SlideShare a Scribd company logo
Claude Hubert
MSx Evangelist / Cybersecurity SME
Jeff Meltzer
Channel Manager – South Florida
2COVID-19 Cybersecurity Concerns
 ATC Welcome and Introduction
 Voice | Data | Cloud | Security
 TPx – Hidden Gem– 250+ Providers
 Essentials and Why Managed Security?
 Encourage Dialogue and Q&A
 Speaker Intro– Claude Hubert
3
Louie Hollmeyer
louie@4atc.com
ThreatsHaveIncreasedExponentially
All current statistics show a massive increase in all threat vectors as a result
of COVID-19:
• COVID-19 informational sites infected with malware are popping up
all around the world
• Ransomware attacks on the rise
• Company attacks on the rise
• Home networks now being actively attacked
• Massive phishing campaigns
• Viruses, trojans, keyloggers, and all other malware also on the rise
Bad actors will use anything to steal data for gain! And now some of them
have more time on their hands because of the COVID-19 confinement.
4
Headlines
Here are the headlines from Artic Wolf’s COVID-19 Weekly Threat Roundup
for April 24
Remote Work Attacks Continue
• Phishing Campaign Impersonates Skype
• Phishing Campaign Imitates HR Department Remote Work Announcement
• Zoom User Enumeration Threat Discovered & Remediated
• Zoombombing Hits US Congress Meeting
COVID Related Attacks by State Actors
• Google’s Threat Analysis Group (TAG) Identifies COVID-Themed Attacks By State
Actors
• Suspected Vietnamese threat actors APT32 target Chinese government
Institutions, NGOs Breached
• Emails and credentials for WHO, NIH, Gates Foundation dumped online
• Attackers Use Pulse Secure VPN Vulnerability to Attack Hospitals, Government
Entities
• FBI Alerts of Phishing Attacks Against Hospitals and Healthcare Providers
Small Business Administration (SBA) Leaks and Attacks
• SBA Spoofed to Distribute Remote Access Trojan
5
GoldenCybersecurityRule
DON’T CLICK ON THINGS!!!
Received an email with a link? DON’T CLICK ON IT!
Received a pop-up while browsing inviting you to click on something?
DON’T CLICK ON IT!
Malware usually requires you to take some action to do its dirty work
and often all it takes is 1 click! Make sure links are clean before you
click, and if you don’t know, then just DON’T CLICK ON IT!
If possible, get confirmation before clicking, and remember hackers can
take control and respond as someone else, so getting confirmation by
phone is better (and safer) than by email.
6
Ex-HackerHacked–Part1
Shortly after the start of the COVID-19 confinement, my home network
crashed randomly. This went on for nearly 3 weeks and happened a few
times every day.
Could not find the cause until I was looking at devices connected to my
network and a computer popped-up that wasn’t mine. A few moments later
my network crashed. Caught it again a little later.
It caused my Ring security system to fail over to 4G, my Philips Hue smart
lights to only work with wall switches, and my Amazon Echos to go offline…
Nothing serious, but annoying.
7
Ex-HackerHacked–Part2
Time to replace my router with a firewall with the following features, which I
now deem a necessity:
• Intrusion detection/protection system (IDS/IPS)
• SSL Deep Packet Inspection (DPI)
• Device discovery with ability to require admin confirmation
After looking at some options, I ordered a Bitdefender Box 2, which I
installed and configured as soon as it arrived - No more intrusions and no
more network crashes. Problem solved.
8
WhatisaFirewall?
There are 2 types of firewalls:
• A network security device, sometimes referred to as a network or
security appliance.
• A software firewall which runs on a computer.
In both cases, the firewall monitors incoming and outgoing network traffic
and decides whether to allow or block specific traffic based on a defined set
of security rules.
9
FirewallSecurityAppliance
Firewalls are a critical network security component as they are the 1st line of
defense against network intrusions. Today’s next generation firewalls are far
more capable than traditional firewalls as they add Unified Threat
Management (UTM) features, such as:
• Anti-virus
• Application control
• Content filtering
• Data Loss Prevention (DLP)
• Intrusion Detection System (IDS)
• Intrusion Protection System (IPS)
• SSL Deep Packet Inspection (DPI)
• Two factor authentication
Note: IDS/IPS are sometimes combined into a single feature.
10
DistributedorCentralized?
Firewall security appliances can be distributed at every location or
centralized at a given location or in the cloud. Generally:
• Distributed firewalls provide protection at each location, even when
other locations are compromised, but cost is usually higher, and
takes more work to manage and maintain.
• Centralized firewalls are easier to manage and maintain, and cost is
usually lower overall, but if communications to the centralized
firewall fail, locations may lose access to the WAN or the Internet
unless an alternative local solution is implemented.
11
WhattoLookFor?
More and more malware is being delivered with SSL encryption, making SSL
Deep Packet Inspection an absolute necessity.
Look for next generation firewalls with critical UTM features:
• Anti-virus
• Content filtering
• Data Loss Prevention (DLP)
• Intrusion Detection System (IDS)
• Intrusion Protection System (IPS)
• SSL Deep Packet Inspection (SSL DPI)
The more UTM features a firewall has, the more it costs, but it’s still several
orders of magnitude lower than the cost of a breach. Think of it as insurance.
12
FirewallSoftware
Windows, MacOS, and some versions of Linux have built-in software firewalls
that are usually enabled by default, although some companies disable them.
In today’s high-performance computers, a software firewall will use a small
percentage of a computer’s processing power, so we recommend software
firewalls be enabled for all network types on all computers.
