SlideShare uma empresa Scribd logo
1 de 21
Baixar para ler offline
“Protecting Digital Lives”
Security Webinar for Small Business
  http://www.frontier.com/secure
Intro

•   Each cyber attack costs small and
    medium sized businesses an
    average of nearly $200,000 per
    incident
•   80 percent of small businesses
    that experience a data breach go
    bankrupt or suffer severe
    financial losses
•   Our webinar is here to educate
    you and provide some helpful
    hints on how to protect your
    business from internet security
    issues



                                          2
Firewalls
•   Symantec recorded nearly 60 million attempts by
    hackers to gain unauthorized entry into business
    and home computers in a single 24-hour period
•   The first way to prevent this is to have a firewall
     •   A firewall acts as a barriers between one
         network and another. It prevents unauthorized
         inbound and outbound traffic. On a small
         business network, a firewall will separate the
         local private network from the Internet. A
         firewall will inspect the information trying to
         come through and will determine if it is
         legitimate. A firewall can hide your personal
         network protecting it from unknown intruders.
•   Make sure to protect other servers that are
    connected to your network for special functions,
    such as sharing a printer, store files, or deliver Web
    pages. If it is connected to the Internet, it is a risk
    and needs a server.
                                                              3
Common Security Threats
                   Spam

Spam, or unsolicited commercial e-mail
messages, wastes bandwidth and time. The
sheer volume of it can be overwhelming,
and it can be a vehicle for viruses. Much of
it is of an explicit sexual nature, which in
some cases can create an uncomfortable
work environment and, potentially, legal
liabilities if companies do not take steps to
stop it




                                                4
Common Security Threats
                        Spoofing

IP Spoofing - creating packets that look as though
they have come from a different IP address. This
technique is used primarily in one-way attacks (such as
denial of service attacks). If packets appear to come
from a computer on the local network, it is possible for
them to pass through firewall security. IP spoofing
attacks are difficult to detect and require the skill and
means to monitor and analyze data packets

E-mail Spoofing - forging an e-mail message so that
the From address does not indicate the true address of
the sender. They may ask you to log in and update your
info or submit your billing information




                                                            5
Common Security Threats
                     Phishing

Phishing is becoming more and more prominent
for hackers and organized crime. Typically, an
attacker sends an e-mail message that looks very
much like it comes from an official source (such
as a bank or a website you shop at)

Links in the message take you to a fake website
that also looks like a real page. The goal of the   http://www.antiphishing.org/images/h2_2011_phishing_reports_chart.jpg


scam is to trick you into giving away personal
information so that the hackers can steal your
account information or even your identity

The victims of these scams are the users who may
give up personal and confidential information, but
also the spoofed business’ brand and reputation
that were used to gain the customer’s trust




                                                                                                                  6
Common Security Threats
            Viruses

Viruses are programs designed to
replicate themselves and
potentially cause harmful actions
and infect other programs on your
computer

They are often hidden inside
harmless programs. Viruses in e-
mail messages often masquerade
as games or pictures and use
beguiling subjects to encourage
users to open and run them




                                    7
Common Security Threats
                   Worms

Worms also replicate themselves, but they are
often able to do so by sending out e-mail
messages themselves rather than simply
infecting programs on a single computer.
They can break into computers without
human assistance or knowledge


               Trojan Horses

Trojan horses are malicious programs that
pretend to be benign applications. They don’t
replicate like viruses and worms but can still
cause considerable harm. Often, viruses or
worms are smuggled inside a Trojan horse



                                                 8
Common Security Threats
             Spyware

Spyware refers to small, hidden
programs that run on your computer
and are used for everything from
tracking your online activities to
allowing intruders to monitor and
access your computer.

You can become the target of
spyware if you download music from
file-sharing programs such as
limewire, free games and movies
from sites you don’t trust, or other
software from unknown sources.




