· SoftScan Solna Strandväg 78 171 54 Solna Sweden The less you hear from us the better Shhh… The less.

Slides:



Advertisements
Similar presentations
Presented by Ben Serebin Tue, June 15, Every 2 nd Tuesday of the Month. Same Time and Place Visit for Presentation.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
TrustPort Net Gateway Web traffic protection. Keep It Secure Contents Latest security threats spam and malware Advantages of entry point.
10 Things You Can do to Secure Your PC Presented by Peter Nowak OIS Client Services Manager.
TrustPort Net Gateway traffic protection. Keep It Secure Entry point protection –Clear separation of the risky internet and secured.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Module 6 Implementing Messaging Security. Module Overview Deploying Edge Transport Servers Deploying an Antivirus Solution Configuring an Anti-Spam Solution.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
Web Servers Security: What You Should Know. The World Wide Web (WWW) is one of the best ways to develop an e-commerce business presence and interact with.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
S EC (4.5): S ECURITY 1. F ORMS OF ATTACK There are numerous way that a computer system and its contents can be attacked via network connections. Many.
What’s New in WatchGuard XCS 10.0 Update 3 WatchGuard Training.
Utility Programs and their Functions. Antivirus Software (Virus Checker) Keep the Computer software healthy and free of virus’ that can harm the function.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Norman SecureSurf Protect your users when surfing the Internet.
Securing Exchange Server Session Goals: Introduce you to the concepts and mechanisms for securing Exchange Examine the techniques and tools.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
CensorNet Ltd An introduction to CensorNet Mailsafe Presented by: XXXXXXXX Product Manager Tel: XXXXXXXXXXXXX.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
10 Tips for keeping MCL safe 1. Set up your defenses. Do you have adequate firewalls and antivirus software to protect you from hackers who could steal.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Staying Safe Online Keep your Information Secure.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Client X CronLab Spam Filter Technical Training Presentation 19/09/2015.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
Trend Micro Confidential 9/23/2015 Threat Rules Sharing Advanced Threats Research.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
Module 6 Planning and Deploying Messaging Security.
1 CHAPTER 2 LAWS OF SECURITY. 2 What Are the Laws of Security Client side security doesn’t work Client side security doesn’t work You can’t exchange encryption.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Module 6: Integrating ISA Server 2004 and Microsoft Exchange Server.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Internet Safety Internet Safety LPM
Copyright ©2015 WatchGuard Technologies, Inc. All Rights Reserved WatchGuard Training WatchGuard XCS What’s New in version 10.1.
What is Spam? d min.
Security fundamentals Topic 10 Securing the network perimeter.
Security fundamentals Topic 9 Securing internet messaging.
NetTech Solutions Protecting the Computer Lesson 10.
Internet safety By Suman Nazir
Computer Security By Duncan Hall.
Cybersecurity Test Review Introduction to Digital Technology.
E-Commerce & Bank Security By: Mark Reed COSC 480.
Information Systems Design and Development Security Precautions Computing Science.
FIND OUT WHY VIPRE IS STILL OUTPERFORMING ITS RIVALS! Distributed By: & Insert Your Logo Here.
Windows Vista Configuration MCTS : Productivity Applications.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
FIND OUT WHY VIPRE IS STILL OUTPERFORMING ITS RIVALS! Distributed By: & Insert Your Logo Here.
Network System Security - Task 2. Russell Johnston.
Understand Protection LESSON Security Fundamentals.
Hardware and software that can provide a good level of security In this presentation I am going to provide advices on hardware and software that needs.
Windows Tutorial 5 Protecting Your Computer
Security fundamentals
Protecting the Server and Client
What they are and how to protect against them
TMG Client Protection 6NPS – Session 7.
Training Objectives About D2F Download Installation Configuration
Unit 4 IT Security.
Lesson 3 Safe Computing.
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Protect Your Computer Against Harmful Attacks!
Information Security Session October 24, 2005
Real World Advanced Threat Protection
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
COMPLETE BUSINESS TEXTING SOLUTION
Using Software Restriction Policies
Presentation transcript:

· SoftScan Solna Strandväg Solna Sweden The less you hear from us the better Shhh… The less you hear from us the better Shhh…

· Spam & virus trends - is the problem getting bigger? Thursday, 1st of June 2006 Presented by: Diego d’Ambra, SoftScan

· Agenda Is malware/spam an increasing problem? - Some facts - New types of attack How can we stay safe? - 10 suggestions

· Is the problem increasing? Facts: - trends -Virus 0,5 ~ 10 % -Spam 80 ~ 90 % - Sweden is not behind… - Once you’re bitten… -Spyware -Adware -Backdoor proxies -Password stealers/crackers -Downloaders -Spam tools -Defense blockers

· Is the problem increasing? New types of attack -Instant messenger services (IM) -Compromised websites (recipient notified though IM, or poisoned DNS) -Client / Server networks (Faster and intelligent spread) -Phishing (E-bay, Paypal, credit card, online banking systems) -Mobile phones (PDA)

· How can we stay safe? 10 suggestions 1) Know your anti-virus product – Cleanup – ”Panic-button” – Beta signatures 2) Security-sites/services – AVIEN, Bugtrack, ISC, Secunia – Check/report suspicious files Virustotal ( Jotti (

· How can we stay safe? 10 suggestions 3) Software updates (and ensure they are implemented) – Microsoft® SUS/WUSP – Routers / Gate servers 4) IDS – Listen for suspicious traffic TCP port 25, , 445 IRC traffic P2P applications 5) Filter outgoing traffic – Proxy service – Block unneeded ports

· How can we stay safe? 10 suggestions 6) Install an anti-spam system – Probably best to detect Phishing s 7) Security policy (and implement it) – , IM, P2P etc. 8) Install an easy to understand scanning solution – Own signatures – Check MIME type 9) Train users – They are your last defense 10) Check your systems (again and again)

· BREAK…

· SoftScan Solna Strandväg Solna Sweden The less you hear from us the better Shhh… The less you hear from us the better Shhh…

· Newest development - how to stay safe? Thursday, 1st of June 2006 Presented by: Diego d’Ambra, SoftScan

· SoftScan suggestions 5 things you should/must do! 1)Deny s with executable attachments [exe] -Binary check -detects every executable binary 2)Enable [Virus Probability Analyze] (VPA) -Recommended setting: 90 % -Use Paranoid IQS to receive notification 3)Valid addresses -SPF record 4)TLS 5)Filter SMTP traffic -Delete A records such as mail, smtp etc.

· SoftScan suggestions 5 things you should not do! 1)Create MX records, not pointing at SoftScan 2)Allow MX record changes without your agreement/knowledge 3)Remove locally installed anti-virus -Clients / servers -(Except perimeter scanning services) 4)RBL lookup 5)Graylisting / tarpitting

· SoftScan suggestions 5 suggestions regarding the SoftScan system! 1)LDAP -MS AD / Lotus Domino integrated -SSL encrypted connection to SoftScan 2)TLS certificate check -Protects against man-in-the-middle-attacks 3)SMTP rules -Your s, your choice… 4)Report spam 5)Black’n’white -When SoftScan is wrong…

· New features… Archive your s - Optional service that allows you to save a copy of sent/received s POP3 proxy - Private accounts Per user quarantine zone - Less work for the administrator(s) Compliance - Rules and regulations requires companies to meet standards