Security for Small Business

49
Protecting the irreplaceable | f-secure.com

description

A presentation on security for small businesses presented by F-Secure.

Transcript of Security for Small Business

Page 1: Security for Small Business

Protecting the irreplaceable | f-secure.com

Page 2: Security for Small Business

Protecting the irreplaceable | f-secure.com

Threat Eye-Opener

Bryan Ford – Head of Operator Sales

August 15th, 2012

Page 3: Security for Small Business

| © August 15, 2012, F-Secure Corporation

Agenda• Definition of Terms

• History of Malware

• Recent Attacks – Stuxnet & Ghost Click

• Online Safety Tips

• Mobile Threats

• Frontier Secure

• Q&A

Page 4: Security for Small Business

| © August 15, 2012, F-Secure Corporation

Industry Terms• Malware - Software that is intended to damage or disable computers and

computer systems

• Botnets - A botnet is a collection of internet-connected computers whose security defenses have been breached and control ceded to an unknown party

• SSL - (Secure Sockets Layer) is the standard security technology for establishing an encrypted link between a web server and a browser

Page 5: Security for Small Business

| © August 15, 2012, F-Secure Corporation

We used to be fighting these...

• Chen-Ing HauAuthor of the CIH virus

Joseph McElroyHacked the Fermi lab network

BennyEx-29A

Page 6: Security for Small Business

| © August 15, 2012, F-Secure Corporation

Case Tariq al-Daour

Page 7: Security for Small Business

| © August 15, 2012, F-Secure Corporation

Malware Trends

Page 8: Security for Small Business

| © August 15, 2012, F-Secure Corporation

Malware Trends

• Numbers continue to rise exponentially

Number of malware

Page 9: Security for Small Business

| © August 15, 2012, F-Secure Corporation

Malware Trends

Page 10: Security for Small Business

| © August 15, 2012, F-Secure Corporation

• Malware writing is becoming more professional

Malware Trends

Page 11: Security for Small Business

| © August 15, 2012, F-Secure Corporation

• Malware writing is becoming more professional

• Previously undiscovered vulnerabilities are worth a lot on the black market

Malware Trends

Page 12: Security for Small Business

| © August 15, 2012, F-Secure Corporation

• Previously undiscovered vulnerabilities are worth a lot on the black market

Malware Trends

Page 13: Security for Small Business

| © August 15, 2012, F-Secure Corporation

Malware Trends

Q: How expensive would such vulnerabilities be?

Page 14: Security for Small Business

| © August 15, 2012, F-Secure Corporation

Malware Trends

A: A single form of malware in a popular version of Windows could go for anything between $50,000 to $500,000.

Page 15: Security for Small Business

| © August 15, 2012, F-Secure Corporation

Malware Trends

• The aims are simple and depend on the group involved:

• Money from spam, scams and fakes

• Hacktivism to increase public exposure of an issue

Page 16: Security for Small Business

| © August 15, 2012, F-Secure Corporation

Malware Trends

• The aims are simple and depend on the group involved:

• Money from spam, scams and fakes

• Hacktivism to increase public exposure of an issue

Page 17: Security for Small Business

| © August 15, 2012, F-Secure Corporation

Malware Trends

• Money from spam, scams and fakes

• Hacktivism to increase public exposure of an issue

Page 18: Security for Small Business

| © August 15, 2012, F-Secure Corporation

Malware Trends

• Hacktivism to increase public exposure of an issue

Page 19: Security for Small Business

| © August 15, 2012, F-Secure Corporation

Malware Trends

Page 20: Security for Small Business

| © August 15, 2012, F-Secure Corporation

Page 21: Security for Small Business

| © August 15, 2012, F-Secure Corporation

Page 22: Security for Small Business

| © August 15, 2012, F-Secure Corporation

Malware trends

Page 23: Security for Small Business

| © August 15, 2012, F-Secure Corporation

Malware trends

Case:

Page 24: Security for Small Business

| © August 15, 2012, F-Secure Corporation

Malware trends

Case:Stuxnet

Page 25: Security for Small Business

| © August 15, 2012, F-Secure Corporation

Malware trends

Case:Stuxnet

More information:

Page 26: Security for Small Business

| © August 15, 2012, F-Secure Corporation

Malware trends

Case:Stuxnet

More information:http://www.f-secure.com/weblog/archives/00002066.html

Page 27: Security for Small Business

| © August 15, 2012, F-Secure Corporation

Malware trends

Case:Stuxnet

More information:http://www.f-secure.com/weblog/archives/00002066.html

Page 28: Security for Small Business

| © August 15, 2012, F-Secure Corporation

Malware trends

Case:”Ghost Click”

More information:http://www.f-secure.com/weblog/archives/00002268.html

Page 29: Security for Small Business

| © August 15, 2012, F-Secure Corporation

Malware trends

Case:”Ghost Click”

