SlideShare a Scribd company logo
1 of 68
Security Minded
Presenter: Greg Wartes, MCP
www.servit.net
• East Carolina University
• Microsoft Certified Business Management Solutions
Professional
• Technology Enthusiast – Published in:
• Wall Street Journal – ‘Cloud Innovator’
• Redmond Channel Magazine : 2011 & 2012
• Huffington Post – SBA National Small Business
Conference Microsoft Cloud Representative
• Microsoft Case Study – Cloud Based PC Manageme
• Former PGA Golf Professional
Presenter: Tony Merendino ServIT - CEO
www.servit.net
• The University of Tennessee at Chattanooga
BA, Business Management
• Over 20 years of experience in Executive level positions in
the arena of technology
• Former owner/CEO of BMC Solution
• Former professional athlete - NFL with the NY Jets
• Recently acquired an all organic farm which is producing
organic hay and organic angus beef
AGENDA
Ransomware Facts
Figures
Network Security
What can you do?
Your Thoughts?
Who? How? Why?
Browsing Security
Every 10 seconds, a consumer gets hit
with ransomware.
(up from every 20 seconds in Q1 2016)
Every 40 seconds, a company gets
hit with ransomware.
(up from every 2 minutes in Q1 2016)
The world's biggest cyberattack
has hit at least 150 countries and
infected 300,000 machines since it
started spreading Friday (May 17th,
2017.) ((Virus released May 12th,
"According to the Wall Street Journal, over 34,000 computer security
incidents occur every day – and 62 percent of those incidents involve
breaches of small and medium-sized businesses.*
*Simon, Ruth. “‘Ransomware’ a Growing Threat to Small
Businesses.” The Wall Street Journal. April 15, 2015."
SMB is an
organization with
500 users or less
do not have a
dedicated IT person
or I.T. partner/firm
do not have a
dedicated Security
person or firm
81% 86%
Attacks on large enterprises resulted in a confirmed breach
Attacks on SMB resulted in a confirmed breach
83%
0.7%
Cyber Crime Affects All Industries
Financial
Services:
$16.53
Utilities &
Energy:
$14.80
Technology:
$11.04
Services:
$8.99
Industrial:
$8.05
Healthcare:
$7.35
Retail:
$7.12
Transportation:
$6.81
Communications:
$6.13
Media:
$5.75
Pharmaceutical:
$4.92
Hospitality:
$3.68
2016 Cost of Cyber Crime Study & the Risk of Business Innovation: Ponemon Institute : http://www.ponemon.org/library/2016-cost-of-cyber-crime-study-the-risk-of-business-innovation
Average Cost of Breach per Company by Sector in US$ millions (2016)
Average hacking cost
on a small business:
$32,000Average
4.9 MONTHSis the average time to detect a
data breach in an organization.
Source: infocyte.com
8 months 8 months 8 months
~1 year ~1 year ~1 year
Understanding Why Ransomware is on the Rise
• It is easier for hackers to execute than other campaigns
̶ Social Engineering
̶ Exploit Kits
̶ Broad Audience without customization or localization
• The Money Factors
̶ Time to money is sooner
̶ Bitcoin reduces risk on collection, and eliminates reversals
• Less Technical Obstacles
̶ Simplified Attacks, some without Command & Control
̶ Onus is on the victim to pay, not on hacker to exfiltrate
Downloading
malicious
documents
Browsing
infected
websites
Malicious
attachments
Malicious
links
Malicious
File from
USB
Server
vulnerability
exploit
Ransomware Trend #2: Phishing email attachments have
become the #1 delivery vehicle for ransomware
The number of ransomware variants grew by a factor of 30x in 2016.
Criminals know a cash cow when they see one.
Experts estimate ransomware generated $1 billion last year.
FORTUNE Magazine:
“Security experts have been
warning organizations that
failed to apply security
patches to
their MicrosoftWindows-
based computer systems that
it was only a matter of time
before another digital siege
surfaced. It seems their
predictions have borne true.”
Bitcoin is a new currency that was created in 2009 by an
unknown person using the alias Satoshi Nakamoto.