                                       9
Common Security Threats
               Tampering

Tampering consists of altering the
contents of packets as they travel over
the Internet or altering data on computer
disks after a network has been
penetrated. For example, an attacker may
try to change the data in your files as it
leaves your network

               Repudiation

Repudiation refers to a user’s ability to
falsely deny having performed an action
that other parties cannot disprove. For
example, a user who deleted a file can
successfully deny doing so if no
mechanism (such as audit records) can
prove otherwise


                                            10
Common Security Threats
    Information Disclosure                    Denial of Service
Information disclosure consists of    DoS attacks are computerized
the exposure of information to        assaults launched by an attacker in
individuals who normally would not    an attempt to overload or halt a
have access to it                     network service, such as a Web
For example, a user on your network   server or a file server
might make certain files accessible    For example, an attack may cause a
over the network that should not be   server to become so busy attempting
shared. Employees also tend to        to respond that it ignores legitimate
share important information, such     requests for connections 
as passwords, with people who
should not have them




                                                                      11
Common Security Threats
      Elevation of Privilege                       Pirated Software
Elevation of privilege is a process by   In the United States, an 19% (http://
which a user misleads a system into      portal.bsa.org/globalpiracy2011/) of
granting unauthorized rights, usually    software is counterfeit. While the low
for the purpose of compromising or       prices of counterfeit software can be
destroying the system                    attractive, such software comes with a
                                         potentially much higher price:
For example, an attacker might log       Counterfeit software can contain bugs
on to a network by using a guest         and viruses and is illegal
account, then exploit a weakness in
the software that lets the attacker
change the guest privileges to
administrative privileges




                                                                           12
Conclusion
•   Most attackers use the processing power of computers as their weapon
•   They might use a virus to spread a DoS program to thousands of
    computers. They might use a password-guessing program to try every
    word in the dictionary as a password
     – Of course, the first passwords they check are “password,” “letmein,”
       “opensesame,” and a password that is the same as the username.
•   Attackers have programs that randomly probe every IP address on the
    Internet looking for unprotected systems and, when they find one, have
    port scanners to see whether any ports are open for attack
     – If these attackers find an open port, they have a library of known
        vulnerabilities they can use to try to gain access. For more
        deliberate attacks, such as industrial espionage, a combination of
        technology and social engineering is most effective.
          • (Ex. Inducing members of your staff to reveal confidential
            information, rifling through trash in search of revealing
            information, or simply looking for passwords written on notes
            by monitors)




                                                                             13
Tips to Protect Your Small Business from
                 Cyber-Attacks
•    Never click on Hyperlinks within emails, instead, copy and
     paste them into your browser
•    Use SPAM Filter Software
•    Use Anti-Virus Software
•    Use a Personal Firewall
•    Keep Software Updated (operating systems and web
     browsers)
•    Always look for "https://" and padlock on web sites that
     require personal information
•    Keep your computer clean from Spyware
•    Educate Yourself of fraudulent activity on the Internet
•    Check & monitor your credit report
http://www.fraudwatchinternational.com/phishing/individual_alert.php?fa_no=240305&mode=alert


                                                                                               14
Social Media Security Tips for Small
                Businesses
•   There are long-term marketing benefits of social media, but there are also
    security issues that come with it. Here are some tips for your small business
    below.
•   #1 Implement policies. Social media is a great platform for connecting with
    existing and potential clients. However, without some type of policy in place
    that regulates employee access and guidelines for appropriate behavior,
    social media may eventually be completely banned from every corporate
    network. Teach effective use by provide training on proper use and
    especially what not do too.
•   #2 Encourage URL decoding. Before clicking on shortened URLs, find out
    where they lead by pasting them into a URL lengthening service like a tiny
    URL decoder.
•   #3 Limit social networks. Through secondary research about social media
    security, 300-400 operable social networks serving numerous uses from
    music to movies, from friending to fornicating have been found. Some are
    more or less appropriate and others even less secure.




                                                                                    15
Social Media Security Tips for Small
                  Businesses
•    #4 Train IT personnel. Effective policies begin from the top down. Those
     responsible for managing technology need to be fully up to speed with
     social media security risks.
•    #5 Maintain updated security. Whether hardware or software, anti-virus or
     critical security patches, make sure your business network is up to date.
•    #6 Lock down settings. Most social networks have privacy settings that
     need to be administered to the highest level. Default settings generally
     leave the networks wide open for attack.
•    #7 Companies who eliminate access to social media open themselves up to
     other business security issues. Employees who are bent on getting access,
     often skirt security making the network vulnerable.
Robert Siciliano personal and small business security specialist to ADT Small Business Security discussing ADT Pulse on Fox
     News. Disclosures

http://www.infosecisland.com/blogview/20943-Social-Media-Security-Tips-for-Small-Business.html




