SlideShare a Scribd company logo
1 of 14
© 2018 WSI. All rights reserved.
Your Business Can’t Afford to Ignore
5 Cybersecurity
Threats
2
© 2018 WSI. All rights reserved.
3
© 2018 WSI. All rights reserved.
1. Everyone Is A Potential Cybercrime
Victim (Yes, You Too)
2. Once The Bad Guys Get Your Stuff,
There’s No Getting It Back
3. Failing to Use Two-Factor
Authentication Can Put You At Risk
4. Cyber Criminals Prey on Weak
Passwords
5. Letting Your Guard Down on Social
Media
5 Cybersecurity Threats
4
© 2018 WSI. All rights reserved.
"Cybersecurity costs will reach 1
trillion dollars in five years - and it
still won't be nearly enough to stop
the bad guys!"
The Unfortunate Reality
- Scott Augenbaum, Retired FBI Special Agent, Cybercrime Division
5
© 2018 WSI. All rights reserved.
Everyone Is A Potential Cybercrime Victim
(Yes, You Too)
Misconception
“It will never happen to me, I have nothing of
value.”
“We have security measures in place, we’re
safe.”
“We have much bigger competitors. They’ll
get targeted, not us.”
Reality
Everyone has sensitive information they need
to safeguard.
Everyone uses common technologies that
exist outside of basic protection (e.g. email,
social media)
Whether you’re an individual with five pieces
of information or a global corporation with 50
million, you’re a potential cybercrime victim.
6
© 2018 WSI. All rights reserved.
Once the Bad Guys Get Your Stuff,
There’s No Getting it Back
• This isn’t like getting your car stolen
– There’s no insurance policy to
recover your losses
• Important to be proactive, not
reactive
• Businesses have an obligation to
protect their the online accounts of
their customers
• A cybersecurity breach isn’t a
mistake, it’s a failure that couple
have been avoided
7
© 2018 WSI. All rights reserved.
Failing to Use Two-Factor Authentication
Can Put You At Risk
• Two-factor authentication is a method or technology that confirms a user’s identity
by any combination of two different factors:
– Something they know (usually a password)
– Something they have (a text message sent to their phone)
– Or, something they are (voice or fingerprint).
• 85% of all data breaches could be prevented using
two-factor authentication
8
© 2018 WSI. All rights reserved.
Cybercriminals Prey on Weak Passwords
• 70% of people use the same password for multiple
accounts
• Reduce the chance of a cyberattack by using:
– Two-factor authentication + strong passwords
• Our recommendations:
– Have separate passwords for mission-critical accounts
– Don’t use week passwords for anything
– Come up with a password creation system and USE it
– Or, find a password management tool with two-factor
authentication
9
© 2018 WSI. All rights reserved.
• Passwords should include:
– 12 characters in length
– Both uppercase and
lowercase letters
– Special character and a
number
– Personal passphrases
• A phrase that has personal
meaning that you can
remember
Criteria for a Strong Password Creation System
Example of a strong password system:
#9ILFbtlCC9#
Special character
and number
Special character
and number
Personal passphrase
I love fall because the leaves change color
10
© 2018 WSI. All rights reserved.
Letting Your Guard Down on Social Media
• Still a lack of concern for security on social media
• Many of us often use social information to login to
third party accounts and apps
• For cybercriminals, social media is the gateway to
your more personal information
– Some people use similar passwords for social accounts
as other mission critical accounts (e.g. bank accounts)
– Can learn a lot about your personal details (e.g. job,
address) but trolling someone’s social media accounts
11
© 2018 WSI. All rights reserved.
DO’S
• Use service providers that offer two-
factor authentication
• Use our password creation system to
generate mission-critical passwords.
• Use different passwords for mission-
critical accounts
• Use different passwords for as many of
your accounts as possible
• Think before you click, no matter what
you’re doing online
• Protect yourself on social media
DON’TS
• Never believe that it can’t happen to you
– it can and it will
• Don’t assume the FBI, or anybody else,
can get your stuff back
• Never use a service provider unless they
offer two-factor authentication
• Don’t use the same password for mission-
critical accounts
• Don’t get complacent about your
cybersecurity
• Don’t let your guard down on social
media
Cybersecurity Do’s & Don’ts
12
© 2018 WSI. All rights reserved.
Please Don’t Ignore Your Cybersecurity
• Here are three takeaways I’d like you to remember:
#1 - Think before you act. Think before you click. You are your own
firewall, so question everything, and if you aren’t sure, don’t click.
#2 - Don’t do business with people or companies that don’t use
two-factor authentication. Period. No exceptions.
#3 - Use strong passwords, and don’t use the same password for
two different mission-critical accounts.
13
© 2018 WSI. All rights reserved.
Want to improve your
cybersecurity?
Request a copy of WSI’s
Cybersecurity eBook
We help ideas realize their potential by leveraging the
Internet & its many unrecognized opportunities.
© 2017 WSI. All rights reserved.

