Ted - CyberSecurity for your Business

Preview:

Citation preview

Ted SandersCyber Security for Your Business

Digital Marketing Manager

Social Marketing | Paid Search | Revenue per Unit, Business Evaluation | Maintenance | Task Management,

Data Standardization | Customer Service, Sound Accounting | Website Management

CYBER SECURITY

Internet Security Threats to Property Management

5 Ways to Defend Your Business From Hackers

• It’s a top-down commitment

• This is not an IT problem – it’s a business issue

• It’s not a matter of “if” it’s a matter of “when”

• The only thing harder and more expensive than

preparing for a threat now is waiting until you’ve been

hacked

• Any effort is better than no effort

Security vs. Access • More security means less access• More access means less security

Types of Hacks and Prevention• Network and System Attacks • Email Hacking- Spam, Virus, and “Phishing”• Password strength and strategies• Encrypted Password Tools for everyone

#1 Security Vulnerability Social Hackers – people who attempt to gain access to restricted information by using seemingly legitimate techniques.

Types of Social Hacks - Dumpster diving - Roleplaying - Tailgating - Spearphishing

Network HackingNetwork Attacks • Packet Sniffing

(Eavesdropping) • IP Address Spoofing • Session Hijacking • Man in the Middle (MITM)

System Attacks • Password Cracking • SQL Injection • Web Protocol Abuse • Denial of Service (DOS) • Distributed Denial of Service

(DDOS) • Trap Door • Virus, Worm, Trojan horse

Hacking Prevention • Change Passwords Regularly (Monthly, Quarterly, etc.)• Manage who has access to what • Terminate access for old vendors and employees• Utilize anti-virus software• Lock – doors, computers, etc.• Use shredding service for confidential documents

Email Hacking • Spam • Virus • Phishing

spamphishing

virus

Virus ExamplesYou didn't ask for this file, but perhaps think you did or you are curious as to whether it's an honest mistake. It's not. Also, never open a file of type ".pif".

Subject: Re: Your product From: arielb@rice.edu     Here is the file.Attachments: your_product.pif 23k

The W32.Sober.K@mm virus. Some viruses are hidden inside ZIP files. As usual, the FROM address is forged.

Subject: You visit illegal websites From: Officer@FBI.govDear Sir/Madam,we have logged your IP-address on more than 40 illegal Websites. Important: Please answer our questions!The list of questions are attached.Attachments: indictment_cit2987.zip

SPAM!!! (90% of all international email traffic)

Use Antivirus/Antispam Software

Phish (Not that Phish!)

Phishing on a Web Page

SpearPhishing – Don’t Open the Link!

SIMPLIFY YOUR LIFE.LastPass remembers your passwords so that you can focus on the more important things in life. Cost is **FREE**

www.lastpass.com

Top Takeaways Your accountable for your data Never send personal information by email Consider using password and security products like Lastpass and

AppRiver Most security breaches originate within an organization’s sphere of

influence

THANK YOUFor additional information email: internetmarketing@realpropertymgt.com

Recommended