Transactions are made with no middle men – meaning, no
banks! There are no transaction fees and no need to give your
real name. More merchants are beginning to accept them: You
can buy webhosting services, pizza or even manicures.
Any downtime can be debilitating. For example, each day of an IT outage
costs small and medium-sized companies an estimated $12,500, Symantec
estimates, noting that this figure excludes the impact of a company’s
computers being down on customers.
In assessing the damage done by
hurricanes Katrina and Rita in the
Gulf Coast states in 2005, U.S.
Congress found that 43 percent of
businesses that close after a natural
disaster never reopen. Of those that
stay open, more than 29 percent
close within two years.
Group Policy is a hierarchical
infrastructure that allows a network
administrator in charge of Microsoft's
Active Directory to implement specific
configurations for users and
computers. Group Policycan also be used
to define user, security and
networking policies at the machine level.
HAVE PROFESSIONALS APPLY PATCHES AND UPDATES.
•Install Firewall
•Install Antivirus Software
•Install Anti-Spyware Software
•Use Complex and Secure
Passwords/Phrases
•Check on the Security Settings of the
Browser
Have up to date
virus scanners
running
CCleaner is a small, effective utility for computers running Microsoft Windows
that cleans out the 'junk' that accumulates over time: temporary files, broken
shortcuts, and other problems. CCleaner protects your privacy.
https://managedservicesatlanta.blogspot.com/2017/05/passwords-are-like-flossing.htm l
10 Helpful Hints for Password(s) complexity and protection
https://www.symantec.com/connect/blogs
http://blog.checkpoint.com/
https://blog.malwarebytes.com/
https://blogs.technet.microsoft.com/mmpc/
https://managedservicesatlanta.blogspot.com/
Ad supported software, often called Adware or Advertising Supported Software, is
used when referencing any type of program that downloads or displays unwanted
banner advertisements in the software being used. Adware is often bundled within
software a computer owner purchases.
However, adware can also contain or be classified as spyware, a type of malware
that is considered by many to be privacy-invasive. Spyware can steal a user’s
information or corrupt the user’s system files.
If you are not expecting the mail – take
the proper precautions to ensure it is a
legit email.
Do NOT open ANY attachments from
people that you do not know!
Keep your browser and your O/S up to date:
Keep your O/S up to date:
Virtualization-based security
Secure booting
Windows Hello is Windows 10’s attempt to
get rid of passwords, which are often
stolen and reused. Hello supports three
methods of biometric authentication (facial,
iris, and fingerprint) in concert with a
simple PIN.
Passport: If your computer has a TPM
chip, the private key of the asymmetric key
pair is securely stored there instead of in
software. You use Hello or your PIN to
authenticate locally, then use Passport to
securely authenticate to other network
locations.
Device Guard is a highly secure tool that
determines which applications and scripts
should be allowed to run on a particular
computer.
Credential Guard
Enterprise Data Protection
Keep your browser up to date:
Crawl
Firewall
Application Control (Detect)
URL Filtering
Intrusion Detection
Antivirus
Anti-Malware (Endpoint
Walk
Anti-Bot
Anti-Spam
E-mail Security
Application Control (Block)
Intrusion Protection
Media/Port Encryption (Endpoint)
Full Disk Encryption (Endpoint)
Remote Access VPN (Endpoint)
Run
Identity Awareness
Threat Extraction/Emulation (Gateway)
Emulation
Cloud Security
Mobile Security
DDos Protection
Document Protection
Threat Extraction/Emulation (Endpoint)
Greg Wartes
gwartes@servit.net
678-995-4735
www.servit.net
https://managedservicesatlanta.blogspot.com/