More information:http://www.f-secure.com/weblog/archives/00002268.html

Page 30: Security for Small Business

| © August 15, 2012, F-Secure Corporation

Safer online banking

Page 31: Security for Small Business

| © August 15, 2012, F-Secure Corporation

Safer online banking

Page 32: Security for Small Business

| © August 15, 2012, F-Secure Corporation

Safer online banking

• Banks provide safety instuctions• No pop-ups• PIN only asked once

• https:// address (Hypertext Transfer Protocol over Secure Socket Layer)• always when banking and dealing with credit card number in an online

store

• Paying with credit card or online payment service provider (PayPal) is safer

Page 33: Security for Small Business

| © August 15, 2012, F-Secure Corporation

Safer online banking

• Banks provide safety instuctions• No pop-ups• PIN only asked once

• https:// address (Hypertext Transfer Protocol over Secure Socket Layer)• always when banking and dealing with credit card number in an online

store

• Paying with credit card or online payment service provider (PayPal) is safer

Page 34: Security for Small Business

| © August 15, 2012, F-Secure Corporation

Safer online banking

• Banks provide safety instuctions• No pop-ups• PIN only asked once

• https:// address (Hypertext Transfer Protocol over Secure Socket Layer)• always when banking and dealing with credit card number in an online

store

• Paying with credit card or online payment service provider (PayPal) is safer

Page 35: Security for Small Business

| © August 15, 2012, F-Secure Corporation

Safer social networking

Page 36: Security for Small Business

| © August 15, 2012, F-Secure Corporation

Safer social networking

Page 37: Security for Small Business

| © August 15, 2012, F-Secure Corporation

Safer social networking

• Danger of revealing too much• Caution with personal details• Pictures stay on the Internet forever

• Privacy?• Privacy settings• Strong passwords• Identity theft, spam, targeted attacks

• Maintaining a good reputation

Page 38: Security for Small Business

| © August 15, 2012, F-Secure Corporation

Safer social networking

• Danger of revealing too much• Caution with personal details• Pictures stay on the Internet forever

• Privacy?• Privacy settings• Strong passwords• Identity theft, spam, targeted attacks

• Maintaining a good reputation

Page 39: Security for Small Business

| © August 15, 2012, F-Secure Corporation

Safer social networking

• Danger of revealing too much• Caution with personal details• Pictures stay on the Internet forever

• Privacy?• Privacy settings• Strong passwords• Identity theft, spam, targeted attacks

• Maintaining a good reputation

Page 40: Security for Small Business

| © August 15, 2012, F-Secure Corporation

Safer social networking

• Danger of revealing too much• Caution with personal details• Pictures stay on the Internet forever

• Privacy?• Privacy settings• Strong passwords• Identity theft, spam, targeted attacks

• Maintaining a good reputation

Page 41: Security for Small Business

| © August 15, 2012, F-Secure Corporation

Well-being in a mobile world

Page 42: Security for Small Business

| © August 15, 2012, F-Secure Corporation

Well-being in a mobile world• Lots of information on your mobile

• Crime against Android multiplying

• Malware via Bluetooth and web download

• Spy-tools

• Recording

• Monitoring calls, SMS, multimedia, email

• Locating phone via GPS

Page 43: Security for Small Business

| © August 15, 2012, F-Secure Corporation

Well-being in a mobile world• Lots of information on your mobile

• Crime against Android multiplying

• Malware via Bluetooth and web download

• Spy-tools

• Recording

• Monitoring calls, SMS, multimedia, email

• Locating phone via GPS

Page 44: Security for Small Business

| © August 15, 2012, F-Secure Corporation

Well-being in a mobile world• Lots of information on your mobile

• Crime against Android multiplying

• Malware via Bluetooth and web download

• Spy-tools

• Recording

• Monitoring calls, SMS, multimedia, email

• Locating phone via GPS

Page 45: Security for Small Business

| © August 15, 2012, F-Secure Corporation

Well-being in a mobile world• Lots of information on your mobile

• Crime against Android multiplying

• Malware via Bluetooth and web download

• Spy-tools

• Recording

• Monitoring calls, SMS, multimedia, email

• Locating phone via GPS

Page 46: Security for Small Business

| © August 15, 2012, F-Secure Corporation

Well-being in a mobile world• Lots of information on your mobile

• Crime against Android multiplying

• Malware via Bluetooth and web download

• Spy-tools

• Recording

• Monitoring calls, SMS, multimedia, email

• Locating phone via GPS

Page 47: Security for Small Business

| © August 15, 2012, F-Secure Corporation

Frontier Secure – Max Security

• Single Integrated product :

• Antivirus Protection

• Anti Spyware

• Personal Firewall

• Browsing Protection

• Spam Filtering

• Automatic Updates

• Live 24/7 Support

• PC & Mac Support

Page 48: Security for Small Business

| © August 15, 2012, F-Secure Corporation

Q&A

www.frontier.com/security

Page 49: Security for Small Business

A MORE DEDICATED CONNECTION

Brought to you by:

Thank YouCall: 1-866-408-0233