cyber security and for business seminar enter your
play

Cyber Security And For Business Seminar Enter your business card for - PowerPoint PPT Presentation

Cyber Security And For Business Seminar Enter your business card for an opportunity to win the most productivity tool for your business worth over $200 Cyber Security And For Business Seminar How Cyber Criminals Are Targeting Small


  1. Cyber Security And For Business Seminar “Enter your business card for an opportunity to win the most productivity tool for your business worth over $200

  2. Cyber Security And For Business Seminar “How Cyber Criminals Are Targeting Small Businesses, What You Can Do Now To Avoid Costly Cyber Security Breaches, Data Loss, Theft And To Protect Your Business Online” Your Presenter : Femi Dada, A+, Security +, MCP , MCTS President, Smarthost Design Technologies, LLC

  3. Today We’re Going To Cover • What Cyber Security is in simple terms, and what methods hackers are using to steal money from businesses. • Critical policies, procedures and protections EVERY Business must have in place NOW before allowing employee to connect to the internet, use application, send and receive emails or work online. • BotNets, Trojans Malware, What are the best strategies you need to have in place. • New Legal issues introduced with disclosing confidential information, violating privacy laws and how to reduce or eliminate your risk • Answers to your questions .

  4. Who Is Femi Dada? Femi Dada, Founder & CEO of Smarthost Design Technologies, a an experienced IT consultant and strategist with specialty in integrating and designing highly effective, technology and network systems for businesses and professional services organizations. I founded Smarthost Design Technologies after migrating to the US while studding at UMUC. Graduated with a BSc. In Computer Science. Experienced in programing (C++, C#, Java) several financial web application back when I was a Web GURU, but more specifically I know how to create and implement technology plans and support solution that gives businesses the peace of mind, allowing them to add new clients, increase sales and make more money – as a result of implementing the right technology solution to support their core business objectives.

  5. Who Is Femi Dada? My experience includes enterprise level network infrastructure and services Desk support, Branch Banking support through SunTrust Bank, Industrial manufacturing system automation at CTI Group, Modis-IT and other firms. Femi was part of a team lead on successful Migration of HCPSC, DCPS, Constellation Energy (BGE) system infrastructure and enterprise email and website self services project among others. A graduate of the University of Maryland University College(UMUC) , Femi holds the multiple Microsoft Certified Technology Specialist (MCTS), MCDS, MCP credential. In early 2000’s, Femi was among the first Microsoft Small Business Specialist Engineers of which there are tens of thousands today.

  6. Who Is Femi Dada? • Spent over a decade researching , developing, testing and refining IT solution for small & mid-size businesses including government contractors, professional services companies. • We have served about 50 clients spanning the DC, MD, and VA area from a brand new startups to multi-million dollar IT firms including large health care provider. • I’ve spent well over 200 hours talking to Business Owners – Managers – researching and discovering what they look for when outsourcing their IT support or buying IT services. • I have also over 18 months attended industry trade show , verifying vendors solutions, test their solutions, and have spent real money to purchase their solution and put it to test. • Currently serve on the Board of Greater Beltsville Business Association (GBBA) helping local business and charities in the Beltsville area.

  7. The Evolution Of IT: A Brief History

  8. So What IS Cyber Security ? Cyber security , is the security of the internet, all electronic foot print inter connected to the data that are passing and stored through it. (computers, networks, programs and data from unintended or unauthorized access, change or destruction).

  9. Why Is Protecting you PC, Network important to your businesses Governments, military, corporations, financial institutions, hospitals and businesses collect, process and store a great deal of confidential information on computers and transmit that data across networks to other computers. With the growing volume and sophistication of cyber attacks, ongoing attention is required to protect sensitive business and personal information, as well as safeguard national security. During a Senate hearing in March 2013, the nation's top intelligence officials warned that cyber attacks and digital spying are the top threat to national security, eclipsing terrorism.