Remember, if firewall security appliances are compromised, having firewall
software running on computers will provide some protection.
13
WhatisanEndpoint?
An endpoint is any Internet-capable device on a network, including:
• Computers (servers, workstations, and laptops)
• Security appliances and Routers
• Network switches
• Printers, plotters, and Scanners
• VOIP phones
• Smartphones
• Tablets
• Etc.
14
KeepingEndpointsUptodate
Hardware and software providers normally issue updates and security
patches on a regular basis to fix bugs and potential vulnerabilities.
It is critical that endpoints be kept up to date, including:
• BIOS
• Firmware
• Operating system
• Anti-malware
• Software
15
Anti-Malware
Computers are targeted by many threats (ransomware, viruses, trojans,
worms, key loggers, etc.), making anti-malware software a necessity:
• Traditional anti-malware looks for “signatures” in files to identify
viruses and malware.
• Next generation anti-malware still does that, but it also looks at
what programs are doing, in other words, a program’s behavior.
As new threats emerge, anti-malware programs need to be updated to deal
with the new threats.
And remember: no one can guarantee 100% protection.
16
Ransomware 17
Ransomware usually lays dormant for some time to allow it to spread and so
it gets on backups. That way, if someone restores their systems from an
infected backup, they bring the ransomware back with it.
To safely recover from a ransomware attack, care must be taken to scan
backups for ransomware and only restore files that are not infected.
Every company, no matter their size, needs to consider Backup and Disaster
Recovery (BDR) a critical component of their cybersecurity measures.
Lastly, paying a ransom motivates hackers to do it again, flags company for
possible future attacks, and there is no guarantee a decryption key will be
provided. Of course, if there is no other way to recover data, companies may
not have a choice.
BackupsandDisasterRecovery
Companies need more than just backups; they need a complete Backup and
Disaster Recovery (BDR) solution so they can recover their systems quickly.
A good BDR solution should include malware detection and offsite
replication, either to another location or to the cloud.
Keep in mind:
• 43% of SMBs go out of business after experiencing a major data loss
(Gartner)
• Ransomware costs US Small Business $75B in downtime (Datto)
• Unplanned downtime can cost an SMB $8,600 per hour (Aberdeen)
18
WindowsSecurityFeatures
Microsoft Windows has security features built-in that many are not aware of:
• Firewall – Microsoft’s built-in firewall does what a basic firewall
should do.
• Windows Defender – Microsoft’s anti-malware application, which
gets decent results in recent tests. If you install another program,
you can still enable Windows Defender to run on occasion.
• Controlled folders access – A simple yet effective solution against
ransomware. You define a list of folders to protect and which
programs can access them. Any program not given access will not
be able to update those folders.
19
Remember
• No solution is 100% safe.
• Security is a multi-layer effort – There is no single solution.
• Security is a moving target – Security measures must be kept up to date.
• Security measures are only expensive before an incident.
• Once an incident has occurred, it’s too late.
• Whenever possible, technology should be used to mitigate risks.
• The golden rule: DON’T CLICK ON THINGS!!!
20
Videos
The evail twin – Part 1:
https://www.tpx.com/wp-content/uploads/2018/09/The-Evil-Twin_-
Getting-Hacked-Is-Easier-Than-You-Think-Part-1.mp4
The evil twin – Part 2:
https://www.tpx.com/wp-content/uploads/2018/09/The-Evil-Twin_-
Getting-Hacked-Is-Easier-Than-You-Think-Part-2.mp4
21
TPxCanHelp!
TPx offers different security measures
across products and services it provides.
22
MSxManagedFirewalls
Firewalls are a strong line of defense against multiple threats and are often the central piece of the security fabric. Depending on
the service level and options chosen, our firewall solution can include:
• Content filtering
• Standard routing policies
• Anti-Virus
• Anti-Spam
• Application control
• Intrusion detection (IDS) / Intrusion protection (IPS)
• SSL packet inspection
• SSL certificates
• Threat detection and alerting (automated log monitoring)
• Active directory integration
• Remote VPN users
• Site to site VPNs
• Reporting
• High availability
• Two factor authentication (hard and/or soft tokens)
23
MSxManagedEndpoints
Keeping endpoints and their protection software up to date is a critical part of the security fabric. Depending on service level
and options chosen, our endpoint management solution can offer:
• Workstation and server management
• Automated patch management
• Monitoring and alerting
• Asset management
• Secure remote access agent
• Endpoint protection software (anti-virus and anti-malware)
• Automated reporting
• RMM administration
• 3rd party application assistance and troubleshooting
• Virus and malware deep scan assistance
24
MSxManagedBackups
Backups and disaster recovery are an important part of the security fabric. Depending on service level and options chosen, our
backup solution can offer:
• Onsite and cloud backups
• Unified backup and disaster recovery solution
• Off-site retention of backups to cloud environment
• AES/SSL encryption during both transmission and cloud storage
• Optional AES encryption of local backups (on some models)
• Backup screenshot verification
• Ransomware detection
• Fast failback bare metal restores
• Disaster recovery virtualization
• Bandwidth optimization
• End-to-end encryption
• Device and cloud audit reports
25
Questions? 26
Thank You! 27
Claude Hubert
MSx Evangelist / Cybersecurity SME
Jeff Meltzer
Channel Manager – South Florida