                                                                                                                              16
Frontier Secure Tips
•   Passwords: Don’t choose a common password such as “123456.” Make
    your password personal, such as the name of your favorite sports team plus
    your favorite number, or your favorite teacher
•   Information: Share as little personal information as possible. That might be
    difficult since you do just that on Facebook or Twitter, but do not include
    any financial information, your birthday, address, e-mail address, phone
    number, etc
•   Limit: The more social networks you join, the greater your chances of being
    hacked. Limit your social networking sites to two or three at most. Stick to
    popular networks such as Twitter and Facebook because they are more
    credible and have stricter safety standards
•   Security: Make sure your computer has the latest security software so it’s
    protected against attack from social media hackers, viruses, spyware and
    other Internet threats




                                                                                   17
Frontier Secure Tips
•   Safety: Update the privacy settings on your social networking pages. Limit
    the friends and followers who see your content. For example, on Facebook
    you can control where your posts go by customizing the “Settings” icon of
    your profile page. On Twitter, you can request notification when someone
    new is following you
•   Know your source: Never click on a link from someone you don’t know.
    Remember that even your friends can have a computer virus that blasts to
    all their contacts without their knowledge
•   Look out for “Deals”: Many of us take advantage of various discount
    opportunities, but even these links may have viruses. Be sure you’re
    opening a safe link even if the business is credible
•   Search term mix ups: A harmless Internet search can bring up websites
    laced with viruses. Be extra careful about what you type in a search engine
 




                                                                                  18
Frontier Secure

 




                      19
Frontier Secure

 




                      20
Sources
•   Robert Siciliano personal and small business security specialist to ADT Small Business Security discussing ADT Pulse on
    Fox News. Disclosures http://www.infosecisland.com/blogview/20943-Social-Media-Security-Tips-for-Small-
    Business.html
•   http://www.fraudwatchinternational.com/phishing/individual_alert.php?fa_no=240305&mode=alert
•   http://portal.bsa.org/globalpiracy2011/
•   http://www.smallbusinesscomputing.com/webmaster/article.php/10732_3908811_2/15-Data-Security-Tips-to-Protect-
    Your-Small-Business.htm
•   http://www.smallbusinesscomputing.com/biztools/article.php/10730_3930231_2/10-Top-Small-Business-Security-
    Tools.htm




    F-Secure rated #2 overall best security product from independent testing by AV-Test (full article)




                                                                                                                              21

Mais conteúdo relacionado

Mais procurados

Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end usersNetWatcher
 
Cyber Security Update: How to Train Your Employees to Prevent Data Breaches
Cyber Security Update: How to Train Your Employees to Prevent Data BreachesCyber Security Update: How to Train Your Employees to Prevent Data Breaches
Cyber Security Update: How to Train Your Employees to Prevent Data BreachesParsons Behle & Latimer
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProRonald Soh
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Programdavidcurriecia
 
IT Security booklet
IT Security bookletIT Security booklet
IT Security bookletiteclearners
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Symptai Consulting Limited
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System ThreatsDrishti Bhalla
 
Computer virus
Computer virusComputer virus
Computer virussajeena81
 
Technology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreTechnology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreWilliam Mann
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacyArdit Meti
 
Types of Cyber-Attacks
Types of Cyber-AttacksTypes of Cyber-Attacks
Types of Cyber-Attackstechexpert2345
 
Cyber Security for Financial Planners
Cyber Security for Financial PlannersCyber Security for Financial Planners
Cyber Security for Financial PlannersMichael O'Phelan
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Webdpd
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Securitydkp205
 

Mais procurados (20)

Computer security and
Computer security andComputer security and
Computer security and
 
Security threats
Security threatsSecurity threats
Security threats
 
Ransomware 101
Ransomware 101Ransomware 101
Ransomware 101
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 
Cyber Security Update: How to Train Your Employees to Prevent Data Breaches
Cyber Security Update: How to Train Your Employees to Prevent Data BreachesCyber Security Update: How to Train Your Employees to Prevent Data Breaches
Cyber Security Update: How to Train Your Employees to Prevent Data Breaches
 
