SlideShare a Scribd company logo
1 of 21
Presented by Victor Beitner, CISSP
President
Cyber Security Canada
 Computer and Network Security Solutions for
Small and Medium Business
 Managed Services, Forensics, Vulnerability
Assessments, Incident Response
 Empowers IT and Protects Valuable Data
 Saves Money
Victor Beitner
 Founder and CEO of Cyber Security Canada
 Over 20 years experience in Computer Security
 Certified Information Systems
Security Professional (CISSP)
Small and Medium Business
 Easier Targets for Bad Guys
 Usually don’t have a Security Policy
or Posture
 Small or No trained IT staff
 Naive users and vulnerable systems
 “We have nothing anyone
would want to steal or hide…”
Case Studies
The following presentation contains actual cases
that Cyber Security Canada has dealt with
 Case 1: Illegal Onsite Entry and Data Loss
 Case 2: Ransomware
Case 1:
Poor Security Practices:
Illegal Onsite Entry through
Offsite Hacking
The Clues… 1
 Executive noticed webcam light on his laptop
was activating randomly
 No video conferencing software was
running on the computer
 Hacker remote-spying through webcams
Executive’s Webcam Activated Remotely
 Executive logged in to security DVR,
camera screens were blank
 Hacker Stopped Security Recordings
The Clues… 2
DVR Security Recording Screens Go Blank
 Admin Password on Cisco Router is changed
 Files start disappearing from
the main server
 Phone system stops working
 Hacker Gained Admin Access !!
The Clues… 3
All Hell Breaks Loose ~ Time to Panic !
Cyber Security Canada to the
Rescue!
 Installed Next-Gen Firewall Appliance
 Stop on-going external attack
 Block outbound malware traffic
 Capture and report all network activity
Step 1: Diagnosis
X
Malicious Software Detected
 Computers and cameras attempting
to connect to outside parties
 Company data being sent to Asia
 Within 24 hours, we discovered 40% of machines -
including server / domain controller - had known
malware installed
 After 48 hours 100% of the machines were
compromised
Appropriate Remediation &
Protection
 Installed properly configured & remote-monitored
next-gen firewall
 Identified vulnerable systems to be updated,
patched or replaced
 Designed simple network segmentation plan
 Sophos endpoint installed on all machines
including server
 All systems now protected by Commercial
Grade Anti-Virus product
The Heist Discovered
 1 skid of 12 cash machines
disappeared at some unknown point
Physical Assets Stolen
Thieves Left No Trace
 No evidence of the physical intrusion
 DVR recordings & logs are blank or have gaps
 No unauthorised entry / exit in
electronic access control system
 Client claims all fobs were accounted for…
 Key Fob Cloned ?
Conclusions
 Strong physical defences - cameras, controlled
access systems – can’t compensate for weak
computer & network security
 Good Cyber Security is hard – small businesses do
not have the time, staff or resources to implement it
properly
 An managed solution, designed, implemented &
monitored by security professionals can provide an
appropriate level of security at a reasonable cost
Case Study 2: Ransomware
Phase 1:
 Precise source of infection unknown:
 Employee received a phishing email ?
 Employee clicked on a link & was re- directed
to a malicious site ?
 Employee visited a news site hosting a third party
advertising system that was hacked ?
Single Workstation Infected With Ransomware
 Ransomware scanned mounted Network
drives and shares
 Compromised other Workstations and the Server
 All working files are encrypted
 Last backups are over 2 weeks old
 Never tested
 Business grinds to a complete halt !
Phase 2:
Infection Spreads over the Network
CEO Paid The Ransom
 Ransomware key unlocked the data
BUT
 Workstations are still infected – re-encrypt daily
 Ransomware file cannot be located
on workstations
Appropriate Remediation &
Protection
 Bare-metal rebuild of all workstations with
latest patched software
 Monitored next-gen firewall to prevent ransomware
‘calling home’ during remediation
 Commercial Grade anti-virus and process-monitoring
system on all workstations and servers
 Recommended Business Continuity System with on-site
and remote cloud backups every 15 minutes
 Anti-virus and firewall alone cannot prevent all
ransomware infections
 Spear-phishing campaigns can overcome most defences
 Employee education is a vital part of the Security Program
 Best Defense = Monitored Firewall + AV + Education +
Business Continuity System combining both on-site and
remote cloud backups every 15 minutes with Virtual
Machine instant restore
 Assures minimum downtime, data & financial loss.
Conclusions

