SlideShare a Scribd company logo
Chamber Forum Workshop
TITLE:
CYBERSECURITY CONFERENCE
Chamber Forum Facilitator:
Quadri Consulting LTD
Jeremy Quadri
Date: 10.12.2015
ABOUT THE CHAMBER OF COMMERCE
• INDEPENDENT AND NOT-FOR-PROFIT ORGANISATION
• LINKS TO OVER 5,000 LOCAL BUSINESSES FROM FTSE 100
COMPANIES TO BUSINESS CONSULTANTS.
• FACILITATE BROAD RANGE OF MONTHLY EVENTS; E.G.
• BUSINESS BREAKFASTS, CONFERENCES, MASTERCLASSES
• MEMBERSHIP INCLUDES 12 HOURS FREE ONE-TO-ONE
BUSINESS MENTORING
• ADVERTISING AND SPONSORSHIP OPPORTUNITIES
Jeremy Quadri
- Director of Quadri Consulting Ltd
- Director of TopDevCentral Ltd
- BEng (Hons) Degree - Electrical & Electronics Engineerv1992
- IT Security Professional at Cable&Wireless Since 1998
- CISSP Certified (372063)
- Certified Ethical Hacker Certification
- Offensive Security Certified Professional certification (OSCP)
- CompTIA SY0-301 Security+
- InfoSec Institute Web Application Security Certified
- OWASP - Testing Secure Web Applications
TopDevCentral Ltd
 Custom Software Development
 Team augmentation
 Data Warehousing/Big Data
 BI Development
 Project Rescue
Quadri Consulting
Ltd
 Vulnerability Scanning
 Penetration Testing
 Professional Services
 Threat Management
 Awareness Training
 BI Development
Services
Why Are We Here?
 What is Cybersecurity?
 Who’s responsibility is it to keep cyber safe?
 The Government or the private sector ?
 Why YOU may become the next victim?
 Who is doing the attacking?
 What do they attack?
 Why do they attack?
 How to protect yourself, your family, and your
business!
WHY THIS IS
IMPORTANT
~ A LITTLE HISTORY~
 90% of large organisation and 74% of small businesses reported some form
of data breach
 Online attacks have grown by 66% since 2009.
 Cyber crime costs the UK economy £27bn a year
 158 new malware created EVERY MINUTE : PandaLabs
One for each one of us
• Facebook Sees 600,000 Compromised Logins Per Day :TechCrunch
UK HACKED SITES
Hackers Don't Have Rules, Regulations
They Don’t Have To Meet Compliance Such
as PCI, Data Protection, ISO 27001 Etc...
COMMON FALSE RATIONALES?
• There’s Nothing A Hacker Would Want On My PC.
• I Don’t Store Sensitive Information On My PC.
• I Only Use It For Checking E-mails.
• My Company Isn’t Big Enough To Worry About
Hackers?
• Online Stores Will Keep Our Details Safe
How Valuable Is A
Hacked Workstation
Websites & Blogs
WordPress is used by 60.9% of all the websites.
1. Use the latest version of core and plugins.
2. Use strong passwords. For more security
enable a 2-factor plugin
3. Get DDOS protection?
CLIENT SIDE ATTACK
DEMO
WHATAN ATTACK MIGHT LOOK
LIKE
Your data has been encrypted by ransomware
malware/virus?
What is Bitcoin?
Bitcoin vs USD chart statistics
Your data has been encrypted by ransomware
malware/virus?
HELPFUL TIP #6: WHAT TO DO IF
BREACHED
1. Reboot your computer, choose
safe mode. (Can someone tell me
how to boot into safe mode —
(press & hold the F8 key)
2. Install a Good Anti-virus
3. Run a Scan With Anti-Virus
4. Bios infected seek professional help
DARK WEB
1.ORIGINAL UK PASSPORTS : HTTP://VFQND6MIECCQYIIT.ONION/
2.RENT A HACKER: HTTP://2OGMRLFZDTHNWKEZ.ONION/
3.ASSASSIN FOR HIRE IN EUROPE: HTTP://YBP4OEZFHK24HXMB.ONION/
4.EUROPEAN BASED ARMS-DEALER: HTTP://2KKA4F23PCXGQKPV.ONION/
5.EU DRUG SALE: HTTP://S5Q54HFWW56OV2XC.ONION/
6.COUNTERFEITS CURRENCY: HTTP://Y3FPIEIEZY2SIN4A.ONION/,
HTTP://SLA2TCYPJZ774DNO.ONION/
7.BUY A PAYPAL ACCOUNT & CLONED CARDS :
What sort of things can you find on the deep
web
HELPFUL TIP #1: BACKUP YOUR
DATA
1. Run Daily Backups of Critical Data
2. Automated Offsite BackupsAre
Invaluable
3. Check / Test Your Data Backups
Monthly (Minimum)
50% of SMB’s Have No Backup & Disaster Recovery Plan
Only 28% Have Tested Their Plan
HELPFUL TIP #1: BACKUP YOUR
DATA
Why is Payment card data an attractive
target to hackers
HELPFUL TIP #2: BANK CARD
RULES
• LOOKOUT FOR THE HTTPS LOCK ICON
• AVOID SHOPPING OVER OPEN WI-FI
• SECURE YOUR HOME NETWORK
• DISABLE PHONE WI-FI & BLUETOOTH WHEN NOT IN USE
• STICK TO REPUTABLE RETAILERS ONLY
How They Get Paid
REAL VALUE?
One prominent credential seller
in the underground reported:
• iTunes accounts for $8
• Fedex.com, Continental.com and
United.com accounts for USD $6
• Groupon.com accounts fetch $5
• $4 buys hacked credentials at registrar and
hosting provider Godaddy.com, as well as
wireless providers Att.com, Sprint.com,
Verizonwireless.com, and Tmobile.com
• Active accounts at Facebook and Twitter
retail for just $2.50 each
93% of companies that lose their data - file for
bankruptcy within 1 year [National Archives]
“3D PRINTING AND CREDIT CARD
SKIMMERS!”
HELPFUL TIP #3: MULTIPLE BANK
ACCOUNTS
One Account for Payroll and Taxes
– NO DEBIT OR CREDIT CARDS
ASSOCIATED WITH THIS ACCOUNT
2.
3.
4.
Check for padlock when
shopping online
5.
Place your hand over the keyboard
when entering your pin
One Account for Operations &
Expenses
Don't let your card's out
of your site when shopping
Password
Examples
Social
Password Hacking Demo
HELPFUL TIP #4: PASSWORD RULES
1. DON’T SHARE PASSWORDS
– This includes your “IT Guy”
– Type your password for them
One Password Per Account
2.
3. No Password POST-IT NOTES!
4. Change Your Password Every 60 Days
5. Use a phrase with numbers and characters:
“I Only Have Eyes For You”
”!0hE4uAug”
6. Use a password manager
HELPFUL TIP #5: WINDOWS FIREWALL &
UAC
1. Re-Enable Windows Firewall
2. Install CurrentAntiVirus Software
(and keep it current please)
3. Enable UserAccess Control (UAC)
-- We know it is considered obnoxious,
but it really does work to help prevent
attacks against your workstation
>> Control Panel> UserAccounts
4. Seek professional help to secure your
business network
HELPFUL TIP #7: WORK SMARTER
1. Name
2. Address
3. Phone
4. DOB?
5. Education (College/High School)
6. Mother’s Maiden Name?
7. Mothers fathers name
8. Friends names
9. Children’s names
10. Children's school
11. Children's DOB
12. Pets name
13. Browsing habits (websites, services,
hobbies, likes, etc…
14. Don't include passport photograph's
on social media
SOCIAL MEDIA AND
PHISHING
1. Know who is authorized to add
content
2. Type of content allowed
3. Who has access
4. Who has login info
5. Which sites are used
6. Employee Termination Policy
According to a Microsoft study, phishing via social
Networks grew from 8.3% in 2010 to 84.5% in
2011 (increasing steadily since then)
Find out what percentage of your employees are Phish-
prone™ with our free test
https://www.knowbe4.com/phishing-security-test-offer
PHONE HACKING
DEMO
If You Allow Users To Access
• Corporate E-mail
• Corporate Data
• Remote Access To Corp Network
Then You MUST have Mobile Device
Management and use a policy to
ensure You Can Wipe Your Corporate
Data If The Device Is Lost Or Stolen.
-Install Tracker application on your smartphone, it could help trace
your device if stolen
-London: Most Of Crimes Reported Are Phone Theft
Where Do Employees Leave Your Corporate
Data And Email?
Put A
Lock On
Your
Phone
TODAY!
PERKELE: ANDROID MALWARE KIT
1. Can Help Defeat Multi-factor
Authentication Used By Many Banks
2. Interacts With A Wide Variety Of
Malware Already Resident On A
Victim’s PC
3. WhenA Victim Visits His Bank’s Web
Site, The Trojan Injects Malicious Code
Prompting The User To Enter His
Mobile Information, Including Phone
Number And OS Type
When the bank sends an SMS with a one-time code,
Perkele intercepts that code and sends it to the
attacker’s control server. Then the malicious script
completes an unauthorized transaction.
THE MOST SECURE WAY TO
COMMUNICATE
1. A LETTER SENT THROUGH SNAIL MAIL. (BY CONVENTIONAL POSTAL DELIVERY
SERVICES)
2. OVERNIGHT PACKAGE SUCH AS FEDEX OR UPS.
3. A CALL MADE FROM ONE PREVIOUSLY UNUSED CELL PHONE TO ANOTHER
PREVIOUSLY UNUSED CELL PHONE.
1. Tor
2. Red Phone  Free, Worldwide, Encrypted Phone Calls everything
is end-to-end encrypted
3. Signal Desktop  [https://whispersystems.org/blog/signal-
desktop/]
Modern secure privacy tools
Traditional
TOP 6 BEST ANTIVIRUS FOR
ANDROID
Anti-theft, lost phone check
1.Avast Mobile Security & Antivirus FREE
2. 360 Security – Antivirus FREE
4. CM Security Antivirus Applock by Cheetah Mobile — FREE
5. AVG Anti-Virus Security – FREE
6. Kaspersky -
Train Staff On Social Engineering!
Know The Source
Limit Telephone Information Sharing
Physical Security
Wireless “Hot Spots” & Hotel Internet
Your Equipment @ Offsite Locations
including Starbucks & Conferences
Ability To Disable The Device If It’s Lost Or
Stolen (LoJack, Encryption, Etc.)
HELPFUL TIP #8: COMMON SENSE SECURITY
Use Malware protection
Encrypt Your Hard Drive
Use Email Hygiene Provider / Service
Use Server Based Group Policies
Use MSP to Manage Company Firewall(s)
Establish Company-wide Data Policies
HELPFUL TIP #9: ADVANCED SECURITY TIPS
All You Needed In The 80’s
Tape Backup
A Good Mullet
An Afro
Patch Management
Force Password Changes
Implement Password Policies
SecureALL Mobile Devices
Review Workstation Security
Review Network Security
Enforce Content Filtering
HELPFUL TIP #10: PATCHES, UPDATES, & YOUR
NETWORK
WHAT’S NEXT ON CYBERCRIMINALS
AGENDA?
1. WebsiteAccounts: Twitter,
Facebook, Pinterest,
YOUR WEBSITE
2. Home Automation
Systems
3. Video Conferencing
Systems
4. Video Surveillance
Systems
5. Refrigerator and Other Network
Appliances
6. HVAC Systems
7.
8.
Automobiles, Phones, &
Televisions
All IOT ( internet of things )
** Recent Paid Test Results In Disabled Brakes**
What’s Next on YOUR Agenda?
Network Security Audit
1. Fill Out The Audit Contact Form
2. Business Development Will Schedule
An On-site Pre-Audit Meeting
3. Engineer Will Be Scheduled For On-
site Visit
4. Engineer and Business Development
Will Discuss The Findings Of The Audit
5. Follow Up Client Meeting To Discuss
RecommendationsAnd Findings Of
The Audit
WHAT HAPPENS NEXT?
ONE OF TWO THINGS HAPPENS
1. Do You have a security plan ?
Can you implement it in house ?
3. Can you to outsource it ?
2.
Analyse
Plan
Design
Implement
Operate
Optimize
Analyse
Plan
Design
Implement
Operate
Optimize
WHAT HAPPENS NEXT?
ONE OF TWO THINGS HAPPENS
2. You love the plan and ask us to
get you protected ASAP.
If that’s the case, we’ll knock it out of the park
... and that’s a promise.
QUESTIONS?
Founded 2013
About
Quadri Consulting
QUADRI CONSULTING LTD
3rd Floor
207 Regent Street
London
W1B 3HH
UK
www.quadriconsulting.com
Phone+44-0800-044-5840
RECAP ON THE QUADRI CONSULTING
LTD
• NEXT WORKSHOP WILL BE MARCH 2016 ON THE SAME
SUBJECT WITH MORE HACKING
• BEERS, CONFERENCES, MASTERCLASSES
• INCLUDES 1 HOUR FREE HACKING MENTORING
• ADVERTISING AND SPONSORSHIP OPPORTUNITIES

