Cyber Security And For Business Seminar Enter your business card for - - PowerPoint PPT Presentation

cyber security and for business seminar enter your
SMART_READER_LITE
LIVE PREVIEW

Cyber Security And For Business Seminar Enter your business card for - - PowerPoint PPT Presentation

Cyber Security And For Business Seminar Enter your business card for an opportunity to win the most productivity tool for your business worth over $200 Cyber Security And For Business Seminar How Cyber Criminals Are Targeting Small


slide-1
SLIDE 1

“Enter your business card for an opportunity to win the most productivity tool for your business worth over $200 Cyber Security And For Business Seminar

slide-2
SLIDE 2

“How Cyber Criminals Are Targeting Small Businesses, What You Can Do Now To Avoid Costly Cyber Security Breaches, Data Loss, Theft And To Protect Your Business Online” Cyber Security And For Business Seminar

Your Presenter:

Femi Dada, A+, Security +, MCP , MCTS President, Smarthost Design Technologies, LLC

slide-3
SLIDE 3
  • What Cyber Security is in simple terms, and what

methods hackers are using to steal money from businesses.

  • Critical policies, procedures and protections EVERY

Business must have in place NOW before allowing employee to connect to the internet, use application, send and receive emails or work online.

  • BotNets, Trojans Malware, What are the best

strategies you need to have in place.

  • New Legal issues introduced with disclosing

confidential information, violating privacy laws and how to reduce or eliminate your risk

  • Answers to your questions.

Today We’re Going To Cover

slide-4
SLIDE 4

Who Is Femi Dada?

Femi Dada, Founder & CEO of Smarthost Design Technologies, a an experienced IT consultant and strategist with specialty in integrating and designing highly effective, technology and network systems for businesses and professional services organizations. I founded Smarthost Design Technologies after migrating to the US while studding at UMUC. Graduated with a BSc. In Computer Science. Experienced in programing (C++, C#, Java) several financial web application back when I was a Web GURU, but more specifically I know how to create and implement technology plans and support solution that gives businesses the peace of mind, allowing them to add new clients, increase sales and make more money – as a result of implementing the right technology solution to support their core business objectives.

slide-5
SLIDE 5

Who Is Femi Dada?

My experience includes enterprise level network infrastructure and services Desk support, Branch Banking support through SunTrust Bank, Industrial manufacturing system automation at CTI Group, Modis-IT and other firms. Femi was part of a team lead on successful Migration of HCPSC, DCPS, Constellation Energy (BGE) system infrastructure and enterprise email and website self services project among others. A graduate of the University of Maryland University College(UMUC), Femi holds the multiple Microsoft Certified Technology Specialist (MCTS), MCDS, MCP

  • credential. In early 2000’s, Femi was among the first

Microsoft Small Business Specialist Engineers of which there are tens of thousands today.

slide-6
SLIDE 6
  • Spent over a decade researching, developing, testing and

refining IT solution for small & mid-size businesses including government contractors, professional services companies.

  • We have served about 50 clients spanning the DC, MD, and VA

area from a brand new startups to multi-million dollar IT firms including large health care provider.

  • I’ve spent well over 200 hours talking to Business Owners –

Managers – researching and discovering what they look for when outsourcing their IT support or buying IT services.

  • I have also over 18 months attended industry trade show

, verifying vendors solutions, test their solutions, and have spent real money to purchase their solution and put it to test.

  • Currently serve on the Board of Greater Beltsville Business

Association (GBBA) helping local business and charities in the Beltsville area.

Who Is Femi Dada?

slide-7
SLIDE 7

The Evolution Of IT: A Brief History

slide-8
SLIDE 8

So What IS Cyber Security ?

Cyber security, is the security of the internet, all electronic foot print inter connected to the data that are passing and stored through it. (computers, networks, programs and data from unintended or unauthorized access, change or destruction).

slide-9
SLIDE 9

Why Is Protecting you PC, Network important to your businesses

Governments, military, corporations, financial institutions, hospitals and businesses collect, process and store a great deal of confidential information on computers and transmit that data across networks to other computers. With the growing volume and sophistication of cyber attacks, ongoing attention is required to protect sensitive business and personal information, as well as safeguard national security. During a Senate hearing in March 2013, the nation's top intelligence officials warned that cyber attacks and digital spying are the top threat to national security, eclipsing terrorism.

slide-10
SLIDE 10
  • Virus attacks are no longer just viruses (they may

include payload)

  • Wireless and wired network sniffers packet
  • Widespread denial-of-service attacks
  • Botnets and Zombies
  • Spoofing Hijacking sessions
  • Automated probes and scans
  • GUI intruder tools (fake speedup my computer tools)
  • Automated widespread attacks
  • .exe code attacks (against browsers) + Compress files
  • Techniques to analyze code to identify vulnerabilities
  • Internet social engineering attacks

