SlideShare a Scribd company logo
1 of 3
Download to read offline
3101 N. Central Avenue I Suite 300 I Phoenix, AZ 85012
602.264.6835
www.cbiz.com I www.mhmcpa.com
CBIZ & MAYER HOFFMAN MCCANN P. C. – YOUR LEADING BUSINESS SERVICES PARTNER
Antivirus Complacency could Cost More than You Think!
In recent years, business and home PC users have enjoyed a period of relative calm with low impact
virus outbreaks or so it would seem. Yes, it’s true that antivirus programs like Symantec 360, McAfee
and Sophos have all improved to the point that we forget there is a war taking place over our data just
on the other side of our keyboards. The categories of Malware targeting our business and home PC’s
have changed to avoid detection. For example, some malware gets on your system and waits, listening
for remote commands to become active and deliver its payload. Other malware uses stealth to hide and
others put on a disguise to look like operating system files. Have you looked at your antivirus protection
application log files lately? Most of us haven’t. Symantec 360, for example, will display a history of
intrusion prevention, identity protection events, firewall reports and the one I pay attention to the most
is the recent history report that displays all of the preceding reports and much more.
Reading your PC’s antivirus software history report on a weekly basis can give you a better
understanding of the attacks that are taking place on your PC, even when you’re not using it. Did you
leave your PC on last night? I believe that we as computer users grow complacent because we have
transferred the job of protecting our businesses and PC’s from hackers and malware coders to the big
antivirus companies. We have forgotten that we are in a war and “know your enemy” applies just as
much today as it did 2,500 years ago when Sun Tzu wrote those words.
Here’s What You Need to Know
Most Antivirus Manufactures do a good job of protecting your PC from Malware and the sub categories
such as antivirus and spam. While it’s true that our best offense is a great defense, today’s business
systems require a greater depth of security controls that are detective, preventative, deterrent,
compensating and technical. Most businesses are willing to invest in network equipment of some kind,
that’s a technical control. To make the purchase truly effective, your network security equipment needs
to provide a layered security strategy also known as ‘defense in depth’ that includes security controls
from each category. Simply put, don’t place all of your eggs in one basket and rely on the antivirus
manufacturer to keep your critical business data safe! Taking a layered approach to security includes
having properly configured firewalls that block unwanted traffic both coming in and going out of your
network. Depending on the size of your company, your defense in depth strategy may require you to
deploy a Unified Threat Manager (UTM) or Intrusion prevention System (IPS) to work alongside of your
firewall. Your PC’s also need protection everywhere they go not just on the business network. Defense
in depth on a PC should include at least three layers: antivirus protection, the operating system firewall,
and some type of end point protection in the form of an internet proxy filter. Today, these defensive
tools come in the form of hardware appliances and software applications to fit just about any budget.
3101 N. Central Avenue I Suite 300 I Phoenix, AZ 85012
602.264.6835
www.cbiz.com I www.mhmcpa.com
CBIZ & MAYER HOFFMAN MCCANN P. C. – YOUR LEADING BUSINESS SERVICES PARTNER
Data Security is a Full Contact Sport
When it comes to data security, I like to quote Warren Buffett “ It takes 20 years to build a reputation
and five minutes to ruin it”. When applying this to protecting your business data , compliance
requirements and legal implications that come from just one data breach should help us to become
better guardians of our data. You may have the best antivirus money can buy, but if you are relying on
antivirus alone it’s just a matter of time before your PC gets compromised. PC end user awareness and
malware education should be at the top of your business defense in depth strategy and it’s the focus of
the rest of this article. Knowing your enemy isn’t enough these days, you need to know your PC. We
spend more time with our PC’s today than we do with our friends and family. We know when things are
off with our PC’s, we see and feel the warning signs, but choose to ignore them and that is what the
malware coders are counting on. If you are the PC user that leaves your computer running all night
because rebooting takes too long then you could find yourself waking up to a ransomware infection that
has locked up your data. I’m not just talking about your PC hard drive either. If you are logged into the
network, ransomware will go to work on the server drives that are mapped to your PC. Beginning with
Drive F: and working to drive Z: every file that the infected PC has access to will get encrypted.
Phases of Ransomware Infection
Let’s look at the phases of a ransomware infection and some of the symptoms that you may be ignoring.
Phase One, you took the bait. It showed up in the form of a phishing email or you downloaded what
looked like a .PDF and ignored the warning that the PDF file needed to run a script. You thought nothing
of it because nothing appeared to change on your PC. So you moved past the incident and forgot that it
happened. Phases Two and Three, the Trojan is now activated on your PC and it begins writing to the
windows registry. The next time you boot up your PC the ransomware encryption engine starts. You may
have the latest Antivirus update installed to stop it, but then again your PC may be under attack from a
newer version of Trojan/ Win32.crilok.new.* and the Antivirus company hasn’t identified it yet. This is
where user awareness comes in. You say to yourself “It’s taking longer to open that email, application,
webpage than it did last week.” But you shrug it off and move on. Stop and rewind. What if your car,
dishwasher, or TV suddenly started running slow would you just ignore it? Now is the time to call your
IT support professional to help you by checking your PC’s antivirus, firewall and proxy logs for new
issues. Phase Four, you become complacent and leave your PC on all night allowing
Trojan/Win32.crilok.* to have its way with your PC. Trojan/Win32.crilok.* establishes a connection to
the command and control server, it’s now too late! Remember what I said about blocking traffic leaving
your network, this is why. If Trojan/Win32.crilok.*or any of its new variations is able to establish a
connection to the command and control server, the encryption begins and the key exchange takes place
3101 N. Central Avenue I Suite 300 I Phoenix, AZ 85012
602.264.6835
www.cbiz.com I www.mhmcpa.com
CBIZ & MAYER HOFFMAN MCCANN P. C. – YOUR LEADING BUSINESS SERVICES PARTNER
allowing them to make good on the threat of holding your data hostage until the ransom is paid and
they send you the un-encryption key to unlock your PC. It’s during phase four where it all begins to
become clear as to what just happened to your PC. That’s when people call me and say “ the other day I
opened this email and…”, or “I was a website and this download did something and now I can’t get to
my files.”
For a business owner with a computer network, one infected PC that is attached to the network
undetected during Phases 1,2, or 3, will move into phase 4 and encrypt the file server mapped network
drives as well. Beginning with Drive F:, the network drives will begin encrypting moving as far down the
server drive mappings as the compromised user has access to. To combat ransomware and many other
malware threats we need to stop being complacent PC users. Please reach out to your IT professional as
soon as you notice any strange activity. The earlier we can detect and prevent, the safer our computers
and data will be.