More Related Content

What's hot

DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
Andris Soroka
 
Total Defense Product Information
Total Defense Product InformationTotal Defense Product Information
Total Defense Product InformationZeeshan Humayun
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Accellis Technology Group
 
IBM Security Services Overview
IBM Security Services OverviewIBM Security Services Overview
IBM Security Services Overview
Casey Lucas
 
Nuts & Bolts of the Dynamic Attack Chain
Nuts & Bolts of the Dynamic Attack ChainNuts & Bolts of the Dynamic Attack Chain
Nuts & Bolts of the Dynamic Attack Chain
IBM Security
 
Dressing up the ICS Kill Chain
Dressing up the ICS Kill ChainDressing up the ICS Kill Chain
Dressing up the ICS Kill Chain
Dragos, Inc.
 
Incident handling of cyber espionage
Incident handling of cyber espionageIncident handling of cyber espionage
Incident handling of cyber espionage
Marie Elisabeth Gaup Moe
 
MID_SIEM_Boubker_EN
MID_SIEM_Boubker_ENMID_SIEM_Boubker_EN
MID_SIEM_Boubker_EN
Vladyslav Radetsky
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
Bule Hora University
 
Info Sec2007 End Point Final
Info Sec2007   End Point FinalInfo Sec2007   End Point Final
Info Sec2007 End Point Final
Ben Rothke
 
Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Samuel Kamuli
 
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?
IBM Security
 
DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....
DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....
DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....
Shah Sheikh
 
Intelligence-based computer network defence: Understanding the cyber kill cha...
Intelligence-based computer network defence: Understanding the cyber kill cha...Intelligence-based computer network defence: Understanding the cyber kill cha...
Intelligence-based computer network defence: Understanding the cyber kill cha...
Huntsman Security
 
Business Continuity 2009
Business Continuity 2009Business Continuity 2009
Business Continuity 2009
OS-Cubed, Inc.
 
Cyber Security - IDS/IPS is not enough
Cyber Security - IDS/IPS is not enoughCyber Security - IDS/IPS is not enough
Cyber Security - IDS/IPS is not enough
Savvius, Inc
 
Is Anti-Virus Dead?
Is Anti-Virus Dead?Is Anti-Virus Dead?
Is Anti-Virus Dead?
ESET
 
Information security and privacy
Information security and privacyInformation security and privacy
Information security and privacyJoy Chakraborty
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProjectKaley Hair
 
Secure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoSecure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAlto
Prime Infoserv
 

What's hot (20)

DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
 
Total Defense Product Information
Total Defense Product InformationTotal Defense Product Information
Total Defense Product Information
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
 
IBM Security Services Overview
IBM Security Services OverviewIBM Security Services Overview
IBM Security Services Overview
 
Nuts & Bolts of the Dynamic Attack Chain
Nuts & Bolts of the Dynamic Attack ChainNuts & Bolts of the Dynamic Attack Chain
Nuts & Bolts of the Dynamic Attack Chain
 
Dressing up the ICS Kill Chain
Dressing up the ICS Kill ChainDressing up the ICS Kill Chain
Dressing up the ICS Kill Chain
 
Incident handling of cyber espionage
Incident handling of cyber espionageIncident handling of cyber espionage
Incident handling of cyber espionage
 
MID_SIEM_Boubker_EN
MID_SIEM_Boubker_ENMID_SIEM_Boubker_EN
MID_SIEM_Boubker_EN
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
 
Info Sec2007 End Point Final
Info Sec2007   End Point FinalInfo Sec2007   End Point Final
Info Sec2007 End Point Final
 
Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015
 
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?
 
DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....
DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....
DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....
 
Intelligence-based computer network defence: Understanding the cyber kill cha...
Intelligence-based computer network defence: Understanding the cyber kill cha...Intelligence-based computer network defence: Understanding the cyber kill cha...
Intelligence-based computer network defence: Understanding the cyber kill cha...
 
Business Continuity 2009
Business Continuity 2009Business Continuity 2009
Business Continuity 2009
 
Cyber Security - IDS/IPS is not enough
Cyber Security - IDS/IPS is not enoughCyber Security - IDS/IPS is not enough
Cyber Security - IDS/IPS is not enough
 
Is Anti-Virus Dead?
Is Anti-Virus Dead?Is Anti-Virus Dead?
Is Anti-Virus Dead?
 