So, Why us. I’m just a small businesses

slide-11
SLIDE 11
  • Ransom Ware
  • Fake Antivirus Programs
  • Stranded Abroad- Send me

western union money

  • Email Spoofing
  • Bank account website redirect
  • Mobile Apps

Methods Hackers are using to Steal from businesses

slide-12
SLIDE 12

Poisonous Links

Ransom ware, Fake Antivirus, poisonous search links

slide-13
SLIDE 13

Ransom ware, Fake Antivirus, poisonous search links

slide-14
SLIDE 14

Ransom ware, Fake Antivirus, poisonous search links

slide-15
SLIDE 15

A recent report from McAfee shows an astonishing rise in malware designed to attack mobile devices, from 792 samples in 2011 to 36,699 in 2012, just

  • ne year later!

Malware: A Rapidly Growing Concern

slide-16
SLIDE 16

A writer once asked a literary agent, “What kind of writing pays the most?” Her answer was simple: “Ransom notes.” That's sort of what's happening in the cybercrime world — sensitive data in the wrong hands is used to extort money.

Data Breaches Dangers On The Rise…

slide-17
SLIDE 17

Bank Account Website Redirect

slide-18
SLIDE 18

Bank Account Website Redirect

Robot forms

slide-19
SLIDE 19
  • Employee loss of productivity time
  • Law suites against businesses for

work place harassment

  • In appropriate images display on

computer screen

  • Loss of customer data, critical

company assets

  • Embarrassment
  • Loss of integrity with prime, vendors

and partners

  • And more (just think about it)

Effects on Businesses

slide-20
SLIDE 20

Internet of things- No guns.. No Blood.. , but USD 45 Millions robbed from banks

This story is meant to give you an insight on 21st century cyber crime scenario and what the future holds. Apprehending the future of our connected life is

  • ne big step towards a secured
  • nline life. - See more at:

http://www.cyberoam.com/blog/internet-of-things- no-guns-no-bloodshed-usd-45-million-robbed-from- banks-via-atms-within- hours/#sthash.qyHEHKiH.dpuf

slide-21
SLIDE 21

Modern Security tools, Use Policy and + Training Work Hand In Hand

slide-22
SLIDE 22
  • Employee Computer Use Policy

– What is allowed and what is not?

  • Internet Use Policy

– Allowable sites, use of internet (monster, LinkedIn Facebook, Instigram, Pondora, etc)

  • Mobile Devices Use Policy (BYOD) Policy

– Do you provide your user with mobile devices/ user provide, if so; how does Remote wipe, employee checks email from home works?

Critical Policies, Procedures and Protections Must be in Place

slide-23
SLIDE 23

What and How Do I Protect my business Against Cyber Hackers

slide-24
SLIDE 24

1st Get a Business Policy in Place Built to Direct the use of Technology.

  • Employee Computer Use Policy

– What is allowed and what is not?

  • Internet Use Policy

– Allowable sites, use of internet (monster, LinkedIn Facebook, Instigram, Pondora, etc)

  • Mobile Devices Use Policy

(BYOD) Policy

– Do you provide your user with mobile device/ user provide, if so; how does Remote wipe, employee checks email from home works?

slide-25
SLIDE 25

2nd Implement Policies Built for Business. Engineered for Security. Ready for the Future.

  • Implement the hardware, software tools

according to the Policies set

  • Replace outdated security hardware in you

network (Firewall is not enough anymore)

  • Train employee
  • Minimized use of Social Network (monster,

LinkedIn Facebook, Instigram, Pondora, etc)

  • Mobile Devices Use Policy (BYOD) Policy

– Do you provide you user with mobile device/ user provide, if so; how does Remote wipe, employee checks email from home works?

slide-26
SLIDE 26

3rd Continuous Security Aware Training.

  • Training your staff on what is out

there.

  • Password selection training (don’t put

your password under your key board).

  • Website search engine usage(infected

web links to virus).

  • Software installation (who has

permission to install software).

  • User account Privilege on computers.
  • Windows XP is not secure anymore

compared to the risk faced today.

slide-27
SLIDE 27

4th make sure that all you PC/Mobile Devices have Protection.

  • http://www.avg.com/
  • http://www.sophos.com
slide-28
SLIDE 28

It’s Not All Sunshine And Roses…

The Dangers from Cyber Attacks are Real

slide-29
SLIDE 29

Questions:

1. Is it true that Apple computers are safer than other computers? 2. Do I really need to worry about someone hacking into my PC? 3. What do think? Is iPhone 5c- Colorful/5s- forward thinking 4. ????

slide-30
SLIDE 30

The Winner is ……..?? Thanks to the wonderful picture I found on the internet