More Related Content

What's hot

Protecting Microsoft Teams from Cyber Security Threats - a Practical Guide
Protecting Microsoft Teams from Cyber Security Threats - a Practical GuideProtecting Microsoft Teams from Cyber Security Threats - a Practical Guide
Protecting Microsoft Teams from Cyber Security Threats - a Practical Guide
Benedek Menesi
 
BugBounty Roadmap with Mohammed Adam
BugBounty Roadmap with Mohammed AdamBugBounty Roadmap with Mohammed Adam
BugBounty Roadmap with Mohammed Adam
Mohammed Adam
 
Webinar On Ethical Hacking & Cybersecurity - Day2
Webinar On Ethical Hacking & Cybersecurity - Day2Webinar On Ethical Hacking & Cybersecurity - Day2
Webinar On Ethical Hacking & Cybersecurity - Day2
Mohammed Adam
 
Lenovo Presentation for Sys Logic Lunch and Learn
Lenovo Presentation for Sys Logic Lunch and LearnLenovo Presentation for Sys Logic Lunch and Learn
Lenovo Presentation for Sys Logic Lunch and Learn
Tony DeGonia (LION)
 
The EU Data Protection Regulation and what it means for your organization
The EU Data Protection Regulation and what it means for your organizationThe EU Data Protection Regulation and what it means for your organization
The EU Data Protection Regulation and what it means for your organization
Sophos Benelux
 
6 Security Tips for Using Public WiFi
6 Security Tips for Using Public WiFi6 Security Tips for Using Public WiFi
6 Security Tips for Using Public WiFi
Quick Heal Technologies Ltd.
 
Document safer online for nonprofits guide
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guide
Nguyen Xuan Quang
 
How can EMM help with GDPR compliance?
How can EMM help with GDPR compliance?How can EMM help with GDPR compliance?
How can EMM help with GDPR compliance?
Miradore
 
Year 7 - Week 5 esafety
Year 7 - Week 5   esafetyYear 7 - Week 5   esafety
Year 7 - Week 5 esafety
teachesict
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsBen Graybar
 
The Mirai Botnet and Massive DDoS Attacks of October 2016
The Mirai Botnet and Massive DDoS Attacks of October 2016The Mirai Botnet and Massive DDoS Attacks of October 2016
The Mirai Botnet and Massive DDoS Attacks of October 2016
William Slater III
 
The Quiet Rise of Account Takeover
The Quiet Rise of Account TakeoverThe Quiet Rise of Account Takeover
The Quiet Rise of Account Takeover
IMMUNIO
 
Common Security Misconception
Common Security MisconceptionCommon Security Misconception
Common Security Misconception
Matthew Ong
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet SecurityJFashant
 
Securing Yourself in the Cyber World
Securing Yourself in the Cyber WorldSecuring Yourself in the Cyber World
Securing Yourself in the Cyber World
Emil Tan
 

What's hot (17)

Protecting Microsoft Teams from Cyber Security Threats - a Practical Guide
Protecting Microsoft Teams from Cyber Security Threats - a Practical GuideProtecting Microsoft Teams from Cyber Security Threats - a Practical Guide
Protecting Microsoft Teams from Cyber Security Threats - a Practical Guide
 
BugBounty Roadmap with Mohammed Adam
BugBounty Roadmap with Mohammed AdamBugBounty Roadmap with Mohammed Adam
BugBounty Roadmap with Mohammed Adam
 
Webinar On Ethical Hacking & Cybersecurity - Day2
Webinar On Ethical Hacking & Cybersecurity - Day2Webinar On Ethical Hacking & Cybersecurity - Day2
Webinar On Ethical Hacking & Cybersecurity - Day2
 
Lenovo Presentation for Sys Logic Lunch and Learn
Lenovo Presentation for Sys Logic Lunch and LearnLenovo Presentation for Sys Logic Lunch and Learn
Lenovo Presentation for Sys Logic Lunch and Learn
 
The EU Data Protection Regulation and what it means for your organization
The EU Data Protection Regulation and what it means for your organizationThe EU Data Protection Regulation and what it means for your organization
The EU Data Protection Regulation and what it means for your organization
 
INTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDSINTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDS
 
6 Security Tips for Using Public WiFi
6 Security Tips for Using Public WiFi6 Security Tips for Using Public WiFi
6 Security Tips for Using Public WiFi
 
Document safer online for nonprofits guide
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guide
 
Pcs academy october_2020_security
Pcs academy october_2020_securityPcs academy october_2020_security
Pcs academy october_2020_security
 
How can EMM help with GDPR compliance?
How can EMM help with GDPR compliance?How can EMM help with GDPR compliance?
How can EMM help with GDPR compliance?
 