Information security and privacy
Information security and privacyInformation security and privacy
Information security and privacy
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProject
 
Secure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoSecure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAlto
 

Similar to Cybersecurity Concerns You Should be Thinking About

Prevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability ScannerPrevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability Scanner
GFI Software
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpur
Mohsin Dahar
 
Post Wannacry Update
Post Wannacry UpdatePost Wannacry Update
Post Wannacry Update
Thomas Springer
 
PoS Malware and Other Threats to the Retail Industry
PoS Malware and Other Threats to the Retail IndustryPoS Malware and Other Threats to the Retail Industry
PoS Malware and Other Threats to the Retail Industry
Invincea, Inc.
 
WatchGuard - Cryptolocker en het gevecht tegen IT 's grootste vijand - Orbid ...
WatchGuard - Cryptolocker en het gevecht tegen IT 's grootste vijand - Orbid ...WatchGuard - Cryptolocker en het gevecht tegen IT 's grootste vijand - Orbid ...
WatchGuard - Cryptolocker en het gevecht tegen IT 's grootste vijand - Orbid ...
Orbid
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?
Faith Zeller
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
Mohan Jadhav
 
Security Threats.pptx
Security Threats.pptxSecurity Threats.pptx
Security Threats.pptx
Kalyani Raut
 
Beware the Firewall My Son: The Jaws That Bite, The Claws That Catch!
Beware the Firewall My Son: The Jaws That Bite, The Claws That Catch!Beware the Firewall My Son: The Jaws That Bite, The Claws That Catch!
Beware the Firewall My Son: The Jaws That Bite, The Claws That Catch!
Michele Chubirka
 
Get Smart about Ransomware: Protect Yourself and Organization
Get Smart about Ransomware: Protect Yourself and OrganizationGet Smart about Ransomware: Protect Yourself and Organization
Get Smart about Ransomware: Protect Yourself and Organization
Security Innovation
 
Types-of-Cyber-Attacks-E-book.pdf
Types-of-Cyber-Attacks-E-book.pdfTypes-of-Cyber-Attacks-E-book.pdf
Types-of-Cyber-Attacks-E-book.pdf
ANUSREEASHOK5
 
Defending Your IBM i Against Malware
Defending Your IBM i Against MalwareDefending Your IBM i Against Malware
Defending Your IBM i Against Malware
Precisely
 
WannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do Now
IBM Security
 
Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptx
Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptxCheck-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptx
Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptx
kris harden
 
computer virus full explain ppt.pptx
computer virus full explain ppt.pptxcomputer virus full explain ppt.pptx
computer virus full explain ppt.pptx
TayyabaAbbas4
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
JoselitoJMebolos
 
Panda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion GuidePanda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion Guide
Panda Security
 
3 Tips to Stay Safe Online in 2017
3 Tips to Stay Safe Online in 20173 Tips to Stay Safe Online in 2017
3 Tips to Stay Safe Online in 2017
Bret Piatt
 
ITPG Secure on WannaCry
ITPG Secure on WannaCryITPG Secure on WannaCry
Behind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced ThreatsBehind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced Threats
Cisco Canada
 

Similar to Cybersecurity Concerns You Should be Thinking About (20)

Prevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability ScannerPrevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability Scanner
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpur
 
Post Wannacry Update
Post Wannacry UpdatePost Wannacry Update
Post Wannacry Update
 
PoS Malware and Other Threats to the Retail Industry
PoS Malware and Other Threats to the Retail IndustryPoS Malware and Other Threats to the Retail Industry
PoS Malware and Other Threats to the Retail Industry
 
WatchGuard - Cryptolocker en het gevecht tegen IT 's grootste vijand - Orbid ...
WatchGuard - Cryptolocker en het gevecht tegen IT 's grootste vijand - Orbid ...WatchGuard - Cryptolocker en het gevecht tegen IT 's grootste vijand - Orbid ...
WatchGuard - Cryptolocker en het gevecht tegen IT 's grootste vijand - Orbid ...
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
Security Threats.pptx
Security Threats.pptxSecurity Threats.pptx
Security Threats.pptx
 
Beware the Firewall My Son: The Jaws That Bite, The Claws That Catch!
Beware the Firewall My Son: The Jaws That Bite, The Claws That Catch!Beware the Firewall My Son: The Jaws That Bite, The Claws That Catch!
Beware the Firewall My Son: The Jaws That Bite, The Claws That Catch!
 
