SlideShare a Scribd company logo
Internet Safety and You
What is MePush?
Fast Facts
 The average cost of a malware attack on a company is 2.4 million dollars.
 Microsoft Office formats make up the most prevalent group of malicious file
extensions at 38% of the total.
 21% of all files are not protected at all.
 Ransomware attacks are growing more than 350% annually.
Small Businesses as a Target
 43% of cyber attacks target small
businesses
 Small businesses are easy prey for
international hacking
 Small businesses are very vulnerable to
generalized phishing and malware
 Small businesses are easy accidental
targets for script kiddies
Small Businesses as a Target
 Small business owners pay ransoms
 Small businesses have valuable data
 Small businesses are easy for hackers to
get in and stay in undetected
 Lack of budget for adequate
security
 Lack of staff and training
Malware
 Malware is any form of programming or code that can be used to expose a
vulnerability or open a door to your internal network.
 Types of malware:
 Trojan: Malware that pretends to be other software
 Spyware: Used to spy on network operations or users
 Rootkit: Installed to gain hidden unauthorized control
 Backdoor: Opening in the network for further exploitation
Phishing
 Phishing is the practice of sending emails
claiming to be from reputable companies
in order to get individuals to reveal
personal information.
Email Links
 Do not click suspicious email links.
 If you are unsure about a link, do not click on the link.
 Use https://safeweb.Norton.com by copying the link’s URL and pastig it into
the URL checker at Norton.
 Any link can be disguised to redirect you to somewhere else
 To circumvent this, just Google it.
Email Attachments
 The same best practices followed with the clicking links should also be
applied to email attachments.
 There are resources you can use if you believe you have a file that might be
malicious. You can upload the suspected file to the website
https://www.virustotal.com/#/home/upload
 This site will analyze the file and brief you with results if it is malicious.
Protected View
 Do not use the “Enable Editing” setting if
not necessary.
 This can potentially allow malware to run
background processes on your computer.
 This can lead to ransomware and
backdoors on the machine for identity
theft.
Social Engineering
 Social engineering is the manipulation of
people into performing actions or
divulging confidential information
 Types of social engineering include:
 Phishing
 Tailgaiting
 Quid pro quo
Antivirus
 Antivirus tools are used to remove infections from computers using previously
known hash values. Hash values are the “DNA” of the virus.
 Antivirus monitoring are systems that are implemented to monitor normal
user use and network behavior to alert a system administrator of a potential
threat. Alerts could be too many failed login attempts to DNS spoofing and
other network changes.
Web Content and Media Filtering
 These tools are used to limit the risk of malware exposed to host machines
and servers. Without proper web filtering, users may access sites that could
put potential rootkits and backdoors on user machines, therefore allowing
unauthorized access to the machine from a remote hacker.
 Sites that should be blocked include sites that allow file transferring, for
example torrents and The Onion Router traffic. Furthermore, blocking not
suitable for work sites is needed to prevent users from accessing crude or
time-wasting sites that are not suitable for company operations.
Virtual Private Network (VPN)
 VPNs allow safe remote access to your company’s internal network to access
documents and work remotely.
 They work off individual access and encrypt traffic coming into your network
to prevent attackers from stalking and watching the network traffic.
 With a VPN, a user is able to remotely connect from a public network into a
private network safely and securely.
Data
 Data is information. It is the documents,
spreadsheets, and images stored on the
computer.
 Data is also more than just files. Data is
the configuration files, services, and
programs that make your computer run.
Without these files, your computer may
not be able to run.
Backups
 A full backup is the simplest but most data intensive and timely type of
backup. This type of backup will completely record your entire computer or
server to external media.
 An incremental backup results in a copy of only the new data that has been
created since the last backup of any type. It can be run as often as desired
and is not usually time intensive or data intensive if managed properly.
 A differential backup copies all of the data that has been created since the
previous backup. However, each time the differential backup is run it will
continue to copy all data changed since the previous file backup.
Single Point of Failure
 A single point of failure is putting all your
eggs in one basket. This means securing
all your backups in one place such as only
on a single external backup media.
Patching
 Patches are fixes to a piece of software that either fix bugs, fix security
vulnerabilities, or add features.
 More than 70% of cyber attacks exploit patchable vulnerabilities.
 Have a policy to patch your machines regularly.
 Test patches on one machine before deploying to all of them.
Wireless Security
 There are various forms of encryption
used for wireless.
 The most common is unhidden WPA2 with
a pre-shared-key.
 As a business, you want a strong
password, pre-shared-key, for your WiFi
because it has become increasingly easier
to decrypt these WiFi passwords.
Compliance
 Compliance means meeting all of the controls required by the governing
agency
 Payment Card Industry (PCI) depends on your business type
 HIPAA compliance is universal and applies to any organization that store ePHI.
 These regulations help protect your business from threats.
 In theory if you are fully compliant, an attacker will have a difficult time
compromising your data.
Dangers of Non-Compliance
 General
 Lawsuits for data loss
 PCI
 Fines from credit card companies
 Increase in transaction fees
 HIPAA
 Fines from HIPAA regulatory bodies
 Legal Fees
CyberSecurity Insurance
 General Liability insurance WILL NOT cover:
 Identity theft or fraud resulting from either a malicious or inadvertent security
breach
 Lawsuits or fines resulting from data leaked through a breach
 Theft or destruction of such valuable digital assets as intellectual property or
customer lists
 Interruption of your business or loss of business due to a hacker or malware
CyberSecurity Insurance
 Insurance companies offer cyber policies and data breach policies for covering
your business in the event of an attack. They may cover:
 Forensic investigation of the breach
 Legal advice to determine your notification and regulatory obligations
 Offering credit monitoring to customers as a result
 Settlements, damages, and judgments related to the breach
 Regulatory fines and penalties (including Payment Card Industry fines)
Mange Your Risks
 IT Management (managing users,
passwords, firewalls, PCs, servers,
networks, change management, logging
and monitoring)
 Regular training and awareness for all
users
 Regular lifecycle and replacing old
equipment and software
What is QuickWatch?
 QuickWatch protects your email, servers, network, website, and workstations.
 QuickWatch allows us to remotely access your machines to deal with certain
issues that you may have.
 QuickWatch automatically backs up your data.
 QuickWatch has automatic cloud-driven patch management.
Top Tips
 Never believe that you are not a
target to hackers.
 Keep your software and operating
system up-to-date
 Beware of suspicious emails and
phone calls
 Practice good password
management
 Never leave devices unlocked and
unattended
 Back up your data
 Use two-factor authentication
 Use secure internet connections
 Install an enterprise anti-virus and
keep it up-to-date
 Protect sensitive data
Sources
 https://www.quickwatch.support/
 https://blog.varonis.com/cybersecurity-statistics/
 https://blog.varonis.com/cybersecurity-statistics/
 https://security.berkeley.edu/resources/best-practices-how-to-articles/top-
10-secure-computing-tips
 https://ist.mit.edu/security/tips
 https://www.zdnet.com/article/simple-security-step-by-step-guide/

