Ted - CyberSecurity for your Business

22

Transcript of Ted - CyberSecurity for your Business

Page 1: Ted - CyberSecurity for your Business
Page 2: Ted - CyberSecurity for your Business

Ted SandersCyber Security for Your Business

Digital Marketing Manager

Page 3: Ted - CyberSecurity for your Business

Social Marketing | Paid Search | Revenue per Unit, Business Evaluation | Maintenance | Task Management,

Data Standardization | Customer Service, Sound Accounting | Website Management

CYBER SECURITY

Page 4: Ted - CyberSecurity for your Business

Internet Security Threats to Property Management

Page 5: Ted - CyberSecurity for your Business

5 Ways to Defend Your Business From Hackers

• It’s a top-down commitment

• This is not an IT problem – it’s a business issue

• It’s not a matter of “if” it’s a matter of “when”

• The only thing harder and more expensive than

preparing for a threat now is waiting until you’ve been

hacked

• Any effort is better than no effort

Page 6: Ted - CyberSecurity for your Business

Security vs. Access • More security means less access• More access means less security

Page 7: Ted - CyberSecurity for your Business

Types of Hacks and Prevention• Network and System Attacks • Email Hacking- Spam, Virus, and “Phishing”• Password strength and strategies• Encrypted Password Tools for everyone

Page 8: Ted - CyberSecurity for your Business

#1 Security Vulnerability Social Hackers – people who attempt to gain access to restricted information by using seemingly legitimate techniques.

Page 9: Ted - CyberSecurity for your Business

Types of Social Hacks - Dumpster diving - Roleplaying - Tailgating - Spearphishing

Page 10: Ted - CyberSecurity for your Business

Network HackingNetwork Attacks • Packet Sniffing

(Eavesdropping) • IP Address Spoofing • Session Hijacking • Man in the Middle (MITM)

System Attacks • Password Cracking • SQL Injection • Web Protocol Abuse • Denial of Service (DOS) • Distributed Denial of Service

(DDOS) • Trap Door • Virus, Worm, Trojan horse

Page 11: Ted - CyberSecurity for your Business

Hacking Prevention • Change Passwords Regularly (Monthly, Quarterly, etc.)• Manage who has access to what • Terminate access for old vendors and employees• Utilize anti-virus software• Lock – doors, computers, etc.• Use shredding service for confidential documents

Page 12: Ted - CyberSecurity for your Business

Email Hacking • Spam • Virus • Phishing

spamphishing

virus

Page 13: Ted - CyberSecurity for your Business

Virus ExamplesYou didn't ask for this file, but perhaps think you did or you are curious as to whether it's an honest mistake. It's not. Also, never open a file of type ".pif".

Subject: Re: Your product From: [email protected]     Here is the file.Attachments: your_product.pif 23k

The W32.Sober.K@mm virus. Some viruses are hidden inside ZIP files. As usual, the FROM address is forged.

Subject: You visit illegal websites From: [email protected] Sir/Madam,we have logged your IP-address on more than 40 illegal Websites. Important: Please answer our questions!The list of questions are attached.Attachments: indictment_cit2987.zip

Page 14: Ted - CyberSecurity for your Business

SPAM!!! (90% of all international email traffic)

Page 15: Ted - CyberSecurity for your Business

Use Antivirus/Antispam Software

Page 16: Ted - CyberSecurity for your Business

Phish (Not that Phish!)

Page 17: Ted - CyberSecurity for your Business

Phishing on a Web Page

Page 18: Ted - CyberSecurity for your Business

SpearPhishing – Don’t Open the Link!

Page 19: Ted - CyberSecurity for your Business
Page 20: Ted - CyberSecurity for your Business

SIMPLIFY YOUR LIFE.LastPass remembers your passwords so that you can focus on the more important things in life. Cost is **FREE**

www.lastpass.com

Page 21: Ted - CyberSecurity for your Business

Top Takeaways Your accountable for your data Never send personal information by email Consider using password and security products like Lastpass and

AppRiver Most security breaches originate within an organization’s sphere of

influence

Page 22: Ted - CyberSecurity for your Business

THANK YOUFor additional information email: [email protected]