SlideShare uma empresa Scribd logo
1 de 38
www.TakewareGatekeeper.co.uk
MERIT Congratulations!
Closing the back door Quote "The History of every major Galactic Civilization tends to pass through three distinct and recognizable phases, those of  Survival ,  Inquiry  and  Sophistication , otherwise known as the  How ,  Why  and  Where  phases. "For instance, the first phase is characterized by the question How can we eat? the second by the question Why do we eat? and the third by the question  Where shall we have lunch?  .” Douglas Adams
Closing the back door Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Threat! ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Samsung SGH-i310 8 Gigabyte phone featuring an 8 gigabyte hard disc.
The Threat!
The Threat! Price £69.99  incVAT
The nature of the threat – Who says…
The nature of the threat The DTI Security Breaches Report 2006 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The nature of the threat The DTI Security Breaches Report 2006 ,[object Object],[object Object],[object Object],[object Object]
The Threat!
The nature of the threat The DTI Security Breaches Report 2006 Found that… “such devices are being used in 84 per cent of companies and, on average, a third of employees are using them in the office”. 90% of those surveyed said they were aware of the potential danger that removable media presents, and a third of organisations admitted that removable media is being used without authorisation.
The nature of the threat The DTI Security Breaches Report 2006 "With removable media plummeting in price, soaring memory capacity and more people using them at work, companies need to be aware of how easy it is for staff to use them, lose them or take competitive information away on them, all in the palm of their hands,"  "If lost or stolen, vast amounts of valuable information could seriously expose a company to extortion, digital identity fraud, or damage to their reputation, integrity and brand."
The nature of the threat The DTI Security Breaches Report 2006 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The nature of the threat Quotes ‘ Opportunity makes the thief. If you give them the opportunity to access systems that they shouldn’t, then things can go wrong ’  ‘ There seems to be a fixation on threats from the internet and external hackers but for the criminals, going the insider route is easier and there can be much more financial benefit for them’  ‘ In addition, organised crime gangs have been blackmailing people inside companies to obtain information  ‘
The nature of the threat Gartner Research "Organisations are increasingly putting themselves at risk by allowing the unauthorized and uncontrolled use of portable storage devices". “These are ideal for anyone intending to steal sensitive and valuable data… The impact of this goes beyond the commercial value of the data.”
How Bad Is the Threat? A demonstration
How Bad Is the Threat? www.PodSnaffler.co.uk
Who’s Vulnerable ,[object Object],[object Object],[object Object]
Who’s Vulnerable “ In a recent survey 70% of employees admitted taking information from work to which they were not entitled. As Computer Weekly has commented “ anyone planning to leave will remove most of the information they want well in advance .”
What’s at risk The Crown Jewels… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What’s at risk ,[object Object],[object Object],[object Object]
What’s at risk Portable Hacking Tools ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
When will it become a practical problem? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Closing the back door Quote “ A learning experience is one of those things that says,  'You know that thing you just did? Don't do that.' ”  Douglas Adams “ Human beings, who are almost unique in having the ability to learn from the experience of others, are also remarkable for their apparent disinclination to do so.” Douglas Adams
Who’s Vulnerable In the press… BBC  29April Digital cameras, MP3 players and handheld computers could be the tools that disgruntled UK employees use to sabotage computer systems or steal vital data, warn security experts. The removable memory cards inside the devices could be used to bring in software that looks for vulnerabilities on a company's internal network.  The innocent-looking devices could also be used to smuggle out confidential or sensitive information.  The dangers disgruntled employees posed was highlighted by a survey showing that almost half of the most serious security incidents businesses suffered last year were caused by company workers.
In the press… Inside job Computing Magazine 14 April While companies guard against external hacks, it is easy to overlook threats closer to home Last year, more than a dozen employees who had worked for Citibank’s Indian call centre partner Mphasis were arrested for allegedly stealing $350,000 (£199,842) from the bank’s American customers .  … Similar threats can occur inside many organisations, warns Floris Van Den Dool, head of consultant Accenture’s European security practice. ‘ There seems to be a fixation on threats from the internet and external hackers but for the criminals , going the insider route is easier and there can be much more financial benefit for them,’ he says… The UK’s former National Hi-Tech Crime Unit produced similar research that suggests  38% of financial fraud results from internal security breaches and collusion . ‘Accessing unsecure business applications from within the organisation is much easier than hacking through the corporate firewall and the potential for fraud is far greater, according to Van Den Dool. But according to a recent survey by the Department of Trade and Industry (DTI), 99%of UK companies are failing to implement all the safeguards available to them to help prevent internal security breaches.
Who’s Vulnerable In the press…   insiders infiltrating firms, U.K. cops warn April 25, 2006,  Silicon.com / CNET News.com Employees are still one of the greatest threats to corporate security, as "new-age" mafia gangs infiltrate companies, the U.K.'s crime-fighting agency has said.  Speaking on Tuesday Tony Neate, e-crime liaison for the Serious Organised Crime Agency (SOCA), said insider "plants" are causing significant damage to companies.  " We have fraud and ID theft, but one of the big threats still comes from the trusted insiders . That is, people inside the company who are attacking the systems," he said.  "(Organized crime) has changed. You still have traditional organized crime, but now they have learned to compromise employees and contractors. (They are) new-age, maybe have computer degrees and are enterprising themselves. They have a wide circle of associates and new structures," he added.   
Who’s Vulnerable In the press… Beware the enemy within News, Data Theft  Almost half the security experts who attended the recent E-Crime Congress in London agreed that internal users were the greatest risk to their IT security. Only 11% of respondents thought that external hackers were more dangerous, while 44% rated external and internal threats equally. The survey also established that only eight percent of respondents felt the “average” company takes a proactive approach to security - with over half (59%) reporting that companies were only reactive.
In the press… A Spy Downloads on China …  He claims to have downloaded some of these documents from his police computer into his MP3 player and given a sample of them to Australian immigration officials as proof of his claims. The Sydney Mercury Herald .
In the press… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How Can it Be Addressed? The easy way and the  hard  way ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How Can it Be Addressed? The  easy  way and the hard way ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Five Point Action Plan 1. Be aware  of the threats & plan an appropriate and proportionate response. 2. Consider threats from insider  as well as outside. 3. Ensure you have an appropriate AUP  (acceptable use policy) in place and that all staff are aware of it and agree it.  4.  Adopt supportive technology  to monitor and control use of devices and data… 5. Conduct a security risk assessment   -  Ensure that this, and your AUP,  also covers the use of removable devices - as well as Internet and Email use etc. …  (and don’t panic!)
Where can we get help? Links and Resources ,[object Object],[object Object],[object Object],[object Object],[object Object]
An Announcement Gatekeeper AntiTheft for Small businesses .
Closing the back door Quote " There is a feeling which persists in England that making a sandwich interesting, attractive, or in any way pleasant to eat is something sinful that only foreigners do.” Douglas Adams
Closing the back door Thank you Please visit the demo during lunch…