More Related Content

What's hot

Basic practices for information & computer security
Basic practices for information & computer securityBasic practices for information & computer security
Basic practices for information & computer securityPrajktaGN
 
SWITZ Business Security. Official presentation!
SWITZ Business Security. Official presentation!SWITZ Business Security. Official presentation!
SWITZ Business Security. Official presentation!Maxim Sidorenko
 
Winchester Aquarium and Pet Center Incident Response Plan
Winchester Aquarium and Pet Center Incident Response PlanWinchester Aquarium and Pet Center Incident Response Plan
Winchester Aquarium and Pet Center Incident Response PlanR. Curtis Roth
 
Take a sneak peek into Saner 2.0
Take a sneak peek into Saner 2.0Take a sneak peek into Saner 2.0
Take a sneak peek into Saner 2.0SecPod Technologies
 
Basic Security Computere
Basic Security ComputereBasic Security Computere
Basic Security Computererashmi1234
 
Attachment 1 – mitigation measures for two factor authentication compromise
Attachment 1 – mitigation measures for two factor authentication compromiseAttachment 1 – mitigation measures for two factor authentication compromise
Attachment 1 – mitigation measures for two factor authentication compromiseHai Nguyen
 
Why Workstation Log Management is Crucial for Network Security?
Why Workstation Log Management is Crucial for Network Security?Why Workstation Log Management is Crucial for Network Security?
Why Workstation Log Management is Crucial for Network Security?SolarWinds
 
Computer security overview
Computer security overviewComputer security overview
Computer security overviewCAS
 
Latihan6 comp-forensic-bab5
Latihan6 comp-forensic-bab5Latihan6 comp-forensic-bab5
Latihan6 comp-forensic-bab5sabtolinux
 
Management Information System Presentation
Management Information System PresentationManagement Information System Presentation
Management Information System PresentationAaDi Malik
 
Security concepts
Security conceptsSecurity concepts
Security conceptsartisriva
 
It security
It securityIt security
It securityavi2607
 
Nagios Conference 2014 - Jorge Higueros - SNAPS
Nagios Conference 2014 - Jorge Higueros - SNAPSNagios Conference 2014 - Jorge Higueros - SNAPS
Nagios Conference 2014 - Jorge Higueros - SNAPSNagios
 
The Role of Application Control in a Zero-Day Reality
The Role of Application Control in a Zero-Day RealityThe Role of Application Control in a Zero-Day Reality
The Role of Application Control in a Zero-Day RealityLumension
 
BAIT1003 Chapter 11
BAIT1003 Chapter 11BAIT1003 Chapter 11
BAIT1003 Chapter 11limsh
 
Critical Controls Of Cyber Defense
Critical Controls Of Cyber DefenseCritical Controls Of Cyber Defense
Critical Controls Of Cyber DefenseRishu Mehra
 

What's hot (20)

Basic practices for information & computer security
Basic practices for information & computer securityBasic practices for information & computer security
Basic practices for information & computer security
 
Linux Security best Practices with Fedora
Linux Security best Practices with FedoraLinux Security best Practices with Fedora
Linux Security best Practices with Fedora
 
SWITZ Business Security. Official presentation!
SWITZ Business Security. Official presentation!SWITZ Business Security. Official presentation!
SWITZ Business Security. Official presentation!
 
Winchester Aquarium and Pet Center Incident Response Plan
Winchester Aquarium and Pet Center Incident Response PlanWinchester Aquarium and Pet Center Incident Response Plan
Winchester Aquarium and Pet Center Incident Response Plan
 
Take a sneak peek into Saner 2.0
Take a sneak peek into Saner 2.0Take a sneak peek into Saner 2.0
Take a sneak peek into Saner 2.0
 
Basic Security Computere
Basic Security ComputereBasic Security Computere
Basic Security Computere
 
Attachment 1 – mitigation measures for two factor authentication compromise
Attachment 1 – mitigation measures for two factor authentication compromiseAttachment 1 – mitigation measures for two factor authentication compromise
Attachment 1 – mitigation measures for two factor authentication compromise
 
Why Workstation Log Management is Crucial for Network Security?
Why Workstation Log Management is Crucial for Network Security?Why Workstation Log Management is Crucial for Network Security?
Why Workstation Log Management is Crucial for Network Security?
 