More Related Content

What's hot

Cyber Security Threats in the Financial Sector
Cyber Security Threats in the Financial SectorCyber Security Threats in the Financial Sector
Cyber Security Threats in the Financial SectorFarook Al-Jibouri
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsUlf Mattsson
 
What's Hot In IT - Cybersecurity
What's Hot In IT - CybersecurityWhat's Hot In IT - Cybersecurity
What's Hot In IT - CybersecurityRow Murray
 
Outlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber SecurityOutlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber SecurityMastel Indonesia
 
Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware IBM Security
 
140707_Cyber-Security
140707_Cyber-Security140707_Cyber-Security
140707_Cyber-SecurityTara Gravel
 
Board and Cyber Security
Board and Cyber SecurityBoard and Cyber Security
Board and Cyber SecurityLeon Fouche
 
2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public SectorScott Geye
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]Kolluru N Rao
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber securityCarol Meng-Shih Wang
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceCharles Lim
 
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemCybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemIBM Security
 
The Board and Cyber Security
The Board and Cyber SecurityThe Board and Cyber Security
The Board and Cyber SecurityFireEye, Inc.
 
Cyber-risk Oversight Handbook for Corporate Boards
Cyber-risk Oversight Handbook for Corporate BoardsCyber-risk Oversight Handbook for Corporate Boards
Cyber-risk Oversight Handbook for Corporate BoardsCheffley White
 
Cybersecurity and The Board
Cybersecurity and The BoardCybersecurity and The Board
Cybersecurity and The BoardPaul Melson
 
The 2016 Ponemon Cost of a Data Breach Study
The 2016 Ponemon Cost of a Data Breach StudyThe 2016 Ponemon Cost of a Data Breach Study
The 2016 Ponemon Cost of a Data Breach StudyIBM Security
 
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...Netpluz Asia Pte Ltd
 

What's hot (20)

Cyber Security Threats in the Financial Sector
Cyber Security Threats in the Financial SectorCyber Security Threats in the Financial Sector
Cyber Security Threats in the Financial Sector
 
Data breach
Data breachData breach
Data breach
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
What's Hot In IT - Cybersecurity
What's Hot In IT - CybersecurityWhat's Hot In IT - Cybersecurity
What's Hot In IT - Cybersecurity
 
Must Know Cyber Security Stats of 2016
Must Know Cyber Security Stats of 2016Must Know Cyber Security Stats of 2016
Must Know Cyber Security Stats of 2016
 
Outlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber SecurityOutlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber Security
 
Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware
 
140707_Cyber-Security
140707_Cyber-Security140707_Cyber-Security
140707_Cyber-Security
 
Board and Cyber Security
Board and Cyber SecurityBoard and Cyber Security
Board and Cyber Security
 
2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber security
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security Governance
 
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemCybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
 
The Board and Cyber Security
The Board and Cyber SecurityThe Board and Cyber Security
The Board and Cyber Security
 
Cyber-risk Oversight Handbook for Corporate Boards
Cyber-risk Oversight Handbook for Corporate BoardsCyber-risk Oversight Handbook for Corporate Boards
Cyber-risk Oversight Handbook for Corporate Boards
 
Cybersecurity and The Board
Cybersecurity and The BoardCybersecurity and The Board
Cybersecurity and The Board
 
The 2016 Ponemon Cost of a Data Breach Study
The 2016 Ponemon Cost of a Data Breach StudyThe 2016 Ponemon Cost of a Data Breach Study
The 2016 Ponemon Cost of a Data Breach Study
 
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
 
Ten Expert Tips on Internet of Things Security
Ten Expert Tips on Internet of Things SecurityTen Expert Tips on Internet of Things Security
Ten Expert Tips on Internet of Things Security
 

Similar to Security Minded - Ransomware Awareness

InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141sraina2
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?TechSoup
 
Best Security Practices for a Web Application
Best Security Practices for a Web Application Best Security Practices for a Web Application
Best Security Practices for a Web Application TriState Technology
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...Rishi Singh
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSPreetiDevidas
 
Securing Your Small Business Network
Securing Your Small Business NetworkSecuring Your Small Business Network
Securing Your Small Business NetworkAnindita Ghatak
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of securityMatthew Pascucci
 
First Union Bank Report
First Union Bank ReportFirst Union Bank Report
First Union Bank ReportYogesh Kumar
 
Ways To Protect Your Company From Cybercrime
Ways To Protect Your Company From CybercrimeWays To Protect Your Company From Cybercrime
Ways To Protect Your Company From Cybercrimethinkwithniche
 
Ransomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksRansomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksdinCloud Inc.
 
