Slides from our latest webinar "Top 5 Security Threats Facing Businesses Today." Whether or not they are truly the top 5 most dangerous threats may be debatable but the threat they pose to a businesses network are not. Enjoy!
1. Top 5 Security Threats
Facing Businesses Today
Key Considerations in Protecting
Your Data and Your Future
Network Security Series
Part 1 of 2
2. How to Interact Today
Type your questions and
comments here
throughout the webinar.
We will answer them
periodically or at the end.
or…
Email your questions to
sales@velocityns.com and
we will reply to you by the
end of the day.
4. Who is this webinar for?
Business Owners
Executives
Office Administrators
Business Managers
IT Staff Members
5. The Key Takeaways
The 5 major security threats facing your business today
How these threats work
Tips to protecting your network
• More on Network Security Components in Part 2 of the Series
6. Today’s attendees will receive…
Network Assessment + Risk Report
by Velocity Network Solutions
7. The 5 threats we’ll cover…
Malware
Torrents (peer-to-peer networks)
Snowshoe Spamming
Hacking-as-a-Service
Mobile Threats
9. Malware
malicious software used to gather sensitive data,
infiltrate private networks or harm general operations.
computer viruses
ransomware
worms
trojan horses
rootkits
keyloggers
dialers
spyware
adware
malicious BHOs
rogue security software
10. Tips to Protect Your Network
Use enterprise grade anti-malware software
Have a backup & disaster recovery solution in place
Limit which websites employees can visit
Educate staff on best practices
12. Torrents (peer-to-peer networks)
a way of sharing often pirated files such as music, video,
software, etc. within a peer-to-peer network by
simultaneously downloading and uploading segments of
each file.
BitTorrent
The Pirate Bay
Torrentz
Kickass Torrents
IsoHunt
ExtraTorrent
1337x
EZTV
BitSnoop
TorrentReactor
13. Tips to Protect Your Network
Safest bet…don’t use them!
Use a PC that’s off your business’s network
Scan the files for viruses and wait for results
15. Snowshoe Spamming
a spamming technique in which a spammer uses a
multitude of IP addresses in order to widely disperse
spam messages. This large spread of IP addresses
increases the difficulty in identifying the source,
allowing it to reach more email inboxes.
16. Tips to Protect Your Network
Impossible to protect yourself 100% BUT thee are still
solid options
Use enterprise grade anti-spam software
Be smart about which emails you open and what files
you download
18. Hacking-as-a-Service
people who wish to engage in cybercrime can pay
money to gain access to hacking tools and services
provided by expert hackers.
attacks-as-a-service
malware-as-a-service
fraud-as-a-service
cybercrime-as-a-service
19. Tips to Protect Your Network
Engage a well-rounded security toolset
Hire a professional IT firm or employee to stay current
with upgrades and updates
DO NOT assume that hackers are not interested in
your particular business!
21. Mobile Threats
hackers are increasingly targeting mobile devices from a
number of different angles as mobile devices tend to
store a plethora of personal and business information.
Cyber attacks on mobile devices jumped by 500% in 2012*
Of the 3 major cell phone manufacturers (Android,
Blackberry and Apple), Android’s OS is the least secure,
with Blackberry being the most secure*
*Tom Kellerman - “Cybersecurity for small business: Hackers and mobile devices -
2013's top threats” – 6/12/2013 – courtesy of thestar.com
22. Tips to Protect Your Network
Enable and use passwords to access devices
Enable and use data encryption
Update OS and security items regularly
23. What we covered today
Malware
Torrents (peer-to-peer networks)
Snowshoe Spamming
Hacking-as-a-Service
Mobile Threats
24. How Velocity Network Solutions can help…
Develop a network security plan
Proactively monitor and update your network
Standardize your environment
Troubleshoot potentially hazardous issues
Backup and disaster recovery
and much more…
25. Join us for part 2 of our
Network Security Webinar Series
Wednesday, October 9th @ 11:00am PT
“5 Must-Have Components of a Secure Network”
26. Thank you for attending and
we’ll see you at the next webinar!
Phone: (818) 780-3600 x306 Email: dhall@velocityns.com
www.VelocityNS.com