More Related Content

What's hot

Securing Your Small Business Network
Securing Your Small Business NetworkSecuring Your Small Business Network
Securing Your Small Business NetworkAnindita Ghatak
 
Data Breach: Hot Topics in Information Security Trends Webinar Recording
Data Breach: Hot Topics in Information Security Trends Webinar RecordingData Breach: Hot Topics in Information Security Trends Webinar Recording
Data Breach: Hot Topics in Information Security Trends Webinar RecordingBradley Arant Boult Cummings LLP
 
The 10 Commandments of Computer Security
The 10 Commandments of Computer SecurityThe 10 Commandments of Computer Security
The 10 Commandments of Computer SecurityTechvera
 
Small Business Cyber Security Checklist
Small Business Cyber Security ChecklistSmall Business Cyber Security Checklist
Small Business Cyber Security ChecklistGabriel Friedlander
 
Making Threat Management More Manageable
Making Threat Management More ManageableMaking Threat Management More Manageable
Making Threat Management More ManageableIBM Security
 
Jeremy Virus Effect
Jeremy   Virus EffectJeremy   Virus Effect
Jeremy Virus Effectguest7b2ba1
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014B2BPlanner Ltd.
 
Business Continuity
Business  ContinuityBusiness  Continuity
Business ContinuityRedcliff
 
At Your Expense
At Your ExpenseAt Your Expense
At Your ExpenseDan Oblak
 
Nuts & Bolts of the Dynamic Attack Chain
Nuts & Bolts of the Dynamic Attack ChainNuts & Bolts of the Dynamic Attack Chain
Nuts & Bolts of the Dynamic Attack ChainIBM Security
 
Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-VirusWong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virussharing notes123
 
Enterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entitiesEnterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entitiesQuick Heal Technologies Ltd.
 
Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businessesB2BPlanner Ltd.
 

What's hot (20)

Data security
 Data security  Data security
Data security
 
Securing Your Small Business Network
Securing Your Small Business NetworkSecuring Your Small Business Network
Securing Your Small Business Network
 
Data Breach: Hot Topics in Information Security Trends Webinar Recording
Data Breach: Hot Topics in Information Security Trends Webinar RecordingData Breach: Hot Topics in Information Security Trends Webinar Recording
Data Breach: Hot Topics in Information Security Trends Webinar Recording
 
M
MM
M
 
List of Malwares
List of MalwaresList of Malwares
List of Malwares
 
The 10 Commandments of Computer Security
The 10 Commandments of Computer SecurityThe 10 Commandments of Computer Security
The 10 Commandments of Computer Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Small Business Cyber Security Checklist
Small Business Cyber Security ChecklistSmall Business Cyber Security Checklist
Small Business Cyber Security Checklist
 