Mais conteúdo relacionado

Mais procurados

CC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityCC_Futureinc_Cyber Security
CC_Futureinc_Cyber Security
Alistair Blake
 
HE Mag_New Cyber Threats_ITSource
HE Mag_New Cyber Threats_ITSourceHE Mag_New Cyber Threats_ITSource
HE Mag_New Cyber Threats_ITSource
Brian Arellanes
 
Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009
Kim Jensen
 
Cyber savvy (2)
Cyber savvy (2)Cyber savvy (2)
Cyber savvy (2)
naveen p
 
A Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDCA Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDC
Microsoft Asia
 

Mais procurados (20)

CC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityCC_Futureinc_Cyber Security
CC_Futureinc_Cyber Security
 
HE Mag_New Cyber Threats_ITSource
HE Mag_New Cyber Threats_ITSourceHE Mag_New Cyber Threats_ITSource
HE Mag_New Cyber Threats_ITSource
 
Year of pawnage - Ian trump
Year of pawnage  - Ian trumpYear of pawnage  - Ian trump
Year of pawnage - Ian trump
 
Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009
 
Why computers will never be safe
Why computers will never be safeWhy computers will never be safe
Why computers will never be safe
 
Critical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the BoardroomCritical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the Boardroom
 
Cybercrime: Radically Rethinking the Global Threat
Cybercrime:  Radically Rethinking the Global ThreatCybercrime:  Radically Rethinking the Global Threat
Cybercrime: Radically Rethinking the Global Threat
 
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and Solutions
 
Ict forensics and audit bb
Ict forensics and  audit bbIct forensics and  audit bb
Ict forensics and audit bb
 
CIR Magazine - Cyber Readiness, key to survival
CIR Magazine - Cyber Readiness, key to survivalCIR Magazine - Cyber Readiness, key to survival
CIR Magazine - Cyber Readiness, key to survival
 