Year 7 - Week 5 esafety
Year 7 - Week 5   esafetyYear 7 - Week 5   esafety
Year 7 - Week 5 esafety
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
 
The Mirai Botnet and Massive DDoS Attacks of October 2016
The Mirai Botnet and Massive DDoS Attacks of October 2016The Mirai Botnet and Massive DDoS Attacks of October 2016
The Mirai Botnet and Massive DDoS Attacks of October 2016
 
The Quiet Rise of Account Takeover
The Quiet Rise of Account TakeoverThe Quiet Rise of Account Takeover
The Quiet Rise of Account Takeover
 
Common Security Misconception
Common Security MisconceptionCommon Security Misconception
Common Security Misconception
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
Securing Yourself in the Cyber World
Securing Yourself in the Cyber WorldSecuring Yourself in the Cyber World
Securing Yourself in the Cyber World
 

Viewers also liked

Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber SecurityAnand Kater
 
Cyber Security Terms
Cyber Security TermsCyber Security Terms
Cyber Security Terms
Suryaprakash Nehra
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
Preethi Kumaresh
 
Cyber Security_Presentation_KTH
Cyber Security_Presentation_KTHCyber Security_Presentation_KTH
Cyber Security_Presentation_KTHAwais Shibli
 
Cyber Security Seminar, MEA 2015, IGN Mantra
Cyber Security Seminar, MEA 2015, IGN MantraCyber Security Seminar, MEA 2015, IGN Mantra
Cyber Security Seminar, MEA 2015, IGN Mantra
IGN MANTRA
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
Alisha Korpal
 
Computer science seminar topics
Computer science seminar topicsComputer science seminar topics
Computer science seminar topics
123seminarsonly
 
Cyber security
Cyber securityCyber security
Cyber security
Siblu28
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 

Viewers also liked (9)

Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber Security
 
Cyber Security Terms
Cyber Security TermsCyber Security Terms
Cyber Security Terms
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
Cyber Security_Presentation_KTH
Cyber Security_Presentation_KTHCyber Security_Presentation_KTH
Cyber Security_Presentation_KTH
 
Cyber Security Seminar, MEA 2015, IGN Mantra
Cyber Security Seminar, MEA 2015, IGN MantraCyber Security Seminar, MEA 2015, IGN Mantra
Cyber Security Seminar, MEA 2015, IGN Mantra
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Computer science seminar topics
Computer science seminar topicsComputer science seminar topics
Computer science seminar topics
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Similar to Cyber Security Seminar

Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
mateenzero
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOs
gppcpa
 
How to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data SafeHow to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data Safe
Rocket Matter, LLC
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
NetWatcher
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security Innovation
Priyanka Aash
 
Network Security - What Every Business Needs to Know
Network Security - What Every Business Needs to KnowNetwork Security - What Every Business Needs to Know
Network Security - What Every Business Needs to Know
mapletronics
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
Hokme
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
MTG IT Professionals
 
Keeping your business safe online cosy club
Keeping your business safe online cosy clubKeeping your business safe online cosy club
Keeping your business safe online cosy club
Get up to Speed
 
The top 5 basics fundamentals of network security cyberhunter solutions
The top 5 basics fundamentals of network security    cyberhunter solutionsThe top 5 basics fundamentals of network security    cyberhunter solutions
The top 5 basics fundamentals of network security cyberhunter solutions
Cyberhunter Cyber Security
 
Secure End User
Secure End UserSecure End User
Secure End User
Muhammad Salahuddien
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and Privacy
Michael Davis
 
Private Data and Prying Eyes
Private Data and Prying EyesPrivate Data and Prying Eyes
Private Data and Prying Eyes
Ellie Sherven
 
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptxORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
PiedadCES
 
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptxORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
JohnSimLabayan2
 
Security Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessSecurity Minded - Ransomware Awareness
Security Minded - Ransomware Awareness
Greg Wartes, MCP
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
Kazi Sarwar Hossain
 
VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing
Netpluz Asia Pte Ltd
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
Priyab Satoshi
 
Iron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyIron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data Responsibly
Gabor Szathmari
 

Similar to Cyber Security Seminar (20)

Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOs
 
How to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data SafeHow to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data Safe
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security Innovation
 
Network Security - What Every Business Needs to Know
Network Security - What Every Business Needs to KnowNetwork Security - What Every Business Needs to Know
Network Security - What Every Business Needs to Know
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
 
Keeping your business safe online cosy club
Keeping your business safe online cosy clubKeeping your business safe online cosy club
Keeping your business safe online cosy club
 
The top 5 basics fundamentals of network security cyberhunter solutions
The top 5 basics fundamentals of network security    cyberhunter solutionsThe top 5 basics fundamentals of network security    cyberhunter solutions
The top 5 basics fundamentals of network security cyberhunter solutions
 