Making Threat Management More Manageable
Making Threat Management More ManageableMaking Threat Management More Manageable
Making Threat Management More Manageable
 
Jeremy Virus Effect
Jeremy   Virus EffectJeremy   Virus Effect
Jeremy Virus Effect
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
 
Business Continuity
Business  ContinuityBusiness  Continuity
Business Continuity
 
Ransomware
Ransomware Ransomware
Ransomware
 
At Your Expense
At Your ExpenseAt Your Expense
At Your Expense
 
Synchronized security
Synchronized securitySynchronized security
Synchronized security
 
Nuts & Bolts of the Dynamic Attack Chain
Nuts & Bolts of the Dynamic Attack ChainNuts & Bolts of the Dynamic Attack Chain
Nuts & Bolts of the Dynamic Attack Chain
 
Computer virus 2015
Computer virus 2015Computer virus 2015
Computer virus 2015
 
Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-VirusWong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virus
 
Enterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entitiesEnterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entities
 
Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businesses
 

Viewers also liked

DEVNET-1112 The DevNet Hackathon Awards
DEVNET-1112	The DevNet Hackathon AwardsDEVNET-1112	The DevNet Hackathon Awards
DEVNET-1112 The DevNet Hackathon AwardsCisco DevNet
 
2015 09-10 Health Valley meets Topsector LSH Alain van Gool
2015 09-10 Health Valley meets Topsector LSH Alain van Gool2015 09-10 Health Valley meets Topsector LSH Alain van Gool
2015 09-10 Health Valley meets Topsector LSH Alain van GoolAlain van Gool
 
Kas yra svietėjas apzvalga 5 dalis vaizdine medziaga 2013
Kas yra svietėjas apzvalga  5 dalis vaizdine medziaga 2013Kas yra svietėjas apzvalga  5 dalis vaizdine medziaga 2013
Kas yra svietėjas apzvalga 5 dalis vaizdine medziaga 2013valentina valentina
 
DEVNET-1148 Leveraging Cisco OpenStack Private Cloud for Developers
DEVNET-1148	Leveraging Cisco OpenStack Private Cloud for DevelopersDEVNET-1148	Leveraging Cisco OpenStack Private Cloud for Developers
DEVNET-1148 Leveraging Cisco OpenStack Private Cloud for DevelopersCisco DevNet
 
2014 03-13 Health Valley 2014, Nijmegen
2014 03-13 Health Valley 2014, Nijmegen2014 03-13 Health Valley 2014, Nijmegen
2014 03-13 Health Valley 2014, NijmegenAlain van Gool
 
2014 02-24 Oxford Global biomarker congress, Manchester
2014 02-24 Oxford Global biomarker congress, Manchester2014 02-24 Oxford Global biomarker congress, Manchester
2014 02-24 Oxford Global biomarker congress, ManchesterAlain van Gool
 
Fipp world media trends special report video report
Fipp world media trends special report video reportFipp world media trends special report video report
Fipp world media trends special report video reportTuan Anh Nguyen
 
ÈTICA Y ATENCIÒN A LA DIVERSIDAD
ÈTICA Y ATENCIÒN A LA DIVERSIDADÈTICA Y ATENCIÒN A LA DIVERSIDAD
ÈTICA Y ATENCIÒN A LA DIVERSIDADANYTALUCIA
 
The gnome ranger and pronto's Journey
The gnome ranger and pronto's JourneyThe gnome ranger and pronto's Journey
The gnome ranger and pronto's Journeysethdecker
 
Relatoio contas sgu 2
Relatoio contas sgu 2Relatoio contas sgu 2
Relatoio contas sgu 2macoesapo
 
2015 03-11 Opening EATRIS Finland, Helsinki
2015 03-11 Opening EATRIS Finland, Helsinki2015 03-11 Opening EATRIS Finland, Helsinki
2015 03-11 Opening EATRIS Finland, HelsinkiAlain van Gool
 
October fair trade month
October fair trade monthOctober fair trade month
October fair trade monthPattye255
 
Edited pictures presentation
Edited pictures presentationEdited pictures presentation
Edited pictures presentationalexjr1996
 
Relatoio contas sgu 2
Relatoio contas sgu 2Relatoio contas sgu 2
Relatoio contas sgu 2macoesapo
 

Viewers also liked (20)

DEVNET-1112 The DevNet Hackathon Awards
DEVNET-1112	The DevNet Hackathon AwardsDEVNET-1112	The DevNet Hackathon Awards
DEVNET-1112 The DevNet Hackathon Awards
 
