cyber Security

  • 1. UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint Group Special Business Briefing for SMEs June 2015
  • 2. HOW DO YOU KNOW IF YOU REALLY ARE A TARGET? “If you’re on the internet – if you use email & you have a bank account… you’re a target” DAVID HIGGINS WatchGuard
  • 3. Every single minute A COMPUTER ACCESSES A MALICIOUS WEBSITE Source: Protecting Your Business from Cyber Attacks in only 10 minutes a day Boaz Fischer
  • 4. Every 3 minutes AN INFECTED COMPUTER IS COMMUNICATING WITH ITS ATTACKER Source: Protecting Your Business from Cyber Attacks in only 10 minutes a day Boaz Fischer
  • 5. Every 10 minutes A MALWARE IS BEING DOWNLOADED Source: CheckPoint Security Report 2014 Protecting Your Business from Cyber Attacks in only 10 minutes a day Boaz Fischer
  • 6. DID YOU KNOW 20% of Small Businesses fall victim to CyberCrime each year… 60% of those go out of business within six months of an attack Source: National CyberSecurity Alliance Protecting Your Business from Cyber Attacks in only 10 minutes a day Boaz Fischer
  • 7. Businesses with less than 250 employees are increasingly targeted 2013 – Target US – 80 million customer email addresses & payment details were hacked and stolen via a trusted small business supplier’s IT infrastructure & their link into Target systems
  • 8. Ransomware: A software that denies you access into your files until you pay a ransom Often targeting small & medium business Ransomware seeks to get a small amount of money from a large number of people – often between $600 - $3000 IDENTIFYING SPECIFIC THREATS
  • 9. Have you ever received an email reminder about a traffic offence? No … That’s CryptoLocker An email about a late speeding fine payment? Clicking on any attachment or link will install MALWARE on your computer and data can be ENCRYPTED – until you pay the RANSOM one of the most common types of ransomware
  • 10. PROTECT AGAINST RANSOMWARE Ensure you have a regular BACK-UP of all data SME CYBER SECURE TIP & know how to restore it. It’s a good idea to test your capability to restore from back-up before you really need to do it.
  • 11. Ensure you & all staff “patch” your system regularly A patch is a piece of software designed to update a computer program or its supporting data, to fix or improve it. This includes fixing security vulnerabilities and other bugs, and improving the usability or performance. By not applying a patch you might be leaving the door open for malware to come in. SME CYBER SECURE TIP
  • 12. CLOUD COMPUTING SECURITY Do you store business data on the cloud Is it ENCRYPTED? Or can anybody read it if there’s a breach? PROTECTING YOUR DATA SME CYBER SECURE TIP Encrypt data you store on the cloud
  • 13. CLOUD COMPUTING Know WHERE your data is &HOW it is protected SME CYBER SECURE TIP
  • 14. REMOTE ACCESS Protect “data in motion” by using a Virtual Private Network to encrypt the traffic between two points. SME CYBER SECURE TIP A PC connecting to your company network, to access applications or data, should be connected by a Virtual Private Network, or VPN.
  • 15. PRIVACY ACT 2014 The 2014 Privacy Act brings significant changes to the way businesses handle personal data. DO YOU COMPLY? SME CYBER SECURE TIP If you have Private Data that you don’t need – get rid of it!
  • 16. WHAT CAN YOU DO TO IMPROVE CYBER SECURITY & DECREASE THE RISK IN 10 MINUTES A DAY Ensure your PC operating system, applications & anti-virus software are all regularly updated Turn your PC firewall on Back-up your key data today
  • 17. IMPROVE CYBER SECURITY 10 MINUTES A DAY Use strong & unique passwords Only download applications from trusted websites Lock or shutdown your PC when not in use
  • 18. IMPROVE CYBER SECURITY 10 MINUTES A DAY Log onto your PC without admin privileges Treat all emails as suspicious Practice “safe” web browsing
  • 19. IMPROVE CYBER SECURITY 10 MINUTES A DAY Do NOT respond to requests with personal information Never post personal information online Never leave personal information lying around – including passwords
  • 20. The biggest threat we face is ourselves… TOP SME CYBER SECURE TIP MOST breaches can be PREVENTED by Employee education & training
  • 21. WHAT TO DO IF YOU ARE BREACHED Unplug computer from the internet KEY CONTACTS www.acorn.gov.au www.acsc.gov.au www.indepthit.com.au Determine the extent of breach & isolate affected computers Begin repair process Restore data from most recent back-up
  • 22. Watch video highlights from our business briefing DAVID HIGGINS WATCHGUARD
  • 23. Contact us for the next steps in managing Cyber Security & Risk in your business NEIL PARKER BRIDGEPOINT GROUP DAVID NIMMO INDEPTH IT SOLUTIONS www.bridgepointgroup.com.au Ph 1300 656 141