Panda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion GuidePanda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion GuidePanda Security
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Erik Ginalick
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threatsReadWrite
 
Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023K7 Computing Pvt Ltd
 
How to secure your enterprise data during Covid-19
How to secure your enterprise data during Covid-19How to secure your enterprise data during Covid-19
How to secure your enterprise data during Covid-19Dharmendra Rama
 
Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Joseph White MPA CPM
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays worldSibghatullah Khattak
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education ConferanceTommy Riggins
 

Similar to Security Minded - Ransomware Awareness (20)

InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
 
Best Security Practices for a Web Application
Best Security Practices for a Web Application Best Security Practices for a Web Application
Best Security Practices for a Web Application
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
 
Securing Your Small Business Network
Securing Your Small Business NetworkSecuring Your Small Business Network
Securing Your Small Business Network
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
 
First Union Bank Report
First Union Bank ReportFirst Union Bank Report
First Union Bank Report
 
Ways To Protect Your Company From Cybercrime
Ways To Protect Your Company From CybercrimeWays To Protect Your Company From Cybercrime
Ways To Protect Your Company From Cybercrime
 
Information security
Information securityInformation security
Information security
 
Ransomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksRansomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacks
 
Panda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion GuidePanda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion Guide
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
 
Securing Your Business
Securing Your BusinessSecuring Your Business
Securing Your Business
 
Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023
 
How to secure your enterprise data during Covid-19
How to secure your enterprise data during Covid-19How to secure your enterprise data during Covid-19
How to secure your enterprise data during Covid-19
 
Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays world
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
 

More from Greg Wartes, MCP

Pgatss slide deck june 7, 2018
Pgatss slide deck june 7, 2018Pgatss slide deck june 7, 2018
Pgatss slide deck june 7, 2018Greg Wartes, MCP
 
Augusta gen v presentation adapture v2
Augusta gen v presentation adapture v2Augusta gen v presentation adapture v2
Augusta gen v presentation adapture v2Greg Wartes, MCP
 
Ga society of cpa's 2018 coastal chapter
Ga society of cpa's   2018 coastal chapterGa society of cpa's   2018 coastal chapter
Ga society of cpa's 2018 coastal chapterGreg Wartes, MCP
 
Removing Reactive Behavior Inside Your Organization
Removing Reactive Behavior Inside Your Organization Removing Reactive Behavior Inside Your Organization
Removing Reactive Behavior Inside Your Organization Greg Wartes, MCP
 
Outcome Based Selling July 15th 2014 CPA event
Outcome Based Selling July 15th 2014 CPA eventOutcome Based Selling July 15th 2014 CPA event
Outcome Based Selling July 15th 2014 CPA eventGreg Wartes, MCP
 
Comptia slides managed print vegas
Comptia slides managed print vegasComptia slides managed print vegas
Comptia slides managed print vegasGreg Wartes, MCP
 
June 18th, 2013 gwinnete chapter of cpa's
June 18th, 2013 gwinnete chapter of cpa'sJune 18th, 2013 gwinnete chapter of cpa's
June 18th, 2013 gwinnete chapter of cpa'sGreg Wartes, MCP
 
Office 365 mid_market_sales_pitch_deck (3)
Office 365 mid_market_sales_pitch_deck (3)Office 365 mid_market_sales_pitch_deck (3)
Office 365 mid_market_sales_pitch_deck (3)Greg Wartes, MCP
 

More from Greg Wartes, MCP (9)

Pgatss slide deck june 7, 2018
Pgatss slide deck june 7, 2018Pgatss slide deck june 7, 2018
Pgatss slide deck june 7, 2018
 
Augusta gen v presentation adapture v2
Augusta gen v presentation adapture v2Augusta gen v presentation adapture v2
Augusta gen v presentation adapture v2
 
Kba talk track 2018
Kba talk track 2018Kba talk track 2018
Kba talk track 2018
 
Ga society of cpa's 2018 coastal chapter
Ga society of cpa's   2018 coastal chapterGa society of cpa's   2018 coastal chapter
Ga society of cpa's 2018 coastal chapter
 
Removing Reactive Behavior Inside Your Organization
Removing Reactive Behavior Inside Your Organization Removing Reactive Behavior Inside Your Organization
Removing Reactive Behavior Inside Your Organization
 
Outcome Based Selling July 15th 2014 CPA event
Outcome Based Selling July 15th 2014 CPA eventOutcome Based Selling July 15th 2014 CPA event
Outcome Based Selling July 15th 2014 CPA event
 
Comptia slides managed print vegas
Comptia slides managed print vegasComptia slides managed print vegas
Comptia slides managed print vegas
 
June 18th, 2013 gwinnete chapter of cpa's
June 18th, 2013 gwinnete chapter of cpa'sJune 18th, 2013 gwinnete chapter of cpa's
June 18th, 2013 gwinnete chapter of cpa's
 
