Protecting Against Cyber Attacks PLEASE TAKE A MINUTE TO LOOK AT THIS IMPORTANT MESSAGE. THIS IS HAPPENING HERE AND NOW! LET US SAVE YOU AND YOUR INFORMATION.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Thank you to IT Training at Indiana University Computer Malware.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
SECURITY CHECK Protecting Your System and Yourself Source:
7 Effective Habits when using the Internet Philip O’Kane 1.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Computer Maintenance & Safety Spring Internet Safety Keeping your computer safe What is a computer virus? A computer program that can copy itself.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Computer Viruses.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Computer Hardware Software 1.Introduction 2.Internet research and security Basic online protection 3.Use PC safely and efficiently 4.Purchase decisions.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Internet safety By Lydia Snowden.
Elite Networking & Consulting Presents: Everything You Wanted To Know About Data Insurance* * But Were Afraid To Ask Elite Networking & Consulting, LLC,
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Your Trusted Partner In All Things IT. 20 Years of IT Experience University Automotive Food Service Banking Insurance Legal Medical Dental Software Development.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
PLUG IT IN 7 Protecting Your Information Assets. 1.How to Protect Your Assets: The Basics 2.Behavioral Actions to Protect Your Information Assets 3.Computer-Based.
1. Self Awareness You should only access your accounts and private informations from a safe location (only at home as necessary if at all possible) where.
The Strickland Group Founded in employees Information Technology consulting – Software Development – HelpDesk Support – Network Infrastructure.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
Computer Security! By Bailey Hoover. Opening: “Computer viruses are an urban legend.” -Peter Norton Actually: Virus: software reproduces itself; causes.
Types of Electronic Infection
A Growing Threat Debbie Russ 1/28/2015. What is Ransomware? A type of malware which restricts access to the computer system that it infects, and demands.
Viruses Hacking Backups Computer safety... Viruses A computer virus is a piece of program code that makes copies of itself by attaching itself to another.
 You always need to have the latest anti- virus software so that you can prevent picking up unwanted virus’.  To prevent receiving junk mail, being.
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
XP Practical PC, 3e Chapter 6 1 Protecting Your Files.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Computer Safety Sid Holder 8k Viruses Hacking Backing Up.
INTERNET SAFETY FOR KIDS
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
safety Bailey mullan. dangers ing has become on of the main sources for communicating. When using it is more likely for someone.
Safety and Security issues of using ICT Alys brooks.
What is Spam? d min.
By Liam Wright Manga comic group Japan SAFETY on your computer.
Internet safety By Suman Nazir
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
January 07 th 2016 Intelligence Briefing NOT PROTECTIVELY MARKED.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Personal Data Protection and Security Measures Kelvin Lai IT Services - Information Security Team 12 & 13 April 2016.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Computer Security Keeping you and your computer safe in the digital world.
R ANSOMWARE CAN ORIGINATE FROM A MALICIOUS WEBSITE THAT EXPLOITS A KNOWN VULNERABILITY, PHISHING CAMPAIGNS,
Ransomware BISD Technology Department. Ransomware Ransomware is a type of malicious software (malware) that infects a computer and/or mobile device and.
Presented by: SBS CyberSecurity © SBS CyberSecurity, LLC
Managing Windows Security
Unit 4 IT Security.
Home Computer Security
Cybersecurity Awareness
4 ways to stay safe online 1. Avoid viruses and phishing scams
Top Ten Cyber Security Hygiene Tips
Why Cyber Security is important to SME? Useful Tips on how you protect and secure your business. By Ronald Soh from Win-Pro Consultancy Pte Ltd
Cybersecurity Simplified: Ransomware
Presentation transcript:

Protecting Against Cyber Attacks PLEASE TAKE A MINUTE TO LOOK AT THIS IMPORTANT MESSAGE. THIS IS HAPPENING HERE AND NOW! LET US SAVE YOU AND YOUR INFORMATION.

What is it?  Ransomware is a type of malicious software designed to block access to a computer system until a sum of money is paid.  Ransomware may:  Prevent you from accessing Windows  Encrypt files so you cannot use them  Stop certain apps from running  Demand you pay money  Make you complete surveys

How do you get it? 1. You receive spam with malware. 2. The malware downloads CTB Locker. 3. CTB Locker encrypts your files. 4. You are given a ransom notice with a deadline. 5. You are requested to pay Bitcoins.

Can I get it at home?  As people continue to live an evolving digital lifestyle more and more important data is being stored on computers and devices.  Passwords  Credit Cards  Bank Account Information  Birth Certificates  Recent Visited Places  Private Conversations

Work?  Ransomware does not just impact home computers.  Businesses, financial institutions, government agencies, academic institutions, and other organizations can and have become infected with it as well.  Potential Issues:  Loss of sensitive or proprietary information.  Disruption to regular operations  Financial losses incurred to restore systems and files  Potential harm to an organizations reputation

Ransomware on the rise?  As reported by PC World, “Cryptolocker, a popular variant of the ransomware likely made its operators tens of millions of dollars until authorities disrupted the network in May 2014, shutting down Cryptolocker command-and-control servers and the GameOver Zeus botnet infrastructure that spread the malware.”

How much is my data worth?  “Ransomware perpetrators generally demand a nuisance fee for restoration of encrypted files, often $200 - $2,000.”  “Between mid-March and August 24, 2014, more than 600,000 systems were infected with the CrypoWall variant of ransomware.”  600,000 x $200 = $120,000,000  600,000 x $2000 = $1,200,000,000

How do I protect myself?  Keep your firewall on.  Don’t open spam messages or click links on suspicious websites. (Cryptolocker spreads via.Zip files sent as attachments, for example.)  Keep all of the software on your computer up to date  Make sure automatic updating is turned on to get all the latest Microsoft security updates and browser-related components (Java, Adobe, etc.)

How do I protect myself?  Experts advise taking these steps to avoid attacks or protect yourself after an attack:  Use reputable antivirus software and a firewall  Backup often  Exercise caution  Disconnect from the network and internet  Alert authorities  Update your security software

Questions? CALL US AT WE CAN HELP KEEP YOUR INFORMATION SAFE.

CALL FOR YOUR FREE SECURITY ASSESMENT or  The single Biggest thing that will defeat ransomware is having a regularly updated backup.  All your data is backed up CONTINUOUSLY throughout the day in 15 minute increments—even open documents. That means if your server is encrypted, we can recover your work up to 15 minutes prior to the event.  We AUTOMATICALLY back up all of your data to a highly-secure, off-site location. This eliminates the unreliability of tapes and external hard drives, and protects you if your office is destroyed by an earthquake, flood, fire, and even theft and human error.  We can monitor this system 24-7 to make sure it’s working. No ‘unpleasant surprises’ that your backups weren’t working.  Should your server crash-or even get destroyed- we’ll have a mirror copy of your server, with all the software and settings EXACTLY as you had them, that can INSTANTLY take over.