Computer security overview
Computer security overviewComputer security overview
Computer security overview
 
Latihan6 comp-forensic-bab5
Latihan6 comp-forensic-bab5Latihan6 comp-forensic-bab5
Latihan6 comp-forensic-bab5
 
Management Information System Presentation
Management Information System PresentationManagement Information System Presentation
Management Information System Presentation
 
Security concepts
Security conceptsSecurity concepts
Security concepts
 
Threats to a computer
Threats to a computer Threats to a computer
Threats to a computer
 
It security
It securityIt security
It security
 
Nagios Conference 2014 - Jorge Higueros - SNAPS
Nagios Conference 2014 - Jorge Higueros - SNAPSNagios Conference 2014 - Jorge Higueros - SNAPS
Nagios Conference 2014 - Jorge Higueros - SNAPS
 
Cyber Security # Lec 2
Cyber Security # Lec 2Cyber Security # Lec 2
Cyber Security # Lec 2
 
The Role of Application Control in a Zero-Day Reality
The Role of Application Control in a Zero-Day RealityThe Role of Application Control in a Zero-Day Reality
The Role of Application Control in a Zero-Day Reality
 
System security
System securitySystem security
System security
 
BAIT1003 Chapter 11
BAIT1003 Chapter 11BAIT1003 Chapter 11
BAIT1003 Chapter 11
 
Critical Controls Of Cyber Defense
Critical Controls Of Cyber DefenseCritical Controls Of Cyber Defense
Critical Controls Of Cyber Defense
 

Viewers also liked (20)

Barc0de - Pitch
Barc0de - PitchBarc0de - Pitch
Barc0de - Pitch
 
B428 study on pharmacog. standardization
B428 study on pharmacog. standardizationB428 study on pharmacog. standardization
B428 study on pharmacog. standardization
 
mass communication
mass communicationmass communication
mass communication
 
Techniques of production
Techniques of productionTechniques of production
Techniques of production
 
Speaking Tiger books on travel
Speaking Tiger books on travelSpeaking Tiger books on travel
Speaking Tiger books on travel
 
Relationship Workshop
Relationship Workshop Relationship Workshop
Relationship Workshop
 
Fire safety mnemonics
Fire safety mnemonicsFire safety mnemonics
Fire safety mnemonics
 
Kinsiology Project
Kinsiology ProjectKinsiology Project
Kinsiology Project
 
cost Savings
cost Savingscost Savings
cost Savings
 
Anibal martinez
Anibal martinezAnibal martinez
Anibal martinez
 
review article
review articlereview article
review article
 
EL BULLYING
EL BULLYINGEL BULLYING
EL BULLYING
 
Eng.Mostafa Ezzat.CV
Eng.Mostafa Ezzat.CVEng.Mostafa Ezzat.CV
Eng.Mostafa Ezzat.CV
 
Ppt on nano
Ppt on nanoPpt on nano
Ppt on nano
 
4491E_RaynerMendes_250617182_Thesis
4491E_RaynerMendes_250617182_Thesis4491E_RaynerMendes_250617182_Thesis
4491E_RaynerMendes_250617182_Thesis
 
CV
CVCV
CV
 
Literature Paper
Literature PaperLiterature Paper
Literature Paper
 
DISC_TC_SYFY
DISC_TC_SYFYDISC_TC_SYFY
DISC_TC_SYFY
 
Business Plan- Team Mt. Jr
Business Plan- Team Mt. JrBusiness Plan- Team Mt. Jr
Business Plan- Team Mt. Jr
 
Speaking Tiger Catalogue
Speaking Tiger CatalogueSpeaking Tiger Catalogue
Speaking Tiger Catalogue
 

Similar to How cybercrime affects small business

It's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityIt's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityLumension
 
Threat Modeling
Threat ModelingThreat Modeling
Threat Modelingkeyuradmin
 
The hacker playbook: How to think and act like a cybercriminal to reduce risk...
The hacker playbook: How to think and act like a cybercriminal to reduce risk...The hacker playbook: How to think and act like a cybercriminal to reduce risk...
The hacker playbook: How to think and act like a cybercriminal to reduce risk...Paula Januszkiewicz
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and youArt Ocain
 
Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint SecurityBurak DAYIOGLU
 
IT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIT-Security-20210426203847.ppt
IT-Security-20210426203847.pptRamaNingaiah
 
