01110000011100100110100101101111011100100110100101110100011110010010000001100 10001100001011101000110000101110000011100100110100101101111011100100110100101.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
7 Effective Habits when using the Internet Philip O’Kane 1.
Protect Yourself Against Phishing. The good news: The number of US adult victims of identity fraud decreased from 9.3 million in 2005, to 8.4 million.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Network Security aka CyberSecurity Monitor and manage security risks at the network level for the entire Johns Hopkins Network.
Phishing and Pharming New Identity Theft Threats Presentation by Jason Guthrie.
8 Mistakes That Expose You to Online Fraud to Online Fraud.
Security for Internet Every Day Use Standard Security Practices and New Threats.
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Internet Phishing Not the kind of Fishing you are used to.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
1 The Information School of the University of Washington Nov 17fit spyware © 2006 University of Washington The Dark Side of the Internet INFO/CSE.
Quiz Review.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
How It Applies In A Virtual World
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Protecting Information. Who We Are We are working on our Information Assurance MBA This is part of our curriculum; to present on information security.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Your Trusted Partner In All Things IT. 20 Years of IT Experience University Automotive Food Service Banking Insurance Legal Medical Dental Software Development.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Safe Internet Use Mark Wheatley CSI Onsite
IT Security for Users By Matthew Moody.
Staying Safe Online Keep your Information Secure.
You, Me & Technology. Overview Technology –Our relationship with technology Threats –What, Who, When, Where, Why & How Protection –What we can do to protect.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Instructional Technology & Design Office or Digital Security Basics Presented by Mark Baldwin &
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
IT Banking Advantages and Disadvantages. Advantages IT banking is faster and more convenient for the user as they no longer are required to be at the.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
INTERNET: The Good, The Bad and The Ugly
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
A Matter of Your Personal Security Phishing. Beware of Phishing s Several employees received an that looked legitimate, as if it was being.
What is Spam? d min.
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
A Matter of Your Personal Security Phishing Revised 11/30/15.
What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point.
October is National CyberSecurity Awareness Month OIT and IT providers across campus are launching an awareness campaign to provide tips and resources.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Internet safety. Dangers of a poor password How people guess your password Your partner, child, or pet's name, possibly followed by a 0 or 1 The last.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
The internet is a place of both useful and bad information. It has both good and bad side- and it’s all too easy for kids to stray into it. And no parents/guardian.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Protecting Against Cyber Attacks PLEASE TAKE A MINUTE TO LOOK AT THIS IMPORTANT MESSAGE. THIS IS HAPPENING HERE AND NOW! LET US SAVE YOU AND YOUR INFORMATION.
Cyber security. Malicious Code Social Engineering Detect and prevent.
Learn how to protect yourself against common attacks
Lesson 3 Safe Computing.
National Cyber Security Month
Information Security 101 Richard Davis, Rob Laltrello.
Phishing is a form of social engineering that attempts to steal sensitive information.
Protect Your Computer Against Harmful Attacks!
Cybersecurity Awareness
Robert Leonard Information Security Manager Hamilton
Risk of the Internet At Home
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Presentation transcript:

Top Threats and What You Can Do About Them By Top Threats and What You Can Do About Them By Cyber Security

Hackers

Cyber Warfare

Dictators

Your Employees

The Bad News For Cyber Criminals size doesn’t matter – Successful attacks on small-midsize businesses grew by 64% in 2014 – Smaller companies are low hanging fruit

More Bad News – Automated attacks mean criminals can hit thousands of businesses

The Really Bad News 60 % of small businesses that suffer an attack shut down after 6 months

Small Business Security Threats Social Engineering – Phishing Malware – Viruses – Worms – Trojan horses – Ransomware

Social Engineering Psychological manipulation of people into performing actions or divulging confidential information.

Phishing The attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication.

Phishing Example A (Hello Dearest) Hello Dearest, Compliments of the day. I came across your contact address while searching for someone to help me, I lost my parents and want you to stand as my foreign trustee to retrive and invest USD$6.5 Million which I inherited from my late parent. I tried to get this money out from the bank, but the management refused because of my age. I am ready to give you 25% of the whole money at the completion of the transaction, write me back for more details. Regards, Miss.Mary Anderson

Phishing Example B (Mr. Leon) 1,500,000 USD A Personal Donation to you from Mr.Leon hirtle, Contact Mr. Leon hirtle On: for more Greetings!!! I'm Mr Juan Colombás from Lloyds banking Group United Kingdom. I saw your profile and I want to have a Joint Venture with you. You can view my website and contact me for more details directors/board_directors.asp Mr. Juan Colombás Mobile: www.lloydsbankinggroup.comhttp:// directors/board_directors.asp

Phishing Example C (The Official Message) ******* THIS IS AN AUTOMATED-NOTIFICATION *********. 08 / 06 / ********************************************. Public-Records Access-Correspondence. ********************************************. MESSAGE ID NO ********************************************. 82U-jW8 BACKGROUND NOTICE. ********************************************. It has just been-brought to our attention that one new-negative item was recently-added to your public-records on This new-negative line-item that was recently-posted, as well as all of your public record-file(s) are currently- accessible online & can be viewed anyone who is searching your name or any other information related to you. Go here today and review this negative-item and formally-dispute:

Phishing Example D (The Official )

Malware Malware= short for malicious software, is any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems.

Ransomware A type of malware that restricts access to a computer system that it infects in some way, and demands that the user pay a ransom to the operators of the malware to remove the restriction.

Ransomware Example A

Things To Consider Fake Wireless Access Points Browser cookies that save passwords Malicious Apps

The Good News! You don’t need to be an expert to protect yourself like an expert

More Good News Cyber Security experts What are the 3 most important things you do to protect your security online?

The Top 5 Responses Installing software updates Using unique passwords Using strong passwords Using two factor authentication Using a password manager

Anti-Phishing Tips Beware of s that try to get you to click a link in order to change your account information. Do not follow any links via to change your sensitive information. Only visit sites from known sources and always confirm suspicious information via telephone.

Anti-Phishing Tips Always use updated anti-virus software with a special anti- phishing filter. Always be very skeptical about sending any of your personal or sensitive information over the Internet. Keep informed about Phishing techniques (phishme.com) Keep link clicking to a minimum Keep your browser up to date

Anti-Phishing Tips Everyone has their own passwords! Change passwords every 3 months Backup your data

The Good News Employee Education Have a Cyber Security office policy

The Future No more passwords

Moving to the Cloud

The Future Moving to the Cloud – A worldwide growth rate of 36% – Market size = $19.6 billion by 2016

Security in the Cloud Transfer the worry to your vendor Technicians whose only job is data security Multiple technicians employing the latest technology watching your data Your data is backed up for you Built in Disaster Recovery

“Security is actually increased when using cloud solutions due to strict ISO security standards that cloud providers must adhere to, in addition to the regular security audits.”

Thank You