2015 09-10 Health Valley meets Topsector LSH Alain van Gool
2015 09-10 Health Valley meets Topsector LSH Alain van Gool2015 09-10 Health Valley meets Topsector LSH Alain van Gool
2015 09-10 Health Valley meets Topsector LSH Alain van Gool
 
Kas yra svietėjas apzvalga 5 dalis vaizdine medziaga 2013
Kas yra svietėjas apzvalga  5 dalis vaizdine medziaga 2013Kas yra svietėjas apzvalga  5 dalis vaizdine medziaga 2013
Kas yra svietėjas apzvalga 5 dalis vaizdine medziaga 2013
 
Patient confidentiality training
Patient confidentiality trainingPatient confidentiality training
Patient confidentiality training
 
DEVNET-1148 Leveraging Cisco OpenStack Private Cloud for Developers
DEVNET-1148	Leveraging Cisco OpenStack Private Cloud for DevelopersDEVNET-1148	Leveraging Cisco OpenStack Private Cloud for Developers
DEVNET-1148 Leveraging Cisco OpenStack Private Cloud for Developers
 
2014 03-13 Health Valley 2014, Nijmegen
2014 03-13 Health Valley 2014, Nijmegen2014 03-13 Health Valley 2014, Nijmegen
2014 03-13 Health Valley 2014, Nijmegen
 
2014 02-24 Oxford Global biomarker congress, Manchester
2014 02-24 Oxford Global biomarker congress, Manchester2014 02-24 Oxford Global biomarker congress, Manchester
2014 02-24 Oxford Global biomarker congress, Manchester
 
Fipp world media trends special report video report
Fipp world media trends special report video reportFipp world media trends special report video report
Fipp world media trends special report video report
 
Los nombres de villayon
Los nombres de villayonLos nombres de villayon
Los nombres de villayon
 
Ryan Eagle
Ryan EagleRyan Eagle
Ryan Eagle
 
ÈTICA Y ATENCIÒN A LA DIVERSIDAD
ÈTICA Y ATENCIÒN A LA DIVERSIDADÈTICA Y ATENCIÒN A LA DIVERSIDAD
ÈTICA Y ATENCIÒN A LA DIVERSIDAD
 
The gnome ranger and pronto's Journey
The gnome ranger and pronto's JourneyThe gnome ranger and pronto's Journey
The gnome ranger and pronto's Journey
 
Relatoio contas sgu 2
Relatoio contas sgu 2Relatoio contas sgu 2
Relatoio contas sgu 2
 
Esd 14
Esd 14Esd 14
Esd 14
 
dalomoji medžiaga
dalomoji medžiagadalomoji medžiaga
dalomoji medžiaga
 
2015 03-11 Opening EATRIS Finland, Helsinki
2015 03-11 Opening EATRIS Finland, Helsinki2015 03-11 Opening EATRIS Finland, Helsinki
2015 03-11 Opening EATRIS Finland, Helsinki
 
October fair trade month
October fair trade monthOctober fair trade month
October fair trade month
 
Edited pictures presentation
Edited pictures presentationEdited pictures presentation
Edited pictures presentation
 
Relatoio contas sgu 2
Relatoio contas sgu 2Relatoio contas sgu 2
Relatoio contas sgu 2
 
Narracion
NarracionNarracion
Narracion
 

Similar to Is Your Data Secure?

Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Securitybelsis
 
Is Cloud the new home for Cyber Criminals? How to be Safe?
Is Cloud the new home for Cyber Criminals? How to be Safe?Is Cloud the new home for Cyber Criminals? How to be Safe?
Is Cloud the new home for Cyber Criminals? How to be Safe?Web Werks Data Centers
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and youArt Ocain
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
How Computer Network Support System Work Against Hacking?
How Computer Network Support System Work Against Hacking?How Computer Network Support System Work Against Hacking?
How Computer Network Support System Work Against Hacking?jeremyhall724
 
3 Tips to Stay Safe Online in 2017
3 Tips to Stay Safe Online in 20173 Tips to Stay Safe Online in 2017
3 Tips to Stay Safe Online in 2017Bret Piatt
 
Webinar Security: Apps of Steel transcription
Webinar Security:  Apps of Steel transcriptionWebinar Security:  Apps of Steel transcription
Webinar Security: Apps of Steel transcriptionService2Media
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for LawyersMark Lanterman
 
Ethical hacking.docx
Ethical hacking.docxEthical hacking.docx
Ethical hacking.docxHabeebUllah10
 
Recognizing security threats
Recognizing security threatsRecognizing security threats
Recognizing security threatsKishore Kumar
 
