SlideShare uma empresa Scribd logo
1 de 32
Baixar para ler offline
Keeping 'em Safe:
8 More Ways
to Help Your
Clients
More than 8 in 10 US small businesses believe
   their firms are safe from cyber threats yet
almost 80% have no formal security policies in
                      place.

You can be attacked and not even know it. Even
   worse, your system could be used to attack
     other people, and you may not know it.
What Is Cyber Crime?
●
    Spam
●
    Fraud
●
    Obscene or offensive content
●
    Harassment
●
    Child pornography
●
    Drug trafficking
●
    Cyber terrorism
●
    Cyber warfare
Who Is Behind
          Cyber Crime?
●
    Script kiddies
●
    Hacktivists
●
    Individual miscreants
●
    National & transnational organized criminal
    enterprises
●
    Nation states
Why Should You Care?
●
    Your clients trust you with very sensitive data.
●
    If they become victims, your clients have less of
    an ability to bounce back.
●
    Systems that are used to commit crimes often
    support the same organized networks that are
    behind human trafficking, identity theft, child
    pornography, and other issues you battle against
    daily.
Biggest Threat?

       You
What? No Way!
●
  Acting maliciously
●
  Forgetting to log off
●
  Losing laptops, USB keys, or smartphones
●
  Storing client data in questionable places
●
  Downloading viruses and malware
●
  Using social network sites carelessly
●
  Leaving metadata in documents
●
  Having bad password practices
●
  Getting tricked
Acting maliciously
What You Can Do
●
    Put policies in place and enforce them
●
    Trust your gut
Forgetting
 to log off
What You Can Do
●
    Log off when you leave your computer
●
    Shut down your computer at the end of the
    day
●
    Set up your computer to automatically lock
    when the screensaver comes on
Losing laptops,
USB keys, or
smartphones
What You Can Do
●
    Pay special attention and be careful
●
    Store only the client data you absolutely need
●
    Encrypt your data
●
    Set up phones so you can erase them remotely
●
    Use strong passwords
●
    Back up the data before you leave
Storing client data in
questionable places
What You Can Do
●
    Read privacy policies
●
    Develop a set of approved sites that client
    information can be stored on and train staff to
    not store data on any other sites
●
    Don't include identifiable client information in
    emails
Downloading
viruses and
malware
What You Can Do
●
    Patch software and systems religiously
●
    Read before you click
●
    Ask if the email or attachment seems “funny”
●
    Avoid downloading screensavers, fonts, & porn
●
    Use your anti-virus software
●
    Ignore any website that pops up a virus warning
Using social
network
sites
carelessly
What You Can Do
●
    Be careful what you click
●
    Don't friend people you don't know
●
    Use strong passwords
●
    Avoid playing games and installing applications
●
    Be very careful about what you post
Leaving
metadata in
 documents
What You Can Do
●
    Clean metadata from documents before sending
    electronic copies
●
    Use the Document Inspector tool in Office
●
    Download and use Metadata Removal tool for
    WordPerfect
Having bad
password
practices
What You Can Do
●
    Use strong passwords
●
    Change passwords quarterly
●
    Don't use a password for more than one site
●
    Don't share passwords
●
    Establish password guidelines for the
    organization and follow them
●
    Try a password manager
Getting tricked
What You Can Do
●
    Be skeptical
●
    Don't give anyone your passwords
●
    Don't click a link to your bank website
What If?
●
    Tell your supervisor immediately
●
    Be prepared to help figure out what happened
●
    Notify the proper authorities
Who Are the
         Proper Authorities?
Computer Intrusion           Local FBI Office
                             US Secret Service
                             Internet Crime Complaint Center

Password trafficking         Local FBI Office
                             US Secret Service
                             Internet Crime Complaint Center

Counterfeiting of currency   US Secret Service
Who Are the
          Proper Authorities?
Child pornography or   Local FBI Office
exploitation           US Customs and Enforcement (if imported)
                       Internet Crime Complaint Center

Internet fraud & SPAM Local FBI Office
                      US Secret Service (Financial Crimes Division)
                      Federal Trade Commission
                      Securities & Exchange Commission (if securities/investment-related)
                      Internet Crime Complaint Center