Firewall
FirewallFirewall
Firewall
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Netiquette
NetiquetteNetiquette
Netiquette
 
IT Security booklet
IT Security bookletIT Security booklet
IT Security booklet
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
 
Computer virus
Computer virusComputer virus
Computer virus
 
Technology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreTechnology Training - Security, Passwords & More
Technology Training - Security, Passwords & More
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
 
Types of Cyber-Attacks
Types of Cyber-AttacksTypes of Cyber-Attacks
Types of Cyber-Attacks
 
Cyber Security for Financial Planners
Cyber Security for Financial PlannersCyber Security for Financial Planners
Cyber Security for Financial Planners
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Security
 
Dos and Don'ts of Internet Security
Dos and Don'ts of Internet SecurityDos and Don'ts of Internet Security
Dos and Don'ts of Internet Security
 

Destaque

Destaque (7)

Security for Small Business
Security for Small BusinessSecurity for Small Business
Security for Small Business
 
How to Set Up a Business Facebook Page
How to Set Up a Business Facebook PageHow to Set Up a Business Facebook Page
How to Set Up a Business Facebook Page
 
Rental options in india
Rental options in indiaRental options in india
Rental options in india
 
Rental options in india
Rental options in indiaRental options in india
Rental options in india
 
Microscopy
MicroscopyMicroscopy
Microscopy
 
Ellen Williams from Constant Contact's Webinar Presentation. "What Every Smal...
Ellen Williams from Constant Contact's Webinar Presentation. "What Every Smal...Ellen Williams from Constant Contact's Webinar Presentation. "What Every Smal...
Ellen Williams from Constant Contact's Webinar Presentation. "What Every Smal...
 
How to Be A Social All Star - Frontier Small Business
How to Be A Social All Star - Frontier Small BusinessHow to Be A Social All Star - Frontier Small Business
How to Be A Social All Star - Frontier Small Business
 

Semelhante a Frontier Secure: Handout for small business leaders on "How to be Secure"

7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences MagazineThe Lifesciences Magazine
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and securityjovellconde1
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.angelaag98
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsDrPraveenKumar37
 
Cybersecurity
CybersecurityCybersecurity
CybersecurityA. Shamel
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
A Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comBusiness.com
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityNcell
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
 
E commerce security 4
E commerce security 4E commerce security 4
E commerce security 4Anne ndolo
 

Semelhante a Frontier Secure: Handout for small business leaders on "How to be Secure" (20)

Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine
 
Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
 
Data security
 Data security  Data security
Data security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
A Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.com
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
E commerce security 4
E commerce security 4E commerce security 4
E commerce security 4
 

Último

Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menzaictsugar
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditNhtLNguyn9
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxsaniyaimamuddin
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Doge Mining Website
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...ictsugar
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 

Último (20)

Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal audit
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 

Frontier Secure: Handout for small business leaders on "How to be Secure"