Office 365 mid_market_sales_pitch_deck (3)
Office 365 mid_market_sales_pitch_deck (3)Office 365 mid_market_sales_pitch_deck (3)
Office 365 mid_market_sales_pitch_deck (3)
 

Recently uploaded

business environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxbusiness environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxShruti Mittal
 
Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsIndiaMART InterMESH Limited
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024Adnet Communications
 
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfGUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfDanny Diep To
 
Unveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesUnveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesDoe Paoro
 
Technical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamTechnical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamArik Fletcher
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environmentelijahj01012
 
Interoperability and ecosystems: Assembling the industrial metaverse
Interoperability and ecosystems:  Assembling the industrial metaverseInteroperability and ecosystems:  Assembling the industrial metaverse
Interoperability and ecosystems: Assembling the industrial metaverseSiemens
 
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...Operational Excellence Consulting
 
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdftrending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdfMintel Group
 
Psychic Reading | Spiritual Guidance – Astro Ganesh Ji
Psychic Reading | Spiritual Guidance – Astro Ganesh JiPsychic Reading | Spiritual Guidance – Astro Ganesh Ji
Psychic Reading | Spiritual Guidance – Astro Ganesh Jiastral oracle
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Peter Ward
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfShashank Mehta
 
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...ssuserf63bd7
 
Effective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold JewelryEffective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold JewelryWhittensFineJewelry1
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFChandresh Chudasama
 
Data Analytics Strategy Toolkit and Templates
Data Analytics Strategy Toolkit and TemplatesData Analytics Strategy Toolkit and Templates
Data Analytics Strategy Toolkit and TemplatesAurelien Domont, MBA
 
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdfChris Skinner
 

Recently uploaded (20)

business environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxbusiness environment micro environment macro environment.pptx
business environment micro environment macro environment.pptx
 
Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan Dynamics
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024
 
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfGUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
 
Unveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesUnveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic Experiences
 
Technical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamTechnical Leaders - Working with the Management Team
Technical Leaders - Working with the Management Team
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
Interoperability and ecosystems: Assembling the industrial metaverse
Interoperability and ecosystems:  Assembling the industrial metaverseInteroperability and ecosystems:  Assembling the industrial metaverse
Interoperability and ecosystems: Assembling the industrial metaverse
 
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
 
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdftrending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
 
Psychic Reading | Spiritual Guidance – Astro Ganesh Ji
Psychic Reading | Spiritual Guidance – Astro Ganesh JiPsychic Reading | Spiritual Guidance – Astro Ganesh Ji
Psychic Reading | Spiritual Guidance – Astro Ganesh Ji
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdf
 
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
 
Effective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold JewelryEffective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold Jewelry
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDF
 
Data Analytics Strategy Toolkit and Templates
Data Analytics Strategy Toolkit and TemplatesData Analytics Strategy Toolkit and Templates
Data Analytics Strategy Toolkit and Templates
 
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
 
WAM Corporate Presentation April 12 2024.pdf
WAM Corporate Presentation April 12 2024.pdfWAM Corporate Presentation April 12 2024.pdf
WAM Corporate Presentation April 12 2024.pdf
 