IT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIan Dave Balatbat
 
IT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIT-Security-20210426203847.ppt
IT-Security-20210426203847.pptssuser6c59cb
 
Security Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA EnvironmentsSecurity Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA Environmentsamiable_indian
 
Aon Ransomware Response and Mitigation Strategies
Aon Ransomware Response and Mitigation StrategiesAon Ransomware Response and Mitigation Strategies
Aon Ransomware Response and Mitigation StrategiesCSNP
 
IT Audit - Shadow IT Systems
IT Audit - Shadow IT SystemsIT Audit - Shadow IT Systems
IT Audit - Shadow IT SystemsDam Frank
 
Security information for internet and security
Security information  for  internet and securitySecurity information  for  internet and security
Security information for internet and securitySomesh Kumar
 
Ethicalhackingalicencetohack 120223062548-phpapp01
Ethicalhackingalicencetohack 120223062548-phpapp01Ethicalhackingalicencetohack 120223062548-phpapp01
Ethicalhackingalicencetohack 120223062548-phpapp01rajkumar jonuboyena
 
Week3Project Part 1-Task 2 – Risk Assessment.docx
Week3Project Part 1-Task 2 – Risk Assessment.docxWeek3Project Part 1-Task 2 – Risk Assessment.docx
Week3Project Part 1-Task 2 – Risk Assessment.docxhelzerpatrina
 
George, Tony, Michael - PECB Webinar 27701 Data Protection Risk Management V1...
George, Tony, Michael - PECB Webinar 27701 Data Protection Risk Management V1...George, Tony, Michael - PECB Webinar 27701 Data Protection Risk Management V1...
George, Tony, Michael - PECB Webinar 27701 Data Protection Risk Management V1...PECB
 
5 Step Data Security Plan for Small Businesses
5 Step Data Security Plan for Small Businesses5 Step Data Security Plan for Small Businesses
5 Step Data Security Plan for Small BusinessesWilkins Consulting, LLC
 
Presentazione-CyberArk-MDM-v3
Presentazione-CyberArk-MDM-v3Presentazione-CyberArk-MDM-v3
Presentazione-CyberArk-MDM-v3Marco Di Martino
 
MIT-6-determina-vps.ppt
MIT-6-determina-vps.pptMIT-6-determina-vps.ppt
MIT-6-determina-vps.pptwebhostingguy
 

Similar to How cybercrime affects small business (20)

It's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityIt's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint Security
 
Information Security Seminar
Information Security SeminarInformation Security Seminar
Information Security Seminar
 
Threat Modeling
Threat ModelingThreat Modeling
Threat Modeling
 
The hacker playbook: How to think and act like a cybercriminal to reduce risk...
The hacker playbook: How to think and act like a cybercriminal to reduce risk...The hacker playbook: How to think and act like a cybercriminal to reduce risk...
The hacker playbook: How to think and act like a cybercriminal to reduce risk...
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and you
 
Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint Security
 
IT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIT-Security-20210426203847.ppt
IT-Security-20210426203847.ppt
 
IT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIT-Security-20210426203847.ppt
IT-Security-20210426203847.ppt
 
IT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIT-Security-20210426203847.ppt
IT-Security-20210426203847.ppt
 
Security Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA EnvironmentsSecurity Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA Environments
 
Aon Ransomware Response and Mitigation Strategies
Aon Ransomware Response and Mitigation StrategiesAon Ransomware Response and Mitigation Strategies
Aon Ransomware Response and Mitigation Strategies
 
IT Audit - Shadow IT Systems
IT Audit - Shadow IT SystemsIT Audit - Shadow IT Systems
IT Audit - Shadow IT Systems
 
Security information for internet and security
Security information  for  internet and securitySecurity information  for  internet and security
Security information for internet and security
 
Ethicalhackingalicencetohack 120223062548-phpapp01
Ethicalhackingalicencetohack 120223062548-phpapp01Ethicalhackingalicencetohack 120223062548-phpapp01
Ethicalhackingalicencetohack 120223062548-phpapp01
 
Week3Project Part 1-Task 2 – Risk Assessment.docx
Week3Project Part 1-Task 2 – Risk Assessment.docxWeek3Project Part 1-Task 2 – Risk Assessment.docx
Week3Project Part 1-Task 2 – Risk Assessment.docx
 
George, Tony, Michael - PECB Webinar 27701 Data Protection Risk Management V1...
George, Tony, Michael - PECB Webinar 27701 Data Protection Risk Management V1...George, Tony, Michael - PECB Webinar 27701 Data Protection Risk Management V1...
George, Tony, Michael - PECB Webinar 27701 Data Protection Risk Management V1...
 