More Related Content

What's hot

Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceInderjeet Singh
 
Health Information Privacy and Security (October 21, 2020)
Health Information Privacy and Security (October 21, 2020)Health Information Privacy and Security (October 21, 2020)
Health Information Privacy and Security (October 21, 2020)Nawanan Theera-Ampornpunt
 
A Comedy of Errors in Web Application Security
A Comedy of Errors in Web Application SecurityA Comedy of Errors in Web Application Security
A Comedy of Errors in Web Application SecurityRob Dudley
 
Artificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityArtificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityOlivier Busolini
 
Cyberattacks the-next-healthcare-epidemic
Cyberattacks the-next-healthcare-epidemicCyberattacks the-next-healthcare-epidemic
Cyberattacks the-next-healthcare-epidemicKate Barney
 
Ict H A C K I N G
Ict    H A C K I N GIct    H A C K I N G
Ict H A C K I N GHafizra Mas
 
Presentation: True Stories from the Threat Hunting Files
Presentation: True Stories from the Threat Hunting FilesPresentation: True Stories from the Threat Hunting Files
Presentation: True Stories from the Threat Hunting FilesDomainTools
 
Cyber and Data Risks
Cyber and Data RisksCyber and Data Risks
Cyber and Data Risksrisksmith
 
Cybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive MeasuresCybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive MeasuresAditya Ratnaparkhi
 
Whitepaper Avira about Artificial Intelligence to cyber security
Whitepaper Avira  about Artificial Intelligence to cyber securityWhitepaper Avira  about Artificial Intelligence to cyber security
Whitepaper Avira about Artificial Intelligence to cyber securityGopiRajan4
 
Cybersecurity & Data Protection: Thinking About Risk & Compliance
Cybersecurity & Data Protection: Thinking About Risk & ComplianceCybersecurity & Data Protection: Thinking About Risk & Compliance
Cybersecurity & Data Protection: Thinking About Risk & ComplianceShawn Tuma
 
Expert FSO Insider Threat Awareness
Expert FSO Insider Threat AwarenessExpert FSO Insider Threat Awareness
Expert FSO Insider Threat AwarenessEric Schiowitz
 
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...Black Duck by Synopsys
 
Information security
Information securityInformation security
Information securityVarshil Patel
 
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...Netpluz Asia Pte Ltd
 
Ethical Hacking & IT Security Courses in SIFS
Ethical Hacking & IT Security Courses in SIFSEthical Hacking & IT Security Courses in SIFS
Ethical Hacking & IT Security Courses in SIFSSifs India
 
Cyber Security: The Strategic View
Cyber Security: The Strategic ViewCyber Security: The Strategic View
Cyber Security: The Strategic ViewCisco Canada
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsNetLockSmith
 

What's hot (20)

Cyber attack
Cyber attackCyber attack
Cyber attack
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial Intelligence
 
Health Information Privacy and Security (October 21, 2020)
Health Information Privacy and Security (October 21, 2020)Health Information Privacy and Security (October 21, 2020)
Health Information Privacy and Security (October 21, 2020)
 
A Comedy of Errors in Web Application Security
A Comedy of Errors in Web Application SecurityA Comedy of Errors in Web Application Security
A Comedy of Errors in Web Application Security
 
Artificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityArtificial Intelligence and Cybersecurity
Artificial Intelligence and Cybersecurity
 
Cyberattacks the-next-healthcare-epidemic
Cyberattacks the-next-healthcare-epidemicCyberattacks the-next-healthcare-epidemic
Cyberattacks the-next-healthcare-epidemic
 
Ict H A C K I N G
Ict    H A C K I N GIct    H A C K I N G
Ict H A C K I N G
 
Presentation: True Stories from the Threat Hunting Files
Presentation: True Stories from the Threat Hunting FilesPresentation: True Stories from the Threat Hunting Files
Presentation: True Stories from the Threat Hunting Files
 
Cyber and Data Risks
Cyber and Data RisksCyber and Data Risks
Cyber and Data Risks
 
Cybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive MeasuresCybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive Measures
 
Whitepaper Avira about Artificial Intelligence to cyber security
Whitepaper Avira  about Artificial Intelligence to cyber securityWhitepaper Avira  about Artificial Intelligence to cyber security
Whitepaper Avira about Artificial Intelligence to cyber security
 
Cybersecurity & Data Protection: Thinking About Risk & Compliance
Cybersecurity & Data Protection: Thinking About Risk & ComplianceCybersecurity & Data Protection: Thinking About Risk & Compliance
Cybersecurity & Data Protection: Thinking About Risk & Compliance
 
Expert FSO Insider Threat Awareness
Expert FSO Insider Threat AwarenessExpert FSO Insider Threat Awareness
Expert FSO Insider Threat Awareness
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
 
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
 
Information security
Information securityInformation security
Information security
 
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
 
Ethical Hacking & IT Security Courses in SIFS
Ethical Hacking & IT Security Courses in SIFSEthical Hacking & IT Security Courses in SIFS
Ethical Hacking & IT Security Courses in SIFS
 
Cyber Security: The Strategic View
Cyber Security: The Strategic ViewCyber Security: The Strategic View
Cyber Security: The Strategic View
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness Infographics
 

Similar to 5 Cybersecurity Threats Your Business Can't Afford to Ignore

Cybersecurity Awareness Overview.pptx
Cybersecurity Awareness Overview.pptxCybersecurity Awareness Overview.pptx
Cybersecurity Awareness Overview.pptxsanap6
 
Cybersecurity Awareness Overview.pptx
Cybersecurity Awareness Overview.pptxCybersecurity Awareness Overview.pptx
Cybersecurity Awareness Overview.pptxinstaeditz009
 
Cybersecurity Awareness Overview.pptx
Cybersecurity Awareness Overview.pptxCybersecurity Awareness Overview.pptx
Cybersecurity Awareness Overview.pptxAfsanaMumal2
 
Cybersecurity Awareness Overview- BSBXCS402.pptx
Cybersecurity Awareness Overview- BSBXCS402.pptxCybersecurity Awareness Overview- BSBXCS402.pptx
Cybersecurity Awareness Overview- BSBXCS402.pptxitsamuamit11
 
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...nexxtep
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBCapyn
 
Phishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxPhishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxStephen Jesukanth Martin
 
How to Recognize a Fake Email.pptx
How to Recognize a Fake Email.pptxHow to Recognize a Fake Email.pptx
How to Recognize a Fake Email.pptxSultan593473
 
The Immune System of Internet
The Immune System of InternetThe Immune System of Internet
The Immune System of InternetMohit Kanwar
 
What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?Entrance Exam Info
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingSachin Saini
 
Are you at risk on the World Wide Web?
Are you at risk on the World Wide Web? Are you at risk on the World Wide Web?
Are you at risk on the World Wide Web? TechGenie
 
Cyber Security - Moving Past "Best Practices"
Cyber Security - Moving Past "Best Practices"Cyber Security - Moving Past "Best Practices"
Cyber Security - Moving Past "Best Practices"Billtrust
 
Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015
Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015
Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015StampedeCon
 
Netwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech TalkNetwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech TalkNetWatcher
 