Security Minded - Ransomware Awareness

  • 2. Presenter: Greg Wartes, MCP www.servit.net • East Carolina University • Microsoft Certified Business Management Solutions Professional • Technology Enthusiast – Published in: • Wall Street Journal – ‘Cloud Innovator’ • Redmond Channel Magazine : 2011 & 2012 • Huffington Post – SBA National Small Business Conference Microsoft Cloud Representative • Microsoft Case Study – Cloud Based PC Manageme • Former PGA Golf Professional
  • 3. Presenter: Tony Merendino ServIT - CEO www.servit.net • The University of Tennessee at Chattanooga BA, Business Management • Over 20 years of experience in Executive level positions in the arena of technology • Former owner/CEO of BMC Solution • Former professional athlete - NFL with the NY Jets • Recently acquired an all organic farm which is producing organic hay and organic angus beef
  • 4. AGENDA Ransomware Facts Figures Network Security What can you do? Your Thoughts? Who? How? Why? Browsing Security
  • 5.
  • 6.
  • 7. Every 10 seconds, a consumer gets hit with ransomware. (up from every 20 seconds in Q1 2016) Every 40 seconds, a company gets hit with ransomware. (up from every 2 minutes in Q1 2016)
  • 8. The world's biggest cyberattack has hit at least 150 countries and infected 300,000 machines since it started spreading Friday (May 17th, 2017.) ((Virus released May 12th,
  • 9.
  • 10. "According to the Wall Street Journal, over 34,000 computer security incidents occur every day – and 62 percent of those incidents involve breaches of small and medium-sized businesses.* *Simon, Ruth. “‘Ransomware’ a Growing Threat to Small Businesses.” The Wall Street Journal. April 15, 2015."
  • 11.
  • 12. SMB is an organization with 500 users or less do not have a dedicated IT person or I.T. partner/firm do not have a dedicated Security person or firm 81% 86%
  • 13. Attacks on large enterprises resulted in a confirmed breach Attacks on SMB resulted in a confirmed breach 83% 0.7%
  • 14. Cyber Crime Affects All Industries Financial Services: $16.53 Utilities & Energy: $14.80 Technology: $11.04 Services: $8.99 Industrial: $8.05 Healthcare: $7.35 Retail: $7.12 Transportation: $6.81 Communications: $6.13 Media: $5.75 Pharmaceutical: $4.92 Hospitality: $3.68 2016 Cost of Cyber Crime Study & the Risk of Business Innovation: Ponemon Institute : http://www.ponemon.org/library/2016-cost-of-cyber-crime-study-the-risk-of-business-innovation Average Cost of Breach per Company by Sector in US$ millions (2016)
  • 15. Average hacking cost on a small business: $32,000Average
  • 16.
  • 17. 4.9 MONTHSis the average time to detect a data breach in an organization. Source: infocyte.com 8 months 8 months 8 months ~1 year ~1 year ~1 year
  • 18. Understanding Why Ransomware is on the Rise • It is easier for hackers to execute than other campaigns ̶ Social Engineering ̶ Exploit Kits ̶ Broad Audience without customization or localization • The Money Factors ̶ Time to money is sooner ̶ Bitcoin reduces risk on collection, and eliminates reversals • Less Technical Obstacles ̶ Simplified Attacks, some without Command & Control ̶ Onus is on the victim to pay, not on hacker to exfiltrate
  • 19.
  • 21.
  • 22. Ransomware Trend #2: Phishing email attachments have become the #1 delivery vehicle for ransomware The number of ransomware variants grew by a factor of 30x in 2016. Criminals know a cash cow when they see one. Experts estimate ransomware generated $1 billion last year.
  • 23. FORTUNE Magazine: “Security experts have been warning organizations that failed to apply security patches to their MicrosoftWindows- based computer systems that it was only a matter of time before another digital siege surfaced. It seems their predictions have borne true.”
  • 24. Bitcoin is a new currency that was created in 2009 by an unknown person using the alias Satoshi Nakamoto. Transactions are made with no middle men – meaning, no banks! There are no transaction fees and no need to give your real name. More merchants are beginning to accept them: You can buy webhosting services, pizza or even manicures.
  • 25.
  • 26. Any downtime can be debilitating. For example, each day of an IT outage costs small and medium-sized companies an estimated $12,500, Symantec estimates, noting that this figure excludes the impact of a company’s computers being down on customers. In assessing the damage done by hurricanes Katrina and Rita in the Gulf Coast states in 2005, U.S. Congress found that 43 percent of businesses that close after a natural disaster never reopen. Of those that stay open, more than 29 percent close within two years.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31. Group Policy is a hierarchical infrastructure that allows a network administrator in charge of Microsoft's Active Directory to implement specific configurations for users and computers. Group Policycan also be used to define user, security and networking policies at the machine level.
  • 32. HAVE PROFESSIONALS APPLY PATCHES AND UPDATES.
  • 33.
  • 34. •Install Firewall •Install Antivirus Software •Install Anti-Spyware Software •Use Complex and Secure Passwords/Phrases •Check on the Security Settings of the Browser
  • 35.
  • 36. Have up to date virus scanners running
  • 37.
  • 38. CCleaner is a small, effective utility for computers running Microsoft Windows that cleans out the 'junk' that accumulates over time: temporary files, broken shortcuts, and other problems. CCleaner protects your privacy.
  • 39.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
  • 59. Ad supported software, often called Adware or Advertising Supported Software, is used when referencing any type of program that downloads or displays unwanted banner advertisements in the software being used. Adware is often bundled within software a computer owner purchases. However, adware can also contain or be classified as spyware, a type of malware that is considered by many to be privacy-invasive. Spyware can steal a user’s information or corrupt the user’s system files.
  • 60. If you are not expecting the mail – take the proper precautions to ensure it is a legit email. Do NOT open ANY attachments from people that you do not know!
  • 61. Keep your browser and your O/S up to date:
  • 62. Keep your O/S up to date: Virtualization-based security Secure booting Windows Hello is Windows 10’s attempt to get rid of passwords, which are often stolen and reused. Hello supports three methods of biometric authentication (facial, iris, and fingerprint) in concert with a simple PIN. Passport: If your computer has a TPM chip, the private key of the asymmetric key pair is securely stored there instead of in software. You use Hello or your PIN to authenticate locally, then use Passport to securely authenticate to other network locations. Device Guard is a highly secure tool that determines which applications and scripts should be allowed to run on a particular computer. Credential Guard Enterprise Data Protection
  • 63. Keep your browser up to date:
  • 64.
  • 65. Crawl Firewall Application Control (Detect) URL Filtering Intrusion Detection Antivirus Anti-Malware (Endpoint Walk Anti-Bot Anti-Spam E-mail Security Application Control (Block) Intrusion Protection Media/Port Encryption (Endpoint) Full Disk Encryption (Endpoint) Remote Access VPN (Endpoint) Run Identity Awareness Threat Extraction/Emulation (Gateway) Emulation Cloud Security Mobile Security DDos Protection Document Protection Threat Extraction/Emulation (Endpoint)
  • 66.
  • 67.