Daddy Thwane. CV
Daddy Thwane. CVDaddy Thwane. CV
Daddy Thwane. CV
 
5 Step Data Security Plan for Small Businesses
5 Step Data Security Plan for Small Businesses5 Step Data Security Plan for Small Businesses
5 Step Data Security Plan for Small Businesses
 
Presentazione-CyberArk-MDM-v3
Presentazione-CyberArk-MDM-v3Presentazione-CyberArk-MDM-v3
Presentazione-CyberArk-MDM-v3
 
MIT-6-determina-vps.ppt
MIT-6-determina-vps.pptMIT-6-determina-vps.ppt
MIT-6-determina-vps.ppt
 

Recently uploaded

一比一原版美国加州大学戴维斯分校毕业证(ucd毕业证书)学位证书仿制
一比一原版美国加州大学戴维斯分校毕业证(ucd毕业证书)学位证书仿制一比一原版美国加州大学戴维斯分校毕业证(ucd毕业证书)学位证书仿制
一比一原版美国加州大学戴维斯分校毕业证(ucd毕业证书)学位证书仿制afukemk
 
Petitioner Moot Memorial including Charges and Argument Advanced.docx
Petitioner Moot Memorial including Charges and Argument Advanced.docxPetitioner Moot Memorial including Charges and Argument Advanced.docx
Petitioner Moot Memorial including Charges and Argument Advanced.docxRumantSharma
 
(Hamad khadam ) ENGLISH LEGAL 2.0.docx
(Hamad khadam )   ENGLISH LEGAL 2.0.docx(Hamad khadam )   ENGLISH LEGAL 2.0.docx
(Hamad khadam ) ENGLISH LEGAL 2.0.docxlibiwo274
 
HOW LAW FIRMS CAN SUPPORT MILITARY DIVORCE CASES
HOW LAW FIRMS CAN SUPPORT MILITARY DIVORCE CASESHOW LAW FIRMS CAN SUPPORT MILITARY DIVORCE CASES
HOW LAW FIRMS CAN SUPPORT MILITARY DIVORCE CASESMesnik Law Group,Inc.
 
2024 Managing Labor + Employee Relations Seminar
2024 Managing Labor + Employee Relations Seminar2024 Managing Labor + Employee Relations Seminar
2024 Managing Labor + Employee Relations SeminarKegler Brown Hill + Ritter
 
Law of succession-Notes for students studying law
Law of succession-Notes for students studying lawLaw of succession-Notes for students studying law
Law of succession-Notes for students studying lawMANGAUNGUSDGQUARTERL
 
ORane M Cornish affidavit statement for New Britain court proving Wentworth'...
ORane M Cornish affidavit statement  for New Britain court proving Wentworth'...ORane M Cornish affidavit statement  for New Britain court proving Wentworth'...
ORane M Cornish affidavit statement for New Britain court proving Wentworth'...Oranecornish
 
File Taxes Online Simple Steps for Efficient Filing.pdf
File Taxes Online Simple Steps for Efficient Filing.pdfFile Taxes Online Simple Steps for Efficient Filing.pdf
File Taxes Online Simple Steps for Efficient Filing.pdfTaxHelp desk
 
一比一原版(BCU毕业证书)伯明翰城市大学毕业证成绩单原件一模一样
一比一原版(BCU毕业证书)伯明翰城市大学毕业证成绩单原件一模一样一比一原版(BCU毕业证书)伯明翰城市大学毕业证成绩单原件一模一样
一比一原版(BCU毕业证书)伯明翰城市大学毕业证成绩单原件一模一样mefyqyn
 
Asif_Sultan_Syeda_vs_UT_of_J_K.pdf op[ke[k
Asif_Sultan_Syeda_vs_UT_of_J_K.pdf op[ke[kAsif_Sultan_Syeda_vs_UT_of_J_K.pdf op[ke[k
Asif_Sultan_Syeda_vs_UT_of_J_K.pdf op[ke[kbhavenpr
 
Comprehensive Guide on Drafting Directors' Report and its ROC Compliances und...
Comprehensive Guide on Drafting Directors' Report and its ROC Compliances und...Comprehensive Guide on Drafting Directors' Report and its ROC Compliances und...
Comprehensive Guide on Drafting Directors' Report and its ROC Compliances und...neha695897
 
