We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byAmy Sartwell
Modified about 1 year ago
© 2011 Smartronix, Inc. 1 Cyber Heists & Prevention in
© 2011 Smartronix, Inc. 2 Happy Cyber Awareness Month cybersecurity-awareness-month
© 2011 Smartronix, Inc. Cyber Crime Still A Growing Industry Online bank robberies outpace the “in person” alternatives Totals in cyber thefts have been more than twice traditional bank crimes since
© 2011 Smartronix, Inc. Will My Organization Be A Target? It already is Do you have: − Any patents (intellectual property)? − A bank account? − A lot of bandwidth? − A customer contact list or sensitive personal info? Do you ever receive: − Phishing (“You’ve won!!!”)? − Unsolicited Resumes? − Requests to follow links (via Tweet, FB, …)? 4
© 2011 Smartronix, Inc. Cases Studies in 2011 Conclusion to Patco Construction’s Ordeal? − 2 years worth of legal struggle after $580,000 theft − What are reasonable security measures? Experi-Metal vs. Comerica − Comerica not found to be acting in good faith for a customer − What impact does that have for everyone else? 5
© 2011 Smartronix, Inc. How Exactly Did Those Cases Start? The best guess is a single 6 Subject: You have won - Congratulations From: "MICROSOFT PROMOTION" To: undisclosed-recipients You have won - Congratulations You are a winner of £450,000 Pounds Sterling courtesy of Microsoft Corporation, United Kingdom in our monthly lottery held on 15th December Your secret pin code ML and your reference number REF NO:MICRO-L/2009-END10. Subject: Upgrade From: "Webmail Support Team" Reply-To: Dear Webmail Subscriber, This is to notify you that we are presently working on our webmail User Accounts Owner for safety. We are having congestions due to the anonymous registration of accounts so we are shutting down some accounts that are no more active and your account might be deleted or suspended within 24 hours for security reasons if you do not respond to this mail. We are sending this to you so that you can verify and let us know if you still want to use this account…. From: To: Subject: setting for your mailbox are changed SMTP and POP3 servers for mailbox are changed. Please carefully read the attached instructions before updating settings. From: To: Subject: application for employment To Whom It May Concern, Please find attached my resume for employment with your company. Thank you.
© 2011 Smartronix, Inc. The Ounce of Prevention Dedicated machines for banking - possibly virtual machines fit this bill if you are technically inclined Select banks that allow tokens), and ask for the token for online banking ($2), or out-of-band verification Review the transaction reports Training & testing employees Ask about security 7
© 2011 Smartronix, Inc. Thank You Contact Information: Eric Walters Jason Gordon 8
SAFETY What to be aware of and how to avoid problems. **This is not meant to make you fearful of . The goal of this discussion is to make sure.
ONLINE SAFETY Online safety Money Works: Level 1 Topic 3.
By Toby Reed. What is ? stands for ‘electronic mail’. Its is used for digitally sending messages (whether it only has an attachment or a photo.
1 Applications of Computers Lecture-3 2 E-Commerce 4 Almost all major companies have their homes on the web, mainly for advertising 4 Companies were.
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
October Secure source for employee-related information All employees have access to ESS. – Personal Data changes – Home, Mailing and Addresses.
Understanding and Building Basic Networks Chapter 3 The Other Internet.
James Fox Shane Stuart Danny Deselle Matt Baldwin Acceptable Use Policies.
Copyright © SkyeyTech, Inc. BUGtrack Interface.
UO Academic Extension Online Registration Instructions and help.
Please lock your COW! ext or call the College IT Help or ext
Account HIGHJACKING & IDENTITY THEFT GPCE Credit Union has prepared a slide show presentation to examine the most prevalent financial crimes at work today.
Proprietary and Confidential Don’t be the Next Cyber Crime Statistic C. Kevin deBrucky, Vice President PINACLE ® Security Manager.
HUNTINGTON BEACH PUBLIC LIBRARY Basics. What is ? short for electronic mail send & receive messages over the internet.