Get Smart about Ransomware: Protect Yourself and Organization
Get Smart about Ransomware: Protect Yourself and OrganizationGet Smart about Ransomware: Protect Yourself and Organization
Get Smart about Ransomware: Protect Yourself and Organization
 
Types-of-Cyber-Attacks-E-book.pdf
Types-of-Cyber-Attacks-E-book.pdfTypes-of-Cyber-Attacks-E-book.pdf
Types-of-Cyber-Attacks-E-book.pdf
 
Defending Your IBM i Against Malware
Defending Your IBM i Against MalwareDefending Your IBM i Against Malware
Defending Your IBM i Against Malware
 
WannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do Now
 
Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptx
Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptxCheck-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptx
Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptx
 
computer virus full explain ppt.pptx
computer virus full explain ppt.pptxcomputer virus full explain ppt.pptx
computer virus full explain ppt.pptx
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Panda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion GuidePanda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion Guide
 
3 Tips to Stay Safe Online in 2017
3 Tips to Stay Safe Online in 20173 Tips to Stay Safe Online in 2017
3 Tips to Stay Safe Online in 2017
 
ITPG Secure on WannaCry
ITPG Secure on WannaCryITPG Secure on WannaCry
ITPG Secure on WannaCry
 
Behind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced ThreatsBehind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced Threats
 

More from Advanced Technology Consulting (ATC)

Cloud Managed Services: Best Practices
Cloud Managed Services: Best PracticesCloud Managed Services: Best Practices
Cloud Managed Services: Best Practices
Advanced Technology Consulting (ATC)
 
Racing + Cloud
Racing + CloudRacing + Cloud
Navigating Cloud and Multi-Cloud
Navigating Cloud and Multi-CloudNavigating Cloud and Multi-Cloud
Navigating Cloud and Multi-Cloud
Advanced Technology Consulting (ATC)
 
ATC Delta Dinner - SOB 2022
ATC Delta Dinner - SOB 2022ATC Delta Dinner - SOB 2022
ATC Delta Dinner - SOB 2022
Advanced Technology Consulting (ATC)
 
"Turning Your Contact Center into a Profit Center"
"Turning Your Contact Center into a Profit Center""Turning Your Contact Center into a Profit Center"
"Turning Your Contact Center into a Profit Center"
Advanced Technology Consulting (ATC)
 
"Navigate the MDR Marketplace Like a Pro!"
 "Navigate the MDR Marketplace Like a Pro!" "Navigate the MDR Marketplace Like a Pro!"
"Navigate the MDR Marketplace Like a Pro!"
Advanced Technology Consulting (ATC)
 
"Building Forward, Hybrid Workplaces & UCaaS"
  "Building Forward, Hybrid Workplaces & UCaaS"  "Building Forward, Hybrid Workplaces & UCaaS"
"Building Forward, Hybrid Workplaces & UCaaS"
Advanced Technology Consulting (ATC)
 
Optimizing Your Hybrid IT Strategy
Optimizing Your Hybrid IT StrategyOptimizing Your Hybrid IT Strategy
Optimizing Your Hybrid IT Strategy
Advanced Technology Consulting (ATC)
 
"AI and the Customer Experience (CX)"
"AI and the Customer Experience (CX)""AI and the Customer Experience (CX)"
"AI and the Customer Experience (CX)"
Advanced Technology Consulting (ATC)
 
Hybrid Work Models, Anywhere Operations and Security
Hybrid Work Models, Anywhere Operations and SecurityHybrid Work Models, Anywhere Operations and Security
Hybrid Work Models, Anywhere Operations and Security
Advanced Technology Consulting (ATC)
 
ATC Delta Elite Dinner - 4.15.21 - Jags
ATC Delta Elite Dinner - 4.15.21 - JagsATC Delta Elite Dinner - 4.15.21 - Jags
ATC Delta Elite Dinner - 4.15.21 - Jags
Advanced Technology Consulting (ATC)
 
Digital Transformation of LAN Infrastructure
Digital Transformation of  LAN InfrastructureDigital Transformation of  LAN Infrastructure
Digital Transformation of LAN Infrastructure
Advanced Technology Consulting (ATC)
 
Building Cyber Resilience: No Safe Harbor
Building Cyber Resilience: No Safe HarborBuilding Cyber Resilience: No Safe Harbor
Building Cyber Resilience: No Safe Harbor
Advanced Technology Consulting (ATC)
 
Digital Transformation of LAN Infrastructure
Digital Transformation of  LAN InfrastructureDigital Transformation of  LAN Infrastructure
Digital Transformation of LAN Infrastructure
Advanced Technology Consulting (ATC)
 
Microsoft Teams' Direct Routing for UCaaS and CCaaS
Microsoft Teams' Direct Routing for UCaaS and CCaaSMicrosoft Teams' Direct Routing for UCaaS and CCaaS
Microsoft Teams' Direct Routing for UCaaS and CCaaS
Advanced Technology Consulting (ATC)
 
The CIO Circle Executive Briefing featuring Zoom and 8x8
The CIO Circle Executive Briefing featuring Zoom and 8x8The CIO Circle Executive Briefing featuring Zoom and 8x8
The CIO Circle Executive Briefing featuring Zoom and 8x8
Advanced Technology Consulting (ATC)
 
CCaaS Takes Center Stage
CCaaS Takes Center StageCCaaS Takes Center Stage
CCaaS Takes Center Stage
Advanced Technology Consulting (ATC)
 
SD-WAN - comSpark 2019
SD-WAN - comSpark 2019SD-WAN - comSpark 2019
SD-WAN - comSpark 2019
Advanced Technology Consulting (ATC)
 