Securing Your Work from Home.pdf
Securing Your Work from Home.pdfSecuring Your Work from Home.pdf
Securing Your Work from Home.pdfKavitaDubey18
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PCthatfunguygeek
 
Should You Pay Ransomware.pdf
Should You Pay Ransomware.pdfShould You Pay Ransomware.pdf
Should You Pay Ransomware.pdfKavitaDubey18
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdfPavelVtek3
 
Ne Course Part One
Ne Course Part OneNe Course Part One
Ne Course Part Onebackdoor
 
ITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security SeminarITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security SeminarDaniel Versola
 

Similar to Is Your Data Secure? (20)

Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
Is Cloud the new home for Cyber Criminals? How to be Safe?
Is Cloud the new home for Cyber Criminals? How to be Safe?Is Cloud the new home for Cyber Criminals? How to be Safe?
Is Cloud the new home for Cyber Criminals? How to be Safe?
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and you
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
What is ransomware?
What is ransomware?What is ransomware?
What is ransomware?
 
How Computer Network Support System Work Against Hacking?
How Computer Network Support System Work Against Hacking?How Computer Network Support System Work Against Hacking?
How Computer Network Support System Work Against Hacking?
 
3 Tips to Stay Safe Online in 2017
3 Tips to Stay Safe Online in 20173 Tips to Stay Safe Online in 2017
3 Tips to Stay Safe Online in 2017
 
Webinar Security: Apps of Steel transcription
Webinar Security:  Apps of Steel transcriptionWebinar Security:  Apps of Steel transcription
Webinar Security: Apps of Steel transcription
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
 
Ethical hacking.docx
Ethical hacking.docxEthical hacking.docx
Ethical hacking.docx
 
Recognizing security threats
Recognizing security threatsRecognizing security threats
Recognizing security threats
 
User security awareness
User security awarenessUser security awareness
User security awareness
 
Securing Your Work from Home.pdf
Securing Your Work from Home.pdfSecuring Your Work from Home.pdf
Securing Your Work from Home.pdf
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
 
Network monitoring white paper
Network monitoring white paperNetwork monitoring white paper
Network monitoring white paper
 
Should You Pay Ransomware.pdf
Should You Pay Ransomware.pdfShould You Pay Ransomware.pdf
Should You Pay Ransomware.pdf
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdf
 
Ne Course Part One
Ne Course Part OneNe Course Part One
Ne Course Part One
 
ITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security SeminarITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security Seminar
 
What Businesses Entrepreneurs Are Imperative To Know About Ransomware
What Businesses Entrepreneurs Are Imperative To Know About RansomwareWhat Businesses Entrepreneurs Are Imperative To Know About Ransomware
What Businesses Entrepreneurs Are Imperative To Know About Ransomware
 

More from CBIZ & MHM Phoenix

Phoenix Construction Vital Stats - March
Phoenix Construction Vital Stats - MarchPhoenix Construction Vital Stats - March
Phoenix Construction Vital Stats - MarchCBIZ & MHM Phoenix
 
Phoenix Construction Vital Stats - February
Phoenix Construction Vital Stats - FebruaryPhoenix Construction Vital Stats - February
Phoenix Construction Vital Stats - FebruaryCBIZ & MHM Phoenix
 
Phoenix Construction Vital Stats - January
Phoenix Construction Vital Stats - JanuaryPhoenix Construction Vital Stats - January
Phoenix Construction Vital Stats - JanuaryCBIZ & MHM Phoenix
 
Phoenix Construction Vital Stats - December
Phoenix Construction Vital Stats - DecemberPhoenix Construction Vital Stats - December
Phoenix Construction Vital Stats - DecemberCBIZ & MHM Phoenix
 
Phoenix Construction Vital Stats - November
Phoenix Construction Vital Stats - NovemberPhoenix Construction Vital Stats - November
Phoenix Construction Vital Stats - NovemberCBIZ & MHM Phoenix
 
Phoenix Construction Vital Stats - October
Phoenix Construction Vital Stats - OctoberPhoenix Construction Vital Stats - October
Phoenix Construction Vital Stats - OctoberCBIZ & MHM Phoenix
 
Phoenix Construction Vital Stats - September
Phoenix Construction Vital Stats - SeptemberPhoenix Construction Vital Stats - September
Phoenix Construction Vital Stats - SeptemberCBIZ & MHM Phoenix
 
Phoenix Construction Vital Stats - August
Phoenix Construction Vital Stats - AugustPhoenix Construction Vital Stats - August
Phoenix Construction Vital Stats - AugustCBIZ & MHM Phoenix
 
