O slideshow foi denunciado.
Utilizamos seu perfil e dados de atividades no LinkedIn para personalizar e exibir anúncios mais relevantes. Altere suas preferências de anúncios quando desejar.

5 Cybersecurity Threats Your Business Can't Afford to Ignore

With a little care, attention and a few no-cost preventative measures, you can go a long way to keeping your digital information safe.

  • Entre para ver os comentários

  • Seja a primeira pessoa a gostar disto

5 Cybersecurity Threats Your Business Can't Afford to Ignore

  1. 1. © 2018 WSI. All rights reserved. Your Business Can’t Afford to Ignore 5 Cybersecurity Threats
  2. 2. 2 © 2018 WSI. All rights reserved.
  3. 3. 3 © 2018 WSI. All rights reserved. 1. Everyone Is A Potential Cybercrime Victim (Yes, You Too) 2. Once The Bad Guys Get Your Stuff, There’s No Getting It Back 3. Failing to Use Two-Factor Authentication Can Put You At Risk 4. Cyber Criminals Prey on Weak Passwords 5. Letting Your Guard Down on Social Media 5 Cybersecurity Threats
  4. 4. 4 © 2018 WSI. All rights reserved. "Cybersecurity costs will reach 1 trillion dollars in five years - and it still won't be nearly enough to stop the bad guys!" The Unfortunate Reality - Scott Augenbaum, Retired FBI Special Agent, Cybercrime Division
  5. 5. 5 © 2018 WSI. All rights reserved. Everyone Is A Potential Cybercrime Victim (Yes, You Too) Misconception “It will never happen to me, I have nothing of value.” “We have security measures in place, we’re safe.” “We have much bigger competitors. They’ll get targeted, not us.” Reality Everyone has sensitive information they need to safeguard. Everyone uses common technologies that exist outside of basic protection (e.g. email, social media) Whether you’re an individual with five pieces of information or a global corporation with 50 million, you’re a potential cybercrime victim.
  6. 6. 6 © 2018 WSI. All rights reserved. Once the Bad Guys Get Your Stuff, There’s No Getting it Back • This isn’t like getting your car stolen – There’s no insurance policy to recover your losses • Important to be proactive, not reactive • Businesses have an obligation to protect their the online accounts of their customers • A cybersecurity breach isn’t a mistake, it’s a failure that couple have been avoided
  7. 7. 7 © 2018 WSI. All rights reserved. Failing to Use Two-Factor Authentication Can Put You At Risk • Two-factor authentication is a method or technology that confirms a user’s identity by any combination of two different factors: – Something they know (usually a password) – Something they have (a text message sent to their phone) – Or, something they are (voice or fingerprint). • 85% of all data breaches could be prevented using two-factor authentication
  8. 8. 8 © 2018 WSI. All rights reserved. Cybercriminals Prey on Weak Passwords • 70% of people use the same password for multiple accounts • Reduce the chance of a cyberattack by using: – Two-factor authentication + strong passwords • Our recommendations: – Have separate passwords for mission-critical accounts – Don’t use week passwords for anything – Come up with a password creation system and USE it – Or, find a password management tool with two-factor authentication
  9. 9. 9 © 2018 WSI. All rights reserved. • Passwords should include: – 12 characters in length – Both uppercase and lowercase letters – Special character and a number – Personal passphrases • A phrase that has personal meaning that you can remember Criteria for a Strong Password Creation System Example of a strong password system: #9ILFbtlCC9# Special character and number Special character and number Personal passphrase I love fall because the leaves change color
  10. 10. 10 © 2018 WSI. All rights reserved. Letting Your Guard Down on Social Media • Still a lack of concern for security on social media • Many of us often use social information to login to third party accounts and apps • For cybercriminals, social media is the gateway to your more personal information – Some people use similar passwords for social accounts as other mission critical accounts (e.g. bank accounts) – Can learn a lot about your personal details (e.g. job, address) but trolling someone’s social media accounts
  11. 11. 11 © 2018 WSI. All rights reserved. DO’S • Use service providers that offer two- factor authentication • Use our password creation system to generate mission-critical passwords. • Use different passwords for mission- critical accounts • Use different passwords for as many of your accounts as possible • Think before you click, no matter what you’re doing online • Protect yourself on social media DON’TS • Never believe that it can’t happen to you – it can and it will • Don’t assume the FBI, or anybody else, can get your stuff back • Never use a service provider unless they offer two-factor authentication • Don’t use the same password for mission- critical accounts • Don’t get complacent about your cybersecurity • Don’t let your guard down on social media Cybersecurity Do’s & Don’ts
  12. 12. 12 © 2018 WSI. All rights reserved. Please Don’t Ignore Your Cybersecurity • Here are three takeaways I’d like you to remember: #1 - Think before you act. Think before you click. You are your own firewall, so question everything, and if you aren’t sure, don’t click. #2 - Don’t do business with people or companies that don’t use two-factor authentication. Period. No exceptions. #3 - Use strong passwords, and don’t use the same password for two different mission-critical accounts.
  13. 13. 13 © 2018 WSI. All rights reserved. Want to improve your cybersecurity? Request a copy of WSI’s Cybersecurity eBook
  14. 14. We help ideas realize their potential by leveraging the Internet & its many unrecognized opportunities. © 2017 WSI. All rights reserved.

×