SOC-as-a-Service - comSpark 2019
SOC-as-a-Service - comSpark 2019SOC-as-a-Service - comSpark 2019
SOC-as-a-Service - comSpark 2019
Advanced Technology Consulting (ATC)
 
The CIO's Journey to the Cloud: Cloud Hero or Cloud Zero
The CIO's Journey to the Cloud: Cloud Hero or Cloud ZeroThe CIO's Journey to the Cloud: Cloud Hero or Cloud Zero
The CIO's Journey to the Cloud: Cloud Hero or Cloud Zero
Advanced Technology Consulting (ATC)
 

More from Advanced Technology Consulting (ATC) (20)

Cloud Managed Services: Best Practices
Cloud Managed Services: Best PracticesCloud Managed Services: Best Practices
Cloud Managed Services: Best Practices
 
Racing + Cloud
Racing + CloudRacing + Cloud
Racing + Cloud
 
Navigating Cloud and Multi-Cloud
Navigating Cloud and Multi-CloudNavigating Cloud and Multi-Cloud
Navigating Cloud and Multi-Cloud
 
ATC Delta Dinner - SOB 2022
ATC Delta Dinner - SOB 2022ATC Delta Dinner - SOB 2022
ATC Delta Dinner - SOB 2022
 
"Turning Your Contact Center into a Profit Center"
"Turning Your Contact Center into a Profit Center""Turning Your Contact Center into a Profit Center"
"Turning Your Contact Center into a Profit Center"
 
"Navigate the MDR Marketplace Like a Pro!"
 "Navigate the MDR Marketplace Like a Pro!" "Navigate the MDR Marketplace Like a Pro!"
"Navigate the MDR Marketplace Like a Pro!"
 
"Building Forward, Hybrid Workplaces & UCaaS"
  "Building Forward, Hybrid Workplaces & UCaaS"  "Building Forward, Hybrid Workplaces & UCaaS"
"Building Forward, Hybrid Workplaces & UCaaS"
 
Optimizing Your Hybrid IT Strategy
Optimizing Your Hybrid IT StrategyOptimizing Your Hybrid IT Strategy
Optimizing Your Hybrid IT Strategy
 
"AI and the Customer Experience (CX)"
"AI and the Customer Experience (CX)""AI and the Customer Experience (CX)"
"AI and the Customer Experience (CX)"
 
Hybrid Work Models, Anywhere Operations and Security
Hybrid Work Models, Anywhere Operations and SecurityHybrid Work Models, Anywhere Operations and Security
Hybrid Work Models, Anywhere Operations and Security
 
ATC Delta Elite Dinner - 4.15.21 - Jags
ATC Delta Elite Dinner - 4.15.21 - JagsATC Delta Elite Dinner - 4.15.21 - Jags
ATC Delta Elite Dinner - 4.15.21 - Jags
 
Digital Transformation of LAN Infrastructure
Digital Transformation of  LAN InfrastructureDigital Transformation of  LAN Infrastructure
Digital Transformation of LAN Infrastructure
 
Building Cyber Resilience: No Safe Harbor
Building Cyber Resilience: No Safe HarborBuilding Cyber Resilience: No Safe Harbor
Building Cyber Resilience: No Safe Harbor
 
Digital Transformation of LAN Infrastructure
Digital Transformation of  LAN InfrastructureDigital Transformation of  LAN Infrastructure
Digital Transformation of LAN Infrastructure
 
Microsoft Teams' Direct Routing for UCaaS and CCaaS
Microsoft Teams' Direct Routing for UCaaS and CCaaSMicrosoft Teams' Direct Routing for UCaaS and CCaaS
Microsoft Teams' Direct Routing for UCaaS and CCaaS
 
The CIO Circle Executive Briefing featuring Zoom and 8x8
The CIO Circle Executive Briefing featuring Zoom and 8x8The CIO Circle Executive Briefing featuring Zoom and 8x8
The CIO Circle Executive Briefing featuring Zoom and 8x8
 
CCaaS Takes Center Stage
CCaaS Takes Center StageCCaaS Takes Center Stage
CCaaS Takes Center Stage
 
SD-WAN - comSpark 2019
SD-WAN - comSpark 2019SD-WAN - comSpark 2019
SD-WAN - comSpark 2019
 
SOC-as-a-Service - comSpark 2019
SOC-as-a-Service - comSpark 2019SOC-as-a-Service - comSpark 2019
SOC-as-a-Service - comSpark 2019
 
The CIO's Journey to the Cloud: Cloud Hero or Cloud Zero
The CIO's Journey to the Cloud: Cloud Hero or Cloud ZeroThe CIO's Journey to the Cloud: Cloud Hero or Cloud Zero
The CIO's Journey to the Cloud: Cloud Hero or Cloud Zero
 

Recently uploaded

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 

Recently uploaded (20)