Editor's Notes

  1. ServIT
  2. ServIT
  3. ServIT
  4. Seth's books deal what is defined as the last 50 years of business called “ the factory model”. He emphatically states that this is completely broken!
  5. Defining what we mean. We argue over different definitions, and because someone is doing what we want!
  6. everybody must be aligned around the same story! A must is everyone must be able to TELL the story. What is your value proposition. Must come from the top. question, can anyone name the 3 methodologies stated by MIT
  7. everybody must be aligned around the same story! A must is everyone must be able to TELL the story. What is your value proposition. Must come from the top. question, can anyone name the 3 methodologies stated by MIT
  8. https://www.infocyte.com/blog/2016/7/26/how-many-days-does-it-take-to-discover-a-breach-the-answer-may-shock-you OPM= Office of Personnel Management
  9. everybody must be aligned around the same story! A must is everyone must be able to TELL the story. What is your value proposition. Must come from the top. question, can anyone name the 3 methodologies stated by MIT
  10. Seth's books deal what is defined as the last 50 years of business called “ the factory model”. He emphatically states that this is completely broken!
  11. Changing the way we live, work and play.
  12. Seth's books deal what is defined as the last 50 years of business called “ the factory model”. He emphatically states that this is completely broken!
  13. Seth's books deal what is defined as the last 50 years of business called “ the factory model”. He emphatically states that this is completely broken!
  14. Seth's books deal what is defined as the last 50 years of business called “ the factory model”. He emphatically states that this is completely broken!
  15. Patterns were discovered
  16. Patterns were discovered
  17. Patterns were discovered
  18. Patterns were discovered
  19. Patterns were discovered
  20. Multi tasking!!!!! Calling is very difficult. So is email. Linkin, face book. Traditional selling is on trial.
  21. A place from which you see. Where a belief system is birthed.
  22. Connections and without walls.
  23. Connections and without walls.
  24. Ecommerce, social media, information SEO, PPC, etc
  25. Reptilian brain- define as 95% of our brain spends time on protecting us! Saber tooth tiger then; image and political correctness now!
  26. Reptilian brain- define as 95% of our brain spends time on protecting us! Saber tooth tiger then; image and political correctness now!
  27. If I have money why change?
  28. Surgery/Advice via the internet
  29. If I have money why change?
  30. Seth's books deal what is defined as the last 50 years of business called “ the factory model”. He emphatically states that this is completely broken!
  31. Connections and without walls.
  32. Patterns were discovered