O slideshow foi denunciado.
Utilizamos seu perfil e dados de atividades no LinkedIn para personalizar e exibir anúncios mais relevantes. Altere suas preferências de anúncios quando desejar.

Why Would I Be Hacked?

Even with all the advancements in online security, the world wide web is still very much the wild west. We have all heard about hackers, but what interest would they have in you? Find out not only why you would be targeted, but also how one google search could be all it takes to find you and your site's weaknesses.

  • Entre para ver os comentários

  • Seja a primeira pessoa a gostar disto

Why Would I Be Hacked?

  1. 1. cranberry.com/5minutes #5minutes This 5 Minute Webinar™ Sponsored By Why Would I Be Hacked? Small Business = Big Target Presented by CECIL JENTGES of RISK SOLUTIONS UNLIMITED
  2. 2. cranberry.com/5minutes #5minutes WHAT IS THE BIG IDEA? 20% of businesses are hacked within their first year of opening. 34% of businesses being hacked have less than 250 employees. WEB APPLICATION SECURITY THE NEED IS NOW MAKE SURE YOU ARE SECURE BEFORE IT'S TOO LATE.
  3. 3. 5 MINUTE FACT #1 NUTS & BOLTS 1) Stealing User Information Hackers have the ability to find your website’s vulnerabilities with a simple Google search.
  4. 4. NUTS & BOLTS Hackers have software programs designed to specifically attack WordPress hosted websites. 2) Hosting Illegal Content 5 MINUTE FACT #2
  5. 5. NUTS & BOLTS 3) Search Engine Optimization 5 MINUTE FACT #3 Hackers can spoof your online store checkout process, redirecting all sales and credit card information to them.
  6. 6. NUTS & BOLTS 4) Spam Mail Server 5 MINUTE FACT #4 Hackers target free email accounts because they are easy to hack (Gmail, Yahoo, MSN, etc.)
  7. 7. NUTS & BOLTS 5 MINUTE FACT #5 Hackers can insert their viruses into word, excel, and pdf documents that appear innocent when opened. 5) Spreading Viruses, Trojans, Etc.
  8. 8. NUTS & BOLTS 5 MINUTE FACT #6 Hackers can encrypt their viruses so that your antivirus software an’t detect them. 6) To Use It in a Botnet
  9. 9. NUTS & BOLTS 5 MINUTE FACT #7 Hackers can funnel their attacks through servers in China, Russia, and other places where the U.S. has no legal jurisdiction. 7) Rent Out Your Server
  10. 10. WHY IT MATTERS 1 2 3 Hackers can be hired to protect you from other hackers and train your IT or staff on what red flags to look for. 5 MINUTE FACT #8 Check your site’s vulnerabilities Fix all detected problems Have your website monitored for suspicious activity
  11. 11. Thank You! Thank You!WANT MORE INFORMATION? Call us at (360) 319-3988 or email risksolutionsunlimited@gmail.com