2. Presenter: Greg Wartes, MCP
www.servit.net
• East Carolina University
• Microsoft Certified Business Management Solutions
Professional
• Technology Enthusiast – Published in:
• Wall Street Journal – ‘Cloud Innovator’
• Redmond Channel Magazine : 2011 & 2012
• Huffington Post – SBA National Small Business
Conference Microsoft Cloud Representative
• Microsoft Case Study – Cloud Based PC Manageme
• Former PGA Golf Professional
3. Presenter: Tony Merendino ServIT - CEO
www.servit.net
• The University of Tennessee at Chattanooga
BA, Business Management
• Over 20 years of experience in Executive level positions in
the arena of technology
• Former owner/CEO of BMC Solution
• Former professional athlete - NFL with the NY Jets
• Recently acquired an all organic farm which is producing
organic hay and organic angus beef
7. Every 10 seconds, a consumer gets hit
with ransomware.
(up from every 20 seconds in Q1 2016)
Every 40 seconds, a company gets
hit with ransomware.
(up from every 2 minutes in Q1 2016)
8. The world's biggest cyberattack
has hit at least 150 countries and
infected 300,000 machines since it
started spreading Friday (May 17th,
2017.) ((Virus released May 12th,
9.
10. "According to the Wall Street Journal, over 34,000 computer security
incidents occur every day – and 62 percent of those incidents involve
breaches of small and medium-sized businesses.*
*Simon, Ruth. “‘Ransomware’ a Growing Threat to Small
Businesses.” The Wall Street Journal. April 15, 2015."
11.
12. SMB is an
organization with
500 users or less
do not have a
dedicated IT person
or I.T. partner/firm
do not have a
dedicated Security
person or firm
81% 86%
13. Attacks on large enterprises resulted in a confirmed breach
Attacks on SMB resulted in a confirmed breach
83%
0.7%
14. Cyber Crime Affects All Industries
Financial
Services:
$16.53
Utilities &
Energy:
$14.80
Technology:
$11.04
Services:
$8.99
Industrial:
$8.05
Healthcare:
$7.35
Retail:
$7.12
Transportation:
$6.81
Communications:
$6.13
Media:
$5.75
Pharmaceutical:
$4.92
Hospitality:
$3.68
2016 Cost of Cyber Crime Study & the Risk of Business Innovation: Ponemon Institute : http://www.ponemon.org/library/2016-cost-of-cyber-crime-study-the-risk-of-business-innovation
Average Cost of Breach per Company by Sector in US$ millions (2016)
17. 4.9 MONTHSis the average time to detect a
data breach in an organization.
Source: infocyte.com
8 months 8 months 8 months
~1 year ~1 year ~1 year
18. Understanding Why Ransomware is on the Rise
• It is easier for hackers to execute than other campaigns
̶ Social Engineering
̶ Exploit Kits
̶ Broad Audience without customization or localization
• The Money Factors
̶ Time to money is sooner
̶ Bitcoin reduces risk on collection, and eliminates reversals
• Less Technical Obstacles
̶ Simplified Attacks, some without Command & Control
̶ Onus is on the victim to pay, not on hacker to exfiltrate
22. Ransomware Trend #2: Phishing email attachments have
become the #1 delivery vehicle for ransomware
The number of ransomware variants grew by a factor of 30x in 2016.
Criminals know a cash cow when they see one.
Experts estimate ransomware generated $1 billion last year.
23. FORTUNE Magazine:
“Security experts have been
warning organizations that
failed to apply security
patches to
their MicrosoftWindows-
based computer systems that
it was only a matter of time
before another digital siege
surfaced. It seems their
predictions have borne true.”
24. Bitcoin is a new currency that was created in 2009 by an
unknown person using the alias Satoshi Nakamoto.
Transactions are made with no middle men – meaning, no
banks! There are no transaction fees and no need to give your
real name. More merchants are beginning to accept them: You
can buy webhosting services, pizza or even manicures.
25.
26. Any downtime can be debilitating. For example, each day of an IT outage
costs small and medium-sized companies an estimated $12,500, Symantec
estimates, noting that this figure excludes the impact of a company’s
computers being down on customers.
