SlideShare uma empresa Scribd logo
1 de 22
Ted Sanders
Cyber Security for Your Business
Digital Marketing Manager
Social Marketing | Paid Search | Revenue per Unit, Business
Evaluation | Maintenance | Task Management,
Data Standardization | Customer Service,
Sound Accounting | Website Management
CYBER SECURITY
Internet Security Threats to Property Management
5 Ways to Defend Your Business From Hackers
• It’s a top-down commitment
• This is not an IT problem – it’s a business issue
• It’s not a matter of “if” it’s a matter of “when”
• The only thing harder and more expensive than
preparing for a threat now is waiting until you’ve been
hacked
• Any effort is better than no effort
Security vs. Access
• More security means less access
• More access means less security
Types of Hacks and Prevention
• Network and System Attacks
• Email Hacking- Spam, Virus, and “Phishing”
• Password strength and strategies
• Encrypted Password Tools for everyone
#1 Security Vulnerability
Social Hackers – people who attempt to gain
access to restricted information by using
seemingly legitimate techniques.
Types of Social Hacks
- Dumpster diving
- Roleplaying
- Tailgating
- Spearphishing
Network Hacking
Network Attacks
• Packet Sniffing
(Eavesdropping)
• IP Address Spoofing
• Session Hijacking
• Man in the Middle
(MITM)
System Attacks
• Password Cracking
• SQL Injection
• Web Protocol Abuse
• Denial of Service (DOS)
• Distributed Denial of Service
(DDOS)
• Trap Door
• Virus, Worm, Trojan horse
Hacking Prevention
• Change Passwords Regularly (Monthly, Quarterly, etc.)
• Manage who has access to what
• Terminate access for old vendors and employees
• Utilize anti-virus software
• Lock – doors, computers, etc.
• Use shredding service for confidential documents
Email Hacking
• Spam
• Virus
• Phishing
spam
phishingvirus
Virus Examples
You didn't ask for this file, but perhaps think
you did or you are curious as to whether it's
an honest mistake. It's not. Also, never
open a file of type ".pif".
Subject: Re: Your product
From: arielb@rice.edu
Here is the file.
Attachments: your_product.pif 23k
The W32.Sober.K@mm virus. Some
viruses are hidden inside ZIP files. As
usual, the FROM address is forged.
Subject: You visit illegal websites
From: Officer@FBI.gov
Dear Sir/Madam,
we have logged your IP-address on more than
40 illegal
Websites. Important: Please answer our
questions!
The list of questions are attached.
Attachments: indictment_cit2987.zip
SPAM!!! (90% of all international email traffic)
Use Antivirus/Antispam Software
Phish (Not that Phish!)
Phishing on a Web Page
SpearPhishing – Don’t Open the Link!
SIMPLIFY YOUR LIFE.
LastPass remembers your passwords so that
you can focus on the more important things in
life. Cost is **FREE**
www.lastpass.com
Top Takeaways
 Your accountable for your data
 Never send personal information by email
 Consider using password and security products like Lastpass and
AppRiver
 Most security breaches originate within an organization’s sphere of
influence
THANK YOU
For additional information email:
internetmarketing@realpropertymgt.com

Mais conteúdo relacionado

Mais procurados

Security 101 for No- techies
Security 101 for No- techiesSecurity 101 for No- techies
Security 101 for No- techiesBrenton Johnson
 
Presentation: True Stories from the Threat Hunting Files
Presentation: True Stories from the Threat Hunting FilesPresentation: True Stories from the Threat Hunting Files
Presentation: True Stories from the Threat Hunting FilesDomainTools
 
Security and privacy for journalists
Security and privacy for journalistsSecurity and privacy for journalists
Security and privacy for journalistsJillian York
 
Penetration Testing and Vulnerability Assessments: Examining the SEC and FINR...
Penetration Testing and Vulnerability Assessments: Examining the SEC and FINR...Penetration Testing and Vulnerability Assessments: Examining the SEC and FINR...
Penetration Testing and Vulnerability Assessments: Examining the SEC and FINR...TruShield Security Solutions
 
Securing Yourself in the Cyber World
Securing Yourself in the Cyber WorldSecuring Yourself in the Cyber World
Securing Yourself in the Cyber WorldEmil Tan
 
ZeroNights2013 testing of password policy
ZeroNights2013 testing of password policyZeroNights2013 testing of password policy
ZeroNights2013 testing of password policyAnton Dedov
 
