SlideShare a Scribd company logo
Live Webinar:
Webinar Audio:
You can dial the telephone numbers located on your webinar panel.
Or listen in using your headphones or computer speakers.
Welcome!
Webinar DetailsWebinar Details
• Presentation is roughly 1 hour
• All phone lines are muted
• If anyone has any questions during this webinar – please type them in your
Questions Box located at the bottom of your webinar panel
Today’s Presenters
Rocco Passafuime
Director of Infrastructure
Net@Work
Laura Kibbe
Managing Director of Professional Services
RVM Enterprises, Inc.
Webinar Details
180+ Business
Technology
Architects and
Consultants
IT Road
Mapping
& Strategic Planning
Business
Process Review
Ecosystem
BI, Analytics
& Reporting
Cloud & IT
Managed Services
ERP/
Accounting
Web Development
& e-Commerce
Sister Company
Payment
Processing
SWYPE
Sister Company
CRM &
Marketing
Automation
HRMS/
Employer Solutions
Document
Management
Nonprofit
Solutions
Managed Print
Services
Sister Company
Webinar Details
What is a Data Breach?
• Incident where information is stolen from a system without
authorization
• Victims are typically large companies and data stolen tends
to be sensitive, proprietary or confidential (Customer lists,
credit card numbers, etc.)
• Financial and reputational damage as a result of a data
breach is significant.
How Do They Happen?
Inadvertent Invitations
Sometimes data breaches are not directed into he company
iteself:
• Lost or stolen devices
• Malware infected [personal devices that connect to the
company’s network
• Employee sharing of information and files with friends (e.g.,
“let me borrow that PowerPoint?”)
Financial Cost - Ponemon Cost of Data Breach Study
Who? 383 Companies, 12 countries
Damage? Average cost is $4 million
Trend? 29 % increase since 2013
Sources of Breach
Who Are The Targets?
How Can You Prevent a Data Breach?
• Training
• Encryption
• Intrusion Detection and Prevention
• Content Filtering
• Vulnerability Assessment
• Patch Management
• System Monitoring
• Backup
Webinar Details
What is BYOD?
Bring Your Own Device refers to the policy of allowing
employees to purchase and integrate their own devices
into a corporate network
While businesses benefits like effifcicny and employee
satisfaction arwe real, IT departments find it difficult to
balance changing technology landscapes and face new
security concerns.
Benefits of BYOD - Company
• Enhanced employee productivity - immediate access to work when
away from the office
• Employees are much more likely to protect and care for their own
devices. This equates to decreased expenditures due to damaged or
stolen devices and data loss.
• Device ownership costs shifted to the employee rather than the
employer.
• For Gens Y and Z, 50% expect the same technology to be available at
work as at home.
Benefits of BYOD - Employee
• Efficient – carry 1 device instead of 2
• Consistency – because it’s one device, you can save settings and
documents, pictures all in one place
• Choice – employee picks which type of device they want (iPhone,
Galaxy etc.) so they are happier
Best Practices
• Clearly defined written policy with signed acknowledgement
• Training on policy
• Good mobile device management solution
• Smart passwords
• Monitoring and security reporting
Webinar Details
• Deceptive Phishing
Email messages that claims themselves as recognized sources and
asks for your personal details, verification code or even to make a
payment.
 Scam objective -To trick the user into providing personal details to
access his bank account.
• Spear Phishing
A Sophisticated version in which the sender uses available
information to direct his request at you.
 Scam objective-Directly targets you for acquiring all your bank
details or any other data.
• CEO Fraud
Phishers use an email address similar to that of an authority to
request payments or data from others within the company or an
organization.
 Scam objective - To transfer the money directly from victim to
cybercriminals.
• Pharming
Scam in which a hacker hijacks a website’s domain name and uses it to
redirect the visitors to some other site.
 Scam objective-To intercept and steal online payments
• Dropbox Phishing
A Scam that looks real and claims to have come from a Dropbox
requests the user to click on the link to secure their account details or
to share a downloaded file.
 Scam objective-To install malware on victim’s PC.
Preventing Phishing Leaks
• Strong internal firewall management
• Refuse to provide your personal details
• Report suspicious emails
• Use strong anti-virus software
Webinar Details
Malware
Malware is a malicious software that gets installed in
your device and performs unwanted tasks.
Mainly designed to transmit information about your
web browsing habits to the third party
Types of Malware
Viruses Trojan Horse
Spyware Spam
Adware Rootkits
Scareware
Worms
Viruses
• Software that replicates itself and spreads by
damaging and deleting the files.
• Virus enters your device via attached images,
greeting, audio/video files , downloads etc.
Spyware
• Spyware is a program that gets installed without the
user’s permission.
• It monitors the user’s activities on the internet and
transmits that information to the third party.
Adware
• Software where advertising banners are displayed while any
program is running.
• It automatically downloads to your device while browsing any
website
• It is used by companies for marketing purposes
Scareware
Software that is designed to trick the user into buying
or downloading unwanted software.
Worms
• Malicious program that make copies of itself on
local device, network shares etc.
• They make the working of your device slower.
Trojan Horse
• A Trojan Horse is a program containing malicious or
harmful code.
• Entering a computer, it performs various tasks like
corrupting files and sending out personal information.
Spam
• Method of flooding the internet with the copies of the
same message
• It is for the purpose of advertising, phishing, spreading
malware etc.
Rootkits
• Software hidden deep inside your device which
remains undetected.
• It transmits all your sensitive information
Webinar Details
Are the systems in place enough?
• Most companies have robust IT security systems in place at a macro
level – looking for hackers etc.
• The employee armed with a simple laptop and a thumb drive does
the most damage.
The Dilemma
• There’s an inherent tension between giving employees access to the
highly confidential trade secrets they need to do their job and locking
down the information’s use to prevent theft.
What is an employer to do?
• Clearly document policies and controls: Acceptable Use etc.
• Conduct fraud and awareness training for all employees
• Conduct regular information security audits
• Implement strict password policies
• Enforce delegations of authority and access to information (only allow
access to what is needed to perform the job)
• Institute stringent access controls. Backup and recover processes
• Shut down unauthorized data exfiltration means: USB, Bluetooth, media
cards, etc.
• Institute a formal insider threat response plan
Webinar Details
What Is It?
• Type of malware that restricts access to the infected computer system
and demans that a user pay ransom to get access to the files
• How does it restrict access:
• Encrypts files
• Locks system access
• Crashes system
• Disrupts and annoys – opening browser windows, displaying pornographic
images
What’s Bitcoin
• Internet currency
• Like a casino chip, “coins” have no intrinsic value but they can be
traded for real value when you leave
Why Bitcoin for Ransom?
• Bitcoin converst directly into local currency
• Low transaction fees
• Faster than checks, wire transfers, and, even credit cards
• Because not government backed, lightly regulated
Bitcoin solves the problem with a fast, untraceable
payment system that makes ransoms much easier to
pay—and for cyber criminals, much safer to collect
without getting caught
Any Questions?
Please type in
your questions
Thank You For Attending!
Connect with
800-719-3307
www.netatwork.com
netatwork.com/blog
Net@Work YouTube
Follow us on Twitter: @netatwork_corp
Follow Net@Work on LinkedIn
Follow Net@Work on Google+
Follow Net@Work on Facebook
For More Information Contact Your Net@Work Account Manager
Or Contact Us using the information below:
Rocco Passafuime | Net@Work
Director of Infrastructure Sales
(P) 646-517-6093
(E) rpassafuime@netatwork.com