Question: What is Secure Envelope? Answer: DARS will utilizes a Cisco product called Cisco Registered Envelope Service (CRES) to provide Secure services.
Analysing s Michael Jones. Overview How works Types of crimes associated with Mitigations Countermeasures Michael Jones2Analsysing s.
Florida Department of Business and Professional Regulations Ken Lawson Juana Watkins Secretary Director Division of Real Estate.
Potential Members go to our micro sites via the edm mail. User will be forwarded to Paypal payment gateway with security access. Fill in credit card info,
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Managing False Information NiiBen C. A. Ayivorh AML/CFT Consultant Nii-Int’l L.L.C.
EServices How to transact on the eServices website Tando Luyaba 17 September 2015.
RYAN HICKLING. WHAT IS AN An messages distributed by electronic means from one computer user to one or more recipients via a network.
DoS Attacks Phishing Keylogging Computer Laws/Acts.
BTT12OI. Do you know someone who has been scammed? What happened? Been tricked into sending someone else money (not who they thought they were)
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
K12 WebMail. Login into Webmail.
CURRENT STATUS OF CYBERCRIME Security is the fastest growing service in IT Cyber Crime Costs $750 Billion annually 70% of threats arrive via .
Introduction to the Secure SMTP Server service. Secure SMTP server is a secure, reliable SMTP mail relay server for your outgoing mail. Secure SMTP service.
is short for electronic mail!. What is ? An electronic message sent from one computer to another. saves money and time compared to regular.
Phishing on the Internet? Presented by Naveed Farooq Naveed Farooq Admin Nidokidos Network Make Money Online | Join Nidokidos Forum |
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
BTT12OI. Do you know someone who has been scammed online? What happened? Been tricked into sending someone else money (not who they thought they were)
EventsMastery – HOW TO MANAGE CORPORATE EVENTS SUCCESSFUL (HTMCES) eMentorship Portal (eMP) “HOW TO USE PORTAL GUIDE” Managed by.
Component D: Activity D.3: Surveys Department EU Twinning Project.
Professional Communications Mrs. Lopez-Wyatt. Why is etiquette important? We interact more with written word and the number of users and usage rates.
Commercial eSecurity Training and Awareness. Common Online Threats Most electronic fraud falls into one of three categories: PHISHING – Fraudulent s.
Information Technology Online Employee Calendars Archiving Spam and Phishing.
ACTIVITY NO. 10 USING INTERNET SERVICES FOR COMMUNICATION LIKE , CHAT ETC. BRIDGE COURSE of INFORMATION & COMMUNICATION TECHNOLOGY.
Page 1 of 14 To the Voltage Online Training Course Voltage encryption is used to protect sensitive and personal information sent via to external.
Steps for requesting a password, Logging In to DPS, and acknowledging Branch of Service Information.
Using LinkedIn. LinkedIn At A Glance LinkedIn is a social network aimed toward professionals More than 50 million users Usually seen as an online version.
Do Now: Describe the steps used to access the comments tool in MS Word. ( review your notes for the answer) Ex: Step 1. Select the text or item you want.
By: Star Duncan & Hannah Cole Computer Apps 4 th Period.
Instructional Services 8/091 Introduction to Your OUSD and OUSD Technology Applications Leah Jensen, Instructional Technologist (510)
PRESENTED BY: ASHLEY CLOUSER (CONNER) Identity Theft.
Managed IT Services in Charlotte NC. We are leading managed IT services providers in Charlotte NC. Call us now on (704) for managed IT services.
Objectives Explore ways to prevent identity theft. Determine the differences between identity theft and consumer fraud. Examine how media and technological.
Copyright © SkyeyTech, Inc. CRMdesk Power and elegance.
Quick Start Guide | Skill Assessments Using your Online Product Interfaces and Features Getting Started - My Account Creating/Logging into your Self Test.
© 2017 SlidePlayer.com Inc. All rights reserved.