Security is sim
Security is simSecurity is sim
Security is simTim Krabec
 
Web Application Security - DevFest + GDay George Town 2016
Web Application Security - DevFest + GDay George Town 2016Web Application Security - DevFest + GDay George Town 2016
Web Application Security - DevFest + GDay George Town 2016Gareth Davies
 
How to-become-secure-and-stay-secure
How to-become-secure-and-stay-secureHow to-become-secure-and-stay-secure
How to-become-secure-and-stay-secureIIMBNSRCEL
 
Cazando Cibercriminales con: OSINT + Cloud Computing + Big Data
Cazando Cibercriminales con: OSINT + Cloud Computing + Big DataCazando Cibercriminales con: OSINT + Cloud Computing + Big Data
Cazando Cibercriminales con: OSINT + Cloud Computing + Big DataChema Alonso
 
Protecting your online identity - Managing your passwords
Protecting your online identity -  Managing your passwordsProtecting your online identity -  Managing your passwords
Protecting your online identity - Managing your passwordsBunmi Sowande
 
Threat Intelligence Field of Dreams
Threat Intelligence Field of DreamsThreat Intelligence Field of Dreams
Threat Intelligence Field of DreamsGreg Foss
 
SANS CTI Summit 2016 Borderless Threat Intelligence
SANS CTI Summit 2016 Borderless Threat IntelligenceSANS CTI Summit 2016 Borderless Threat Intelligence
SANS CTI Summit 2016 Borderless Threat IntelligenceJason Trost
 
Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Chinatu Uzuegbu
 

Mais procurados (20)

Security 101 for No- techies
Security 101 for No- techiesSecurity 101 for No- techies
Security 101 for No- techies
 
Presentation: True Stories from the Threat Hunting Files
Presentation: True Stories from the Threat Hunting FilesPresentation: True Stories from the Threat Hunting Files
Presentation: True Stories from the Threat Hunting Files
 
Security and privacy for journalists
Security and privacy for journalistsSecurity and privacy for journalists
Security and privacy for journalists
 
Penetration Testing and Vulnerability Assessments: Examining the SEC and FINR...
Penetration Testing and Vulnerability Assessments: Examining the SEC and FINR...Penetration Testing and Vulnerability Assessments: Examining the SEC and FINR...
Penetration Testing and Vulnerability Assessments: Examining the SEC and FINR...
 
The Current State of Cybersecurity
The Current State of CybersecurityThe Current State of Cybersecurity
The Current State of Cybersecurity
 
Securing Yourself in the Cyber World
Securing Yourself in the Cyber WorldSecuring Yourself in the Cyber World
Securing Yourself in the Cyber World
 
Personal Digital Hygiene
Personal Digital HygienePersonal Digital Hygiene
Personal Digital Hygiene
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
ZeroNights2013 testing of password policy
ZeroNights2013 testing of password policyZeroNights2013 testing of password policy
ZeroNights2013 testing of password policy
 
Security is sim
Security is simSecurity is sim
Security is sim
 
Web Application Security - DevFest + GDay George Town 2016
Web Application Security - DevFest + GDay George Town 2016Web Application Security - DevFest + GDay George Town 2016
Web Application Security - DevFest + GDay George Town 2016
 
How to-become-secure-and-stay-secure
How to-become-secure-and-stay-secureHow to-become-secure-and-stay-secure
How to-become-secure-and-stay-secure
 
Logs vs Insiders
Logs vs InsidersLogs vs Insiders
Logs vs Insiders
 
Cazando Cibercriminales con: OSINT + Cloud Computing + Big Data
Cazando Cibercriminales con: OSINT + Cloud Computing + Big DataCazando Cibercriminales con: OSINT + Cloud Computing + Big Data
Cazando Cibercriminales con: OSINT + Cloud Computing + Big Data
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Protecting your online identity - Managing your passwords
Protecting your online identity -  Managing your passwordsProtecting your online identity -  Managing your passwords
Protecting your online identity - Managing your passwords
 
Ethical Hacking
Ethical Hacking Ethical Hacking
Ethical Hacking
 
Threat Intelligence Field of Dreams
Threat Intelligence Field of DreamsThreat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
 
SANS CTI Summit 2016 Borderless Threat Intelligence
SANS CTI Summit 2016 Borderless Threat IntelligenceSANS CTI Summit 2016 Borderless Threat Intelligence
SANS CTI Summit 2016 Borderless Threat Intelligence
 
Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6
 

Destaque

Daily Secret: SXSW Presentation
Daily Secret: SXSW PresentationDaily Secret: SXSW Presentation
Daily Secret: SXSW PresentationDailySecret2
 
Tirana Last Mile Shqip Long
Tirana Last Mile Shqip LongTirana Last Mile Shqip Long
Tirana Last Mile Shqip LongFlorian Voko
 
Values, interpersonal relationships and social behaviours
Values, interpersonal relationships and  social behavioursValues, interpersonal relationships and  social behaviours
Values, interpersonal relationships and social behaviourskarinka2
 
FINAL INVITE BACK AM16
FINAL INVITE BACK AM16FINAL INVITE BACK AM16
FINAL INVITE BACK AM16Madison Luke
 
Tähtsamad ülemaailmsed organisatsioonid
Tähtsamad ülemaailmsed organisatsioonidTähtsamad ülemaailmsed organisatsioonid
Tähtsamad ülemaailmsed organisatsioonidRegina Stown
 
Cerpen "Permberian Terindah Dari Tuhan"
Cerpen "Permberian Terindah Dari Tuhan" Cerpen "Permberian Terindah Dari Tuhan"
Cerpen "Permberian Terindah Dari Tuhan" Syifa Sahaliya
 
Puertas de garaje. Cómo elegir la adecuada
Puertas de garaje. Cómo elegir la adecuadaPuertas de garaje. Cómo elegir la adecuada
Puertas de garaje. Cómo elegir la adecuadaPuertas Roper
 
Curiosidades de las puertas automáticas
Curiosidades de las puertas automáticasCuriosidades de las puertas automáticas
Curiosidades de las puertas automáticasPuertas Roper
 
La célula , líquidos y electrolitos corporales jesyner suarez
La célula ,  líquidos y electrolitos corporales jesyner suarezLa célula ,  líquidos y electrolitos corporales jesyner suarez
La célula , líquidos y electrolitos corporales jesyner suarezJesyner Andreina Suarez Cumare
 
TLM Saytaxi EAL - AutoYou Albania - Albanian
TLM Saytaxi EAL - AutoYou Albania - AlbanianTLM Saytaxi EAL - AutoYou Albania - Albanian
TLM Saytaxi EAL - AutoYou Albania - AlbanianFlorian Voko
 
DISASTER RISK REDUCTION MANAGEMENT OF PUGO ELEMENTARY SCHOOL
DISASTER RISK REDUCTION MANAGEMENT OF PUGO ELEMENTARY SCHOOLDISASTER RISK REDUCTION MANAGEMENT OF PUGO ELEMENTARY SCHOOL
DISASTER RISK REDUCTION MANAGEMENT OF PUGO ELEMENTARY SCHOOLMrsERivera
 
Ficha técnica puerta gdv contra fuego certificada 2013 2
Ficha técnica puerta gdv contra fuego certificada 2013 2Ficha técnica puerta gdv contra fuego certificada 2013 2
Ficha técnica puerta gdv contra fuego certificada 2013 2Christiam Gamboa Verano
 
Online reputation management
Online reputation managementOnline reputation management
Online reputation managementVineetGargLION
 
Achims Draft for Tuulima PSSF APPLICATION-April 2013
Achims Draft for Tuulima PSSF APPLICATION-April 2013Achims Draft for Tuulima PSSF APPLICATION-April 2013
Achims Draft for Tuulima PSSF APPLICATION-April 2013Tuulima Laiti
 

Destaque (20)

CSHL Poster draft 1
CSHL Poster draft 1CSHL Poster draft 1
CSHL Poster draft 1
 
Daily Secret: SXSW Presentation
Daily Secret: SXSW PresentationDaily Secret: SXSW Presentation
Daily Secret: SXSW Presentation
 
Tirana Last Mile Shqip Long
Tirana Last Mile Shqip LongTirana Last Mile Shqip Long
Tirana Last Mile Shqip Long
 
Values, interpersonal relationships and social behaviours
Values, interpersonal relationships and  social behavioursValues, interpersonal relationships and  social behaviours
Values, interpersonal relationships and social behaviours
 
FINAL INVITE BACK AM16
FINAL INVITE BACK AM16FINAL INVITE BACK AM16
FINAL INVITE BACK AM16
 
Tähtsamad ülemaailmsed organisatsioonid
Tähtsamad ülemaailmsed organisatsioonidTähtsamad ülemaailmsed organisatsioonid
Tähtsamad ülemaailmsed organisatsioonid
 