Modern Adversaries (Amplify Partners)
Modern Adversaries (Amplify Partners)Modern Adversaries (Amplify Partners)
Modern Adversaries (Amplify Partners)
 
2015 Global Threat Intelligence Report Executive Summary | NTT i3
2015 Global Threat Intelligence Report Executive Summary | NTT i32015 Global Threat Intelligence Report Executive Summary | NTT i3
2015 Global Threat Intelligence Report Executive Summary | NTT i3
 
Countering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from ChinaCountering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from China
 
Cyber savvy (2)
Cyber savvy (2)Cyber savvy (2)
Cyber savvy (2)
 
A Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDCA Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDC
 
Internet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber CrimeInternet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber Crime
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage Devices
 
Team 3_Final Project.docx
Team 3_Final Project.docxTeam 3_Final Project.docx
Team 3_Final Project.docx
 
Delusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceoDelusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceo
 

Destaque

Jupidi Elevator Pitch
Jupidi Elevator PitchJupidi Elevator Pitch
Jupidi Elevator Pitch
guest0a32fd
 
"5 DEDOS CIERRAN NUESTRO ACUERDO. 5 COMPROMISOS LO MANTIENEN VIVO"
"5 DEDOS CIERRAN NUESTRO ACUERDO. 5 COMPROMISOS LO MANTIENEN VIVO""5 DEDOS CIERRAN NUESTRO ACUERDO. 5 COMPROMISOS LO MANTIENEN VIVO"
"5 DEDOS CIERRAN NUESTRO ACUERDO. 5 COMPROMISOS LO MANTIENEN VIVO"
ekonomistak
 
Fashionbrac2
Fashionbrac2Fashionbrac2
Fashionbrac2
Hazek
 
Ch 3 learning how you learn
Ch 3 learning how you learnCh 3 learning how you learn
Ch 3 learning how you learn
Vjames12
 
What is wifi marketing (1)
What is wifi marketing (1)What is wifi marketing (1)
What is wifi marketing (1)
rogerbourdon
 

Destaque (20)

Investigación de mercados (r)
Investigación de mercados (r)Investigación de mercados (r)
Investigación de mercados (r)
 
El Tuteo
El TuteoEl Tuteo
El Tuteo
 
Jupidi Elevator Pitch
Jupidi Elevator PitchJupidi Elevator Pitch
Jupidi Elevator Pitch
 
Poliskulte
PoliskultePoliskulte
Poliskulte
 
"5 DEDOS CIERRAN NUESTRO ACUERDO. 5 COMPROMISOS LO MANTIENEN VIVO"
"5 DEDOS CIERRAN NUESTRO ACUERDO. 5 COMPROMISOS LO MANTIENEN VIVO""5 DEDOS CIERRAN NUESTRO ACUERDO. 5 COMPROMISOS LO MANTIENEN VIVO"
"5 DEDOS CIERRAN NUESTRO ACUERDO. 5 COMPROMISOS LO MANTIENEN VIVO"
 
M gallego-curri2014-sin fotos
M gallego-curri2014-sin fotosM gallego-curri2014-sin fotos
M gallego-curri2014-sin fotos
 
Biblioteca Popular Pedro Mariqueo - Paula Palacios
Biblioteca Popular Pedro Mariqueo - Paula PalaciosBiblioteca Popular Pedro Mariqueo - Paula Palacios
Biblioteca Popular Pedro Mariqueo - Paula Palacios
 
Texas State Bar 2010 - So What Do I Do Now?
Texas State Bar 2010 - So What Do I Do Now?Texas State Bar 2010 - So What Do I Do Now?
Texas State Bar 2010 - So What Do I Do Now?
 
Fashionbrac2
Fashionbrac2Fashionbrac2
Fashionbrac2
 
Ch 3 learning how you learn
Ch 3 learning how you learnCh 3 learning how you learn
Ch 3 learning how you learn
 
Gestión Presupuestal - Tranparencia 2008 en el Gobierno Regional de Lambayeque
Gestión Presupuestal - Tranparencia 2008 en el Gobierno Regional de LambayequeGestión Presupuestal - Tranparencia 2008 en el Gobierno Regional de Lambayeque
Gestión Presupuestal - Tranparencia 2008 en el Gobierno Regional de Lambayeque
 
