Information Security – Sep 18

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
English Arabic Cyber Security: Implications of recent breaches MENOG April 2015.
Security for Today’s Threat Landscape Kat Pelak 1.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Cyber Security—What you should know before it’s too late! T Jay Humphries and Trevor O’Donnal.
By Ashlee Parton, Kimmy McCoy, & Labdhi Shah
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
How It Applies In A Virtual World
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
A Growing Threat Debbie Russ 1/28/2015. What is Ransomware? A type of malware which restricts access to the computer system that it infects, and demands.
Financial Sector Cyber Attacks Malware Types & Remediation Best Practices
Social Engineering © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point.
Computer crimes.
INTRODUCTION & QUESTIONS.
Malicious Attacks By: Jamie Woznicki Rahul-Anaadi Kurl Alexander Kaufmann Curtis Songer Daniel Cardenas Rivero.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Safe Computing Practices. What is behind a cyber attack? 1.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
CURRENT STATUS OF CYBERCRIME  Security is the fastest growing service in IT  Cyber Crime Costs $750 Billion annually  70% of threats arrive via .
Protecting Against Cyber Attacks PLEASE TAKE A MINUTE TO LOOK AT THIS IMPORTANT MESSAGE. THIS IS HAPPENING HERE AND NOW! LET US SAVE YOU AND YOUR INFORMATION.
PHISHING Hi, The comms team asked if I could refresh everyone about Phishing after a fairly successful phishing circulated last week that led to.
how to prevent them from being successful
CYBER SECURITY...
Cyber Crime What’s all the fuss about?
National Cyber Security Month
Network security threats
Cyber Security Awareness Workshop
Data Compromises: A Tax Practitioners “Nightmare”
Report Phishing Forward phishing s to
Cyber Security Awareness Workshop
Equipo 1 Tema: Crímenes cibernéticos en 2016 Ana Yansi Mejía Mendoza (Informática) Lucia Arellano García (Derecho) Margarita Núñez Rosales (Lengua extranjera)
How to Protect Yourself from ID Theft and Social Engineering
Information Security 101 Richard Davis, Rob Laltrello.
Jon Peppler, Menlo Security Channels
Cybersecurity Awareness
Robert Leonard Information Security Manager Hamilton
“CYBER SPACE” - THE UNDERGROUND ECONOMY
Mary Kummer Jim McNall PRIMA Spring Training 2018
4 ways to stay safe online 1. Avoid viruses and phishing scams
Internet Security Threat Status
European Championships 2017
Prepared By : Binay Tiwari
DON’T GET HOOKED! YOU MAY BE UNAWARE BUT YOU ARE A PHISHING TARGET FOR CYBER CRIMINALS. A. Unknown sender address B. Offer too good to be true &
David J. Carter, CISO Commonwealth Office of Technology
Report Phishing Forward phishing s to
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Anatomy of a Large Scale Attack
Security Hardening through Awareness August 2018
Business Compromise and Cyber Threat
Information Protection
Internet Safety By: Ayana Shiggs.
Privacy, Security, and Ethics
Cybersecurity: Don’t Be Scared; Be Prepared Dean Choudhri, CISSP, CISM, CRISC Assistant Vice President, Cybersecurity and Information Assurance Alloya.
Internet Safety By: Ayana Shiggs.
Types of Cybercrime Cyber crime is any kind of unlawful behaviour that involves the use of computers, either as a tool for committing a crime (such as.
Information Protection
Presentation transcript:

Information Security – Sep 18 Current Threats & Landscape Superdrug Ransom demand - believed to be from cyber criminals, claiming they had obtained customer information. Superdrug stated that they could not find any evidence of a data breach but now believe that the cyber criminals accessed their customer accounts using credentials from other websites. Marap - a new piece of malware using phishing emails to infect users have featured malicious attachments like Word documents or PDF files. To date, Marap has mostly targeted financial institutions. Hermes 2.1 ransomware - , an evolution of ransomware used during the 2017 attempted theft of $60 million from a Taiwan-based bank. The victim receives an “Invoice Due” email – an invoice is attached as a Word document, urges the victim to complete the transaction quickly. The document is protected by a password, contained within the email, giving the campaign added credibility.