Presentation is loading. Please wait.

Presentation is loading. Please wait.

PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.

Similar presentations


Presentation on theme: "PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY."— Presentation transcript:

1 PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY

2 What are we talking about today? 1 WHAT ARE THE THREATS? 2 WHERE DO THREATS COME FROM? 34 WHAT CAN BE DONE? WHO ARE THE TARGETS?

3 What are the threats? Cybersecurity, the Internet, Malware, and Internal Threats

4 CONFIDENTIAL 4 Cybersecurity Protecting information systems from unauthorized or criminal access

5 CONFIDENTIAL 5 The Internet 2.5 Quintillion (18 zeros) bytes of data added daily 90% created in the last two years The early “Internet” - sharing and innovation over security and protection The Creeper System – “I’m the creeper, catch me if you can!” Systems connected to the network should be considered to be unsecured

6 CONFIDENTIAL 6 What are the threats? Malware Social Engineering Hacks Internal Attackers Combinations of these 1234

7 CONFIDENTIAL 7 Malware Computer programs targeted at disrupting service, gaining access, or destroying/stealing data. Adware Virus Worm Spyware / Trojan Ransomware

8 CONFIDENTIAL 8 Adware Threat Level: Annoyance Adware generally consists of pop-up ads that appear after installing a separate piece of software.

9 CONFIDENTIAL 9 Virus Threat Level: Annoyance to Serious Issue Viruses affect the host system and spread to other users.

10 CONFIDENTIAL 10 Worm Threat Level: Serious Issue The “ILOVEYOU” worm of 2000 cost an estimated 5.5 billion in damages. 10% of all Internet connected computers were infected. Worms replicate themselves to other systems where they destroy information as they go.

11 CONFIDENTIAL 11 Spyware / Trojan Horse Threat Level: Dangerous Spyware is a malicious software that spies on you and tracks your internet activities. It helps the hacker to gather information about the victim’s system.

12 CONFIDENTIAL 12 Ransomware Threat Level: Critical Ransomware is an advanced type of malware that restricts access to the computer system until the user pays a fee.

13 CONFIDENTIAL 13 Ransomware How does it work? Installation of the software Phone home Digital keys created Encryption of data Extortion

14 CONFIDENTIAL 14 Ransomware The infamous Cryptolocker and Locky are examples of ransomware.

15 CONFIDENTIAL 15 Malware On average 25% of mail is for work purposes 14% is of critical importance 13% is personal non-work related 48% is SPAM, junk, potentially malware, and/or a phishing attack The shape of email

16 CONFIDENTIAL 16 Phishing Phishing, Spear Phishing, and Whale Hunting Phishing threats are email attacks that politely ask for private information while posing as a different sender.

17 CONFIDENTIAL 17 IoT Botnet Attack Rise of the machines "We have a Botnet army ready to take down your site. You have 48 hours to pay us 1200$. Merry Xmas!” Botnet armies are network connected devices that can be focused on taking down another network device somewhere else.

18 CONFIDENTIAL 18 Security Hardware and Software Backdoors Commercially available hardware Juniper firewalls Chinese components with manufacturing “flaw”

19 CONFIDENTIAL 19 The Internal Threat Physical security is everything User education Give access to only what is required to get the job done

20 Where do threats come from? Who creates them and why would they do such a thing?

21 CONFIDENTIAL 21 Where do these threats come from? Geographically: Russia, China, Iran, and North Korea Virus – a program written to execute with malicious intent. Written by programmers: As a challenge Out of dislike for Microsoft, Apple, or some other company To serve (the hacker brand of) justice! Criminal gain / profit Research

22 Who are the targets and why? Who is vulnerable to security threats?

23 CONFIDENTIAL 23 Who are the targets? Groups of targets include: Hospitals Businesses with a strong Internet presence Large retailers (Home Depot, Target, TJX, Office Max, etc.) Federal Agencies Small Businesses Everyone has data that is valuable to the hackers in one way or another. As security measures for larger companies improve and become more complex, small businesses and home users are being targeted more and more.

24 What can be done? How can I protect my data from threats?

25 CONFIDENTIAL 25 What can be done? Layered security Comprehensive, Encompassing solution Cloud based email scanning Firewall Security Logging / event management Web filtering Antivirus Backup, backup, and more backup Educate your users

26 Questions

27 Thank You NetCenergy


Download ppt "PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY."

Similar presentations


Ads by Google