FCSL Boom Kids' Night Flyer
FCSL Boom Kids' Night FlyerFCSL Boom Kids' Night Flyer
FCSL Boom Kids' Night Flyer
 
GUC SOCSARGEN REYZLANGEL TEAM
GUC SOCSARGEN REYZLANGEL TEAMGUC SOCSARGEN REYZLANGEL TEAM
GUC SOCSARGEN REYZLANGEL TEAM
 
Reactive Java Robotics IoT - jPrime 2016
Reactive Java Robotics IoT - jPrime 2016Reactive Java Robotics IoT - jPrime 2016
Reactive Java Robotics IoT - jPrime 2016
 
Sıkça Kullanılan Bazı Yabancı Kelimelerin Türkçe Karşılıkları (Geliştiren İlh...
Sıkça Kullanılan Bazı Yabancı Kelimelerin Türkçe Karşılıkları (Geliştiren İlh...Sıkça Kullanılan Bazı Yabancı Kelimelerin Türkçe Karşılıkları (Geliştiren İlh...
Sıkça Kullanılan Bazı Yabancı Kelimelerin Türkçe Karşılıkları (Geliştiren İlh...
 
EXPERT TOPIC - Tilapia
EXPERT TOPIC - TilapiaEXPERT TOPIC - Tilapia
EXPERT TOPIC - Tilapia
 
Leveraging the Power of Solr with Spark
Leveraging the Power of Solr with SparkLeveraging the Power of Solr with Spark
Leveraging the Power of Solr with Spark
 
Aeropuerto munich
Aeropuerto munichAeropuerto munich
Aeropuerto munich
 
Administración de red servidores y seguridad
Administración de red servidores y seguridadAdministración de red servidores y seguridad
Administración de red servidores y seguridad
 
What is wifi marketing (1)
What is wifi marketing (1)What is wifi marketing (1)
What is wifi marketing (1)
 

Semelhante a Merit Event - Closing the Back Door in Your Systems

Cyber Security small
Cyber Security smallCyber Security small
Cyber Security small
Henry Worth
 
We are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfWe are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdf
galagirishp
 
White Paper - Nuix Cybersecurity - US Localized
White Paper - Nuix Cybersecurity - US LocalizedWhite Paper - Nuix Cybersecurity - US Localized
White Paper - Nuix Cybersecurity - US Localized
Stuart Clarke
 
Forthright Security Lunch and Learn - Ransomware Focus 2
Forthright Security Lunch and Learn - Ransomware Focus 2Forthright Security Lunch and Learn - Ransomware Focus 2
Forthright Security Lunch and Learn - Ransomware Focus 2
David Dubree
 
Social engineering
Social engineeringSocial engineering
Social engineering
Bola Oduyale
 
Surname 2Briana CastilloCyber Crime6-16-15.docx
Surname 2Briana CastilloCyber Crime6-16-15.docxSurname 2Briana CastilloCyber Crime6-16-15.docx
Surname 2Briana CastilloCyber Crime6-16-15.docx
mattinsonjanel
 
Kaspersky: Global IT Security Risks
Kaspersky: Global IT Security RisksKaspersky: Global IT Security Risks
Kaspersky: Global IT Security Risks
Constantin Cocioaba
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security small
Henry Worth
 
140707_Cyber-Security
140707_Cyber-Security140707_Cyber-Security
140707_Cyber-Security
Tara Gravel
 
Getting the social side of pervasive computing right
Getting the social side of pervasive computing rightGetting the social side of pervasive computing right
Getting the social side of pervasive computing right
blogzilla
 

Semelhante a Merit Event - Closing the Back Door in Your Systems (20)

Cyber Security small
Cyber Security smallCyber Security small
Cyber Security small
 
What Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security ProvidersWhat Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security Providers
 
We are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfWe are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdf
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
 
article cybersecurity must B2B metaverse
article cybersecurity must B2B metaversearticle cybersecurity must B2B metaverse
article cybersecurity must B2B metaverse
 
iStart - Cybercrime scene investigation
iStart - Cybercrime scene investigationiStart - Cybercrime scene investigation
iStart - Cybercrime scene investigation
 
White Paper - Nuix Cybersecurity - US Localized
White Paper - Nuix Cybersecurity - US LocalizedWhite Paper - Nuix Cybersecurity - US Localized
White Paper - Nuix Cybersecurity - US Localized
 
Forthright Security Lunch and Learn - Ransomware Focus 2
Forthright Security Lunch and Learn - Ransomware Focus 2Forthright Security Lunch and Learn - Ransomware Focus 2
Forthright Security Lunch and Learn - Ransomware Focus 2
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerce
 
