SlideShare a Scribd company logo
Because IT support does not equal Data Security
Small businesses in the US are losing $2 Million per WEEK to cyber crime – FBI Estimate Cyber crime take in 2009 a TRILLION dollars.  Bigger than combined sales of Walmart, Exxon and GE. – MacAfee Estimate
Common Misconceptions
I’m safe, I have Antivirus software. AV software only catches between 25% and 40% of Malware. Most of the products take an average of nearly two days to detect the latest threats. - NSS Labs
I only go to trusted web sites. Like these?  All of which have been compromised at one time or another. Anthem Blue Cross Facebook BusinessWeek Wal-Mart US Army US Postal Service Bank of India Fox Sports NASA Bill O’Reilly PBS Daily Telegraph Twitter Microsoft Hotmail Sarah Palin US Treasury Aetna World of Warcraft Apple iTunes Durham Police City of Denver Kaspersky Security Monster Godaddy Dolphin Stadium
I don’t have anything worth stealing.  I only open email from people I know. Man suspected of hacking computers arrested on Federal charges related to demands for sexually explicit videos from women and teenage girls while posing as their boyfriend on-line. Man indicted for hacking into neighbor’s wireless internet system and posing as the neighbor to email child pornography and threats to the Vice President.
Fake AV Warning that looks VERY real.
U.S. indicts Ohio man and two foreign residents in alleged Ukraine-Based "Scareware" fraud scheme that caused $100 million in losses to internet victims worldwide
Houston computer administrator sentenced to 12 Months in prison for hacking former employer’s computer network  Guess they should have changed the password.  What’s your terminated employee policy? Woman pleads guilty to hacking email accounts and deleting documents in domestic relations dispute.  Another password problem. Man arrested and charged with operating international online "Phishing" scheme to steal Income Tax Refunds.  What’s your phishing protection strategy? Mid-Sized bank compromised through job interview process.  How much information do you divulge in a supposed job interview?
I already have an IT provider  They are typically NOT security specialists. Keeping your network running is their priority, not keeping you safe. Self audit is usually NOT a good idea.
Things you can do: Keep your Operating System Patched.  Auto-Update isn’t enough. Keep your applications up-to-date.  Especially those used to deal with electronic content such as Adobe Reader, Java, your browser and any streaming media players. Limit the content you allow on your network. Teach your employees to be a little skeptical. Don’t browse the Internet with Administrative Rights.
What to do if you suspect trouble…. Pull the plug and call for help!

More Related Content

What's hot

Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-woww
FloroRaphaell
 
Malware
MalwareMalware
Malware
galaxy201
 
Email crime ppt
Email crime pptEmail crime ppt
Email crime ppt
Onkar1431
 
Phishing
PhishingPhishing
Phishing
Syeda Javeria
 
Symantec Report On Rogue Security Software
Symantec Report On Rogue Security SoftwareSymantec Report On Rogue Security Software
Symantec Report On Rogue Security Software
Symantec
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Kushal Mondal
 
Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)
rayarren06
 
Cybercrime: A Primer
Cybercrime:  A PrimerCybercrime:  A Primer
Cybercrime: A Primer
fwscholl
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Komal003
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
Mark Lanterman
 
Phishing and hacking
Phishing and hackingPhishing and hacking
Phishing and hacking
Md. Mehadi Hassan Bappy
 
A Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.com
Business.com
 
Cyber crimes & cyber security
Cyber crimes & cyber securityCyber crimes & cyber security
Cyber crimes & cyber security
DR. Hossam Elshenraki
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-woww
FloroRaphaell
 
Cybercrime
CybercrimeCybercrime
Cybercrime
ecommerce
 
Phishing attack till now
Phishing attack till nowPhishing attack till now
Phishing attack till now
elakkiya poongunran
 
Phishing & Pharming
Phishing & PharmingPhishing & Pharming
Phishing & Pharming
Devendra Yadav
 
Top Cyber Threats of 2009
Top Cyber Threats of 2009Top Cyber Threats of 2009
Top Cyber Threats of 2009
Symantec
 

What's hot (18)

Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-woww
 
Malware
MalwareMalware
Malware
 
Email crime ppt
Email crime pptEmail crime ppt
Email crime ppt
 
Phishing
PhishingPhishing
Phishing
 
Symantec Report On Rogue Security Software
Symantec Report On Rogue Security SoftwareSymantec Report On Rogue Security Software
Symantec Report On Rogue Security Software
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)
 