Phoenix Construction Vital Stats - July
Phoenix Construction Vital Stats - JulyPhoenix Construction Vital Stats - July
Phoenix Construction Vital Stats - JulyCBIZ & MHM Phoenix
 
Phoenix Construction Vital Stats - June
Phoenix Construction Vital Stats - JunePhoenix Construction Vital Stats - June
Phoenix Construction Vital Stats - JuneCBIZ & MHM Phoenix
 
HRB 111 Supreme Court Decision - King v Burwell
HRB 111 Supreme Court Decision - King v BurwellHRB 111 Supreme Court Decision - King v Burwell
HRB 111 Supreme Court Decision - King v BurwellCBIZ & MHM Phoenix
 
Phoenix Construction Vital Stats - April
Phoenix Construction Vital Stats - AprilPhoenix Construction Vital Stats - April
Phoenix Construction Vital Stats - AprilCBIZ & MHM Phoenix
 
Phoenix Construction Vital Stats - March
Phoenix Construction Vital Stats - MarchPhoenix Construction Vital Stats - March
Phoenix Construction Vital Stats - MarchCBIZ & MHM Phoenix
 
Proposed Accounting Standards Update for Not-for-Profits and Healthcare Entities
Proposed Accounting Standards Update for Not-for-Profits and Healthcare EntitiesProposed Accounting Standards Update for Not-for-Profits and Healthcare Entities
Proposed Accounting Standards Update for Not-for-Profits and Healthcare EntitiesCBIZ & MHM Phoenix
 
Save the Date: CBIZ Sr. VP, Oscar Diaz, to Present at Marana Chamber of Comme...
Save the Date: CBIZ Sr. VP, Oscar Diaz, to Present at Marana Chamber of Comme...Save the Date: CBIZ Sr. VP, Oscar Diaz, to Present at Marana Chamber of Comme...
Save the Date: CBIZ Sr. VP, Oscar Diaz, to Present at Marana Chamber of Comme...CBIZ & MHM Phoenix
 
Phoenix Construction Vital Stats - February 2015
Phoenix Construction Vital Stats - February 2015Phoenix Construction Vital Stats - February 2015
Phoenix Construction Vital Stats - February 2015CBIZ & MHM Phoenix
 
Phoenix Construction Vital Stats - January 2015
Phoenix Construction Vital Stats - January 2015Phoenix Construction Vital Stats - January 2015
Phoenix Construction Vital Stats - January 2015CBIZ & MHM Phoenix
 
2014 Construction Vital Statistics - December
2014 Construction Vital Statistics - December2014 Construction Vital Statistics - December
2014 Construction Vital Statistics - DecemberCBIZ & MHM Phoenix
 
CBIZ Women's Advantage Newsletter - Winter 2015
CBIZ Women's Advantage Newsletter - Winter 2015CBIZ Women's Advantage Newsletter - Winter 2015
CBIZ Women's Advantage Newsletter - Winter 2015CBIZ & MHM Phoenix
 
2014 Construction Vital Statistics - November
2014 Construction Vital Statistics - November2014 Construction Vital Statistics - November
2014 Construction Vital Statistics - NovemberCBIZ & MHM Phoenix
 

More from CBIZ & MHM Phoenix (20)

Phoenix Construction Vital Stats - March
Phoenix Construction Vital Stats - MarchPhoenix Construction Vital Stats - March
Phoenix Construction Vital Stats - March
 
Phoenix Construction Vital Stats - February
Phoenix Construction Vital Stats - FebruaryPhoenix Construction Vital Stats - February
Phoenix Construction Vital Stats - February
 
Phoenix Construction Vital Stats - January
Phoenix Construction Vital Stats - JanuaryPhoenix Construction Vital Stats - January
Phoenix Construction Vital Stats - January
 
Phoenix Construction Vital Stats - December
Phoenix Construction Vital Stats - DecemberPhoenix Construction Vital Stats - December
Phoenix Construction Vital Stats - December
 
Phoenix Construction Vital Stats - November
Phoenix Construction Vital Stats - NovemberPhoenix Construction Vital Stats - November
Phoenix Construction Vital Stats - November
 
Phoenix Construction Vital Stats - October
Phoenix Construction Vital Stats - OctoberPhoenix Construction Vital Stats - October
Phoenix Construction Vital Stats - October
 
Phoenix Construction Vital Stats - September
Phoenix Construction Vital Stats - SeptemberPhoenix Construction Vital Stats - September
Phoenix Construction Vital Stats - September
 
Phoenix Construction Vital Stats - August
Phoenix Construction Vital Stats - AugustPhoenix Construction Vital Stats - August
Phoenix Construction Vital Stats - August
 