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 

Cybersecurity Concerns You Should be Thinking About

  • 1. Claude Hubert MSx Evangelist / Cybersecurity SME Jeff Meltzer Channel Manager – South Florida
  • 3.  ATC Welcome and Introduction  Voice | Data | Cloud | Security  TPx – Hidden Gem– 250+ Providers  Essentials and Why Managed Security?  Encourage Dialogue and Q&A  Speaker Intro– Claude Hubert 3 Louie Hollmeyer louie@4atc.com
  • 4. ThreatsHaveIncreasedExponentially All current statistics show a massive increase in all threat vectors as a result of COVID-19: • COVID-19 informational sites infected with malware are popping up all around the world • Ransomware attacks on the rise • Company attacks on the rise • Home networks now being actively attacked • Massive phishing campaigns • Viruses, trojans, keyloggers, and all other malware also on the rise Bad actors will use anything to steal data for gain! And now some of them have more time on their hands because of the COVID-19 confinement. 4
  • 5. Headlines Here are the headlines from Artic Wolf’s COVID-19 Weekly Threat Roundup for April 24 Remote Work Attacks Continue • Phishing Campaign Impersonates Skype • Phishing Campaign Imitates HR Department Remote Work Announcement • Zoom User Enumeration Threat Discovered & Remediated • Zoombombing Hits US Congress Meeting COVID Related Attacks by State Actors • Google’s Threat Analysis Group (TAG) Identifies COVID-Themed Attacks By State Actors • Suspected Vietnamese threat actors APT32 target Chinese government Institutions, NGOs Breached • Emails and credentials for WHO, NIH, Gates Foundation dumped online • Attackers Use Pulse Secure VPN Vulnerability to Attack Hospitals, Government Entities • FBI Alerts of Phishing Attacks Against Hospitals and Healthcare Providers Small Business Administration (SBA) Leaks and Attacks • SBA Spoofed to Distribute Remote Access Trojan 5
  • 6. GoldenCybersecurityRule DON’T CLICK ON THINGS!!! Received an email with a link? DON’T CLICK ON IT! Received a pop-up while browsing inviting you to click on something? DON’T CLICK ON IT! Malware usually requires you to take some action to do its dirty work and often all it takes is 1 click! Make sure links are clean before you click, and if you don’t know, then just DON’T CLICK ON IT! If possible, get confirmation before clicking, and remember hackers can take control and respond as someone else, so getting confirmation by phone is better (and safer) than by email. 6
  • 7. Ex-HackerHacked–Part1 Shortly after the start of the COVID-19 confinement, my home network crashed randomly. This went on for nearly 3 weeks and happened a few times every day. Could not find the cause until I was looking at devices connected to my network and a computer popped-up that wasn’t mine. A few moments later my network crashed. Caught it again a little later. It caused my Ring security system to fail over to 4G, my Philips Hue smart lights to only work with wall switches, and my Amazon Echos to go offline… Nothing serious, but annoying. 7
  • 8. Ex-HackerHacked–Part2 Time to replace my router with a firewall with the following features, which I now deem a necessity: • Intrusion detection/protection system (IDS/IPS) • SSL Deep Packet Inspection (DPI) • Device discovery with ability to require admin confirmation After looking at some options, I ordered a Bitdefender Box 2, which I installed and configured as soon as it arrived - No more intrusions and no more network crashes. Problem solved. 8
  • 9. WhatisaFirewall? There are 2 types of firewalls: • A network security device, sometimes referred to as a network or security appliance. • A software firewall which runs on a computer. In both cases, the firewall monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules. 9
  • 10. FirewallSecurityAppliance Firewalls are a critical network security component as they are the 1st line of defense against network intrusions. Today’s next generation firewalls are far more capable than traditional firewalls as they add Unified Threat Management (UTM) features, such as: • Anti-virus • Application control • Content filtering • Data Loss Prevention (DLP) • Intrusion Detection System (IDS) • Intrusion Protection System (IPS) • SSL Deep Packet Inspection (DPI) • Two factor authentication Note: IDS/IPS are sometimes combined into a single feature. 10
  • 11. DistributedorCentralized? Firewall security appliances can be distributed at every location or centralized at a given location or in the cloud. Generally: • Distributed firewalls provide protection at each location, even when other locations are compromised, but cost is usually higher, and takes more work to manage and maintain. • Centralized firewalls are easier to manage and maintain, and cost is usually lower overall, but if communications to the centralized firewall fail, locations may lose access to the WAN or the Internet unless an alternative local solution is implemented. 11
  • 12. WhattoLookFor? More and more malware is being delivered with SSL encryption, making SSL Deep Packet Inspection an absolute necessity. Look for next generation firewalls with critical UTM features: • Anti-virus • Content filtering • Data Loss Prevention (DLP) • Intrusion Detection System (IDS) • Intrusion Protection System (IPS) • SSL Deep Packet Inspection (SSL DPI) The more UTM features a firewall has, the more it costs, but it’s still several orders of magnitude lower than the cost of a breach. Think of it as insurance. 12
  • 13. FirewallSoftware Windows, MacOS, and some versions of Linux have built-in software firewalls that are usually enabled by default, although some companies disable them. In today’s high-performance computers, a software firewall will use a small percentage of a computer’s processing power, so we recommend software firewalls be enabled for all network types on all computers. Remember, if firewall security appliances are compromised, having firewall software running on computers will provide some protection. 13