Internet
InternetInternet
Internet
 
Ten Expert Tips on Internet of Things Security
Ten Expert Tips on Internet of Things SecurityTen Expert Tips on Internet of Things Security
Ten Expert Tips on Internet of Things Security
 
expert tips
expert tipsexpert tips
expert tips
 
Surname 2Briana CastilloCyber Crime6-16-15.docx
Surname 2Briana CastilloCyber Crime6-16-15.docxSurname 2Briana CastilloCyber Crime6-16-15.docx
Surname 2Briana CastilloCyber Crime6-16-15.docx
 
Kaspersky: Global IT Security Risks
Kaspersky: Global IT Security RisksKaspersky: Global IT Security Risks
Kaspersky: Global IT Security Risks
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security small
 
140707_Cyber-Security
140707_Cyber-Security140707_Cyber-Security
140707_Cyber-Security
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer Crimes
 
Getting the social side of pervasive computing right
Getting the social side of pervasive computing rightGetting the social side of pervasive computing right
Getting the social side of pervasive computing right
 

Mais de meritnorthwest

Merit Event - Introducing Windows Server 2008, SQL Server 2008 and Visual Stu...
Merit Event - Introducing Windows Server 2008, SQL Server 2008 and Visual Stu...Merit Event - Introducing Windows Server 2008, SQL Server 2008 and Visual Stu...
Merit Event - Introducing Windows Server 2008, SQL Server 2008 and Visual Stu...
meritnorthwest
 
Merit Event - E-Mail Marketing - How to do it Right!!!
Merit Event - E-Mail Marketing - How to do it Right!!!Merit Event - E-Mail Marketing - How to do it Right!!!
Merit Event - E-Mail Marketing - How to do it Right!!!
meritnorthwest
 
Merit Event - Does "Technology Mean Business" Mean Business
Merit Event - Does "Technology Mean Business" Mean BusinessMerit Event - Does "Technology Mean Business" Mean Business
Merit Event - Does "Technology Mean Business" Mean Business
meritnorthwest
 
Merit Event - Understanding and Managing Data Protection
Merit Event - Understanding and Managing Data ProtectionMerit Event - Understanding and Managing Data Protection
Merit Event - Understanding and Managing Data Protection
meritnorthwest
 
Merit Event - O2 Blackberry Presentation
Merit Event - O2 Blackberry PresentationMerit Event - O2 Blackberry Presentation
Merit Event - O2 Blackberry Presentation
meritnorthwest
 

Mais de meritnorthwest (11)

Merit Event - Introducing Windows Server 2008, SQL Server 2008 and Visual Stu...
Merit Event - Introducing Windows Server 2008, SQL Server 2008 and Visual Stu...Merit Event - Introducing Windows Server 2008, SQL Server 2008 and Visual Stu...
Merit Event - Introducing Windows Server 2008, SQL Server 2008 and Visual Stu...
 
Merit Event - E-Mail Marketing - How to do it Right!!!
Merit Event - E-Mail Marketing - How to do it Right!!!Merit Event - E-Mail Marketing - How to do it Right!!!
Merit Event - E-Mail Marketing - How to do it Right!!!
 
Merit Event - Does "Technology Mean Business" Mean Business
Merit Event - Does "Technology Mean Business" Mean BusinessMerit Event - Does "Technology Mean Business" Mean Business
Merit Event - Does "Technology Mean Business" Mean Business
 
Merit Event - Understanding and Managing Data Protection
Merit Event - Understanding and Managing Data ProtectionMerit Event - Understanding and Managing Data Protection
Merit Event - Understanding and Managing Data Protection
 
Merit Event - North West Broadband Fund
Merit Event - North West Broadband FundMerit Event - North West Broadband Fund
Merit Event - North West Broadband Fund
 
Merit Event - Open Your Mind To Open Source Software
Merit Event - Open Your Mind To Open Source SoftwareMerit Event - Open Your Mind To Open Source Software
Merit Event - Open Your Mind To Open Source Software
 
Merit Event - Customer Relationship Management - What are the benefits?
Merit Event - Customer Relationship Management - What are the benefits?Merit Event - Customer Relationship Management - What are the benefits?
Merit Event - Customer Relationship Management - What are the benefits?
 
