the new data security risk
TRANSCRIPT
![Page 1: The New Data Security Risk](https://reader035.vdocument.in/reader035/viewer/2022062708/558b27abd8b42a2b268b45b5/html5/thumbnails/1.jpg)
![Page 2: The New Data Security Risk](https://reader035.vdocument.in/reader035/viewer/2022062708/558b27abd8b42a2b268b45b5/html5/thumbnails/2.jpg)
The NewSecurity Threat
![Page 3: The New Data Security Risk](https://reader035.vdocument.in/reader035/viewer/2022062708/558b27abd8b42a2b268b45b5/html5/thumbnails/3.jpg)
Your Computers at Risk
Presented by Placer Computers
How cyber-criminals are winning the Malware wars
![Page 4: The New Data Security Risk](https://reader035.vdocument.in/reader035/viewer/2022062708/558b27abd8b42a2b268b45b5/html5/thumbnails/4.jpg)
PC Magazine:
A Zero-Day Attack is a virus or other malware exploit that takes advantage of a hole in a program or operating system before the software developer has made a fix available...”
Zero Day Attacks
![Page 5: The New Data Security Risk](https://reader035.vdocument.in/reader035/viewer/2022062708/558b27abd8b42a2b268b45b5/html5/thumbnails/5.jpg)
Cyber-criminals create over 60,000 new Malware attacks EVERY DAY!
Antivirus/Antispyware software can’t protect against these new threats until AFTER they strike.
Once the malware gets in, it seeks and attacks program vulnerabilities
Am I At Risk?
![Page 6: The New Data Security Risk](https://reader035.vdocument.in/reader035/viewer/2022062708/558b27abd8b42a2b268b45b5/html5/thumbnails/6.jpg)
Improved Microsoft security updates make 3rd party software attacks more attractive
3rd party software less likely to be regularly updated by PC owner
Cyber-criminals know this so they seek the easiest targets
How Did This Happen?
![Page 7: The New Data Security Risk](https://reader035.vdocument.in/reader035/viewer/2022062708/558b27abd8b42a2b268b45b5/html5/thumbnails/7.jpg)
Average PC has 24-26 non-Microsoft (3rd party) apps
Gregg Keiser, Computer World July 2010:
“While vulnerabilities in Windows XP and Vista will climb by 31% and 34% respectively this year compared to 2009, bugs in 3rd party apps will jump by 92%”
Is There a Trend?
![Page 8: The New Data Security Risk](https://reader035.vdocument.in/reader035/viewer/2022062708/558b27abd8b42a2b268b45b5/html5/thumbnails/8.jpg)
California Civil Code 1798.81.5A business… shall implement and maintain reasonable security procedures and practices appropriate… to protect the personal information from unauthorized access… or disclosure.
California Financial Code 4057An entity that negligently discloses or shares nonpublic personal information… shall be liable, irrespective of the amount of damages suffered… for a civil penalty not to exceed $2,500 per violation. ($500,000 max)
How Will It Effect Me?
![Page 9: The New Data Security Risk](https://reader035.vdocument.in/reader035/viewer/2022062708/558b27abd8b42a2b268b45b5/html5/thumbnails/9.jpg)
There is a solution
![Page 10: The New Data Security Risk](https://reader035.vdocument.in/reader035/viewer/2022062708/558b27abd8b42a2b268b45b5/html5/thumbnails/10.jpg)
![Page 11: The New Data Security Risk](https://reader035.vdocument.in/reader035/viewer/2022062708/558b27abd8b42a2b268b45b5/html5/thumbnails/11.jpg)
Placer Computers
![Page 12: The New Data Security Risk](https://reader035.vdocument.in/reader035/viewer/2022062708/558b27abd8b42a2b268b45b5/html5/thumbnails/12.jpg)
Placer Computers
Security Management
KEEPING YOUR SOFTWARE UP TO DATE
![Page 13: The New Data Security Risk](https://reader035.vdocument.in/reader035/viewer/2022062708/558b27abd8b42a2b268b45b5/html5/thumbnails/13.jpg)
Placer Computers
SO WHAT CAN
PLACER COMPUTERSDO FOR YOU?
![Page 14: The New Data Security Risk](https://reader035.vdocument.in/reader035/viewer/2022062708/558b27abd8b42a2b268b45b5/html5/thumbnails/14.jpg)
Placer Computers
STEP 1:
Security Scan
Identify software vulnerabilities
www.PlacerComputers.com
![Page 15: The New Data Security Risk](https://reader035.vdocument.in/reader035/viewer/2022062708/558b27abd8b42a2b268b45b5/html5/thumbnails/15.jpg)
Placer Computers
STEP 2:
Locate Missing Updates
Microsoft critical/optional patches3rd Party program updates/patches
www.PlacerComputers.com
![Page 16: The New Data Security Risk](https://reader035.vdocument.in/reader035/viewer/2022062708/558b27abd8b42a2b268b45b5/html5/thumbnails/16.jpg)
Placer Computers
STEP 3:
Identify End-of-Life Software
Programs no longer supported are risky!
www.PlacerComputers.com
![Page 17: The New Data Security Risk](https://reader035.vdocument.in/reader035/viewer/2022062708/558b27abd8b42a2b268b45b5/html5/thumbnails/17.jpg)
Placer Computers
STEP 4:
Download, install security updates
Ensures that all software is up-to-date
www.PlacerComputers.com
![Page 18: The New Data Security Risk](https://reader035.vdocument.in/reader035/viewer/2022062708/558b27abd8b42a2b268b45b5/html5/thumbnails/18.jpg)
Placer Computers
STEP 5:
Find replacements for EOL programs
Many free options are available. We willresearch and provide recommendations
www.PlacerComputers.com
![Page 19: The New Data Security Risk](https://reader035.vdocument.in/reader035/viewer/2022062708/558b27abd8b42a2b268b45b5/html5/thumbnails/19.jpg)
Placer Computers
STEP 6:
Scan and repair privacy leaks
Most programs leave a trail of personal data
www.PlacerComputers.com
![Page 20: The New Data Security Risk](https://reader035.vdocument.in/reader035/viewer/2022062708/558b27abd8b42a2b268b45b5/html5/thumbnails/20.jpg)
Placer Computers
STEP 7:
Spyware Scan
Catch any malware that gotpast your Antivirus software
www.PlacerComputers.com
![Page 21: The New Data Security Risk](https://reader035.vdocument.in/reader035/viewer/2022062708/558b27abd8b42a2b268b45b5/html5/thumbnails/21.jpg)
Placer Computers
STEP 8:
System Cleanup and Optimization
Clean your computer in/outOptimize your PC to run better
www.PlacerComputers.com
![Page 22: The New Data Security Risk](https://reader035.vdocument.in/reader035/viewer/2022062708/558b27abd8b42a2b268b45b5/html5/thumbnails/22.jpg)
Placer Computers
BOOK NOW AND SAVE:
50% off
530-388-8811www.PlacerComputers.com