2. *Intro to Network Security
Network Security is no joke. Whether you have a website, online accounts•
or any cyber-based infrastructure, you are at risk of a network attack.
Even though the public only hears about cyber attacks against large•
companies, banks and government websites, small businesses make the
best targets for cyber criminals.
Due to the lack of resources of small businesses, they have the least•
protected websites, accounts and network systems, making cyber attacks
against them a relatively easy job.
3. “Attacks against small
businesses continued to
grow in 2015, although
many of these attacks
were directed to fewer
organizations, increasing
by 9 percentage points.“
www.symantec.com
* Phishing Attacks by Size of Targeted
Organization
03
| nutmegtech.com
4. * 5 Most Common Network Security
Mistakes
Uninformed
users opening phishing emails
Passwords
Passwords that are insecure or
don’t expire, along with default
password and user accounts left in
place
Out-of-date
operating systems with known
vulnerabilities left on the internet;
this can be a threat to other, more
up to date machines.
Open ports
on the firewall, for example, to let
someone remote in from home
Unsecured
WiFi
04
| nutmegtech.com
5. Network security is the
any protection of access,
misuse, and hacking of
files and directories in a
computer network system.
Some of the most
common threats to a
network include viruses,
worms, spyware, adware
and identity theft.
One of the most important
aspects is the multiple layers
of security. There is no single
package or system that will
offer complete protection
against every threat to your
network, so it is important to
remember to use multiple
layers of security for your
network.
What is Network Security
05
| nutmegtech.com
6. As the internet evolves and
computer networks become bigger
and bigger, network security has
become one of the most important
factors for companies to consider.
By increasing your network
security, you decrease your chance
of compromising your data.
As the complexity of the systems
and the networks are increasing,
vulnerabilities are also increasing
and the task of securing the
networks is becoming more
complex. This makes network
security an essential part of today’s
businesses.
“”We are the best app development
company in the market”
Why Do We
Need Security?
Data is the most precious factor of today’s businesses.
06
| nutmegtech.com
7. * 10 Most Common Security Threats
According to Cisco.com
01. Malware
03. Rogue Security Software
02. Computer virus
04.
07
Trojan Horse
06. Computer Worm
08. Spam
07. Botnet
09. Phishing
05. Malicious Spyware 10. Rootkit
9. Computer Virus
09
A computer virus, much like a flu virus, is designed to spread from host to host•
and has the ability to replicate itself.
The virus could corrupt, steal, or delete data on your computer• —even erasing
everything on your hard drive.
| nutmegtech.com
10. * Rogue Security Software
Have you ever seen a pop-up window that
advertises a security update or alert?
The goal of rogue security software,
“
is to deceive you into believing that your computer is infected with some serious
threats, and then trick you into installing/purchasing fake security software.
10
| nutmegtech.com
11. A Trojan horse is a type of•
malware that is often
disguised as software.
Trojans can be employed by
hackers trying to gain access
to users' systems.
Once inside your computer,•
a Trojan horse can do
anything from record your
passwords by logging
keystrokes to hijacking your
webcam to watch and record
your every move.
Trojan Horse
11
12. * Malicious Spyware
[spahy-wair]
Malicious spyware is used to describe the•
Trojan application that was created by cyber
criminals to spy on their victims.
An example would be key logger software that•
records a victim’s every keystroke on his or her
keyboard.
Spyware is used to conduct espionage.•
12
| nutmegtech.com
13. A computer worm is a self -replicating
computer program that penetrates an
operating system with the intent of
spreading malicious code.
For example, a worm can send copies of
itself to every contact in your email
address book and then send itself to all the
contacts in your contacts’ address books.
Worms can replicate in great volume and
with great speed.
* Computer Worm
13
| nutmegtech.com
14. Botnets are networks
made up of remote-
controlled computers, or
“bots.” These computers
have been infected with
malware that allows them
to be remotely controlled.
An individual computer in
the group is known as a
“zombie“ computer.
* Botnet
14
| nutmegtech.com
15. * Spam
Spam in the security context is primarily used1.
to describe email spam —unwanted messages in
your email inbox.
Spam is e2. -mail sent to thousands and
sometimes millions of people without prior
approval, promoting a particular product,
service or a scam to get other people's money.
However, spam messages can contain links that3.
when clicked on could go to a website that
installs malicious software onto your computer.
15
| nutmegtech.com
16. * Phishing
Phishing refers to the process where a targeted individual is contacted by email or telephone
by someone posing as a legitimate institution to lure the individual into providing sensitive
information such as banking information, credit card details, and passwords.
For example,
“
the message would try to lure you into giving your personal information by
pretending that your bank or email service provider.
16
| nutmegtech.com
17. Rootkit
A set of software tools that
enable an unauthorized user
to gain control of a computer
system without being
detected.
* A rootkit could be installed on
your computer by a
cybercriminal exploiting a
vulnerability or security hole in
a legitimate application on your
PC and may contain spyware
that monitors and records
keystrokes.
*
17
[ro͞otˌkit]
Noun, computing.
a set of software tools that enable an unauthorized user to gain control of a computer system
without being detected.
| nutmegtech.com
18. * There are Five Steps to Protect Your
Network
IMPLEMENT ANALYZE TEST MODIFY
18
MONITOR
| nutmegtech.com
19. * 5 Steps to Protect Your Network
Implement Analyze Test Modify Monitor
The first step is to
create and implement a
network security system
system that provides
protection and has
sufficient authorization
policies.
Once the network
security system is
created and
implemented, the
system needs to be
analyzed to determine
if the current security
system is appropriate
for the network it is
protecting.
When an appropriate
network security
system is in place, it
is time to conduct
tests to make sure all
of the securities are
working and will
completely protect
your network against
any threats.
19
After conducting the
tests, collect the data
and enhance your
protections. The results
will reveal where your
security system is
effective and where it
can be improved.
Hackers are always
improving their
attacking procedures, so
it is essential to test
your system frequently
to remain protected and
stay one step ahead of
them.
Ongoing monitoring will
help support healthy
network operations at all
hours of the day.
Monitoring the network in
an ongoing fashion doesn’t
have to require more work
or office time. A network
monitoring solution will
keep tabs on device
statuses and send you real-
time alerts via email or
text anytime network
issues occur.
| nutmegtech.com
20. 877-688-6344
info@nutmegtech.com
Wayne Lerario, VP of Sales
twitter.com/nutmegtech
facebook.com/nutmegtech
You can also find us at:
* Want to Protect Your Business?
20
Network security helps your company meet mandatory regulations.
Because network security helps protect your customers' data, it reduces the
risk of legal action from data theft.
*
By having network security in place, your company will experience business
benefits. Your company is protected against business disruption, this helps
keep employees productive.
*
Let’stalk
| nutmegtech.com