Internet harassment    Local FBI Office
Resources
●
    Cybercrime Reporting
    http://www.cybercrime.gov/reporting.htm
●
    Stay Safe Online
    http://www.staysafeonline.org/
●
    US CERT
    http://www.us-cert.gov/nav/nt01/
Resources
●
    US CERT
    http://www.us-cert.gov/cas/tips/
●
    OnGuard Online
    http://www.onguardonline.gov/topics/computer-security.aspx
Picture Attributions
In order
http://www.flickr.com/photos/jesseshapins/3788641411/
http://commons.wikimedia.org/wiki/File:Harry_Potter_Lightning.gif
http://commons.wikimedia.org/wiki/File:Computer_n_screen.svg
http://www.flickr.com/photos/dunechaser/385847284/sizes/l/
http://www.flickr.com/photos/sravi_in/3623242288/sizes/z/
http://www.flickr.com/photos/stukjefotogebeuren/2081170312/
http://www.flickr.com/photos/librarianbyday/3983719036/
http://www.flickr.com/photos/booleansplit/4650422195/
http://www.flickr.com/photos/the-icing-on-the-cake/2424326595/
http://www.flickr.com/photos/sshb/3619977273/
http://www.flickr.com/photos/esm723/4377802647/
http://www.flickr.com/photos/stevendepolo/4027405671/
Contact Information



Kate Bladow
Founder & Strategist
presentations@poweredpursuits.com

Mais conteúdo relacionado

Mais procurados

Information technology powerpoint
Information technology powerpointInformation technology powerpoint
Information technology powerpoint
Ty122987
 

Mais procurados (18)

RATs
RATsRATs
RATs
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Computer security and malware by shahzad younas
Computer security and malware by shahzad younasComputer security and malware by shahzad younas
Computer security and malware by shahzad younas
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for students
 
Zero Day Response: Strategies for Cyber Security Defense
Zero Day Response: Strategies for Cyber Security DefenseZero Day Response: Strategies for Cyber Security Defense
Zero Day Response: Strategies for Cyber Security Defense
 
OSINT - Open Source Intelligence
OSINT - Open Source IntelligenceOSINT - Open Source Intelligence
OSINT - Open Source Intelligence
 
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityOSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
 
Government Data Breach
Government Data BreachGovernment Data Breach
Government Data Breach
 
What is cybersecurity about?
What is cybersecurity about?What is cybersecurity about?
What is cybersecurity about?
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)
 
Internet security
Internet securityInternet security
Internet security
 
Information technology powerpoint
Information technology powerpointInformation technology powerpoint
Information technology powerpoint
 
From OSINT to Phishing presentation
From OSINT to Phishing presentationFrom OSINT to Phishing presentation
From OSINT to Phishing presentation
 
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) Posters
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and Libraries
 
Owasp osint presentation - by adam nurudini
Owasp osint presentation - by adam nurudiniOwasp osint presentation - by adam nurudini
Owasp osint presentation - by adam nurudini
 

Destaque (7)

Recalls, Recovery, and (Credit) Reports, Oh My!
Recalls, Recovery, and (Credit) Reports, Oh My!Recalls, Recovery, and (Credit) Reports, Oh My!
Recalls, Recovery, and (Credit) Reports, Oh My!
 
Idesco 2013
Idesco 2013Idesco 2013
Idesco 2013
 
Online Training Options for Disaster Education
Online Training Options for Disaster EducationOnline Training Options for Disaster Education
Online Training Options for Disaster Education
 
Identity crisis
Identity crisisIdentity crisis
Identity crisis
 
Using Social Media for the Public Good
Using Social Media for the Public GoodUsing Social Media for the Public Good
Using Social Media for the Public Good
 
Small Business Owners – Don’t Get Caught With Out Data Security.
Small Business Owners – Don’t Get Caught With Out Data Security.Small Business Owners – Don’t Get Caught With Out Data Security.
Small Business Owners – Don’t Get Caught With Out Data Security.
 
