Presentation is loading. Please wait.

Presentation is loading. Please wait.

Your Trusted Partner In All Things IT. 20 Years of IT Experience University Automotive Food Service Banking Insurance Legal Medical Dental Software Development.

Similar presentations


Presentation on theme: "Your Trusted Partner In All Things IT. 20 Years of IT Experience University Automotive Food Service Banking Insurance Legal Medical Dental Software Development."— Presentation transcript:

1 Your Trusted Partner In All Things IT

2 20 Years of IT Experience University Automotive Food Service Banking Insurance Legal Medical Dental Software Development “David is someone that can take any piece of electronic equipment, its manual, and 10 minutes, and tell you what you need to know to use it.” – David Steele, former instructor DAVID WILSON

3 The attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication. PHISHING

4

5 PHISHING PREVENTION Look at the Email Header Does the sender’s domain match the company Do I have an account with this company? Have I given my email address to this organization before? Is the email addressed to only me, or to an “undisclosed list” Look at the Content Do the links in the email match with the sender’s email? Are there a lot of typos in the message? Are you being asked for account information or a password? Are you being promised a large sum of money after paying at “processing fee”?

6 PHISHING PREVENTION

7 CRYPTOLOCKER Ransomware trojan which targeted computers running Microsoft Windows Believed to have first been posted to the Internet on 5 September 2013 CryptoLocker propagated via infected email attachments, and via an existing botnet; when activated, the malware encrypts certain types of files stored on local and mounted network drives using RSA public-key cryptography, with the private key stored only on the malware's control servers The malware then displays a message which offers to decrypt the data if a payment (through either Bitcoin or a pre-paid cash voucher) is made by a stated deadline, and threatened to delete the private key if the deadline passes. If the deadline is not met, the malware offered to decrypt data via an online service provided by the malware's operators, for a significantly higher price in Bitcoin.

8 CRYPTOLOCKER

9

10

11

12

13

14

15

16

17

18 PROTECT YOURSELF Think twice, click once. Is the URL going to where I am expecting it to go? Use Antivirus / Malware Protection Free is better than nothing, but you get what you pay for. Keep and maintain a backup of your files A weekly backup of your files is essential for anyone running a business

19 PROTECT YOURSELF Separate Business and Personal E-mail Utilizing you@yourdomain.com adds a layer of professionalism for your business, as well as helps eliminate some of the spam and phishing mail you will receiveyou@yourdomain.com Keep your computers and other devices up to date! Adobe and Microsoft releases new system patches on the 2 nd Tuesday of EVERY month Use complex passwords Adding numbers and CAPITALIZED letters to your passwords will go a long way in keeping people from guessing your passwords

20 QUESTIONS

21 ONLINE @itSynergi @itSynergiHelp

22 ONLINE facebook.com/itsynergi

23 ONLINE google.com/+itsynergi linkedin.com/company/itsynergi

24 THANK YOU WWW.ITSYNERGI.COM | 678.250.9995 | INFO@ITSYNERGI.COM YOUR TRUSTED PARTNER IN ALL THINGS IT


Download ppt "Your Trusted Partner In All Things IT. 20 Years of IT Experience University Automotive Food Service Banking Insurance Legal Medical Dental Software Development."

Similar presentations


Ads by Google