Secure End User
Secure End UserSecure End User
Secure End User
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and Privacy
 
Private Data and Prying Eyes
Private Data and Prying EyesPrivate Data and Prying Eyes
Private Data and Prying Eyes
 
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptxORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
 
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptxORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
 
Security Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessSecurity Minded - Ransomware Awareness
Security Minded - Ransomware Awareness
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
 
VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
 
Iron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyIron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data Responsibly
 

Recently uploaded

Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 

Recently uploaded (20)

Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 

Cyber Security Seminar

  • 1. Chamber Forum Workshop TITLE: CYBERSECURITY CONFERENCE Chamber Forum Facilitator: Quadri Consulting LTD Jeremy Quadri Date: 10.12.2015
  • 2. ABOUT THE CHAMBER OF COMMERCE • INDEPENDENT AND NOT-FOR-PROFIT ORGANISATION • LINKS TO OVER 5,000 LOCAL BUSINESSES FROM FTSE 100 COMPANIES TO BUSINESS CONSULTANTS. • FACILITATE BROAD RANGE OF MONTHLY EVENTS; E.G. • BUSINESS BREAKFASTS, CONFERENCES, MASTERCLASSES • MEMBERSHIP INCLUDES 12 HOURS FREE ONE-TO-ONE BUSINESS MENTORING • ADVERTISING AND SPONSORSHIP OPPORTUNITIES
  • 3. Jeremy Quadri - Director of Quadri Consulting Ltd - Director of TopDevCentral Ltd - BEng (Hons) Degree - Electrical & Electronics Engineerv1992 - IT Security Professional at Cable&Wireless Since 1998 - CISSP Certified (372063) - Certified Ethical Hacker Certification - Offensive Security Certified Professional certification (OSCP) - CompTIA SY0-301 Security+ - InfoSec Institute Web Application Security Certified - OWASP - Testing Secure Web Applications
  • 4. TopDevCentral Ltd  Custom Software Development  Team augmentation  Data Warehousing/Big Data  BI Development  Project Rescue Quadri Consulting Ltd  Vulnerability Scanning  Penetration Testing  Professional Services  Threat Management  Awareness Training  BI Development Services
  • 5. Why Are We Here?  What is Cybersecurity?  Who’s responsibility is it to keep cyber safe?  The Government or the private sector ?  Why YOU may become the next victim?  Who is doing the attacking?  What do they attack?  Why do they attack?  How to protect yourself, your family, and your business!
  • 6. WHY THIS IS IMPORTANT ~ A LITTLE HISTORY~  90% of large organisation and 74% of small businesses reported some form of data breach  Online attacks have grown by 66% since 2009.  Cyber crime costs the UK economy £27bn a year  158 new malware created EVERY MINUTE : PandaLabs One for each one of us • Facebook Sees 600,000 Compromised Logins Per Day :TechCrunch
  • 8. Hackers Don't Have Rules, Regulations They Don’t Have To Meet Compliance Such as PCI, Data Protection, ISO 27001 Etc...
  • 9. COMMON FALSE RATIONALES? • There’s Nothing A Hacker Would Want On My PC. • I Don’t Store Sensitive Information On My PC. • I Only Use It For Checking E-mails. • My Company Isn’t Big Enough To Worry About Hackers? • Online Stores Will Keep Our Details Safe
  • 10. How Valuable Is A Hacked Workstation
  • 11. Websites & Blogs WordPress is used by 60.9% of all the websites. 1. Use the latest version of core and plugins. 2. Use strong passwords. For more security enable a 2-factor plugin 3. Get DDOS protection?
  • 13. WHATAN ATTACK MIGHT LOOK LIKE
  • 14. Your data has been encrypted by ransomware malware/virus?
  • 15. What is Bitcoin? Bitcoin vs USD chart statistics Your data has been encrypted by ransomware malware/virus?