  • 14. WhatisanEndpoint? An endpoint is any Internet-capable device on a network, including: • Computers (servers, workstations, and laptops) • Security appliances and Routers • Network switches • Printers, plotters, and Scanners • VOIP phones • Smartphones • Tablets • Etc. 14
  • 15. KeepingEndpointsUptodate Hardware and software providers normally issue updates and security patches on a regular basis to fix bugs and potential vulnerabilities. It is critical that endpoints be kept up to date, including: • BIOS • Firmware • Operating system • Anti-malware • Software 15
  • 16. Anti-Malware Computers are targeted by many threats (ransomware, viruses, trojans, worms, key loggers, etc.), making anti-malware software a necessity: • Traditional anti-malware looks for “signatures” in files to identify viruses and malware. • Next generation anti-malware still does that, but it also looks at what programs are doing, in other words, a program’s behavior. As new threats emerge, anti-malware programs need to be updated to deal with the new threats. And remember: no one can guarantee 100% protection. 16
  • 17. Ransomware 17 Ransomware usually lays dormant for some time to allow it to spread and so it gets on backups. That way, if someone restores their systems from an infected backup, they bring the ransomware back with it. To safely recover from a ransomware attack, care must be taken to scan backups for ransomware and only restore files that are not infected. Every company, no matter their size, needs to consider Backup and Disaster Recovery (BDR) a critical component of their cybersecurity measures. Lastly, paying a ransom motivates hackers to do it again, flags company for possible future attacks, and there is no guarantee a decryption key will be provided. Of course, if there is no other way to recover data, companies may not have a choice.
  • 18. BackupsandDisasterRecovery Companies need more than just backups; they need a complete Backup and Disaster Recovery (BDR) solution so they can recover their systems quickly. A good BDR solution should include malware detection and offsite replication, either to another location or to the cloud. Keep in mind: • 43% of SMBs go out of business after experiencing a major data loss (Gartner) • Ransomware costs US Small Business $75B in downtime (Datto) • Unplanned downtime can cost an SMB $8,600 per hour (Aberdeen) 18
  • 19. WindowsSecurityFeatures Microsoft Windows has security features built-in that many are not aware of: • Firewall – Microsoft’s built-in firewall does what a basic firewall should do. • Windows Defender – Microsoft’s anti-malware application, which gets decent results in recent tests. If you install another program, you can still enable Windows Defender to run on occasion. • Controlled folders access – A simple yet effective solution against ransomware. You define a list of folders to protect and which programs can access them. Any program not given access will not be able to update those folders. 19
  • 20. Remember • No solution is 100% safe. • Security is a multi-layer effort – There is no single solution. • Security is a moving target – Security measures must be kept up to date. • Security measures are only expensive before an incident. • Once an incident has occurred, it’s too late. • Whenever possible, technology should be used to mitigate risks. • The golden rule: DON’T CLICK ON THINGS!!! 20
  • 21. Videos The evail twin – Part 1: https://www.tpx.com/wp-content/uploads/2018/09/The-Evil-Twin_- Getting-Hacked-Is-Easier-Than-You-Think-Part-1.mp4 The evil twin – Part 2: https://www.tpx.com/wp-content/uploads/2018/09/The-Evil-Twin_- Getting-Hacked-Is-Easier-Than-You-Think-Part-2.mp4 21
  • 22. TPxCanHelp! TPx offers different security measures across products and services it provides. 22
  • 23. MSxManagedFirewalls Firewalls are a strong line of defense against multiple threats and are often the central piece of the security fabric. Depending on the service level and options chosen, our firewall solution can include: • Content filtering • Standard routing policies • Anti-Virus • Anti-Spam • Application control • Intrusion detection (IDS) / Intrusion protection (IPS) • SSL packet inspection • SSL certificates • Threat detection and alerting (automated log monitoring) • Active directory integration • Remote VPN users • Site to site VPNs • Reporting • High availability • Two factor authentication (hard and/or soft tokens) 23
  • 24. MSxManagedEndpoints Keeping endpoints and their protection software up to date is a critical part of the security fabric. Depending on service level and options chosen, our endpoint management solution can offer: • Workstation and server management • Automated patch management • Monitoring and alerting • Asset management • Secure remote access agent • Endpoint protection software (anti-virus and anti-malware) • Automated reporting • RMM administration • 3rd party application assistance and troubleshooting • Virus and malware deep scan assistance 24
  • 25. MSxManagedBackups Backups and disaster recovery are an important part of the security fabric. Depending on service level and options chosen, our backup solution can offer: • Onsite and cloud backups • Unified backup and disaster recovery solution • Off-site retention of backups to cloud environment • AES/SSL encryption during both transmission and cloud storage • Optional AES encryption of local backups (on some models) • Backup screenshot verification • Ransomware detection • Fast failback bare metal restores • Disaster recovery virtualization • Bandwidth optimization • End-to-end encryption • Device and cloud audit reports 25
  • 27. Thank You! 27 Claude Hubert MSx Evangelist / Cybersecurity SME Jeff Meltzer Channel Manager – South Florida