More Related Content

What's hot

Web browser week5 presentation
Web browser week5 presentationWeb browser week5 presentation
Web browser week5 presentation
Deepak John
 
9 - Security
9 - Security9 - Security
9 - Security
Raymond Gao
 
Cyber 101 for smb execs v1
Cyber 101 for smb execs v1Cyber 101 for smb execs v1
Cyber 101 for smb execs v1
NetWatcher
 
CH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and PrivacyCH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and Privacy
malik1972
 
internet securityand cyber law Unit2
internet securityand  cyber law Unit2internet securityand  cyber law Unit2
internet securityand cyber law Unit2
Royalzig Luxury Furniture
 
Bryley - mobility in the work place
Bryley  - mobility in the work placeBryley  - mobility in the work place
Bryley - mobility in the work place
Bryley Systems Inc.
 
Sec and ethics presentation
Sec and ethics presentationSec and ethics presentation
Sec and ethics presentation
Darren McManus
 
Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1
Anpumathews
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and Ethics
Mohsin Riaz
 
Network security basics
Network security basicsNetwork security basics
Network security basics
Skillspire LLC
 
Discovering Computers: Chapter 11
Discovering Computers: Chapter 11Discovering Computers: Chapter 11
Discovering Computers: Chapter 11
Anna Stirling
 
BASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSBASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESS
Md Abu Syeem Dipu
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)
Cyber Security Infotech
 
8 - Securing Info Systems
8 - Securing Info Systems8 - Securing Info Systems
8 - Securing Info Systems
Hemant Nagwekar
 
Securing information systems
Securing information systemsSecuring information systems
Securing information systems
Prof. Othman Alsalloum
 
Chap11
Chap11Chap11
Chap11
Aman Sharma
 
Chap11
Chap11Chap11
Chap11
nitin_009
 
Security and privacy
Security and privacySecurity and privacy
Security and privacy
Haa'Meem Mohiyuddin
 
Session#7; securing information systems
Session#7;  securing information systemsSession#7;  securing information systems
Session#7; securing information systems
Omid Aminzadeh Gohari
 
System failure
System  failureSystem  failure
System failure
chrispaul8676
 

What's hot (20)

Web browser week5 presentation
Web browser week5 presentationWeb browser week5 presentation
Web browser week5 presentation
 
9 - Security
9 - Security9 - Security
9 - Security
 
Cyber 101 for smb execs v1
Cyber 101 for smb execs v1Cyber 101 for smb execs v1
Cyber 101 for smb execs v1
 
CH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and PrivacyCH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and Privacy
 
internet securityand cyber law Unit2
internet securityand  cyber law Unit2internet securityand  cyber law Unit2
internet securityand cyber law Unit2
 
Bryley - mobility in the work place
Bryley  - mobility in the work placeBryley  - mobility in the work place
Bryley - mobility in the work place
 
Sec and ethics presentation
Sec and ethics presentationSec and ethics presentation
Sec and ethics presentation
 
Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and Ethics
 
Network security basics
Network security basicsNetwork security basics
Network security basics
 
Discovering Computers: Chapter 11
Discovering Computers: Chapter 11Discovering Computers: Chapter 11
Discovering Computers: Chapter 11
 
BASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSBASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESS
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)
 
8 - Securing Info Systems
8 - Securing Info Systems8 - Securing Info Systems
8 - Securing Info Systems
 
Securing information systems
Securing information systemsSecuring information systems
Securing information systems
 
Chap11
Chap11Chap11
Chap11
 
Chap11
Chap11Chap11
Chap11
 
Security and privacy
Security and privacySecurity and privacy
Security and privacy
 
Session#7; securing information systems
Session#7;  securing information systemsSession#7;  securing information systems
Session#7; securing information systems
 
System failure
System  failureSystem  failure
System failure
 

Viewers also liked

Genevieve Nixon - 2015 resume
Genevieve Nixon - 2015 resumeGenevieve Nixon - 2015 resume
Genevieve Nixon - 2015 resume
Genevieve Nixon
 
Berbagai karakter slebriti yang wajib di idolakan
Berbagai karakter slebriti yang wajib di idolakanBerbagai karakter slebriti yang wajib di idolakan
Berbagai karakter slebriti yang wajib di idolakan
febyzfmdr
 
Invol mtr 2013 142
Invol mtr 2013 142Invol mtr 2013 142
Invol mtr 2013 142
Miss Hart
 
Insanity&autom2014
Insanity&autom2014Insanity&autom2014
Insanity&autom2014
Miss Hart
 
Eu card
Eu cardEu card
Eu card
Miss Hart
 
Your Clients are in the CLOUD - NetSuite Should be on Your Mind
Your Clients are in the CLOUD - NetSuite Should be on Your MindYour Clients are in the CLOUD - NetSuite Should be on Your Mind
Your Clients are in the CLOUD - NetSuite Should be on Your Mind
Net at Work
 
Shruti Panda Resume -Updated
Shruti Panda Resume -UpdatedShruti Panda Resume -Updated
Shruti Panda Resume -Updated
Shruti Panda
 
Big Data and Analytics on Amazon Web Services: Building A Business-Friendly P...
Big Data and Analytics on Amazon Web Services: Building A Business-Friendly P...Big Data and Analytics on Amazon Web Services: Building A Business-Friendly P...
Big Data and Analytics on Amazon Web Services: Building A Business-Friendly P...
Amazon Web Services
 
Tips on Moving from Sage 300 Financial Reporter to Sage Intelligence
Tips on Moving from Sage 300 Financial Reporter to Sage IntelligenceTips on Moving from Sage 300 Financial Reporter to Sage Intelligence
Tips on Moving from Sage 300 Financial Reporter to Sage Intelligence
Net at Work
 
RBC-PRESENTATION-TRAINING-DAVILA
RBC-PRESENTATION-TRAINING-DAVILARBC-PRESENTATION-TRAINING-DAVILA
RBC-PRESENTATION-TRAINING-DAVILA
Juan Francisco Dávila y Verdin
 
BÀI 1: TỔNG QUAN WORDPRESS – HOSTING – DOMAIN – VÀ CÁC VẤN ĐỀ LƯU Ý
BÀI 1: TỔNG QUAN WORDPRESS – HOSTING – DOMAIN – VÀ CÁC VẤN ĐỀ LƯU ÝBÀI 1: TỔNG QUAN WORDPRESS – HOSTING – DOMAIN – VÀ CÁC VẤN ĐỀ LƯU Ý
BÀI 1: TỔNG QUAN WORDPRESS – HOSTING – DOMAIN – VÀ CÁC VẤN ĐỀ LƯU Ý
vu vanhon
 
Mechanics of Precedent
Mechanics of Precedent Mechanics of Precedent
Mechanics of Precedent
Miss Hart
 
Igcse reading paper
Igcse reading paperIgcse reading paper
Igcse reading paper
Miss Hart
 
General def2014eou
General def2014eouGeneral def2014eou
General def2014eou
Miss Hart
 
Youth sentencing & numbers 2013
Youth sentencing & numbers 2013Youth sentencing & numbers 2013
Youth sentencing & numbers 2013
Miss Hart
 
Generalised periodic epileptiform discharges
Generalised periodic epileptiform dischargesGeneralised periodic epileptiform discharges
Generalised periodic epileptiform discharges
Pramod Krishnan
 

Viewers also liked (16)

Genevieve Nixon - 2015 resume
Genevieve Nixon - 2015 resumeGenevieve Nixon - 2015 resume
Genevieve Nixon - 2015 resume
 
Berbagai karakter slebriti yang wajib di idolakan
Berbagai karakter slebriti yang wajib di idolakanBerbagai karakter slebriti yang wajib di idolakan
Berbagai karakter slebriti yang wajib di idolakan
 
Invol mtr 2013 142
Invol mtr 2013 142Invol mtr 2013 142
Invol mtr 2013 142
 
Insanity&autom2014
Insanity&autom2014Insanity&autom2014
Insanity&autom2014
 
Eu card
Eu cardEu card
Eu card
 
Your Clients are in the CLOUD - NetSuite Should be on Your Mind
Your Clients are in the CLOUD - NetSuite Should be on Your MindYour Clients are in the CLOUD - NetSuite Should be on Your Mind
Your Clients are in the CLOUD - NetSuite Should be on Your Mind
 
Shruti Panda Resume -Updated
Shruti Panda Resume -UpdatedShruti Panda Resume -Updated
Shruti Panda Resume -Updated
 
Big Data and Analytics on Amazon Web Services: Building A Business-Friendly P...
Big Data and Analytics on Amazon Web Services: Building A Business-Friendly P...Big Data and Analytics on Amazon Web Services: Building A Business-Friendly P...
Big Data and Analytics on Amazon Web Services: Building A Business-Friendly P...
 
Tips on Moving from Sage 300 Financial Reporter to Sage Intelligence
Tips on Moving from Sage 300 Financial Reporter to Sage IntelligenceTips on Moving from Sage 300 Financial Reporter to Sage Intelligence
Tips on Moving from Sage 300 Financial Reporter to Sage Intelligence
 
RBC-PRESENTATION-TRAINING-DAVILA
RBC-PRESENTATION-TRAINING-DAVILARBC-PRESENTATION-TRAINING-DAVILA
RBC-PRESENTATION-TRAINING-DAVILA
 
BÀI 1: TỔNG QUAN WORDPRESS – HOSTING – DOMAIN – VÀ CÁC VẤN ĐỀ LƯU Ý
BÀI 1: TỔNG QUAN WORDPRESS – HOSTING – DOMAIN – VÀ CÁC VẤN ĐỀ LƯU ÝBÀI 1: TỔNG QUAN WORDPRESS – HOSTING – DOMAIN – VÀ CÁC VẤN ĐỀ LƯU Ý
BÀI 1: TỔNG QUAN WORDPRESS – HOSTING – DOMAIN – VÀ CÁC VẤN ĐỀ LƯU Ý
 
Mechanics of Precedent
Mechanics of Precedent Mechanics of Precedent
Mechanics of Precedent
 
Igcse reading paper
Igcse reading paperIgcse reading paper
Igcse reading paper
 
General def2014eou
General def2014eouGeneral def2014eou
General def2014eou
 
Youth sentencing & numbers 2013
Youth sentencing & numbers 2013Youth sentencing & numbers 2013
Youth sentencing & numbers 2013
 
Generalised periodic epileptiform discharges
Generalised periodic epileptiform dischargesGeneralised periodic epileptiform discharges
Generalised periodic epileptiform discharges
 

Similar to Meeting the Cybersecurity Challenge

Cybersecurity
Cybersecurity Cybersecurity
Cybersecurity
nado-web
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
Krishna Srikanth Manda
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
WindstoneHealth
 
CyberSecurityPPT_V3_1CyberSecurityPPT_V3_1
CyberSecurityPPT_V3_1CyberSecurityPPT_V3_1CyberSecurityPPT_V3_1CyberSecurityPPT_V3_1
CyberSecurityPPT_V3_1CyberSecurityPPT_V3_1
NilKhunt
 
Identity and Security in the Cloud
Identity and Security in the CloudIdentity and Security in the Cloud
Identity and Security in the Cloud
Richard Diver
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptx
JenetSilence
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
NetWatcher
 
CyberSecurityPPT_V3_1.pptx Awerness cyber
CyberSecurityPPT_V3_1.pptx Awerness cyberCyberSecurityPPT_V3_1.pptx Awerness cyber
CyberSecurityPPT_V3_1.pptx Awerness cyber
harshalgkharat
 
Cybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awarenessCybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awareness
Imran Khan
 
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptxCyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
prtabal_25
 
Implementing security for your library | PLAN Tech Day Conference
Implementing security for  your library | PLAN Tech Day ConferenceImplementing security for  your library | PLAN Tech Day Conference
Implementing security for your library | PLAN Tech Day Conference
Brian Pichman
 
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
Kirti Verma
 
Digital Security and Hygiene.pptx
Digital Security and Hygiene.pptxDigital Security and Hygiene.pptx
Digital Security and Hygiene.pptx
Ultimate Multimedia Consult
 
Enterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entitiesEnterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entities
Quick Heal Technologies Ltd.
 
Office 365 Security Features That Nonprofits Should Know and Use
Office 365 Security Features That Nonprofits Should Know and UseOffice 365 Security Features That Nonprofits Should Know and Use
Office 365 Security Features That Nonprofits Should Know and Use
TechSoup
 
It security in healthcare
It security in healthcareIt security in healthcare
It security in healthcare
Nicholas Davis
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security Innovation
Priyanka Aash
 
Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businesses
B2BPlanner Ltd.
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
Randy Bowman
 
CyberSecurity Series Malware slides
CyberSecurity Series Malware slidesCyberSecurity Series Malware slides
CyberSecurity Series Malware slides
Jim Kaplan CIA CFE
 

Similar to Meeting the Cybersecurity Challenge (20)

Cybersecurity
Cybersecurity Cybersecurity
Cybersecurity
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
 
CyberSecurityPPT_V3_1CyberSecurityPPT_V3_1
CyberSecurityPPT_V3_1CyberSecurityPPT_V3_1CyberSecurityPPT_V3_1CyberSecurityPPT_V3_1
CyberSecurityPPT_V3_1CyberSecurityPPT_V3_1
 
Identity and Security in the Cloud
Identity and Security in the CloudIdentity and Security in the Cloud
Identity and Security in the Cloud
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptx
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 
CyberSecurityPPT_V3_1.pptx Awerness cyber
CyberSecurityPPT_V3_1.pptx Awerness cyberCyberSecurityPPT_V3_1.pptx Awerness cyber
CyberSecurityPPT_V3_1.pptx Awerness cyber
 
Cybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awarenessCybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awareness
 
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptxCyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
 
Implementing security for your library | PLAN Tech Day Conference
Implementing security for  your library | PLAN Tech Day ConferenceImplementing security for  your library | PLAN Tech Day Conference
Implementing security for your library | PLAN Tech Day Conference
 
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
 
Digital Security and Hygiene.pptx
Digital Security and Hygiene.pptxDigital Security and Hygiene.pptx
Digital Security and Hygiene.pptx
 
Enterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entitiesEnterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entities
 
Office 365 Security Features That Nonprofits Should Know and Use
Office 365 Security Features That Nonprofits Should Know and UseOffice 365 Security Features That Nonprofits Should Know and Use
Office 365 Security Features That Nonprofits Should Know and Use
 
It security in healthcare
It security in healthcareIt security in healthcare
It security in healthcare
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security Innovation
 
Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businesses
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
CyberSecurity Series Malware slides
CyberSecurity Series Malware slidesCyberSecurity Series Malware slides
CyberSecurity Series Malware slides
 

More from Net at Work

Sage HRMS Configuration and Business Response and HR Planning
Sage HRMS Configuration and Business Response and HR PlanningSage HRMS Configuration and Business Response and HR Planning
Sage HRMS Configuration and Business Response and HR Planning
Net at Work
 
Employer Update & Getting Business Back on Track
Employer Update & Getting Business Back on Track Employer Update & Getting Business Back on Track
Employer Update & Getting Business Back on Track
Net at Work
 
Tips on the IRS & DOL Employer Tax Credits & Loans
Tips on the IRS & DOL Employer Tax Credits & LoansTips on the IRS & DOL Employer Tax Credits & Loans
Tips on the IRS & DOL Employer Tax Credits & Loans
Net at Work
 
Sage 100: Enabling Your Team to Work Remotely with the Impact from COVID-19 &...
Sage 100: Enabling Your Team to Work Remotely with the Impact from COVID-19 &...Sage 100: Enabling Your Team to Work Remotely with the Impact from COVID-19 &...
Sage 100: Enabling Your Team to Work Remotely with the Impact from COVID-19 &...
Net at Work
 
The New Remote Workforce & The Case for Hosting Your Sage Solution in the Cloud
The New Remote Workforce & The Case for Hosting Your Sage Solution in the CloudThe New Remote Workforce & The Case for Hosting Your Sage Solution in the Cloud
The New Remote Workforce & The Case for Hosting Your Sage Solution in the Cloud
Net at Work
 
MIP Webinar: Working Remotely with the Impact of COVID-19 & Planning for FFCRA
MIP Webinar: Working Remotely with the Impact of COVID-19 & Planning for FFCRAMIP Webinar: Working Remotely with the Impact of COVID-19 & Planning for FFCRA
MIP Webinar: Working Remotely with the Impact of COVID-19 & Planning for FFCRA
Net at Work
 
Managing Through COVID-19
Managing Through COVID-19Managing Through COVID-19
Managing Through COVID-19
Net at Work
 
Tax Compliance in the Wake of COVID-19 What’s Changed
Tax Compliance in the Wake of COVID-19 What’s ChangedTax Compliance in the Wake of COVID-19 What’s Changed
Tax Compliance in the Wake of COVID-19 What’s Changed
Net at Work
 
Fixed Assets are Suddenly Mobile “At Home” Assets
Fixed Assets are Suddenly Mobile “At Home” AssetsFixed Assets are Suddenly Mobile “At Home” Assets
Fixed Assets are Suddenly Mobile “At Home” Assets
Net at Work
 
Sage 300 Webinar: Enabling Your Team to Work Remotely with the Impact from CO...
Sage 300 Webinar: Enabling Your Team to Work Remotely with the Impact from CO...Sage 300 Webinar: Enabling Your Team to Work Remotely with the Impact from CO...
Sage 300 Webinar: Enabling Your Team to Work Remotely with the Impact from CO...
Net at Work
 
Coping with Covid-19: Keeping the Workplace Moving
Coping with Covid-19: Keeping the Workplace Moving Coping with Covid-19: Keeping the Workplace Moving
Coping with Covid-19: Keeping the Workplace Moving
Net at Work
 
Coronavirus Payroll Continuity
Coronavirus Payroll ContinuityCoronavirus Payroll Continuity
Coronavirus Payroll Continuity
Net at Work
 
How Engaged Employees Affect the Bottom Line
How Engaged Employees Affect the Bottom Line How Engaged Employees Affect the Bottom Line
How Engaged Employees Affect the Bottom Line
Net at Work
 
Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!
Net at Work
 
Transformative HR Technology For Nonprofits
Transformative HR Technology For Nonprofits  Transformative HR Technology For Nonprofits
Transformative HR Technology For Nonprofits
Net at Work
 
Document Capture: Never Touch a Document Again
Document Capture: Never Touch a Document AgainDocument Capture: Never Touch a Document Again
Document Capture: Never Touch a Document Again
Net at Work
 
Benefits of Abila MIP Payroll
Benefits of Abila MIP PayrollBenefits of Abila MIP Payroll
Benefits of Abila MIP Payroll
Net at Work
 
Sage Intelligence for Sage 100
Sage Intelligence for Sage 100Sage Intelligence for Sage 100
Sage Intelligence for Sage 100
Net at Work
 