Cybercrime: A Primer
Cybercrime:  A PrimerCybercrime:  A Primer
Cybercrime: A Primer
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
 
Phishing and hacking
Phishing and hackingPhishing and hacking
Phishing and hacking
 
A Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.com
 
Cyber crimes & cyber security
Cyber crimes & cyber securityCyber crimes & cyber security
Cyber crimes & cyber security
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-woww
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Phishing attack till now
Phishing attack till nowPhishing attack till now
Phishing attack till now
 
Phishing & Pharming
Phishing & PharmingPhishing & Pharming
Phishing & Pharming
 
Top Cyber Threats of 2009
Top Cyber Threats of 2009Top Cyber Threats of 2009
Top Cyber Threats of 2009
 

Viewers also liked

What Are My Risks
What Are My RisksWhat Are My Risks
What Are My Risks
rothl
 
The Cristian trust - Joanne Davies- SAC/GAIN 2014
 The Cristian trust - Joanne Davies- SAC/GAIN 2014 The Cristian trust - Joanne Davies- SAC/GAIN 2014
The Cristian trust - Joanne Davies- SAC/GAIN 2014
Igreja Adventista do Sétimo Dia
 
Relaciones Públicas - Susana Cayrus - SAC/GAIN 2014
 Relaciones Públicas - Susana Cayrus - SAC/GAIN 2014 Relaciones Públicas - Susana Cayrus - SAC/GAIN 2014
Relaciones Públicas - Susana Cayrus - SAC/GAIN 2014
Igreja Adventista do Sétimo Dia
 
Heroes game - SAC/GAIN 2014
Heroes game - SAC/GAIN 2014Heroes game - SAC/GAIN 2014
Heroes game - SAC/GAIN 2014
Igreja Adventista do Sétimo Dia
 
O PG e o Plantio de Igrejas
O PG e o Plantio de IgrejasO PG e o Plantio de Igrejas
O PG e o Plantio de Igrejas
Igreja Adventista do Sétimo Dia
 
Projetos Mundiais de Internet da IASD - John Beckett, Fórum Web Adventista
Projetos Mundiais de Internet da IASD - John Beckett, Fórum Web AdventistaProjetos Mundiais de Internet da IASD - John Beckett, Fórum Web Adventista
Projetos Mundiais de Internet da IASD - John Beckett, Fórum Web Adventista
Igreja Adventista do Sétimo Dia
 
Violencia - Internet
Violencia - InternetViolencia - Internet
Violencia - Internet
Igreja Adventista do Sétimo Dia
 
Palestra Inovaçào - Pablo Sánchez - SAC/GAIN 2014
Palestra Inovaçào - Pablo Sánchez - SAC/GAIN 2014Palestra Inovaçào - Pablo Sánchez - SAC/GAIN 2014
Palestra Inovaçào - Pablo Sánchez - SAC/GAIN 2014
Igreja Adventista do Sétimo Dia
 
Challenge2 v2
Challenge2 v2Challenge2 v2
Challenge2 v2WeDecide
 
Violencia Infantil 1
Violencia Infantil 1Violencia Infantil 1
Violencia Infantil 1
Igreja Adventista do Sétimo Dia
 
What Are My Risks
What Are My RisksWhat Are My Risks
What Are My Risks
rothl
 
O pg e o plantio de igrejas
O pg e o plantio de igrejasO pg e o plantio de igrejas
O pg e o plantio de igrejas
Igreja Adventista do Sétimo Dia
 
Plantando igrejas
Plantando igrejasPlantando igrejas
Tema 2 Colapso del imperio
Tema 2 Colapso del imperioTema 2 Colapso del imperio
Tema 2 Colapso del imperio
Igreja Adventista do Sétimo Dia
 
Lenox Advisors Personal CFO brochure
Lenox Advisors Personal CFO brochureLenox Advisors Personal CFO brochure
Lenox Advisors Personal CFO brochure
rburger69
 
UX Design em 7 Passos - Daniel Werle, Fórum Web Adventista
UX Design em 7 Passos - Daniel Werle, Fórum Web AdventistaUX Design em 7 Passos - Daniel Werle, Fórum Web Adventista
UX Design em 7 Passos - Daniel Werle, Fórum Web Adventista
Igreja Adventista do Sétimo Dia
 

Viewers also liked (17)