More Related Content

What's hot

Ethical hacking and social engineering
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineering
Sweta Kumari Barnwal
 
Distribution Industry: What is Ransomware and How Does it Work?
Distribution Industry: What is Ransomware and How Does it Work?Distribution Industry: What is Ransomware and How Does it Work?
Distribution Industry: What is Ransomware and How Does it Work?
The TNS Group
 
Data security
 Data security  Data security
Data security
Laura Breese
 
Information security and Attacks
Information security and AttacksInformation security and Attacks
Information security and Attacks
Sachin Darekar
 
Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)
GuardEra Access Solutions, Inc.
 
Information security[277]
Information security[277]Information security[277]
Information security[277]
Timothy Warren
 
Topic11
Topic11Topic11
Topic11
Anne Starr
 
INFORMATION SECURITY: THREATS AND SOLUTIONS.
INFORMATION SECURITY: THREATS AND SOLUTIONS.INFORMATION SECURITY: THREATS AND SOLUTIONS.
INFORMATION SECURITY: THREATS AND SOLUTIONS.
Ni
 
Network srcurity
Network srcurityNetwork srcurity
Network srcurity
sheikhparvez4
 
Module 3-cyber security
Module 3-cyber securityModule 3-cyber security
Module 3-cyber security
Sweta Kumari Barnwal
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
Bule Hora University
 
Introduction Network security
Introduction Network securityIntroduction Network security
Introduction Network security
IGZ Software house
 
Security Incidents
Security IncidentsSecurity Incidents
Security Incidents
belsis
 
Cybersecurity…real world solutions
Cybersecurity…real world solutions Cybersecurity…real world solutions
Cybersecurity…real world solutions
ErnestStaats
 
Aspects of data security
Aspects of data securityAspects of data security
Aspects of data security
SaranSwathi1
 
Database Threats - Information System Security
Database Threats - Information System SecurityDatabase Threats - Information System Security
Database Threats - Information System Security
sandra sukarieh
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
Mark Silver
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityAtlantic Training, LLC.
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data Protection
UthsoNandy
 
Information security
Information securityInformation security
Information security
Vijayananda Mohire
 

What's hot (20)

Ethical hacking and social engineering
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineering
 
Distribution Industry: What is Ransomware and How Does it Work?
Distribution Industry: What is Ransomware and How Does it Work?Distribution Industry: What is Ransomware and How Does it Work?
Distribution Industry: What is Ransomware and How Does it Work?
 