Similar to 5 Cybersecurity Threats Your Business Can't Afford to Ignore (20)

Cybersecurity Awareness Overview.pptx
Cybersecurity Awareness Overview.pptxCybersecurity Awareness Overview.pptx
Cybersecurity Awareness Overview.pptx
 
Cybersecurity Awareness Overview.pptx
Cybersecurity Awareness Overview.pptxCybersecurity Awareness Overview.pptx
Cybersecurity Awareness Overview.pptx
 
Cybersecurity Awareness Overview.pptx
Cybersecurity Awareness Overview.pptxCybersecurity Awareness Overview.pptx
Cybersecurity Awareness Overview.pptx
 
Social Engineering and Identity Theft
Social Engineering and Identity TheftSocial Engineering and Identity Theft
Social Engineering and Identity Theft
 
Cybersecurity Awareness Overview- BSBXCS402.pptx
Cybersecurity Awareness Overview- BSBXCS402.pptxCybersecurity Awareness Overview- BSBXCS402.pptx
Cybersecurity Awareness Overview- BSBXCS402.pptx
 
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...
 
Masterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy BasicsMasterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy Basics
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBC
 
Personal Threat Models
Personal Threat ModelsPersonal Threat Models
Personal Threat Models
 
Phishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxPhishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptx
 
NEDMA18 Keynote: Cyber Security – what you need to know, what you need to do
NEDMA18 Keynote: Cyber Security – what you need to know, what you need to doNEDMA18 Keynote: Cyber Security – what you need to know, what you need to do
NEDMA18 Keynote: Cyber Security – what you need to know, what you need to do
 
How to Recognize a Fake Email.pptx
How to Recognize a Fake Email.pptxHow to Recognize a Fake Email.pptx
How to Recognize a Fake Email.pptx
 
The Immune System of Internet
The Immune System of InternetThe Immune System of Internet
The Immune System of Internet
 
What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
E commerce
E commerce E commerce
E commerce
 
Are you at risk on the World Wide Web?
Are you at risk on the World Wide Web? Are you at risk on the World Wide Web?
Are you at risk on the World Wide Web?
 
Cyber Security - Moving Past "Best Practices"
Cyber Security - Moving Past "Best Practices"Cyber Security - Moving Past "Best Practices"
Cyber Security - Moving Past "Best Practices"
 
Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015
Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015
Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015
 
Netwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech TalkNetwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech Talk
 

More from WSI WebAnalys

WSI Whitepaper social location mobile marketing
WSI Whitepaper social location mobile marketingWSI Whitepaper social location mobile marketing
WSI Whitepaper social location mobile marketingWSI WebAnalys
 
Outperform your competitors with social selling
Outperform your competitors with social sellingOutperform your competitors with social selling
Outperform your competitors with social sellingWSI WebAnalys
 
Social Selling Uppsala
Social Selling UppsalaSocial Selling Uppsala
Social Selling UppsalaWSI WebAnalys
 
Affärsnyttan med Twitter workshop gävle
Affärsnyttan med Twitter workshop gävleAffärsnyttan med Twitter workshop gävle
Affärsnyttan med Twitter workshop gävleWSI WebAnalys
 
5 tips för att förstå och förbättra din kunds köpcykel
5 tips för att förstå och förbättra din kunds köpcykel5 tips för att förstå och förbättra din kunds köpcykel
5 tips för att förstå och förbättra din kunds köpcykelWSI WebAnalys
 
Utbildningar i Social Selling B2B
Utbildningar i Social Selling B2BUtbildningar i Social Selling B2B
Utbildningar i Social Selling B2BWSI WebAnalys
 
WSI:s App för Lokala Butiker, Salonger, Restauranger och Caféer.
WSI:s App för Lokala Butiker, Salonger, Restauranger och Caféer.WSI:s App för Lokala Butiker, Salonger, Restauranger och Caféer.
WSI:s App för Lokala Butiker, Salonger, Restauranger och Caféer.WSI WebAnalys
 
15 Ways to Improve Your Website's Conversion Rate
15 Ways to Improve Your Website's Conversion Rate15 Ways to Improve Your Website's Conversion Rate
15 Ways to Improve Your Website's Conversion RateWSI WebAnalys
 
