Ted Sanders discusses cyber security threats facing businesses and provides recommendations to defend against hackers. He notes that cyber security is a business issue, not just an IT problem, and any efforts are better than none. He outlines common hacks like network attacks, email hacking through spam, viruses and phishing. Social engineering is the #1 vulnerability where hackers use legitimate techniques to gain access. Sanders recommends regularly changing passwords, limiting access, using antivirus software, and shredding documents to prevent various hacks. The key takeaways are to be accountable for data, avoid sending personal info by email, and consider security products and services.
5. 5 Ways to Defend Your Business From Hackers
• It’s a top-down commitment
• This is not an IT problem – it’s a business issue
• It’s not a matter of “if” it’s a matter of “when”
• The only thing harder and more expensive than
preparing for a threat now is waiting until you’ve been
hacked
• Any effort is better than no effort
6. Security vs. Access
• More security means less access
• More access means less security
7. Types of Hacks and Prevention
• Network and System Attacks
• Email Hacking- Spam, Virus, and “Phishing”
• Password strength and strategies
• Encrypted Password Tools for everyone
8. #1 Security Vulnerability
Social Hackers – people who attempt to gain
access to restricted information by using
seemingly legitimate techniques.
9. Types of Social Hacks
- Dumpster diving
- Roleplaying
- Tailgating
- Spearphishing
10. Network Hacking
Network Attacks
• Packet Sniffing
(Eavesdropping)
• IP Address Spoofing
• Session Hijacking
• Man in the Middle
(MITM)
System Attacks
• Password Cracking
• SQL Injection
• Web Protocol Abuse
• Denial of Service (DOS)
• Distributed Denial of Service
(DDOS)
• Trap Door
• Virus, Worm, Trojan horse
11. Hacking Prevention
• Change Passwords Regularly (Monthly, Quarterly, etc.)
• Manage who has access to what
• Terminate access for old vendors and employees
• Utilize anti-virus software
• Lock – doors, computers, etc.
• Use shredding service for confidential documents
13. Virus Examples
You didn't ask for this file, but perhaps think
you did or you are curious as to whether it's
an honest mistake. It's not. Also, never
open a file of type ".pif".
Subject: Re: Your product
From: arielb@rice.edu
Here is the file.
Attachments: your_product.pif 23k
The W32.Sober.K@mm virus. Some
viruses are hidden inside ZIP files. As
usual, the FROM address is forged.
Subject: You visit illegal websites
From: Officer@FBI.gov
Dear Sir/Madam,
we have logged your IP-address on more than
40 illegal
Websites. Important: Please answer our
questions!
The list of questions are attached.
Attachments: indictment_cit2987.zip
20. SIMPLIFY YOUR LIFE.
LastPass remembers your passwords so that
you can focus on the more important things in
life. Cost is **FREE**
www.lastpass.com
21. Top Takeaways
Your accountable for your data
Never send personal information by email
Consider using password and security products like Lastpass and
AppRiver
Most security breaches originate within an organization’s sphere of
influence