  • 1. “Protecting Digital Lives” Security Webinar for Small Business http://www.frontier.com/secure
  • 2. Intro • Each cyber attack costs small and medium sized businesses an average of nearly $200,000 per incident • 80 percent of small businesses that experience a data breach go bankrupt or suffer severe financial losses • Our webinar is here to educate you and provide some helpful hints on how to protect your business from internet security issues 2
  • 3. Firewalls • Symantec recorded nearly 60 million attempts by hackers to gain unauthorized entry into business and home computers in a single 24-hour period • The first way to prevent this is to have a firewall • A firewall acts as a barriers between one network and another. It prevents unauthorized inbound and outbound traffic. On a small business network, a firewall will separate the local private network from the Internet. A firewall will inspect the information trying to come through and will determine if it is legitimate. A firewall can hide your personal network protecting it from unknown intruders. • Make sure to protect other servers that are connected to your network for special functions, such as sharing a printer, store files, or deliver Web pages. If it is connected to the Internet, it is a risk and needs a server. 3
  • 4. Common Security Threats Spam Spam, or unsolicited commercial e-mail messages, wastes bandwidth and time. The sheer volume of it can be overwhelming, and it can be a vehicle for viruses. Much of it is of an explicit sexual nature, which in some cases can create an uncomfortable work environment and, potentially, legal liabilities if companies do not take steps to stop it 4
  • 5. Common Security Threats Spoofing IP Spoofing - creating packets that look as though they have come from a different IP address. This technique is used primarily in one-way attacks (such as denial of service attacks). If packets appear to come from a computer on the local network, it is possible for them to pass through firewall security. IP spoofing attacks are difficult to detect and require the skill and means to monitor and analyze data packets E-mail Spoofing - forging an e-mail message so that the From address does not indicate the true address of the sender. They may ask you to log in and update your info or submit your billing information 5
  • 6. Common Security Threats Phishing Phishing is becoming more and more prominent for hackers and organized crime. Typically, an attacker sends an e-mail message that looks very much like it comes from an official source (such as a bank or a website you shop at) Links in the message take you to a fake website that also looks like a real page. The goal of the http://www.antiphishing.org/images/h2_2011_phishing_reports_chart.jpg scam is to trick you into giving away personal information so that the hackers can steal your account information or even your identity The victims of these scams are the users who may give up personal and confidential information, but also the spoofed business’ brand and reputation that were used to gain the customer’s trust 6
  • 7. Common Security Threats Viruses Viruses are programs designed to replicate themselves and potentially cause harmful actions and infect other programs on your computer They are often hidden inside harmless programs. Viruses in e- mail messages often masquerade as games or pictures and use beguiling subjects to encourage users to open and run them 7
  • 8. Common Security Threats Worms Worms also replicate themselves, but they are often able to do so by sending out e-mail messages themselves rather than simply infecting programs on a single computer. They can break into computers without human assistance or knowledge Trojan Horses Trojan horses are malicious programs that pretend to be benign applications. They don’t replicate like viruses and worms but can still cause considerable harm. Often, viruses or worms are smuggled inside a Trojan horse 8
  • 9. Common Security Threats Spyware Spyware refers to small, hidden programs that run on your computer and are used for everything from tracking your online activities to allowing intruders to monitor and access your computer. You can become the target of spyware if you download music from file-sharing programs such as limewire, free games and movies from sites you don’t trust, or other software from unknown sources. 9
  • 10. Common Security Threats Tampering Tampering consists of altering the contents of packets as they travel over the Internet or altering data on computer disks after a network has been penetrated. For example, an attacker may try to change the data in your files as it leaves your network Repudiation Repudiation refers to a user’s ability to falsely deny having performed an action that other parties cannot disprove. For example, a user who deleted a file can successfully deny doing so if no mechanism (such as audit records) can prove otherwise 10
  • 11. Common Security Threats Information Disclosure Denial of Service Information disclosure consists of DoS attacks are computerized the exposure of information to assaults launched by an attacker in individuals who normally would not an attempt to overload or halt a have access to it network service, such as a Web For example, a user on your network server or a file server might make certain files accessible For example, an attack may cause a over the network that should not be server to become so busy attempting shared. Employees also tend to to respond that it ignores legitimate share important information, such requests for connections  as passwords, with people who should not have them 11
  • 12. Common Security Threats Elevation of Privilege Pirated Software Elevation of privilege is a process by In the United States, an 19% (http:// which a user misleads a system into portal.bsa.org/globalpiracy2011/) of granting unauthorized rights, usually software is counterfeit. While the low for the purpose of compromising or prices of counterfeit software can be destroying the system attractive, such software comes with a potentially much higher price: For example, an attacker might log Counterfeit software can contain bugs on to a network by using a guest and viruses and is illegal account, then exploit a weakness in the software that lets the attacker change the guest privileges to administrative privileges 12
