ted - cybersecurity for your business
TRANSCRIPT
Ted SandersCyber Security for Your Business
Digital Marketing Manager
Social Marketing | Paid Search | Revenue per Unit, Business Evaluation | Maintenance | Task Management,
Data Standardization | Customer Service, Sound Accounting | Website Management
CYBER SECURITY
Internet Security Threats to Property Management
5 Ways to Defend Your Business From Hackers
• It’s a top-down commitment
• This is not an IT problem – it’s a business issue
• It’s not a matter of “if” it’s a matter of “when”
• The only thing harder and more expensive than
preparing for a threat now is waiting until you’ve been
hacked
• Any effort is better than no effort
Security vs. Access • More security means less access• More access means less security
Types of Hacks and Prevention• Network and System Attacks • Email Hacking- Spam, Virus, and “Phishing”• Password strength and strategies• Encrypted Password Tools for everyone
#1 Security Vulnerability Social Hackers – people who attempt to gain access to restricted information by using seemingly legitimate techniques.
Types of Social Hacks - Dumpster diving - Roleplaying - Tailgating - Spearphishing
Network HackingNetwork Attacks • Packet Sniffing
(Eavesdropping) • IP Address Spoofing • Session Hijacking • Man in the Middle (MITM)
System Attacks • Password Cracking • SQL Injection • Web Protocol Abuse • Denial of Service (DOS) • Distributed Denial of Service
(DDOS) • Trap Door • Virus, Worm, Trojan horse
Hacking Prevention • Change Passwords Regularly (Monthly, Quarterly, etc.)• Manage who has access to what • Terminate access for old vendors and employees• Utilize anti-virus software• Lock – doors, computers, etc.• Use shredding service for confidential documents
Email Hacking • Spam • Virus • Phishing
spamphishing
virus
Virus ExamplesYou didn't ask for this file, but perhaps think you did or you are curious as to whether it's an honest mistake. It's not. Also, never open a file of type ".pif".
Subject: Re: Your product From: [email protected] Here is the file.Attachments: your_product.pif 23k
The W32.Sober.K@mm virus. Some viruses are hidden inside ZIP files. As usual, the FROM address is forged.
Subject: You visit illegal websites From: [email protected] Sir/Madam,we have logged your IP-address on more than 40 illegal Websites. Important: Please answer our questions!The list of questions are attached.Attachments: indictment_cit2987.zip
SPAM!!! (90% of all international email traffic)
Use Antivirus/Antispam Software
Phish (Not that Phish!)
Phishing on a Web Page
SpearPhishing – Don’t Open the Link!
SIMPLIFY YOUR LIFE.LastPass remembers your passwords so that you can focus on the more important things in life. Cost is **FREE**
www.lastpass.com
Top Takeaways Your accountable for your data Never send personal information by email Consider using password and security products like Lastpass and
AppRiver Most security breaches originate within an organization’s sphere of
influence
THANK YOUFor additional information email: [email protected]