IRDA role in Insurance sector in India .pptx
IRDA role in Insurance sector in India .pptxIRDA role in Insurance sector in India .pptx
IRDA role in Insurance sector in India .pptxShreyasVyas9
 
一比一原版(UOL毕业证书)利物浦大学毕业证成绩单原件一模一样
一比一原版(UOL毕业证书)利物浦大学毕业证成绩单原件一模一样一比一原版(UOL毕业证书)利物浦大学毕业证成绩单原件一模一样
一比一原版(UOL毕业证书)利物浦大学毕业证成绩单原件一模一样mefyqyn
 
Termination of Employees under the Labor Code.pptx
Termination of Employees under the Labor Code.pptxTermination of Employees under the Labor Code.pptx
Termination of Employees under the Labor Code.pptxBrV
 
Embed-2-2.pdf[[app[r[prf[-rk;lme;[ed[prp[
Embed-2-2.pdf[[app[r[prf[-rk;lme;[ed[prp[Embed-2-2.pdf[[app[r[prf[-rk;lme;[ed[prp[
Embed-2-2.pdf[[app[r[prf[-rk;lme;[ed[prp[bhavenpr
 
posts-harmful-to-secular-structure-of-the-country-539103-1.pdf
posts-harmful-to-secular-structure-of-the-country-539103-1.pdfposts-harmful-to-secular-structure-of-the-country-539103-1.pdf
posts-harmful-to-secular-structure-of-the-country-539103-1.pdfbhavenpr
 
Skill Development in Law, Para Legal & other Fields and Export of Trained Man...
Skill Development in Law, Para Legal & other Fields and Export of Trained Man...Skill Development in Law, Para Legal & other Fields and Export of Trained Man...
Skill Development in Law, Para Legal & other Fields and Export of Trained Man...Nilendra Kumar
 
Embed-4-2.pdf vk[di-[sd[0edKP[p-[kedkpodekp
Embed-4-2.pdf vk[di-[sd[0edKP[p-[kedkpodekpEmbed-4-2.pdf vk[di-[sd[0edKP[p-[kedkpodekp
Embed-4-2.pdf vk[di-[sd[0edKP[p-[kedkpodekpbhavenpr
 
How Can an Attorney Help With My Car Accident Claim?
How Can an Attorney Help With My Car Accident Claim?How Can an Attorney Help With My Car Accident Claim?
How Can an Attorney Help With My Car Accident Claim?Paisley Law LLC
 
Streamline Legal Operations: A Guide to Paralegal Services
Streamline Legal Operations: A Guide to Paralegal ServicesStreamline Legal Operations: A Guide to Paralegal Services
Streamline Legal Operations: A Guide to Paralegal ServicesEternity Paralegal Services
 

Recently uploaded (20)

一比一原版美国加州大学戴维斯分校毕业证(ucd毕业证书)学位证书仿制
一比一原版美国加州大学戴维斯分校毕业证(ucd毕业证书)学位证书仿制一比一原版美国加州大学戴维斯分校毕业证(ucd毕业证书)学位证书仿制
一比一原版美国加州大学戴维斯分校毕业证(ucd毕业证书)学位证书仿制
 
Petitioner Moot Memorial including Charges and Argument Advanced.docx
Petitioner Moot Memorial including Charges and Argument Advanced.docxPetitioner Moot Memorial including Charges and Argument Advanced.docx
Petitioner Moot Memorial including Charges and Argument Advanced.docx
 
(Hamad khadam ) ENGLISH LEGAL 2.0.docx
(Hamad khadam )   ENGLISH LEGAL 2.0.docx(Hamad khadam )   ENGLISH LEGAL 2.0.docx
(Hamad khadam ) ENGLISH LEGAL 2.0.docx
 
HOW LAW FIRMS CAN SUPPORT MILITARY DIVORCE CASES
HOW LAW FIRMS CAN SUPPORT MILITARY DIVORCE CASESHOW LAW FIRMS CAN SUPPORT MILITARY DIVORCE CASES
HOW LAW FIRMS CAN SUPPORT MILITARY DIVORCE CASES
 
2024 Managing Labor + Employee Relations Seminar
2024 Managing Labor + Employee Relations Seminar2024 Managing Labor + Employee Relations Seminar
2024 Managing Labor + Employee Relations Seminar
 
Law of succession-Notes for students studying law
Law of succession-Notes for students studying lawLaw of succession-Notes for students studying law
Law of succession-Notes for students studying law
 
ORane M Cornish affidavit statement for New Britain court proving Wentworth'...
ORane M Cornish affidavit statement  for New Britain court proving Wentworth'...ORane M Cornish affidavit statement  for New Britain court proving Wentworth'...
ORane M Cornish affidavit statement for New Britain court proving Wentworth'...
 
File Taxes Online Simple Steps for Efficient Filing.pdf
File Taxes Online Simple Steps for Efficient Filing.pdfFile Taxes Online Simple Steps for Efficient Filing.pdf
File Taxes Online Simple Steps for Efficient Filing.pdf
 
一比一原版(BCU毕业证书)伯明翰城市大学毕业证成绩单原件一模一样
一比一原版(BCU毕业证书)伯明翰城市大学毕业证成绩单原件一模一样一比一原版(BCU毕业证书)伯明翰城市大学毕业证成绩单原件一模一样
一比一原版(BCU毕业证书)伯明翰城市大学毕业证成绩单原件一模一样
 
Asif_Sultan_Syeda_vs_UT_of_J_K.pdf op[ke[k
Asif_Sultan_Syeda_vs_UT_of_J_K.pdf op[ke[kAsif_Sultan_Syeda_vs_UT_of_J_K.pdf op[ke[k
Asif_Sultan_Syeda_vs_UT_of_J_K.pdf op[ke[k
 
Comprehensive Guide on Drafting Directors' Report and its ROC Compliances und...
Comprehensive Guide on Drafting Directors' Report and its ROC Compliances und...Comprehensive Guide on Drafting Directors' Report and its ROC Compliances und...
Comprehensive Guide on Drafting Directors' Report and its ROC Compliances und...
 
IRDA role in Insurance sector in India .pptx
IRDA role in Insurance sector in India .pptxIRDA role in Insurance sector in India .pptx
IRDA role in Insurance sector in India .pptx
 
一比一原版(UOL毕业证书)利物浦大学毕业证成绩单原件一模一样
一比一原版(UOL毕业证书)利物浦大学毕业证成绩单原件一模一样一比一原版(UOL毕业证书)利物浦大学毕业证成绩单原件一模一样
一比一原版(UOL毕业证书)利物浦大学毕业证成绩单原件一模一样
 
Termination of Employees under the Labor Code.pptx
Termination of Employees under the Labor Code.pptxTermination of Employees under the Labor Code.pptx
Termination of Employees under the Labor Code.pptx
 
Embed-2-2.pdf[[app[r[prf[-rk;lme;[ed[prp[
Embed-2-2.pdf[[app[r[prf[-rk;lme;[ed[prp[Embed-2-2.pdf[[app[r[prf[-rk;lme;[ed[prp[
Embed-2-2.pdf[[app[r[prf[-rk;lme;[ed[prp[
 
posts-harmful-to-secular-structure-of-the-country-539103-1.pdf
posts-harmful-to-secular-structure-of-the-country-539103-1.pdfposts-harmful-to-secular-structure-of-the-country-539103-1.pdf
posts-harmful-to-secular-structure-of-the-country-539103-1.pdf
 
Skill Development in Law, Para Legal & other Fields and Export of Trained Man...
Skill Development in Law, Para Legal & other Fields and Export of Trained Man...Skill Development in Law, Para Legal & other Fields and Export of Trained Man...
Skill Development in Law, Para Legal & other Fields and Export of Trained Man...
 
Embed-4-2.pdf vk[di-[sd[0edKP[p-[kedkpodekp
Embed-4-2.pdf vk[di-[sd[0edKP[p-[kedkpodekpEmbed-4-2.pdf vk[di-[sd[0edKP[p-[kedkpodekp
Embed-4-2.pdf vk[di-[sd[0edKP[p-[kedkpodekp
 
How Can an Attorney Help With My Car Accident Claim?
How Can an Attorney Help With My Car Accident Claim?How Can an Attorney Help With My Car Accident Claim?
How Can an Attorney Help With My Car Accident Claim?
 