  • 13. Conclusion • Most attackers use the processing power of computers as their weapon • They might use a virus to spread a DoS program to thousands of computers. They might use a password-guessing program to try every word in the dictionary as a password – Of course, the first passwords they check are “password,” “letmein,” “opensesame,” and a password that is the same as the username. • Attackers have programs that randomly probe every IP address on the Internet looking for unprotected systems and, when they find one, have port scanners to see whether any ports are open for attack – If these attackers find an open port, they have a library of known vulnerabilities they can use to try to gain access. For more deliberate attacks, such as industrial espionage, a combination of technology and social engineering is most effective. • (Ex. Inducing members of your staff to reveal confidential information, rifling through trash in search of revealing information, or simply looking for passwords written on notes by monitors) 13
  • 14. Tips to Protect Your Small Business from Cyber-Attacks • Never click on Hyperlinks within emails, instead, copy and paste them into your browser • Use SPAM Filter Software • Use Anti-Virus Software • Use a Personal Firewall • Keep Software Updated (operating systems and web browsers) • Always look for "https://" and padlock on web sites that require personal information • Keep your computer clean from Spyware • Educate Yourself of fraudulent activity on the Internet • Check & monitor your credit report http://www.fraudwatchinternational.com/phishing/individual_alert.php?fa_no=240305&mode=alert 14
  • 15. Social Media Security Tips for Small Businesses • There are long-term marketing benefits of social media, but there are also security issues that come with it. Here are some tips for your small business below. • #1 Implement policies. Social media is a great platform for connecting with existing and potential clients. However, without some type of policy in place that regulates employee access and guidelines for appropriate behavior, social media may eventually be completely banned from every corporate network. Teach effective use by provide training on proper use and especially what not do too. • #2 Encourage URL decoding. Before clicking on shortened URLs, find out where they lead by pasting them into a URL lengthening service like a tiny URL decoder. • #3 Limit social networks. Through secondary research about social media security, 300-400 operable social networks serving numerous uses from music to movies, from friending to fornicating have been found. Some are more or less appropriate and others even less secure. 15
  • 16. Social Media Security Tips for Small Businesses • #4 Train IT personnel. Effective policies begin from the top down. Those responsible for managing technology need to be fully up to speed with social media security risks. • #5 Maintain updated security. Whether hardware or software, anti-virus or critical security patches, make sure your business network is up to date. • #6 Lock down settings. Most social networks have privacy settings that need to be administered to the highest level. Default settings generally leave the networks wide open for attack. • #7 Companies who eliminate access to social media open themselves up to other business security issues. Employees who are bent on getting access, often skirt security making the network vulnerable. Robert Siciliano personal and small business security specialist to ADT Small Business Security discussing ADT Pulse on Fox News. Disclosures http://www.infosecisland.com/blogview/20943-Social-Media-Security-Tips-for-Small-Business.html 16
  • 17. Frontier Secure Tips • Passwords: Don’t choose a common password such as “123456.” Make your password personal, such as the name of your favorite sports team plus your favorite number, or your favorite teacher • Information: Share as little personal information as possible. That might be difficult since you do just that on Facebook or Twitter, but do not include any financial information, your birthday, address, e-mail address, phone number, etc • Limit: The more social networks you join, the greater your chances of being hacked. Limit your social networking sites to two or three at most. Stick to popular networks such as Twitter and Facebook because they are more credible and have stricter safety standards • Security: Make sure your computer has the latest security software so it’s protected against attack from social media hackers, viruses, spyware and other Internet threats 17
  • 18. Frontier Secure Tips • Safety: Update the privacy settings on your social networking pages. Limit the friends and followers who see your content. For example, on Facebook you can control where your posts go by customizing the “Settings” icon of your profile page. On Twitter, you can request notification when someone new is following you • Know your source: Never click on a link from someone you don’t know. Remember that even your friends can have a computer virus that blasts to all their contacts without their knowledge • Look out for “Deals”: Many of us take advantage of various discount opportunities, but even these links may have viruses. Be sure you’re opening a safe link even if the business is credible • Search term mix ups: A harmless Internet search can bring up websites laced with viruses. Be extra careful about what you type in a search engine   18
  • 21. Sources • Robert Siciliano personal and small business security specialist to ADT Small Business Security discussing ADT Pulse on Fox News. Disclosures http://www.infosecisland.com/blogview/20943-Social-Media-Security-Tips-for-Small- Business.html • http://www.fraudwatchinternational.com/phishing/individual_alert.php?fa_no=240305&mode=alert • http://portal.bsa.org/globalpiracy2011/ • http://www.smallbusinesscomputing.com/webmaster/article.php/10732_3908811_2/15-Data-Security-Tips-to-Protect- Your-Small-Business.htm • http://www.smallbusinesscomputing.com/biztools/article.php/10730_3930231_2/10-Top-Small-Business-Security- Tools.htm F-Secure rated #2 overall best security product from independent testing by AV-Test (full article) 21