  10. So, Why us. I’m just a small businesses Virus attacks are no longer just viruses (they may • include payload) Wireless and wired network sniffers packet • Widespread denial-of-service attacks • Botnets and Zombies • Spoofing Hijacking sessions • Automated probes and scans • GUI intruder tools (fake speedup my computer tools) • Automated widespread attacks • .exe code attacks (against browsers) + Compress files • Techniques to analyze code to identify vulnerabilities • Internet social engineering attacks •

  11. Methods Hackers are using to Steal from businesses Ransom Ware • Fake Antivirus Programs • Stranded Abroad- Send me • western union money Email Spoofing • Bank account website redirect • Mobile Apps •

  12. Ransom ware, Fake Antivirus, poisonous search links Poisonous Links

  13. Ransom ware, Fake Antivirus, poisonous search links

  14. Ransom ware, Fake Antivirus, poisonous search links

  15. Malware: A Rapidly Growing Concern A recent report from McAfee shows an astonishing rise in malware designed to attack mobile devices, from 792 samples in 2011 to 36,699 in 2012, just one year later!

  16. Data Breaches Dangers On The Rise… A writer once asked a literary agent, “What kind of writing pays the most?” Her answer was simple: “Ransom notes.” That's sort of what's happening in the cybercrime world — sensitive data in the wrong hands is used to extort money.

  17. Bank Account Website Redirect

  18. Bank Account Website Redirect Robot forms

  19. Effects on Businesses • Employee loss of productivity time • Law suites against businesses for work place harassment • In appropriate images display on computer screen • Loss of customer data, critical company assets • Embarrassment • Loss of integrity with prime, vendors and partners • And more (just think about it)

  20. Internet of things- No guns.. No Blood.. , but USD 45 Millions robbed from banks This story is meant to give you an insight on 21st century cyber crime scenario and what the future holds. Apprehending the future of our connected life is one big step towards a secured online life. - See more at: http://www.cyberoam.com/blog/internet-of-things- no-guns-no-bloodshed-usd-45-million-robbed-from- banks-via-atms-within- hours/#sthash.qyHEHKiH.dpuf

  21. Modern Security tools, Use Policy and + Training Work Hand In Hand

  22. Critical Policies, Procedures and Protections Must be in Place • Employee Computer Use Policy – What is allowed and what is not? • Internet Use Policy – Allowable sites, use of internet (monster, LinkedIn Facebook, Instigram, Pondora, etc) • Mobile Devices Use Policy (BYOD) Policy – Do you provide your user with mobile devices/ user provide, if so; how does Remote wipe, employee checks email from home works?

  23. What and How Do I Protect my business Against Cyber Hackers

  24. 1 st Get a Business Policy in Place Built to Direct the use of Technology. • Employee Computer Use Policy – What is allowed and what is not? • Internet Use Policy – Allowable sites, use of internet (monster, LinkedIn Facebook, Instigram, Pondora, etc) • Mobile Devices Use Policy (BYOD) Policy – Do you provide your user with mobile device/ user provide, if so; how does Remote wipe, employee checks email from home works?

  25. 2 nd Implement Policies Built for Business. Engineered for Security. Ready for the Future. Implement the hardware, software tools • according to the Policies set Replace outdated security hardware in you • network (Firewall is not enough anymore) Train employee • Minimized use of Social Network (monster, • LinkedIn Facebook, Instigram, Pondora, etc) Mobile Devices Use Policy (BYOD) Policy • – Do you provide you user with mobile device/ user provide, if so; how does Remote wipe, employee checks email from home works?

  26. 3 rd Continuous Security Aware Training. • Training your staff on what is out there. • Password selection training (don’t put your password under your key board). • Website search engine usage(infected web links to virus). • Software installation (who has permission to install software). • User account Privilege on computers. • Windows XP is not secure anymore compared to the risk faced today.

  27. 4 th make sure that all you PC/Mobile Devices have Protection. • http://www.avg.com/ • http://www.sophos.com

  28. It’s Not All Sunshine And Roses… The Dangers from Cyber Attacks are Real

  29. Questions: 1. Is it true that Apple computers are safer than other computers? 2. Do I really need to worry about someone hacking into my PC? 3. What do think? Is iPhone 5c- Colorful/5s- forward thinking 4. ????

  30. The Winner is ……..?? Thanks to the wonderful picture I found on the internet

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend