Download presentation
Presentation is loading. Please wait.
Published byMalcolm Fields Modified over 9 years ago
1
Your Trusted Partner In All Things IT
2
20 Years of IT Experience University Automotive Food Service Banking Insurance Legal Medical Dental Software Development “David is someone that can take any piece of electronic equipment, its manual, and 10 minutes, and tell you what you need to know to use it.” – David Steele, former instructor DAVID WILSON
3
The attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication. PHISHING
5
PHISHING PREVENTION Look at the Email Header Does the sender’s domain match the company Do I have an account with this company? Have I given my email address to this organization before? Is the email addressed to only me, or to an “undisclosed list” Look at the Content Do the links in the email match with the sender’s email? Are there a lot of typos in the message? Are you being asked for account information or a password? Are you being promised a large sum of money after paying at “processing fee”?
6
PHISHING PREVENTION
7
CRYPTOLOCKER Ransomware trojan which targeted computers running Microsoft Windows Believed to have first been posted to the Internet on 5 September 2013 CryptoLocker propagated via infected email attachments, and via an existing botnet; when activated, the malware encrypts certain types of files stored on local and mounted network drives using RSA public-key cryptography, with the private key stored only on the malware's control servers The malware then displays a message which offers to decrypt the data if a payment (through either Bitcoin or a pre-paid cash voucher) is made by a stated deadline, and threatened to delete the private key if the deadline passes. If the deadline is not met, the malware offered to decrypt data via an online service provided by the malware's operators, for a significantly higher price in Bitcoin.
8
CRYPTOLOCKER
18
PROTECT YOURSELF Think twice, click once. Is the URL going to where I am expecting it to go? Use Antivirus / Malware Protection Free is better than nothing, but you get what you pay for. Keep and maintain a backup of your files A weekly backup of your files is essential for anyone running a business
19
PROTECT YOURSELF Separate Business and Personal E-mail Utilizing you@yourdomain.com adds a layer of professionalism for your business, as well as helps eliminate some of the spam and phishing mail you will receiveyou@yourdomain.com Keep your computers and other devices up to date! Adobe and Microsoft releases new system patches on the 2 nd Tuesday of EVERY month Use complex passwords Adding numbers and CAPITALIZED letters to your passwords will go a long way in keeping people from guessing your passwords
20
QUESTIONS
21
ONLINE @itSynergi @itSynergiHelp
22
ONLINE facebook.com/itsynergi
23
ONLINE google.com/+itsynergi linkedin.com/company/itsynergi
24
THANK YOU WWW.ITSYNERGI.COM | 678.250.9995 | INFO@ITSYNERGI.COM YOUR TRUSTED PARTNER IN ALL THINGS IT
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.