Social Networks And Phishing
Social Networks And PhishingSocial Networks And Phishing
Social Networks And Phishing
 

Semelhante a Keeping 'Em Safe: Ways to Protect Your Clients Online

Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
sheenau
 
Microsoft (Projects)
Microsoft (Projects)Microsoft (Projects)
Microsoft (Projects)
Vinayak Hegde
 

Semelhante a Keeping 'Em Safe: Ways to Protect Your Clients Online (20)

Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
 
The Human Side of Security
The Human Side of SecurityThe Human Side of Security
The Human Side of Security
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Computer Security Seminar: Protect your internet account information
Computer Security Seminar: Protect your internet account informationComputer Security Seminar: Protect your internet account information
Computer Security Seminar: Protect your internet account information
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
 
Basic Digital Security
Basic Digital SecurityBasic Digital Security
Basic Digital Security
 
Internet safety and security
Internet safety and securityInternet safety and security
Internet safety and security
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
 
Log Out Cyber Awareness
Log Out Cyber AwarenessLog Out Cyber Awareness
Log Out Cyber Awareness
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Computer Security For Activists & Everyone (Oct 2018)
Computer Security For Activists & Everyone (Oct 2018)Computer Security For Activists & Everyone (Oct 2018)
Computer Security For Activists & Everyone (Oct 2018)
 
Microsoft (Projects)
Microsoft (Projects)Microsoft (Projects)
Microsoft (Projects)
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self Defense
 
How To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayHow To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber Monday
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
Personal Threat Models
Personal Threat ModelsPersonal Threat Models
Personal Threat Models
 
Canadian Consumer Handbook
Canadian Consumer HandbookCanadian Consumer Handbook
Canadian Consumer Handbook
 
IESBGA 2014 Cybercrime Seminar by John Bambenek
IESBGA 2014 Cybercrime Seminar by John BambenekIESBGA 2014 Cybercrime Seminar by John Bambenek
IESBGA 2014 Cybercrime Seminar by John Bambenek
 

Mais de Kate Bladow

Mais de Kate Bladow (14)

10 Things I've Learned About Linux
10 Things I've Learned About Linux10 Things I've Learned About Linux
10 Things I've Learned About Linux
 
Homelessness, Youth, & Technology
Homelessness, Youth, & TechnologyHomelessness, Youth, & Technology
Homelessness, Youth, & Technology
 
Social Media for Busy Professionals
Social Media for Busy ProfessionalsSocial Media for Busy Professionals
Social Media for Busy Professionals
 
Twitter, Events, & Network Graphs
Twitter, Events, & Network GraphsTwitter, Events, & Network Graphs
Twitter, Events, & Network Graphs
 
New Media and Social Benefit
New Media and Social BenefitNew Media and Social Benefit
New Media and Social Benefit
 
A Thousand Points of Like: Raising Money Through Social Media Channels
A Thousand Points of Like: Raising Money Through Social Media ChannelsA Thousand Points of Like: Raising Money Through Social Media Channels
A Thousand Points of Like: Raising Money Through Social Media Channels
 
So, I Created a Profile, Now What? (Social Media 101 for Fundraisers)
So, I Created a Profile, Now What? (Social Media 101 for Fundraisers)So, I Created a Profile, Now What? (Social Media 101 for Fundraisers)
So, I Created a Profile, Now What? (Social Media 101 for Fundraisers)
 
Tech Resources for Artist Seminar
Tech Resources for Artist SeminarTech Resources for Artist Seminar
Tech Resources for Artist Seminar
 
Using Current Technology
Using Current TechnologyUsing Current Technology
Using Current Technology
 
Nonprofits and Social Media
Nonprofits and Social MediaNonprofits and Social Media
Nonprofits and Social Media
 
Technology Tips for Legal Aid Advocates
Technology Tips for Legal Aid AdvocatesTechnology Tips for Legal Aid Advocates
Technology Tips for Legal Aid Advocates
 
Plain Language & Writing for the Web
Plain Language & Writing for the WebPlain Language & Writing for the Web
Plain Language & Writing for the Web
 
Social Media for Busy Professionals
Social Media for Busy ProfessionalsSocial Media for Busy Professionals
Social Media for Busy Professionals
 
Where Do I Start? Social Media for Beginners - Bladow, Crawford
Where Do I Start? Social Media for Beginners - Bladow, CrawfordWhere Do I Start? Social Media for Beginners - Bladow, Crawford
Where Do I Start? Social Media for Beginners - Bladow, Crawford
 

Último

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Último (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Keeping 'Em Safe: Ways to Protect Your Clients Online