MSc dissertation
MSc dissertationMSc dissertation
MSc dissertation
 
Cerpen "Permberian Terindah Dari Tuhan"
Cerpen "Permberian Terindah Dari Tuhan" Cerpen "Permberian Terindah Dari Tuhan"
Cerpen "Permberian Terindah Dari Tuhan"
 
Promotional materials
Promotional materialsPromotional materials
Promotional materials
 
London
LondonLondon
London
 
Наукові записки СумДПУ імені А.С. Макаренка. Серія географічні науки
Наукові записки СумДПУ імені А.С. Макаренка. Серія географічні наукиНаукові записки СумДПУ імені А.С. Макаренка. Серія географічні науки
Наукові записки СумДПУ імені А.С. Макаренка. Серія географічні науки
 
Puertas de garaje. Cómo elegir la adecuada
Puertas de garaje. Cómo elegir la adecuadaPuertas de garaje. Cómo elegir la adecuada
Puertas de garaje. Cómo elegir la adecuada
 
Curiosidades de las puertas automáticas
Curiosidades de las puertas automáticasCuriosidades de las puertas automáticas
Curiosidades de las puertas automáticas
 
La célula , líquidos y electrolitos corporales jesyner suarez
La célula ,  líquidos y electrolitos corporales jesyner suarezLa célula ,  líquidos y electrolitos corporales jesyner suarez
La célula , líquidos y electrolitos corporales jesyner suarez
 
TLM Saytaxi EAL - AutoYou Albania - Albanian
TLM Saytaxi EAL - AutoYou Albania - AlbanianTLM Saytaxi EAL - AutoYou Albania - Albanian
TLM Saytaxi EAL - AutoYou Albania - Albanian
 
DISASTER RISK REDUCTION MANAGEMENT OF PUGO ELEMENTARY SCHOOL
DISASTER RISK REDUCTION MANAGEMENT OF PUGO ELEMENTARY SCHOOLDISASTER RISK REDUCTION MANAGEMENT OF PUGO ELEMENTARY SCHOOL
DISASTER RISK REDUCTION MANAGEMENT OF PUGO ELEMENTARY SCHOOL
 
Ficha técnica puerta gdv contra fuego certificada 2013 2
Ficha técnica puerta gdv contra fuego certificada 2013 2Ficha técnica puerta gdv contra fuego certificada 2013 2
Ficha técnica puerta gdv contra fuego certificada 2013 2
 
Oral systemic
Oral systemicOral systemic
Oral systemic
 
Online reputation management
Online reputation managementOnline reputation management
Online reputation management
 
Achims Draft for Tuulima PSSF APPLICATION-April 2013
Achims Draft for Tuulima PSSF APPLICATION-April 2013Achims Draft for Tuulima PSSF APPLICATION-April 2013
Achims Draft for Tuulima PSSF APPLICATION-April 2013
 

Semelhante a Ted - CyberSecurity for your Business

Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsKrishna Srikanth Manda
 
It security in healthcare
It security in healthcareIt security in healthcare
It security in healthcareNicholas Davis
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureLourdes Paloma Gimenez
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber securitySumanPramanik7
 
Information & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineInformation & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineSumanPramanik7
 
Iron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyIron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyGabor Szathmari
 
Computer security and malware by shahzad younas
Computer security and malware by shahzad younasComputer security and malware by shahzad younas
Computer security and malware by shahzad younasShahzad Younas
 
Question 1 Discuss some human safeguards for employees that can .docx
Question 1 Discuss some human safeguards for employees that can .docxQuestion 1 Discuss some human safeguards for employees that can .docx
Question 1 Discuss some human safeguards for employees that can .docxIRESH3
 
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network InsightsNowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network InsightsIBM Security
 
Data security best practices for risk awareness and mitigation
Data security best practices for risk awareness and mitigationData security best practices for risk awareness and mitigation
Data security best practices for risk awareness and mitigationNick Chandi
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self DefenseBarry Caplin
 
Internet Security
Internet SecurityInternet Security
Internet Securitymjelson
 
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...nexxtep
 
Information security
Information securityInformation security
Information securitylinalona515
 
Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?PECB
 
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorJames Krusic
 

Semelhante a Ted - CyberSecurity for your Business (20)

Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
It security in healthcare
It security in healthcareIt security in healthcare
It security in healthcare
 