How the IRS 2019 Form W-4 Will Change Payroll
How the IRS 2019 Form W-4 Will Change PayrollHow the IRS 2019 Form W-4 Will Change Payroll
How the IRS 2019 Form W-4 Will Change Payroll
Net at Work
 
Cloud-based Payroll Outsourcing: Why The Shift?
Cloud-based Payroll Outsourcing:  Why The Shift?Cloud-based Payroll Outsourcing:  Why The Shift?
Cloud-based Payroll Outsourcing: Why The Shift?
Net at Work
 

More from Net at Work (20)

Sage HRMS Configuration and Business Response and HR Planning
Sage HRMS Configuration and Business Response and HR PlanningSage HRMS Configuration and Business Response and HR Planning
Sage HRMS Configuration and Business Response and HR Planning
 
Employer Update & Getting Business Back on Track
Employer Update & Getting Business Back on Track Employer Update & Getting Business Back on Track
Employer Update & Getting Business Back on Track
 
Tips on the IRS & DOL Employer Tax Credits & Loans
Tips on the IRS & DOL Employer Tax Credits & LoansTips on the IRS & DOL Employer Tax Credits & Loans
Tips on the IRS & DOL Employer Tax Credits & Loans
 
Sage 100: Enabling Your Team to Work Remotely with the Impact from COVID-19 &...
Sage 100: Enabling Your Team to Work Remotely with the Impact from COVID-19 &...Sage 100: Enabling Your Team to Work Remotely with the Impact from COVID-19 &...
Sage 100: Enabling Your Team to Work Remotely with the Impact from COVID-19 &...
 
The New Remote Workforce & The Case for Hosting Your Sage Solution in the Cloud
The New Remote Workforce & The Case for Hosting Your Sage Solution in the CloudThe New Remote Workforce & The Case for Hosting Your Sage Solution in the Cloud
The New Remote Workforce & The Case for Hosting Your Sage Solution in the Cloud
 
MIP Webinar: Working Remotely with the Impact of COVID-19 & Planning for FFCRA
MIP Webinar: Working Remotely with the Impact of COVID-19 & Planning for FFCRAMIP Webinar: Working Remotely with the Impact of COVID-19 & Planning for FFCRA
MIP Webinar: Working Remotely with the Impact of COVID-19 & Planning for FFCRA
 
Managing Through COVID-19
Managing Through COVID-19Managing Through COVID-19
Managing Through COVID-19
 
Tax Compliance in the Wake of COVID-19 What’s Changed
Tax Compliance in the Wake of COVID-19 What’s ChangedTax Compliance in the Wake of COVID-19 What’s Changed
Tax Compliance in the Wake of COVID-19 What’s Changed
 
Fixed Assets are Suddenly Mobile “At Home” Assets
Fixed Assets are Suddenly Mobile “At Home” AssetsFixed Assets are Suddenly Mobile “At Home” Assets
Fixed Assets are Suddenly Mobile “At Home” Assets
 
Sage 300 Webinar: Enabling Your Team to Work Remotely with the Impact from CO...
Sage 300 Webinar: Enabling Your Team to Work Remotely with the Impact from CO...Sage 300 Webinar: Enabling Your Team to Work Remotely with the Impact from CO...
Sage 300 Webinar: Enabling Your Team to Work Remotely with the Impact from CO...
 
Coping with Covid-19: Keeping the Workplace Moving
Coping with Covid-19: Keeping the Workplace Moving Coping with Covid-19: Keeping the Workplace Moving
Coping with Covid-19: Keeping the Workplace Moving
 
Coronavirus Payroll Continuity
Coronavirus Payroll ContinuityCoronavirus Payroll Continuity
Coronavirus Payroll Continuity
 
How Engaged Employees Affect the Bottom Line
How Engaged Employees Affect the Bottom Line How Engaged Employees Affect the Bottom Line
How Engaged Employees Affect the Bottom Line
 
Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!
 
Transformative HR Technology For Nonprofits
Transformative HR Technology For Nonprofits  Transformative HR Technology For Nonprofits
Transformative HR Technology For Nonprofits
 
Document Capture: Never Touch a Document Again
Document Capture: Never Touch a Document AgainDocument Capture: Never Touch a Document Again
Document Capture: Never Touch a Document Again
 
Benefits of Abila MIP Payroll
Benefits of Abila MIP PayrollBenefits of Abila MIP Payroll
Benefits of Abila MIP Payroll
 
Sage Intelligence for Sage 100
Sage Intelligence for Sage 100Sage Intelligence for Sage 100
Sage Intelligence for Sage 100
 
How the IRS 2019 Form W-4 Will Change Payroll
How the IRS 2019 Form W-4 Will Change PayrollHow the IRS 2019 Form W-4 Will Change Payroll
How the IRS 2019 Form W-4 Will Change Payroll
 
Cloud-based Payroll Outsourcing: Why The Shift?
Cloud-based Payroll Outsourcing:  Why The Shift?Cloud-based Payroll Outsourcing:  Why The Shift?
Cloud-based Payroll Outsourcing: Why The Shift?
 

Recently uploaded

Quarter 3 SLRP grade 9.. gshajsbhhaheabh
Quarter 3 SLRP grade 9.. gshajsbhhaheabhQuarter 3 SLRP grade 9.. gshajsbhhaheabh
Quarter 3 SLRP grade 9.. gshajsbhhaheabh
aisafed42
 
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
gapen1
 
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian CompaniesE-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
Quickdice ERP
 
Oracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptxOracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptx
Remote DBA Services
 
Malibou Pitch Deck For Its €3M Seed Round
Malibou Pitch Deck For Its €3M Seed RoundMalibou Pitch Deck For Its €3M Seed Round
Malibou Pitch Deck For Its €3M Seed Round
sjcobrien
 
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdfBaha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
Baha Majid
 
WWDC 2024 Keynote Review: For CocoaCoders Austin
WWDC 2024 Keynote Review: For CocoaCoders AustinWWDC 2024 Keynote Review: For CocoaCoders Austin
WWDC 2024 Keynote Review: For CocoaCoders Austin
Patrick Weigel
 
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
kgyxske
 
What’s New in Odoo 17 – A Complete Roadmap
What’s New in Odoo 17 – A Complete RoadmapWhat’s New in Odoo 17 – A Complete Roadmap
What’s New in Odoo 17 – A Complete Roadmap
Envertis Software Solutions
 
GreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-JurisicGreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-Jurisic
Green Software Development
 
How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?
ToXSL Technologies
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
Peter Muessig
 
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdfTop Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
VALiNTRY360
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
Drona Infotech
 
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
The Third Creative Media
 
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Julian Hyde
 
Preparing Non - Technical Founders for Engaging a Tech Agency
Preparing Non - Technical Founders for Engaging  a  Tech AgencyPreparing Non - Technical Founders for Engaging  a  Tech Agency
Preparing Non - Technical Founders for Engaging a Tech Agency
ISH Technologies
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
dakas1
 
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, FactsALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
Green Software Development
 
UI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design SystemUI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design System
Peter Muessig
 

Recently uploaded (20)

Quarter 3 SLRP grade 9.. gshajsbhhaheabh
Quarter 3 SLRP grade 9.. gshajsbhhaheabhQuarter 3 SLRP grade 9.. gshajsbhhaheabh
Quarter 3 SLRP grade 9.. gshajsbhhaheabh
 
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
 
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian CompaniesE-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
 
Oracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptxOracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptx
 
Malibou Pitch Deck For Its €3M Seed Round
Malibou Pitch Deck For Its €3M Seed RoundMalibou Pitch Deck For Its €3M Seed Round
Malibou Pitch Deck For Its €3M Seed Round
 
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdfBaha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
 
WWDC 2024 Keynote Review: For CocoaCoders Austin
WWDC 2024 Keynote Review: For CocoaCoders AustinWWDC 2024 Keynote Review: For CocoaCoders Austin
WWDC 2024 Keynote Review: For CocoaCoders Austin
 
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
 
What’s New in Odoo 17 – A Complete Roadmap
What’s New in Odoo 17 – A Complete RoadmapWhat’s New in Odoo 17 – A Complete Roadmap
What’s New in Odoo 17 – A Complete Roadmap
 
GreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-JurisicGreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-Jurisic
 
How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
 
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdfTop Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
 
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
 
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)
 
Preparing Non - Technical Founders for Engaging a Tech Agency
Preparing Non - Technical Founders for Engaging  a  Tech AgencyPreparing Non - Technical Founders for Engaging  a  Tech Agency
Preparing Non - Technical Founders for Engaging a Tech Agency
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
 
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, FactsALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
 
UI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design SystemUI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design System
 

Meeting the Cybersecurity Challenge

  • 1. Live Webinar: Webinar Audio: You can dial the telephone numbers located on your webinar panel. Or listen in using your headphones or computer speakers. Welcome!
  • 2. Webinar DetailsWebinar Details • Presentation is roughly 1 hour • All phone lines are muted • If anyone has any questions during this webinar – please type them in your Questions Box located at the bottom of your webinar panel
  • 3. Today’s Presenters Rocco Passafuime Director of Infrastructure Net@Work Laura Kibbe Managing Director of Professional Services RVM Enterprises, Inc.
  • 4. Webinar Details 180+ Business Technology Architects and Consultants IT Road Mapping & Strategic Planning Business Process Review Ecosystem BI, Analytics & Reporting Cloud & IT Managed Services ERP/ Accounting Web Development & e-Commerce Sister Company Payment Processing SWYPE Sister Company CRM & Marketing Automation HRMS/ Employer Solutions Document Management Nonprofit Solutions Managed Print Services Sister Company
  • 6. What is a Data Breach? • Incident where information is stolen from a system without authorization • Victims are typically large companies and data stolen tends to be sensitive, proprietary or confidential (Customer lists, credit card numbers, etc.) • Financial and reputational damage as a result of a data breach is significant.
  • 7.
  • 8. How Do They Happen?
  • 9. Inadvertent Invitations Sometimes data breaches are not directed into he company iteself: • Lost or stolen devices • Malware infected [personal devices that connect to the company’s network • Employee sharing of information and files with friends (e.g., “let me borrow that PowerPoint?”)
  • 10. Financial Cost - Ponemon Cost of Data Breach Study Who? 383 Companies, 12 countries Damage? Average cost is $4 million Trend? 29 % increase since 2013
  • 12. Who Are The Targets?
  • 13. How Can You Prevent a Data Breach? • Training • Encryption • Intrusion Detection and Prevention • Content Filtering • Vulnerability Assessment • Patch Management • System Monitoring • Backup
  • 15. What is BYOD? Bring Your Own Device refers to the policy of allowing employees to purchase and integrate their own devices into a corporate network While businesses benefits like effifcicny and employee satisfaction arwe real, IT departments find it difficult to balance changing technology landscapes and face new security concerns.
  • 16. Benefits of BYOD - Company • Enhanced employee productivity - immediate access to work when away from the office • Employees are much more likely to protect and care for their own devices. This equates to decreased expenditures due to damaged or stolen devices and data loss. • Device ownership costs shifted to the employee rather than the employer. • For Gens Y and Z, 50% expect the same technology to be available at work as at home.
  • 17. Benefits of BYOD - Employee • Efficient – carry 1 device instead of 2 • Consistency – because it’s one device, you can save settings and documents, pictures all in one place • Choice – employee picks which type of device they want (iPhone, Galaxy etc.) so they are happier
  • 18. Best Practices • Clearly defined written policy with signed acknowledgement • Training on policy • Good mobile device management solution • Smart passwords • Monitoring and security reporting
  • 20. • Deceptive Phishing Email messages that claims themselves as recognized sources and asks for your personal details, verification code or even to make a payment.  Scam objective -To trick the user into providing personal details to access his bank account.
  • 21. • Spear Phishing A Sophisticated version in which the sender uses available information to direct his request at you.  Scam objective-Directly targets you for acquiring all your bank details or any other data.
  • 22. • CEO Fraud Phishers use an email address similar to that of an authority to request payments or data from others within the company or an organization.  Scam objective - To transfer the money directly from victim to cybercriminals.
  • 23. • Pharming Scam in which a hacker hijacks a website’s domain name and uses it to redirect the visitors to some other site.  Scam objective-To intercept and steal online payments
  • 24. • Dropbox Phishing A Scam that looks real and claims to have come from a Dropbox requests the user to click on the link to secure their account details or to share a downloaded file.  Scam objective-To install malware on victim’s PC.
  • 25. Preventing Phishing Leaks • Strong internal firewall management • Refuse to provide your personal details • Report suspicious emails • Use strong anti-virus software
  • 27. Malware is a malicious software that gets installed in your device and performs unwanted tasks. Mainly designed to transmit information about your web browsing habits to the third party
  • 28. Types of Malware Viruses Trojan Horse Spyware Spam Adware Rootkits Scareware Worms
  • 29. Viruses • Software that replicates itself and spreads by damaging and deleting the files. • Virus enters your device via attached images, greeting, audio/video files , downloads etc.
  • 30. Spyware • Spyware is a program that gets installed without the user’s permission. • It monitors the user’s activities on the internet and transmits that information to the third party.
  • 31. Adware • Software where advertising banners are displayed while any program is running. • It automatically downloads to your device while browsing any website • It is used by companies for marketing purposes
  • 32. Scareware Software that is designed to trick the user into buying or downloading unwanted software.
  • 33. Worms • Malicious program that make copies of itself on local device, network shares etc. • They make the working of your device slower.
  • 34. Trojan Horse • A Trojan Horse is a program containing malicious or harmful code. • Entering a computer, it performs various tasks like corrupting files and sending out personal information.
  • 35. Spam • Method of flooding the internet with the copies of the same message • It is for the purpose of advertising, phishing, spreading malware etc.
  • 36. Rootkits • Software hidden deep inside your device which remains undetected. • It transmits all your sensitive information
  • 38. Are the systems in place enough? • Most companies have robust IT security systems in place at a macro level – looking for hackers etc. • The employee armed with a simple laptop and a thumb drive does the most damage.
  • 39. The Dilemma • There’s an inherent tension between giving employees access to the highly confidential trade secrets they need to do their job and locking down the information’s use to prevent theft.
  • 40. What is an employer to do? • Clearly document policies and controls: Acceptable Use etc. • Conduct fraud and awareness training for all employees • Conduct regular information security audits • Implement strict password policies • Enforce delegations of authority and access to information (only allow access to what is needed to perform the job) • Institute stringent access controls. Backup and recover processes • Shut down unauthorized data exfiltration means: USB, Bluetooth, media cards, etc. • Institute a formal insider threat response plan
  • 42. What Is It? • Type of malware that restricts access to the infected computer system and demans that a user pay ransom to get access to the files • How does it restrict access: • Encrypts files • Locks system access • Crashes system • Disrupts and annoys – opening browser windows, displaying pornographic images
  • 43. What’s Bitcoin • Internet currency • Like a casino chip, “coins” have no intrinsic value but they can be traded for real value when you leave
  • 44. Why Bitcoin for Ransom? • Bitcoin converst directly into local currency • Low transaction fees • Faster than checks, wire transfers, and, even credit cards • Because not government backed, lightly regulated Bitcoin solves the problem with a fast, untraceable payment system that makes ransoms much easier to pay—and for cyber criminals, much safer to collect without getting caught
  • 45. Any Questions? Please type in your questions
  • 46. Thank You For Attending! Connect with 800-719-3307 www.netatwork.com netatwork.com/blog Net@Work YouTube Follow us on Twitter: @netatwork_corp Follow Net@Work on LinkedIn Follow Net@Work on Google+ Follow Net@Work on Facebook For More Information Contact Your Net@Work Account Manager Or Contact Us using the information below: Rocco Passafuime | Net@Work Director of Infrastructure Sales (P) 646-517-6093 (E) rpassafuime@netatwork.com