Marknadsföring på sociala medier
Marknadsföring på sociala medierMarknadsföring på sociala medier
Marknadsföring på sociala medierWSI WebAnalys
 
WSI_WISDOM_BOOK_Internetmarknadsföring - kundrefererenser
WSI_WISDOM_BOOK_Internetmarknadsföring - kundrefererenserWSI_WISDOM_BOOK_Internetmarknadsföring - kundrefererenser
WSI_WISDOM_BOOK_Internetmarknadsföring - kundrefererenserWSI WebAnalys
 

More from WSI WebAnalys (10)

WSI Whitepaper social location mobile marketing
WSI Whitepaper social location mobile marketingWSI Whitepaper social location mobile marketing
WSI Whitepaper social location mobile marketing
 
Outperform your competitors with social selling
Outperform your competitors with social sellingOutperform your competitors with social selling
Outperform your competitors with social selling
 
Social Selling Uppsala
Social Selling UppsalaSocial Selling Uppsala
Social Selling Uppsala
 
Affärsnyttan med Twitter workshop gävle
Affärsnyttan med Twitter workshop gävleAffärsnyttan med Twitter workshop gävle
Affärsnyttan med Twitter workshop gävle
 
5 tips för att förstå och förbättra din kunds köpcykel
5 tips för att förstå och förbättra din kunds köpcykel5 tips för att förstå och förbättra din kunds köpcykel
5 tips för att förstå och förbättra din kunds köpcykel
 
Utbildningar i Social Selling B2B
Utbildningar i Social Selling B2BUtbildningar i Social Selling B2B
Utbildningar i Social Selling B2B
 
WSI:s App för Lokala Butiker, Salonger, Restauranger och Caféer.
WSI:s App för Lokala Butiker, Salonger, Restauranger och Caféer.WSI:s App för Lokala Butiker, Salonger, Restauranger och Caféer.
WSI:s App för Lokala Butiker, Salonger, Restauranger och Caféer.
 
15 Ways to Improve Your Website's Conversion Rate
15 Ways to Improve Your Website's Conversion Rate15 Ways to Improve Your Website's Conversion Rate
15 Ways to Improve Your Website's Conversion Rate
 
Marknadsföring på sociala medier
Marknadsföring på sociala medierMarknadsföring på sociala medier
Marknadsföring på sociala medier
 
WSI_WISDOM_BOOK_Internetmarknadsföring - kundrefererenser
WSI_WISDOM_BOOK_Internetmarknadsföring - kundrefererenserWSI_WISDOM_BOOK_Internetmarknadsföring - kundrefererenser
WSI_WISDOM_BOOK_Internetmarknadsföring - kundrefererenser
 

Recently uploaded

The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwaitdaisycvs
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noidadlhescort
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...rajveerescorts2022
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...lizamodels9
 
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Sheetaleventcompany
 
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceMalegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceDamini Dixit
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Adnet Communications
 
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceEluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceDamini Dixit
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...amitlee9823
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon investment
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentationuneakwhite
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableSeo
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Anamikakaur10
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756dollysharma2066
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperityhemanthkumar470700
 

Recently uploaded (20)

The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
 
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceMalegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
 
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceEluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 