In assessing the damage done by
hurricanes Katrina and Rita in the
Gulf Coast states in 2005, U.S.
Congress found that 43 percent of
businesses that close after a natural
disaster never reopen. Of those that
stay open, more than 29 percent
close within two years.
27.
28.
29.
30.
31. Group Policy is a hierarchical
infrastructure that allows a network
administrator in charge of Microsoft's
Active Directory to implement specific
configurations for users and
computers. Group Policycan also be used
to define user, security and
networking policies at the machine level.
34. •Install Firewall
•Install Antivirus Software
•Install Anti-Spyware Software
•Use Complex and Secure
Passwords/Phrases
•Check on the Security Settings of the
Browser
38. CCleaner is a small, effective utility for computers running Microsoft Windows
that cleans out the 'junk' that accumulates over time: temporary files, broken
shortcuts, and other problems. CCleaner protects your privacy.
59. Ad supported software, often called Adware or Advertising Supported Software, is
used when referencing any type of program that downloads or displays unwanted
banner advertisements in the software being used. Adware is often bundled within
software a computer owner purchases.
However, adware can also contain or be classified as spyware, a type of malware
that is considered by many to be privacy-invasive. Spyware can steal a user’s
information or corrupt the user’s system files.
60. If you are not expecting the mail – take
the proper precautions to ensure it is a
legit email.
Do NOT open ANY attachments from
people that you do not know!
62. Keep your O/S up to date:
Virtualization-based security
Secure booting
Windows Hello is Windows 10’s attempt to
get rid of passwords, which are often
stolen and reused. Hello supports three
methods of biometric authentication (facial,
iris, and fingerprint) in concert with a
simple PIN.
Passport: If your computer has a TPM
chip, the private key of the asymmetric key
pair is securely stored there instead of in
software. You use Hello or your PIN to
authenticate locally, then use Passport to
securely authenticate to other network
locations.
Device Guard is a highly secure tool that
determines which applications and scripts
should be allowed to run on a particular
computer.
Credential Guard
Enterprise Data Protection
Seth's books deal what is defined as the last 50 years of business called “ the factory model”. He emphatically states that this is completely broken!
Defining what we mean. We argue over different definitions, and because someone is doing what we want!
everybody must be aligned around the same story! A must is everyone must be able to TELL the story. What is your value proposition. Must come from the top.
question, can anyone name the 3 methodologies stated by MIT
everybody must be aligned around the same story! A must is everyone must be able to TELL the story. What is your value proposition. Must come from the top.
question, can anyone name the 3 methodologies stated by MIT
https://www.infocyte.com/blog/2016/7/26/how-many-days-does-it-take-to-discover-a-breach-the-answer-may-shock-you
OPM= Office of Personnel Management
everybody must be aligned around the same story! A must is everyone must be able to TELL the story. What is your value proposition. Must come from the top.
question, can anyone name the 3 methodologies stated by MIT
Seth's books deal what is defined as the last 50 years of business called “ the factory model”. He emphatically states that this is completely broken!
Changing the way we live, work and play.
Seth's books deal what is defined as the last 50 years of business called “ the factory model”. He emphatically states that this is completely broken!
Seth's books deal what is defined as the last 50 years of business called “ the factory model”. He emphatically states that this is completely broken!
Seth's books deal what is defined as the last 50 years of business called “ the factory model”. He emphatically states that this is completely broken!
Patterns were discovered
Patterns were discovered
Patterns were discovered
Patterns were discovered
Patterns were discovered
Multi tasking!!!!! Calling is very difficult. So is email. Linkin, face book. Traditional selling is on trial.
A place from which you see. Where a belief system is birthed.
Connections and without walls.
Connections and without walls.
Ecommerce, social media, information SEO, PPC, etc
Reptilian brain- define as 95% of our brain spends time on protecting us!
Saber tooth tiger then; image and political correctness now!
Reptilian brain- define as 95% of our brain spends time on protecting us!
Saber tooth tiger then; image and political correctness now!
If I have money why change?
Surgery/Advice via the internet
If I have money why change?
Seth's books deal what is defined as the last 50 years of business called “ the factory model”. He emphatically states that this is completely broken!