1 / 19

Christo IT Services: The Big Scary Internet

This presentation outlines how you as a small business owner can work more securely on the Internet and help protect your company’s information, customer data, and financial assets against online fraud and other cyber crimes.<br><br>You’ve heard the tales of how companies and organizations were damaged and in some cases even destroyed by cyber criminals. Here are a few true stories: <br><br>A thief stole a company laptop, and the company lost a decade of irreplaceable research and intellectual property worth millions.<br><br>A newly-hired executive received email from what looked like his company’s travel agency, where he was asked to click a link to confirm the accuracy of his personal details. This took him to an official-looking site where he found his personal data. There, he was asked to download software that would link his Outlook email account to the travel agency’s booking system. In so doing, he downloaded malicious software that spread through his new company.<br><br>Hackers broke into the computers of a retail chain through an unsecured wireless network and stole the financial information of all its customers, which cost the company millions in lost business and was ruinous to its reputation.<br><br>Most often, damage to big corporations dominates the news, but cyber crooks target small and mid-sized businesses too.

christoit
Download Presentation

Christo IT Services: The Big Scary Internet

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. “I don’t have anything they want…..”

  2. “It’s just kids fooling around….” RU .10% EUR .41% USA .64% SA .17% CHI .63% BRZ .32% AUS .08% % of GDP LOST to Hacking each year

  3. “I would know right away if there was a problem….” AVERAGE time to detect a problem: 172 Days

  4. “Security slows me down….” Hacking $1000 For every employed US citizen each year

  5. “I know what I’m doing….” “I have a Mac…” “I don’t use it for anything but….” “There’s no time….”

  6. The Big Scary InternetSeminar Presented by Christo IT Services

  7. “Who are these guys?” Wanted for crimes ranging from $500K to $100+ Million https://www.fbi.gov/wanted/cyber

  8. What do they want?

  9. Path of Least Resistance

  10. Where’s the trust? (EULA) • …you give Google a perpetual, irrevocable, worldwide, royalty-free, and non-exclusive license to reproduce, adapt, modify, translate, publish, publicly perform, publicly display and distribute any Content which you submit, post or display on or through, the Services.

  11. OK…OK…OK……..What can we do? • Surfing safely • Would you walk into this “store” alone? • Type, don’t click • Rollover links • https:// • Check for presence of an address, phone number and/or email contact • Common Sense / Instinct • “Would I give this information to someone in a conversation?”

  12. Stop them at the gate - Firewalls INTERNET FIREWALL

  13. Spam Protection

  14. Laptop Security and Encryption • 30 Seconds to get anything and everything • Where/How do you carry your Purse/Wallet? • Wi-Fi – KNOW where you’re connecting to

  15. Email Encryption - “If you have to think about it….don’t do it” • Contains social security numbers • Violates HIPAA • Contains health info / Contains personal identifier • Violates financial services regulations • GLB, SOX, FINRA • Contains financial terms and identifiers • Contains credit card number(s) • State Laws: • California, Massachusetts, Nevada, Washington

  16. 2 Factor Authentication +

  17. Saved the worst for last Since 2005 96%

  18. Keep learning…Spread the word… • NPR – All tech considered • http://www.npr.org/sections/alltechconsidered/ • FBI / Infraguard – Philadelphia Chapter • http://www.infragardphl.org/ • Webroot – Business Protection Resources • http://www.webroot.com/us/en/business/resources/ • Wired • http://www.wired.com/category/security • Report a Problem • http://www.ic3.gov/

  19. Thank you for your time today!!!!!! Chris Schalleur chris@christoit.com 215-256-7901 www.ChristoIT.com

More Related