Phoenix Construction Vital Stats - July
Phoenix Construction Vital Stats - JulyPhoenix Construction Vital Stats - July
Phoenix Construction Vital Stats - July
 
Phoenix Construction Vital Stats - June
Phoenix Construction Vital Stats - JunePhoenix Construction Vital Stats - June
Phoenix Construction Vital Stats - June
 
HRB 111 Supreme Court Decision - King v Burwell
HRB 111 Supreme Court Decision - King v BurwellHRB 111 Supreme Court Decision - King v Burwell
HRB 111 Supreme Court Decision - King v Burwell
 
Phoenix Construction Vital Stats - April
Phoenix Construction Vital Stats - AprilPhoenix Construction Vital Stats - April
Phoenix Construction Vital Stats - April
 
Phoenix Construction Vital Stats - March
Phoenix Construction Vital Stats - MarchPhoenix Construction Vital Stats - March
Phoenix Construction Vital Stats - March
 
Proposed Accounting Standards Update for Not-for-Profits and Healthcare Entities
Proposed Accounting Standards Update for Not-for-Profits and Healthcare EntitiesProposed Accounting Standards Update for Not-for-Profits and Healthcare Entities
Proposed Accounting Standards Update for Not-for-Profits and Healthcare Entities
 
Save the Date: CBIZ Sr. VP, Oscar Diaz, to Present at Marana Chamber of Comme...
Save the Date: CBIZ Sr. VP, Oscar Diaz, to Present at Marana Chamber of Comme...Save the Date: CBIZ Sr. VP, Oscar Diaz, to Present at Marana Chamber of Comme...
Save the Date: CBIZ Sr. VP, Oscar Diaz, to Present at Marana Chamber of Comme...
 
Phoenix Construction Vital Stats - February 2015
Phoenix Construction Vital Stats - February 2015Phoenix Construction Vital Stats - February 2015
Phoenix Construction Vital Stats - February 2015
 
Phoenix Construction Vital Stats - January 2015
Phoenix Construction Vital Stats - January 2015Phoenix Construction Vital Stats - January 2015
Phoenix Construction Vital Stats - January 2015
 
2014 Construction Vital Statistics - December
2014 Construction Vital Statistics - December2014 Construction Vital Statistics - December
2014 Construction Vital Statistics - December
 
CBIZ Women's Advantage Newsletter - Winter 2015
CBIZ Women's Advantage Newsletter - Winter 2015CBIZ Women's Advantage Newsletter - Winter 2015
CBIZ Women's Advantage Newsletter - Winter 2015
 
2014 Construction Vital Statistics - November
2014 Construction Vital Statistics - November2014 Construction Vital Statistics - November
2014 Construction Vital Statistics - November
 

Recently uploaded

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 

Recently uploaded (20)

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 

Is Your Data Secure?