Streamline Legal Operations: A Guide to Paralegal Services
Streamline Legal Operations: A Guide to Paralegal ServicesStreamline Legal Operations: A Guide to Paralegal Services
Streamline Legal Operations: A Guide to Paralegal Services
 

How cybercrime affects small business

  • 1. Presented by Victor Beitner, CISSP President Cyber Security Canada
  • 2.  Computer and Network Security Solutions for Small and Medium Business  Managed Services, Forensics, Vulnerability Assessments, Incident Response  Empowers IT and Protects Valuable Data  Saves Money
  • 3. Victor Beitner  Founder and CEO of Cyber Security Canada  Over 20 years experience in Computer Security  Certified Information Systems Security Professional (CISSP)
  • 4. Small and Medium Business  Easier Targets for Bad Guys  Usually don’t have a Security Policy or Posture  Small or No trained IT staff  Naive users and vulnerable systems  “We have nothing anyone would want to steal or hide…”
  • 5. Case Studies The following presentation contains actual cases that Cyber Security Canada has dealt with  Case 1: Illegal Onsite Entry and Data Loss  Case 2: Ransomware
  • 6. Case 1: Poor Security Practices: Illegal Onsite Entry through Offsite Hacking
  • 7. The Clues… 1  Executive noticed webcam light on his laptop was activating randomly  No video conferencing software was running on the computer  Hacker remote-spying through webcams Executive’s Webcam Activated Remotely
  • 8.  Executive logged in to security DVR, camera screens were blank  Hacker Stopped Security Recordings The Clues… 2 DVR Security Recording Screens Go Blank
  • 9.  Admin Password on Cisco Router is changed  Files start disappearing from the main server  Phone system stops working  Hacker Gained Admin Access !! The Clues… 3 All Hell Breaks Loose ~ Time to Panic !
  • 10. Cyber Security Canada to the Rescue!  Installed Next-Gen Firewall Appliance  Stop on-going external attack  Block outbound malware traffic  Capture and report all network activity Step 1: Diagnosis X
  • 11. Malicious Software Detected  Computers and cameras attempting to connect to outside parties  Company data being sent to Asia  Within 24 hours, we discovered 40% of machines - including server / domain controller - had known malware installed  After 48 hours 100% of the machines were compromised
  • 12. Appropriate Remediation & Protection  Installed properly configured & remote-monitored next-gen firewall  Identified vulnerable systems to be updated, patched or replaced  Designed simple network segmentation plan  Sophos endpoint installed on all machines including server  All systems now protected by Commercial Grade Anti-Virus product
  • 13. The Heist Discovered  1 skid of 12 cash machines disappeared at some unknown point Physical Assets Stolen
  • 14. Thieves Left No Trace  No evidence of the physical intrusion  DVR recordings & logs are blank or have gaps  No unauthorised entry / exit in electronic access control system  Client claims all fobs were accounted for…  Key Fob Cloned ?
  • 15. Conclusions  Strong physical defences - cameras, controlled access systems – can’t compensate for weak computer & network security  Good Cyber Security is hard – small businesses do not have the time, staff or resources to implement it properly  An managed solution, designed, implemented & monitored by security professionals can provide an appropriate level of security at a reasonable cost
  • 16. Case Study 2: Ransomware
  • 17. Phase 1:  Precise source of infection unknown:  Employee received a phishing email ?  Employee clicked on a link & was re- directed to a malicious site ?  Employee visited a news site hosting a third party advertising system that was hacked ? Single Workstation Infected With Ransomware
  • 18.  Ransomware scanned mounted Network drives and shares  Compromised other Workstations and the Server  All working files are encrypted  Last backups are over 2 weeks old  Never tested  Business grinds to a complete halt ! Phase 2: Infection Spreads over the Network
  • 19. CEO Paid The Ransom  Ransomware key unlocked the data BUT  Workstations are still infected – re-encrypt daily  Ransomware file cannot be located on workstations
  • 20. Appropriate Remediation & Protection  Bare-metal rebuild of all workstations with latest patched software  Monitored next-gen firewall to prevent ransomware ‘calling home’ during remediation  Commercial Grade anti-virus and process-monitoring system on all workstations and servers  Recommended Business Continuity System with on-site and remote cloud backups every 15 minutes
  • 21.  Anti-virus and firewall alone cannot prevent all ransomware infections  Spear-phishing campaigns can overcome most defences  Employee education is a vital part of the Security Program  Best Defense = Monitored Firewall + AV + Education + Business Continuity System combining both on-site and remote cloud backups every 15 minutes with Virtual Machine instant restore  Assures minimum downtime, data & financial loss. Conclusions