Janitor vs cleaner
Janitor vs cleanerJanitor vs cleaner
Janitor vs cleaner
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity posture
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber security
 
Information & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineInformation & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. online
 
Iron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyIron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data Responsibly
 
Computer security and malware by shahzad younas
Computer security and malware by shahzad younasComputer security and malware by shahzad younas
Computer security and malware by shahzad younas
 
Question 1 Discuss some human safeguards for employees that can .docx
Question 1 Discuss some human safeguards for employees that can .docxQuestion 1 Discuss some human safeguards for employees that can .docx
Question 1 Discuss some human safeguards for employees that can .docx
 
Cyber
CyberCyber
Cyber
 
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network InsightsNowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
 
Data security best practices for risk awareness and mitigation
Data security best practices for risk awareness and mitigationData security best practices for risk awareness and mitigation
Data security best practices for risk awareness and mitigation
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self Defense
 
Hacking
HackingHacking
Hacking
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Drooger, jack cyber security
Drooger, jack   cyber securityDrooger, jack   cyber security
Drooger, jack cyber security
 
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...
 
Information security
Information securityInformation security
Information security
 
Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?
 
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human Behavior
 

Ted - CyberSecurity for your Business

  • 1.
  • 2. Ted Sanders Cyber Security for Your Business Digital Marketing Manager
  • 3. Social Marketing | Paid Search | Revenue per Unit, Business Evaluation | Maintenance | Task Management, Data Standardization | Customer Service, Sound Accounting | Website Management CYBER SECURITY
  • 4. Internet Security Threats to Property Management
  • 5. 5 Ways to Defend Your Business From Hackers • It’s a top-down commitment • This is not an IT problem – it’s a business issue • It’s not a matter of “if” it’s a matter of “when” • The only thing harder and more expensive than preparing for a threat now is waiting until you’ve been hacked • Any effort is better than no effort
  • 6. Security vs. Access • More security means less access • More access means less security
  • 7. Types of Hacks and Prevention • Network and System Attacks • Email Hacking- Spam, Virus, and “Phishing” • Password strength and strategies • Encrypted Password Tools for everyone
  • 8. #1 Security Vulnerability Social Hackers – people who attempt to gain access to restricted information by using seemingly legitimate techniques.
  • 9. Types of Social Hacks - Dumpster diving - Roleplaying - Tailgating - Spearphishing
  • 10. Network Hacking Network Attacks • Packet Sniffing (Eavesdropping) • IP Address Spoofing • Session Hijacking • Man in the Middle (MITM) System Attacks • Password Cracking • SQL Injection • Web Protocol Abuse • Denial of Service (DOS) • Distributed Denial of Service (DDOS) • Trap Door • Virus, Worm, Trojan horse
  • 11. Hacking Prevention • Change Passwords Regularly (Monthly, Quarterly, etc.) • Manage who has access to what • Terminate access for old vendors and employees • Utilize anti-virus software • Lock – doors, computers, etc. • Use shredding service for confidential documents
  • 12. Email Hacking • Spam • Virus • Phishing spam phishingvirus
  • 13. Virus Examples You didn't ask for this file, but perhaps think you did or you are curious as to whether it's an honest mistake. It's not. Also, never open a file of type ".pif". Subject: Re: Your product From: arielb@rice.edu Here is the file. Attachments: your_product.pif 23k The W32.Sober.K@mm virus. Some viruses are hidden inside ZIP files. As usual, the FROM address is forged. Subject: You visit illegal websites From: Officer@FBI.gov Dear Sir/Madam, we have logged your IP-address on more than 40 illegal Websites. Important: Please answer our questions! The list of questions are attached. Attachments: indictment_cit2987.zip
  • 14. SPAM!!! (90% of all international email traffic)
  • 16. Phish (Not that Phish!)
  • 17. Phishing on a Web Page
  • 18. SpearPhishing – Don’t Open the Link!
  • 19.
  • 20. SIMPLIFY YOUR LIFE. LastPass remembers your passwords so that you can focus on the more important things in life. Cost is **FREE** www.lastpass.com
  • 21. Top Takeaways  Your accountable for your data  Never send personal information by email  Consider using password and security products like Lastpass and AppRiver  Most security breaches originate within an organization’s sphere of influence
  • 22. THANK YOU For additional information email: internetmarketing@realpropertymgt.com

Notas do Editor

  1. Splash page