Data security
 Data security  Data security
Data security
 
Information security and Attacks
Information security and AttacksInformation security and Attacks
Information security and Attacks
 
Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)
 
Information security[277]
Information security[277]Information security[277]
Information security[277]
 
Topic11
Topic11Topic11
Topic11
 
INFORMATION SECURITY: THREATS AND SOLUTIONS.
INFORMATION SECURITY: THREATS AND SOLUTIONS.INFORMATION SECURITY: THREATS AND SOLUTIONS.
INFORMATION SECURITY: THREATS AND SOLUTIONS.
 
Network srcurity
Network srcurityNetwork srcurity
Network srcurity
 
Module 3-cyber security
Module 3-cyber securityModule 3-cyber security
Module 3-cyber security
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
 
Introduction Network security
Introduction Network securityIntroduction Network security
Introduction Network security
 
Security Incidents
Security IncidentsSecurity Incidents
Security Incidents
 
Cybersecurity…real world solutions
Cybersecurity…real world solutions Cybersecurity…real world solutions
Cybersecurity…real world solutions
 
Aspects of data security
Aspects of data securityAspects of data security
Aspects of data security
 
Database Threats - Information System Security
Database Threats - Information System SecurityDatabase Threats - Information System Security
Database Threats - Information System Security
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data Protection
 
Information security
Information securityInformation security
Information security
 

Similar to Internet safety and you

Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
MuhammadRobeel3
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptx
muskaangoel15
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.angelaag98
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
edgar6wallace88877
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
fathwaitewalter
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
TechSoup
 
Data protection and security
Data protection and securityData protection and security
Data protection and security
nazar60
 
Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
Adebisi Tolulope
 
In computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdfIn computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdf
anandanand521251
 
Computing safety
Computing safetyComputing safety
Computing safety
Brulius
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacyArdit Meti
 
security By ZAK
security By ZAKsecurity By ZAK
security By ZAK
Tabsheer Hasan
 
A Brief Note On Companies And The Largest Ever Consumer...
A Brief Note On Companies And The Largest Ever Consumer...A Brief Note On Companies And The Largest Ever Consumer...
A Brief Note On Companies And The Largest Ever Consumer...
Erin Moore
 
Computer security
Computer securityComputer security
Computer security
EktaVaswani2
 
information security awareness course
information security awareness courseinformation security awareness course
information security awareness course
Abdul Manaf Vellakodath
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
MuhammadRehan856177
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
MuhammadRehan856177
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
GulshanAra14
 
Cyber Security School Workshop
Cyber Security School WorkshopCyber Security School Workshop
Cyber Security School Workshop
Rahul Nayan
 
Essentials Of Security
Essentials Of SecurityEssentials Of Security
Essentials Of Security
xsy
 

Similar to Internet safety and you (20)

Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptx
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
 
Data protection and security
Data protection and securityData protection and security
Data protection and security
 
Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
 
In computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdfIn computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdf
 
Computing safety
Computing safetyComputing safety
Computing safety
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
 
security By ZAK
security By ZAKsecurity By ZAK
security By ZAK
 
A Brief Note On Companies And The Largest Ever Consumer...
A Brief Note On Companies And The Largest Ever Consumer...A Brief Note On Companies And The Largest Ever Consumer...
A Brief Note On Companies And The Largest Ever Consumer...
 