  • 16. HELPFUL TIP #6: WHAT TO DO IF BREACHED 1. Reboot your computer, choose safe mode. (Can someone tell me how to boot into safe mode — (press & hold the F8 key) 2. Install a Good Anti-virus 3. Run a Scan With Anti-Virus 4. Bios infected seek professional help
  • 17. DARK WEB 1.ORIGINAL UK PASSPORTS : HTTP://VFQND6MIECCQYIIT.ONION/ 2.RENT A HACKER: HTTP://2OGMRLFZDTHNWKEZ.ONION/ 3.ASSASSIN FOR HIRE IN EUROPE: HTTP://YBP4OEZFHK24HXMB.ONION/ 4.EUROPEAN BASED ARMS-DEALER: HTTP://2KKA4F23PCXGQKPV.ONION/ 5.EU DRUG SALE: HTTP://S5Q54HFWW56OV2XC.ONION/ 6.COUNTERFEITS CURRENCY: HTTP://Y3FPIEIEZY2SIN4A.ONION/, HTTP://SLA2TCYPJZ774DNO.ONION/ 7.BUY A PAYPAL ACCOUNT & CLONED CARDS : What sort of things can you find on the deep web
  • 18. HELPFUL TIP #1: BACKUP YOUR DATA 1. Run Daily Backups of Critical Data 2. Automated Offsite BackupsAre Invaluable 3. Check / Test Your Data Backups Monthly (Minimum) 50% of SMB’s Have No Backup & Disaster Recovery Plan Only 28% Have Tested Their Plan
  • 19. HELPFUL TIP #1: BACKUP YOUR DATA
  • 20. Why is Payment card data an attractive target to hackers
  • 21. HELPFUL TIP #2: BANK CARD RULES • LOOKOUT FOR THE HTTPS LOCK ICON • AVOID SHOPPING OVER OPEN WI-FI • SECURE YOUR HOME NETWORK • DISABLE PHONE WI-FI & BLUETOOTH WHEN NOT IN USE • STICK TO REPUTABLE RETAILERS ONLY
  • 22. How They Get Paid
  • 23. REAL VALUE? One prominent credential seller in the underground reported: • iTunes accounts for $8 • Fedex.com, Continental.com and United.com accounts for USD $6 • Groupon.com accounts fetch $5 • $4 buys hacked credentials at registrar and hosting provider Godaddy.com, as well as wireless providers Att.com, Sprint.com, Verizonwireless.com, and Tmobile.com • Active accounts at Facebook and Twitter retail for just $2.50 each 93% of companies that lose their data - file for bankruptcy within 1 year [National Archives]
  • 24.
  • 25. “3D PRINTING AND CREDIT CARD SKIMMERS!”
  • 26. HELPFUL TIP #3: MULTIPLE BANK ACCOUNTS One Account for Payroll and Taxes – NO DEBIT OR CREDIT CARDS ASSOCIATED WITH THIS ACCOUNT 2. 3. 4. Check for padlock when shopping online 5. Place your hand over the keyboard when entering your pin One Account for Operations & Expenses Don't let your card's out of your site when shopping
  • 29. HELPFUL TIP #4: PASSWORD RULES 1. DON’T SHARE PASSWORDS – This includes your “IT Guy” – Type your password for them One Password Per Account 2. 3. No Password POST-IT NOTES! 4. Change Your Password Every 60 Days 5. Use a phrase with numbers and characters: “I Only Have Eyes For You” ”!0hE4uAug” 6. Use a password manager
  • 30. HELPFUL TIP #5: WINDOWS FIREWALL & UAC 1. Re-Enable Windows Firewall 2. Install CurrentAntiVirus Software (and keep it current please) 3. Enable UserAccess Control (UAC) -- We know it is considered obnoxious, but it really does work to help prevent attacks against your workstation >> Control Panel> UserAccounts 4. Seek professional help to secure your business network
  • 31. HELPFUL TIP #7: WORK SMARTER 1. Name 2. Address 3. Phone 4. DOB? 5. Education (College/High School) 6. Mother’s Maiden Name? 7. Mothers fathers name 8. Friends names 9. Children’s names 10. Children's school 11. Children's DOB 12. Pets name 13. Browsing habits (websites, services, hobbies, likes, etc… 14. Don't include passport photograph's on social media
  • 32. SOCIAL MEDIA AND PHISHING 1. Know who is authorized to add content 2. Type of content allowed 3. Who has access 4. Who has login info 5. Which sites are used 6. Employee Termination Policy According to a Microsoft study, phishing via social Networks grew from 8.3% in 2010 to 84.5% in 2011 (increasing steadily since then) Find out what percentage of your employees are Phish- prone™ with our free test https://www.knowbe4.com/phishing-security-test-offer
  • 34. If You Allow Users To Access • Corporate E-mail • Corporate Data • Remote Access To Corp Network Then You MUST have Mobile Device Management and use a policy to ensure You Can Wipe Your Corporate Data If The Device Is Lost Or Stolen.