What Are My Risks
What Are My RisksWhat Are My Risks
What Are My Risks
 
The Cristian trust - Joanne Davies- SAC/GAIN 2014
 The Cristian trust - Joanne Davies- SAC/GAIN 2014 The Cristian trust - Joanne Davies- SAC/GAIN 2014
The Cristian trust - Joanne Davies- SAC/GAIN 2014
 
Relaciones Públicas - Susana Cayrus - SAC/GAIN 2014
 Relaciones Públicas - Susana Cayrus - SAC/GAIN 2014 Relaciones Públicas - Susana Cayrus - SAC/GAIN 2014
Relaciones Públicas - Susana Cayrus - SAC/GAIN 2014
 
Heroes game - SAC/GAIN 2014
Heroes game - SAC/GAIN 2014Heroes game - SAC/GAIN 2014
Heroes game - SAC/GAIN 2014
 
Violencia Infantil 2
Violencia Infantil 2Violencia Infantil 2
Violencia Infantil 2
 
O PG e o Plantio de Igrejas
O PG e o Plantio de IgrejasO PG e o Plantio de Igrejas
O PG e o Plantio de Igrejas
 
Projetos Mundiais de Internet da IASD - John Beckett, Fórum Web Adventista
Projetos Mundiais de Internet da IASD - John Beckett, Fórum Web AdventistaProjetos Mundiais de Internet da IASD - John Beckett, Fórum Web Adventista
Projetos Mundiais de Internet da IASD - John Beckett, Fórum Web Adventista
 
Violencia - Internet
Violencia - InternetViolencia - Internet
Violencia - Internet
 
Palestra Inovaçào - Pablo Sánchez - SAC/GAIN 2014
Palestra Inovaçào - Pablo Sánchez - SAC/GAIN 2014Palestra Inovaçào - Pablo Sánchez - SAC/GAIN 2014
Palestra Inovaçào - Pablo Sánchez - SAC/GAIN 2014
 
Challenge2 v2
Challenge2 v2Challenge2 v2
Challenge2 v2
 
Violencia Infantil 1
Violencia Infantil 1Violencia Infantil 1
Violencia Infantil 1
 
What Are My Risks
What Are My RisksWhat Are My Risks
What Are My Risks
 
O pg e o plantio de igrejas
O pg e o plantio de igrejasO pg e o plantio de igrejas
O pg e o plantio de igrejas
 
Plantando igrejas
Plantando igrejasPlantando igrejas
Plantando igrejas
 
Tema 2 Colapso del imperio
Tema 2 Colapso del imperioTema 2 Colapso del imperio
Tema 2 Colapso del imperio
 
Lenox Advisors Personal CFO brochure
Lenox Advisors Personal CFO brochureLenox Advisors Personal CFO brochure
Lenox Advisors Personal CFO brochure
 
UX Design em 7 Passos - Daniel Werle, Fórum Web Adventista
UX Design em 7 Passos - Daniel Werle, Fórum Web AdventistaUX Design em 7 Passos - Daniel Werle, Fórum Web Adventista
UX Design em 7 Passos - Daniel Werle, Fórum Web Adventista
 

Similar to What Are My Risks

Cyber Security Incident Response Planning
Cyber Security Incident Response PlanningCyber Security Incident Response Planning
Cyber Security Incident Response Planning
PECB
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
homeworkping4
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Accenture
 
Driving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your EnemyDriving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your Enemy
First Atlantic Commerce
 
100812 internet security2.0
100812 internet security2.0100812 internet security2.0
100812 internet security2.0
dkp205
 
ACEDS-ACFCS Cybersecurity Webcast
ACEDS-ACFCS Cybersecurity WebcastACEDS-ACFCS Cybersecurity Webcast
ACEDS-ACFCS Cybersecurity Webcast
Logikcull.com
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Md Nishad
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
Ritesh Thakur
 
FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International
Scott Mills
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case Study
Pratham Jaiswal
 
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
Aviva Spectrum™
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
KALPITKALPIT1
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
Bushra22
 
Cyber security
Cyber securityCyber security
Cyber security
TonyYeung23
 
Protecting Your Law Office Against Data Breaches and Other Cyber Threats
Protecting Your Law Office Against Data Breaches and Other Cyber ThreatsProtecting Your Law Office Against Data Breaches and Other Cyber Threats
Protecting Your Law Office Against Data Breaches and Other Cyber Threats
Blake A. Klinkner
 