Computer security
Computer securityComputer security
Computer security
 
information security awareness course
information security awareness courseinformation security awareness course
information security awareness course
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
 
Cyber Security School Workshop
Cyber Security School WorkshopCyber Security School Workshop
Cyber Security School Workshop
 
Essentials Of Security
Essentials Of SecurityEssentials Of Security
Essentials Of Security
 

More from Art Ocain

Applying the MITRE CREF.pptx
Applying the MITRE CREF.pptxApplying the MITRE CREF.pptx
Applying the MITRE CREF.pptx
Art Ocain
 
Accidental Resiliency - MITRE ResilienCyCon 2022-draft-PRE-MARKETING -grey.pptx
Accidental Resiliency - MITRE ResilienCyCon 2022-draft-PRE-MARKETING -grey.pptxAccidental Resiliency - MITRE ResilienCyCon 2022-draft-PRE-MARKETING -grey.pptx
Accidental Resiliency - MITRE ResilienCyCon 2022-draft-PRE-MARKETING -grey.pptx
Art Ocain
 
Accidental Resiliency - Global Resilience Federation (GRF) Business Resilienc...
Accidental Resiliency - Global Resilience Federation (GRF) Business Resilienc...Accidental Resiliency - Global Resilience Federation (GRF) Business Resilienc...
Accidental Resiliency - Global Resilience Federation (GRF) Business Resilienc...
Art Ocain
 
vCIO vCISO - Information Technology and Security Strategy.pptx
vCIO vCISO - Information Technology and Security Strategy.pptxvCIO vCISO - Information Technology and Security Strategy.pptx
vCIO vCISO - Information Technology and Security Strategy.pptx
Art Ocain
 
Cybersecurity for Small Business - Incident Response.pptx
Cybersecurity for Small Business - Incident Response.pptxCybersecurity for Small Business - Incident Response.pptx
Cybersecurity for Small Business - Incident Response.pptx
Art Ocain
 
MePush Leadership Fundamentals - Week 5
MePush Leadership Fundamentals - Week 5MePush Leadership Fundamentals - Week 5
MePush Leadership Fundamentals - Week 5
Art Ocain
 
MePush Leadership Fundamentals - Week 4
MePush Leadership Fundamentals - Week 4MePush Leadership Fundamentals - Week 4
MePush Leadership Fundamentals - Week 4
Art Ocain
 
MePush Leadership Fundamentals - Week 3
MePush Leadership Fundamentals - Week 3MePush Leadership Fundamentals - Week 3
MePush Leadership Fundamentals - Week 3
Art Ocain
 
MePush Leadership Fundamentals - Week 2
MePush Leadership Fundamentals - Week 2MePush Leadership Fundamentals - Week 2
MePush Leadership Fundamentals - Week 2
Art Ocain
 
Anatomy of a Ransomware Event
Anatomy of a Ransomware EventAnatomy of a Ransomware Event
Anatomy of a Ransomware Event
Art Ocain
 
MePush Leadership Fundamentals - Week 1
MePush Leadership Fundamentals - Week 1MePush Leadership Fundamentals - Week 1
MePush Leadership Fundamentals - Week 1
Art Ocain
 
Control Your Data: 3 Steps for Data Governance for Work from Home Staff
Control Your Data:  3 Steps for Data Governance for Work from Home StaffControl Your Data:  3 Steps for Data Governance for Work from Home Staff
Control Your Data: 3 Steps for Data Governance for Work from Home Staff
Art Ocain
 
Be More Secure than your Competition: MePush Cyber Security for Small Business
Be More Secure than your Competition:  MePush Cyber Security for Small BusinessBe More Secure than your Competition:  MePush Cyber Security for Small Business
Be More Secure than your Competition: MePush Cyber Security for Small Business
Art Ocain
 

More from Art Ocain (13)

Applying the MITRE CREF.pptx
Applying the MITRE CREF.pptxApplying the MITRE CREF.pptx
Applying the MITRE CREF.pptx
 
Accidental Resiliency - MITRE ResilienCyCon 2022-draft-PRE-MARKETING -grey.pptx
Accidental Resiliency - MITRE ResilienCyCon 2022-draft-PRE-MARKETING -grey.pptxAccidental Resiliency - MITRE ResilienCyCon 2022-draft-PRE-MARKETING -grey.pptx
Accidental Resiliency - MITRE ResilienCyCon 2022-draft-PRE-MARKETING -grey.pptx
 
Accidental Resiliency - Global Resilience Federation (GRF) Business Resilienc...
Accidental Resiliency - Global Resilience Federation (GRF) Business Resilienc...Accidental Resiliency - Global Resilience Federation (GRF) Business Resilienc...
Accidental Resiliency - Global Resilience Federation (GRF) Business Resilienc...
 
vCIO vCISO - Information Technology and Security Strategy.pptx
vCIO vCISO - Information Technology and Security Strategy.pptxvCIO vCISO - Information Technology and Security Strategy.pptx
vCIO vCISO - Information Technology and Security Strategy.pptx
 