  • 35. -Install Tracker application on your smartphone, it could help trace your device if stolen -London: Most Of Crimes Reported Are Phone Theft
  • 36. Where Do Employees Leave Your Corporate Data And Email? Put A Lock On Your Phone TODAY!
  • 37. PERKELE: ANDROID MALWARE KIT 1. Can Help Defeat Multi-factor Authentication Used By Many Banks 2. Interacts With A Wide Variety Of Malware Already Resident On A Victim’s PC 3. WhenA Victim Visits His Bank’s Web Site, The Trojan Injects Malicious Code Prompting The User To Enter His Mobile Information, Including Phone Number And OS Type When the bank sends an SMS with a one-time code, Perkele intercepts that code and sends it to the attacker’s control server. Then the malicious script completes an unauthorized transaction.
  • 38. THE MOST SECURE WAY TO COMMUNICATE 1. A LETTER SENT THROUGH SNAIL MAIL. (BY CONVENTIONAL POSTAL DELIVERY SERVICES) 2. OVERNIGHT PACKAGE SUCH AS FEDEX OR UPS. 3. A CALL MADE FROM ONE PREVIOUSLY UNUSED CELL PHONE TO ANOTHER PREVIOUSLY UNUSED CELL PHONE. 1. Tor 2. Red Phone  Free, Worldwide, Encrypted Phone Calls everything is end-to-end encrypted 3. Signal Desktop  [https://whispersystems.org/blog/signal- desktop/] Modern secure privacy tools Traditional
  • 39. TOP 6 BEST ANTIVIRUS FOR ANDROID Anti-theft, lost phone check 1.Avast Mobile Security & Antivirus FREE 2. 360 Security – Antivirus FREE 4. CM Security Antivirus Applock by Cheetah Mobile — FREE 5. AVG Anti-Virus Security – FREE 6. Kaspersky -
  • 40. Train Staff On Social Engineering! Know The Source Limit Telephone Information Sharing Physical Security Wireless “Hot Spots” & Hotel Internet Your Equipment @ Offsite Locations including Starbucks & Conferences Ability To Disable The Device If It’s Lost Or Stolen (LoJack, Encryption, Etc.) HELPFUL TIP #8: COMMON SENSE SECURITY
  • 41. Use Malware protection Encrypt Your Hard Drive Use Email Hygiene Provider / Service Use Server Based Group Policies Use MSP to Manage Company Firewall(s) Establish Company-wide Data Policies HELPFUL TIP #9: ADVANCED SECURITY TIPS
  • 42. All You Needed In The 80’s Tape Backup A Good Mullet An Afro
  • 43. Patch Management Force Password Changes Implement Password Policies SecureALL Mobile Devices Review Workstation Security Review Network Security Enforce Content Filtering HELPFUL TIP #10: PATCHES, UPDATES, & YOUR NETWORK
  • 44. WHAT’S NEXT ON CYBERCRIMINALS AGENDA? 1. WebsiteAccounts: Twitter, Facebook, Pinterest, YOUR WEBSITE 2. Home Automation Systems 3. Video Conferencing Systems 4. Video Surveillance Systems 5. Refrigerator and Other Network Appliances 6. HVAC Systems 7. 8. Automobiles, Phones, & Televisions All IOT ( internet of things ) ** Recent Paid Test Results In Disabled Brakes**
  • 45. What’s Next on YOUR Agenda? Network Security Audit 1. Fill Out The Audit Contact Form 2. Business Development Will Schedule An On-site Pre-Audit Meeting 3. Engineer Will Be Scheduled For On- site Visit 4. Engineer and Business Development Will Discuss The Findings Of The Audit 5. Follow Up Client Meeting To Discuss RecommendationsAnd Findings Of The Audit
  • 46. WHAT HAPPENS NEXT? ONE OF TWO THINGS HAPPENS 1. Do You have a security plan ? Can you implement it in house ? 3. Can you to outsource it ? 2. Analyse Plan Design Implement Operate Optimize
  • 47. Analyse Plan Design Implement Operate Optimize WHAT HAPPENS NEXT? ONE OF TWO THINGS HAPPENS 2. You love the plan and ask us to get you protected ASAP. If that’s the case, we’ll knock it out of the park ... and that’s a promise.
  • 48.
  • 50. Founded 2013 About Quadri Consulting QUADRI CONSULTING LTD 3rd Floor 207 Regent Street London W1B 3HH UK www.quadriconsulting.com Phone+44-0800-044-5840
  • 51. RECAP ON THE QUADRI CONSULTING LTD • NEXT WORKSHOP WILL BE MARCH 2016 ON THE SAME SUBJECT WITH MORE HACKING • BEERS, CONFERENCES, MASTERCLASSES • INCLUDES 1 HOUR FREE HACKING MENTORING • ADVERTISING AND SPONSORSHIP OPPORTUNITIES