  • 1. 3101 N. Central Avenue I Suite 300 I Phoenix, AZ 85012 602.264.6835 www.cbiz.com I www.mhmcpa.com CBIZ & MAYER HOFFMAN MCCANN P. C. – YOUR LEADING BUSINESS SERVICES PARTNER Antivirus Complacency could Cost More than You Think! In recent years, business and home PC users have enjoyed a period of relative calm with low impact virus outbreaks or so it would seem. Yes, it’s true that antivirus programs like Symantec 360, McAfee and Sophos have all improved to the point that we forget there is a war taking place over our data just on the other side of our keyboards. The categories of Malware targeting our business and home PC’s have changed to avoid detection. For example, some malware gets on your system and waits, listening for remote commands to become active and deliver its payload. Other malware uses stealth to hide and others put on a disguise to look like operating system files. Have you looked at your antivirus protection application log files lately? Most of us haven’t. Symantec 360, for example, will display a history of intrusion prevention, identity protection events, firewall reports and the one I pay attention to the most is the recent history report that displays all of the preceding reports and much more. Reading your PC’s antivirus software history report on a weekly basis can give you a better understanding of the attacks that are taking place on your PC, even when you’re not using it. Did you leave your PC on last night? I believe that we as computer users grow complacent because we have transferred the job of protecting our businesses and PC’s from hackers and malware coders to the big antivirus companies. We have forgotten that we are in a war and “know your enemy” applies just as much today as it did 2,500 years ago when Sun Tzu wrote those words. Here’s What You Need to Know Most Antivirus Manufactures do a good job of protecting your PC from Malware and the sub categories such as antivirus and spam. While it’s true that our best offense is a great defense, today’s business systems require a greater depth of security controls that are detective, preventative, deterrent, compensating and technical. Most businesses are willing to invest in network equipment of some kind, that’s a technical control. To make the purchase truly effective, your network security equipment needs to provide a layered security strategy also known as ‘defense in depth’ that includes security controls from each category. Simply put, don’t place all of your eggs in one basket and rely on the antivirus manufacturer to keep your critical business data safe! Taking a layered approach to security includes having properly configured firewalls that block unwanted traffic both coming in and going out of your network. Depending on the size of your company, your defense in depth strategy may require you to deploy a Unified Threat Manager (UTM) or Intrusion prevention System (IPS) to work alongside of your firewall. Your PC’s also need protection everywhere they go not just on the business network. Defense in depth on a PC should include at least three layers: antivirus protection, the operating system firewall, and some type of end point protection in the form of an internet proxy filter. Today, these defensive tools come in the form of hardware appliances and software applications to fit just about any budget.
  • 2. 3101 N. Central Avenue I Suite 300 I Phoenix, AZ 85012 602.264.6835 www.cbiz.com I www.mhmcpa.com CBIZ & MAYER HOFFMAN MCCANN P. C. – YOUR LEADING BUSINESS SERVICES PARTNER Data Security is a Full Contact Sport When it comes to data security, I like to quote Warren Buffett “ It takes 20 years to build a reputation and five minutes to ruin it”. When applying this to protecting your business data , compliance requirements and legal implications that come from just one data breach should help us to become better guardians of our data. You may have the best antivirus money can buy, but if you are relying on antivirus alone it’s just a matter of time before your PC gets compromised. PC end user awareness and malware education should be at the top of your business defense in depth strategy and it’s the focus of the rest of this article. Knowing your enemy isn’t enough these days, you need to know your PC. We spend more time with our PC’s today than we do with our friends and family. We know when things are off with our PC’s, we see and feel the warning signs, but choose to ignore them and that is what the malware coders are counting on. If you are the PC user that leaves your computer running all night because rebooting takes too long then you could find yourself waking up to a ransomware infection that has locked up your data. I’m not just talking about your PC hard drive either. If you are logged into the network, ransomware will go to work on the server drives that are mapped to your PC. Beginning with Drive F: and working to drive Z: every file that the infected PC has access to will get encrypted. Phases of Ransomware Infection Let’s look at the phases of a ransomware infection and some of the symptoms that you may be ignoring. Phase One, you took the bait. It showed up in the form of a phishing email or you downloaded what looked like a .PDF and ignored the warning that the PDF file needed to run a script. You thought nothing of it because nothing appeared to change on your PC. So you moved past the incident and forgot that it happened. Phases Two and Three, the Trojan is now activated on your PC and it begins writing to the windows registry. The next time you boot up your PC the ransomware encryption engine starts. You may have the latest Antivirus update installed to stop it, but then again your PC may be under attack from a newer version of Trojan/ Win32.crilok.new.* and the Antivirus company hasn’t identified it yet. This is where user awareness comes in. You say to yourself “It’s taking longer to open that email, application, webpage than it did last week.” But you shrug it off and move on. Stop and rewind. What if your car, dishwasher, or TV suddenly started running slow would you just ignore it? Now is the time to call your IT support professional to help you by checking your PC’s antivirus, firewall and proxy logs for new issues. Phase Four, you become complacent and leave your PC on all night allowing Trojan/Win32.crilok.* to have its way with your PC. Trojan/Win32.crilok.* establishes a connection to the command and control server, it’s now too late! Remember what I said about blocking traffic leaving your network, this is why. If Trojan/Win32.crilok.*or any of its new variations is able to establish a connection to the command and control server, the encryption begins and the key exchange takes place
  • 3. 3101 N. Central Avenue I Suite 300 I Phoenix, AZ 85012 602.264.6835 www.cbiz.com I www.mhmcpa.com CBIZ & MAYER HOFFMAN MCCANN P. C. – YOUR LEADING BUSINESS SERVICES PARTNER allowing them to make good on the threat of holding your data hostage until the ransom is paid and they send you the un-encryption key to unlock your PC. It’s during phase four where it all begins to become clear as to what just happened to your PC. That’s when people call me and say “ the other day I opened this email and…”, or “I was a website and this download did something and now I can’t get to my files.” For a business owner with a computer network, one infected PC that is attached to the network undetected during Phases 1,2, or 3, will move into phase 4 and encrypt the file server mapped network drives as well. Beginning with Drive F:, the network drives will begin encrypting moving as far down the server drive mappings as the compromised user has access to. To combat ransomware and many other malware threats we need to stop being complacent PC users. Please reach out to your IT professional as soon as you notice any strange activity. The earlier we can detect and prevent, the safer our computers and data will be.