5 Cybersecurity Threats Your Business Can't Afford to Ignore

  • 1. © 2018 WSI. All rights reserved. Your Business Can’t Afford to Ignore 5 Cybersecurity Threats
  • 2. 2 © 2018 WSI. All rights reserved.
  • 3. 3 © 2018 WSI. All rights reserved. 1. Everyone Is A Potential Cybercrime Victim (Yes, You Too) 2. Once The Bad Guys Get Your Stuff, There’s No Getting It Back 3. Failing to Use Two-Factor Authentication Can Put You At Risk 4. Cyber Criminals Prey on Weak Passwords 5. Letting Your Guard Down on Social Media 5 Cybersecurity Threats
  • 4. 4 © 2018 WSI. All rights reserved. "Cybersecurity costs will reach 1 trillion dollars in five years - and it still won't be nearly enough to stop the bad guys!" The Unfortunate Reality - Scott Augenbaum, Retired FBI Special Agent, Cybercrime Division
  • 5. 5 © 2018 WSI. All rights reserved. Everyone Is A Potential Cybercrime Victim (Yes, You Too) Misconception “It will never happen to me, I have nothing of value.” “We have security measures in place, we’re safe.” “We have much bigger competitors. They’ll get targeted, not us.” Reality Everyone has sensitive information they need to safeguard. Everyone uses common technologies that exist outside of basic protection (e.g. email, social media) Whether you’re an individual with five pieces of information or a global corporation with 50 million, you’re a potential cybercrime victim.
  • 6. 6 © 2018 WSI. All rights reserved. Once the Bad Guys Get Your Stuff, There’s No Getting it Back • This isn’t like getting your car stolen – There’s no insurance policy to recover your losses • Important to be proactive, not reactive • Businesses have an obligation to protect their the online accounts of their customers • A cybersecurity breach isn’t a mistake, it’s a failure that couple have been avoided
  • 7. 7 © 2018 WSI. All rights reserved. Failing to Use Two-Factor Authentication Can Put You At Risk • Two-factor authentication is a method or technology that confirms a user’s identity by any combination of two different factors: – Something they know (usually a password) – Something they have (a text message sent to their phone) – Or, something they are (voice or fingerprint). • 85% of all data breaches could be prevented using two-factor authentication
  • 8. 8 © 2018 WSI. All rights reserved. Cybercriminals Prey on Weak Passwords • 70% of people use the same password for multiple accounts • Reduce the chance of a cyberattack by using: – Two-factor authentication + strong passwords • Our recommendations: – Have separate passwords for mission-critical accounts – Don’t use week passwords for anything – Come up with a password creation system and USE it – Or, find a password management tool with two-factor authentication
  • 9. 9 © 2018 WSI. All rights reserved. • Passwords should include: – 12 characters in length – Both uppercase and lowercase letters – Special character and a number – Personal passphrases • A phrase that has personal meaning that you can remember Criteria for a Strong Password Creation System Example of a strong password system: #9ILFbtlCC9# Special character and number Special character and number Personal passphrase I love fall because the leaves change color
  • 10. 10 © 2018 WSI. All rights reserved. Letting Your Guard Down on Social Media • Still a lack of concern for security on social media • Many of us often use social information to login to third party accounts and apps • For cybercriminals, social media is the gateway to your more personal information – Some people use similar passwords for social accounts as other mission critical accounts (e.g. bank accounts) – Can learn a lot about your personal details (e.g. job, address) but trolling someone’s social media accounts
  • 11. 11 © 2018 WSI. All rights reserved. DO’S • Use service providers that offer two- factor authentication • Use our password creation system to generate mission-critical passwords. • Use different passwords for mission- critical accounts • Use different passwords for as many of your accounts as possible • Think before you click, no matter what you’re doing online • Protect yourself on social media DON’TS • Never believe that it can’t happen to you – it can and it will • Don’t assume the FBI, or anybody else, can get your stuff back • Never use a service provider unless they offer two-factor authentication • Don’t use the same password for mission- critical accounts • Don’t get complacent about your cybersecurity • Don’t let your guard down on social media Cybersecurity Do’s & Don’ts
  • 12. 12 © 2018 WSI. All rights reserved. Please Don’t Ignore Your Cybersecurity • Here are three takeaways I’d like you to remember: #1 - Think before you act. Think before you click. You are your own firewall, so question everything, and if you aren’t sure, don’t click. #2 - Don’t do business with people or companies that don’t use two-factor authentication. Period. No exceptions. #3 - Use strong passwords, and don’t use the same password for two different mission-critical accounts.
  • 13. 13 © 2018 WSI. All rights reserved. Want to improve your cybersecurity? Request a copy of WSI’s Cybersecurity eBook
  • 14. We help ideas realize their potential by leveraging the Internet & its many unrecognized opportunities. © 2017 WSI. All rights reserved.