IT Security Training
Presented by Benjamin Ellis
IT Security Training April 21, 2016 Presented by Benjamin Ellis - - PowerPoint PPT Presentation
IT Security Training April 21, 2016 Presented by Benjamin Ellis Topics to be Covered What has changed to make IT security harder? What are the common areas your business is being attacked? What can you do about those areas? What
Presented by Benjamin Ellis
family safe?
2
3
4
the workplace
available
5
transfer from bank accounts (Zeus).
6
engaging with unknown individuals who claim to have mutual
friend's network doesn't mean the person is trusted. Verify
information.
7
8
attackers attempt to fool you into taking an action.
email pretending to be from someone or something you know
store.
clicking on a link, opening an attachment or responding to a message.
9
cards, SSNs, etc.
will install Key loggers, redirectors, malware, etc.
PDFs, Excel, QuickBooks.
10
creates a sense of urgency.
some other generic salutation. If it is your bank they will know your name.
11
were expecting.
they sent it.
12
information.
to if the link is clicked.
browser. 13
in appearance or by the domain name.
14
15
16
and downloads
17
system until users pay the ransom.
18
19
appropriate anti‐virus protection.
up.
20
21
22
23
24
compromise your computer and create unwanted problems without your knowledge.
probably is.
25
company information including employee information, financial results, or company secrets.
be an employee or one of our business partners.
26
“asdfg” and “12345.”
numbers, and even punctuation.
compromised.
27
minimum password length everyone agrees on, but you should generally go for passwords that are a minimum of 8 characters in
Letters
harder to crack.
28
29
UTM Firewalls:
AntiVirus Products:
dictionary words. Any word on its own is bad. Any combination
For example, “house” is a terrible password. “Red house” is also very bad.
isn’t strong just because you’ve replaced an o with a 0. That’s just
31
requirements here. It’s 12 characters and includes upper‐case letters, lower‐case letters, a symbol, and some numbers. But it’s fairly obvious — it’s a dictionary phrase where each word is capitalized properly. There’s only a single symbol, all the numbers are at the end, and they’re in an easy order to guess.
32
(especially public)
phones, etc)
devices
33
Update Management
and offsite Backups
(especially on security)
‐linkedin‐profiles‐lure‐unsuspecting‐users.html
34
35
Call us! 304.346.0441