3. Your Computers at Risk How cyber-criminals are winning the Malware wars Presented by Placer Computers
4. Zero Day Attacks PC Magazine: A Zero-Day Attack is a virus or other malware exploit that takes advantage of a hole in a program or operating system before the software developer has made a fix available...”
5. Am I At Risk? Cyber-criminals create over 60,000 new Malware attacks EVERY DAY! Antivirus/Antispyware software can’t protect against these new threats until AFTER they strike. Once the malware gets in, it seeks and attacks program vulnerabilities
6. How Did This Happen? Improved Microsoft security updates make 3rd party software attacks more attractive 3rd party software less likely to be regularly updated by PC owner Cyber-criminals know this so they seek the easiest targets
7. Is There a Trend? Average PC has 24-26 non-Microsoft (3rd party) apps Gregg Keiser, Computer World July 2010:“While vulnerabilities in Windows XP and Vista will climb by 31% and 34% respectively this year compared to 2009, bugs in 3rd party apps will jump by 92%”
8. How Will It Effect Me? California Civil Code 1798.81.5A business… shall implement and maintain reasonable security procedures and practices appropriate… to protect the personal information from unauthorized access… or disclosure. California Financial Code 4057An entity that negligently discloses or shares nonpublic personal information… shall be liable, irrespective of the amount of damages suffered… for a civil penalty not to exceed $2,500 per violation. ($500,000 max)
15. Placer Computers STEP 2: Locate Missing Updates Microsoft critical/optional patches 3rd Party program updates/patches www.PlacerComputers.com
16. Placer Computers STEP 3: Identify End-of-Life Software Programs no longer supported are risky! www.PlacerComputers.com
17. Placer Computers STEP 4: Download, install security updates Ensures that all software is up-to-date www.PlacerComputers.com
18. Placer Computers STEP 5: Find replacements for EOL programs Many free options are available. We will research and provide recommendations www.PlacerComputers.com
19. Placer Computers STEP 6: Scan and repair privacy leaks Most programs leave a trail of personal data www.PlacerComputers.com
20. Placer Computers STEP 7: Spyware Scan Catch any malware that gotpast your Antivirus software www.PlacerComputers.com
21. Placer Computers STEP 8: System Cleanup and Optimization Clean your computer in/outOptimize your PC to run better www.PlacerComputers.com