Cybersecurity for Small Business - Incident Response.pptx
Cybersecurity for Small Business - Incident Response.pptxCybersecurity for Small Business - Incident Response.pptx
Cybersecurity for Small Business - Incident Response.pptx
 
MePush Leadership Fundamentals - Week 5
MePush Leadership Fundamentals - Week 5MePush Leadership Fundamentals - Week 5
MePush Leadership Fundamentals - Week 5
 
MePush Leadership Fundamentals - Week 4
MePush Leadership Fundamentals - Week 4MePush Leadership Fundamentals - Week 4
MePush Leadership Fundamentals - Week 4
 
MePush Leadership Fundamentals - Week 3
MePush Leadership Fundamentals - Week 3MePush Leadership Fundamentals - Week 3
MePush Leadership Fundamentals - Week 3
 
MePush Leadership Fundamentals - Week 2
MePush Leadership Fundamentals - Week 2MePush Leadership Fundamentals - Week 2
MePush Leadership Fundamentals - Week 2
 
Anatomy of a Ransomware Event
Anatomy of a Ransomware EventAnatomy of a Ransomware Event
Anatomy of a Ransomware Event
 
MePush Leadership Fundamentals - Week 1
MePush Leadership Fundamentals - Week 1MePush Leadership Fundamentals - Week 1
MePush Leadership Fundamentals - Week 1
 
Control Your Data: 3 Steps for Data Governance for Work from Home Staff
Control Your Data:  3 Steps for Data Governance for Work from Home StaffControl Your Data:  3 Steps for Data Governance for Work from Home Staff
Control Your Data: 3 Steps for Data Governance for Work from Home Staff
 
Be More Secure than your Competition: MePush Cyber Security for Small Business
Be More Secure than your Competition:  MePush Cyber Security for Small BusinessBe More Secure than your Competition:  MePush Cyber Security for Small Business
Be More Secure than your Competition: MePush Cyber Security for Small Business
 

Recently uploaded

Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 

Recently uploaded (20)

Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 

Internet safety and you

  • 3. Fast Facts  The average cost of a malware attack on a company is 2.4 million dollars.  Microsoft Office formats make up the most prevalent group of malicious file extensions at 38% of the total.  21% of all files are not protected at all.  Ransomware attacks are growing more than 350% annually.
  • 4. Small Businesses as a Target  43% of cyber attacks target small businesses  Small businesses are easy prey for international hacking  Small businesses are very vulnerable to generalized phishing and malware  Small businesses are easy accidental targets for script kiddies
  • 5. Small Businesses as a Target  Small business owners pay ransoms  Small businesses have valuable data  Small businesses are easy for hackers to get in and stay in undetected  Lack of budget for adequate security  Lack of staff and training
  • 6. Malware  Malware is any form of programming or code that can be used to expose a vulnerability or open a door to your internal network.  Types of malware:  Trojan: Malware that pretends to be other software  Spyware: Used to spy on network operations or users  Rootkit: Installed to gain hidden unauthorized control  Backdoor: Opening in the network for further exploitation
  • 7. Phishing  Phishing is the practice of sending emails claiming to be from reputable companies in order to get individuals to reveal personal information.
  • 8. Email Links  Do not click suspicious email links.  If you are unsure about a link, do not click on the link.  Use https://safeweb.Norton.com by copying the link’s URL and pastig it into the URL checker at Norton.  Any link can be disguised to redirect you to somewhere else  To circumvent this, just Google it.
  • 9. Email Attachments  The same best practices followed with the clicking links should also be applied to email attachments.  There are resources you can use if you believe you have a file that might be malicious. You can upload the suspected file to the website https://www.virustotal.com/#/home/upload  This site will analyze the file and brief you with results if it is malicious.
  • 10. Protected View  Do not use the “Enable Editing” setting if not necessary.  This can potentially allow malware to run background processes on your computer.  This can lead to ransomware and backdoors on the machine for identity theft.
  • 11.
  • 12. Social Engineering  Social engineering is the manipulation of people into performing actions or divulging confidential information  Types of social engineering include:  Phishing  Tailgaiting  Quid pro quo
  • 13. Antivirus  Antivirus tools are used to remove infections from computers using previously known hash values. Hash values are the “DNA” of the virus.  Antivirus monitoring are systems that are implemented to monitor normal user use and network behavior to alert a system administrator of a potential threat. Alerts could be too many failed login attempts to DNS spoofing and other network changes.
  • 14. Web Content and Media Filtering  These tools are used to limit the risk of malware exposed to host machines and servers. Without proper web filtering, users may access sites that could put potential rootkits and backdoors on user machines, therefore allowing unauthorized access to the machine from a remote hacker.  Sites that should be blocked include sites that allow file transferring, for example torrents and The Onion Router traffic. Furthermore, blocking not suitable for work sites is needed to prevent users from accessing crude or time-wasting sites that are not suitable for company operations.
  • 15. Virtual Private Network (VPN)  VPNs allow safe remote access to your company’s internal network to access documents and work remotely.  They work off individual access and encrypt traffic coming into your network to prevent attackers from stalking and watching the network traffic.  With a VPN, a user is able to remotely connect from a public network into a private network safely and securely.
  • 16. Data  Data is information. It is the documents, spreadsheets, and images stored on the computer.  Data is also more than just files. Data is the configuration files, services, and programs that make your computer run. Without these files, your computer may not be able to run.
  • 17. Backups  A full backup is the simplest but most data intensive and timely type of backup. This type of backup will completely record your entire computer or server to external media.  An incremental backup results in a copy of only the new data that has been created since the last backup of any type. It can be run as often as desired and is not usually time intensive or data intensive if managed properly.  A differential backup copies all of the data that has been created since the previous backup. However, each time the differential backup is run it will continue to copy all data changed since the previous file backup.
  • 18. Single Point of Failure  A single point of failure is putting all your eggs in one basket. This means securing all your backups in one place such as only on a single external backup media.
  • 19. Patching  Patches are fixes to a piece of software that either fix bugs, fix security vulnerabilities, or add features.  More than 70% of cyber attacks exploit patchable vulnerabilities.  Have a policy to patch your machines regularly.  Test patches on one machine before deploying to all of them.
  • 20. Wireless Security  There are various forms of encryption used for wireless.  The most common is unhidden WPA2 with a pre-shared-key.  As a business, you want a strong password, pre-shared-key, for your WiFi because it has become increasingly easier to decrypt these WiFi passwords.
  • 21. Compliance  Compliance means meeting all of the controls required by the governing agency  Payment Card Industry (PCI) depends on your business type  HIPAA compliance is universal and applies to any organization that store ePHI.  These regulations help protect your business from threats.  In theory if you are fully compliant, an attacker will have a difficult time compromising your data.
  • 22. Dangers of Non-Compliance  General  Lawsuits for data loss  PCI  Fines from credit card companies  Increase in transaction fees  HIPAA  Fines from HIPAA regulatory bodies  Legal Fees
  • 23. CyberSecurity Insurance  General Liability insurance WILL NOT cover:  Identity theft or fraud resulting from either a malicious or inadvertent security breach  Lawsuits or fines resulting from data leaked through a breach  Theft or destruction of such valuable digital assets as intellectual property or customer lists  Interruption of your business or loss of business due to a hacker or malware
  • 24. CyberSecurity Insurance  Insurance companies offer cyber policies and data breach policies for covering your business in the event of an attack. They may cover:  Forensic investigation of the breach  Legal advice to determine your notification and regulatory obligations  Offering credit monitoring to customers as a result  Settlements, damages, and judgments related to the breach  Regulatory fines and penalties (including Payment Card Industry fines)
  • 25. Mange Your Risks  IT Management (managing users, passwords, firewalls, PCs, servers, networks, change management, logging and monitoring)  Regular training and awareness for all users  Regular lifecycle and replacing old equipment and software
  • 26. What is QuickWatch?  QuickWatch protects your email, servers, network, website, and workstations.  QuickWatch allows us to remotely access your machines to deal with certain issues that you may have.  QuickWatch automatically backs up your data.  QuickWatch has automatic cloud-driven patch management.
  • 27. Top Tips  Never believe that you are not a target to hackers.  Keep your software and operating system up-to-date  Beware of suspicious emails and phone calls  Practice good password management  Never leave devices unlocked and unattended  Back up your data  Use two-factor authentication  Use secure internet connections  Install an enterprise anti-virus and keep it up-to-date  Protect sensitive data
  • 28. Sources  https://www.quickwatch.support/  https://blog.varonis.com/cybersecurity-statistics/  https://blog.varonis.com/cybersecurity-statistics/  https://security.berkeley.edu/resources/best-practices-how-to-articles/top- 10-secure-computing-tips  https://ist.mit.edu/security/tips  https://www.zdnet.com/article/simple-security-step-by-step-guide/