Year of pawnage - Ian trump
Year of pawnage  - Ian trumpYear of pawnage  - Ian trump
Year of pawnage - Ian trump
MAXfocus
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself Online
Gary Wagnon
 
Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018
Ronak Jain
 
Cyber crime: A Quick Survey
Cyber crime: A Quick SurveyCyber crime: A Quick Survey
Cyber crime: A Quick Survey
Arindam Sarkar
 
eCrime Conference March 2006
eCrime Conference March 2006eCrime Conference March 2006
eCrime Conference March 2006
Alan Mather
 

Similar to What Are My Risks (20)

Cyber Security Incident Response Planning
Cyber Security Incident Response PlanningCyber Security Incident Response Planning
Cyber Security Incident Response Planning
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Driving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your EnemyDriving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your Enemy
 
100812 internet security2.0
100812 internet security2.0100812 internet security2.0
100812 internet security2.0
 
ACEDS-ACFCS Cybersecurity Webcast
ACEDS-ACFCS Cybersecurity WebcastACEDS-ACFCS Cybersecurity Webcast
ACEDS-ACFCS Cybersecurity Webcast
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case Study
 
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber security
Cyber securityCyber security
Cyber security
 
Protecting Your Law Office Against Data Breaches and Other Cyber Threats
Protecting Your Law Office Against Data Breaches and Other Cyber ThreatsProtecting Your Law Office Against Data Breaches and Other Cyber Threats
Protecting Your Law Office Against Data Breaches and Other Cyber Threats
 
Year of pawnage - Ian trump
Year of pawnage  - Ian trumpYear of pawnage  - Ian trump
Year of pawnage - Ian trump
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself Online
 
Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018
 
Cyber crime: A Quick Survey
Cyber crime: A Quick SurveyCyber crime: A Quick Survey
Cyber crime: A Quick Survey
 
eCrime Conference March 2006
eCrime Conference March 2006eCrime Conference March 2006
eCrime Conference March 2006
 

What Are My Risks

  • 1. Because IT support does not equal Data Security
  • 2. Small businesses in the US are losing $2 Million per WEEK to cyber crime – FBI Estimate Cyber crime take in 2009 a TRILLION dollars. Bigger than combined sales of Walmart, Exxon and GE. – MacAfee Estimate
  • 4. I’m safe, I have Antivirus software. AV software only catches between 25% and 40% of Malware. Most of the products take an average of nearly two days to detect the latest threats. - NSS Labs
  • 5. I only go to trusted web sites. Like these? All of which have been compromised at one time or another. Anthem Blue Cross Facebook BusinessWeek Wal-Mart US Army US Postal Service Bank of India Fox Sports NASA Bill O’Reilly PBS Daily Telegraph Twitter Microsoft Hotmail Sarah Palin US Treasury Aetna World of Warcraft Apple iTunes Durham Police City of Denver Kaspersky Security Monster Godaddy Dolphin Stadium
  • 6. I don’t have anything worth stealing. I only open email from people I know. Man suspected of hacking computers arrested on Federal charges related to demands for sexually explicit videos from women and teenage girls while posing as their boyfriend on-line. Man indicted for hacking into neighbor’s wireless internet system and posing as the neighbor to email child pornography and threats to the Vice President.
  • 7. Fake AV Warning that looks VERY real.
  • 8. U.S. indicts Ohio man and two foreign residents in alleged Ukraine-Based "Scareware" fraud scheme that caused $100 million in losses to internet victims worldwide
  • 9. Houston computer administrator sentenced to 12 Months in prison for hacking former employer’s computer network Guess they should have changed the password. What’s your terminated employee policy? Woman pleads guilty to hacking email accounts and deleting documents in domestic relations dispute. Another password problem. Man arrested and charged with operating international online "Phishing" scheme to steal Income Tax Refunds. What’s your phishing protection strategy? Mid-Sized bank compromised through job interview process. How much information do you divulge in a supposed job interview?
  • 10. I already have an IT provider They are typically NOT security specialists. Keeping your network running is their priority, not keeping you safe. Self audit is usually NOT a good idea.
  • 11. Things you can do: Keep your Operating System Patched. Auto-Update isn’t enough. Keep your applications up-to-date. Especially those used to deal with electronic content such as Adobe Reader, Java, your browser and any streaming media players. Limit the content you allow on your network. Teach your employees to be a little skeptical. Don’t browse the Internet with Administrative Rights.
  • 12. What to do if you suspect trouble…. Pull the plug and call for help!