Merit Event - Mobile Voice and Data Convergence
Merit Event - Mobile Voice and Data ConvergenceMerit Event - Mobile Voice and Data Convergence
Merit Event - Mobile Voice and Data Convergence
 
Merit Event - O2 Blackberry Presentation
Merit Event - O2 Blackberry PresentationMerit Event - O2 Blackberry Presentation
Merit Event - O2 Blackberry Presentation
 
Merit Event - ITIL Framework
Merit Event - ITIL FrameworkMerit Event - ITIL Framework
Merit Event - ITIL Framework
 
Merit Event - Monitor, Secure & Control Your Network with JMC IT & Lightspeed...
Merit Event - Monitor, Secure & Control Your Network with JMC IT & Lightspeed...Merit Event - Monitor, Secure & Control Your Network with JMC IT & Lightspeed...
Merit Event - Monitor, Secure & Control Your Network with JMC IT & Lightspeed...
 

Último

VIP Independent Call Girls in Taloja 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Taloja 🌹 9920725232 ( Call Me ) Mumbai Escorts ...VIP Independent Call Girls in Taloja 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Taloja 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
dipikadinghjn ( Why You Choose Us? ) Escorts
 
CBD Belapur Expensive Housewife Call Girls Number-📞📞9833754194 No 1 Vipp HIgh...
CBD Belapur Expensive Housewife Call Girls Number-📞📞9833754194 No 1 Vipp HIgh...CBD Belapur Expensive Housewife Call Girls Number-📞📞9833754194 No 1 Vipp HIgh...
CBD Belapur Expensive Housewife Call Girls Number-📞📞9833754194 No 1 Vipp HIgh...
priyasharma62062
 
call girls in Sant Nagar (DELHI) 🔝 >༒9953056974 🔝 genuine Escort Service 🔝✔️✔️
call girls in Sant Nagar (DELHI) 🔝 >༒9953056974 🔝 genuine Escort Service 🔝✔️✔️call girls in Sant Nagar (DELHI) 🔝 >༒9953056974 🔝 genuine Escort Service 🔝✔️✔️
call girls in Sant Nagar (DELHI) 🔝 >༒9953056974 🔝 genuine Escort Service 🔝✔️✔️
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
dipikadinghjn ( Why You Choose Us? ) Escorts
 
VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...
VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...
VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...
dipikadinghjn ( Why You Choose Us? ) Escorts
 
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...
dipikadinghjn ( Why You Choose Us? ) Escorts
 
VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...
VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...
VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...
dipikadinghjn ( Why You Choose Us? ) Escorts
 
VIP Independent Call Girls in Mira Bhayandar 🌹 9920725232 ( Call Me ) Mumbai ...
VIP Independent Call Girls in Mira Bhayandar 🌹 9920725232 ( Call Me ) Mumbai ...VIP Independent Call Girls in Mira Bhayandar 🌹 9920725232 ( Call Me ) Mumbai ...
VIP Independent Call Girls in Mira Bhayandar 🌹 9920725232 ( Call Me ) Mumbai ...
dipikadinghjn ( Why You Choose Us? ) Escorts
 
VIP Kalyan Call Girls 🌐 9920725232 🌐 Make Your Dreams Come True With Mumbai E...
VIP Kalyan Call Girls 🌐 9920725232 🌐 Make Your Dreams Come True With Mumbai E...VIP Kalyan Call Girls 🌐 9920725232 🌐 Make Your Dreams Come True With Mumbai E...
VIP Kalyan Call Girls 🌐 9920725232 🌐 Make Your Dreams Come True With Mumbai E...
roshnidevijkn ( Why You Choose Us? ) Escorts
 

Último (20)

VIP Independent Call Girls in Taloja 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Taloja 🌹 9920725232 ( Call Me ) Mumbai Escorts ...VIP Independent Call Girls in Taloja 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Taloja 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
 
Booking open Available Pune Call Girls Wadgaon Sheri 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Wadgaon Sheri  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Wadgaon Sheri  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Wadgaon Sheri 6297143586 Call Hot Ind...
 
CBD Belapur Expensive Housewife Call Girls Number-📞📞9833754194 No 1 Vipp HIgh...
CBD Belapur Expensive Housewife Call Girls Number-📞📞9833754194 No 1 Vipp HIgh...CBD Belapur Expensive Housewife Call Girls Number-📞📞9833754194 No 1 Vipp HIgh...
CBD Belapur Expensive Housewife Call Girls Number-📞📞9833754194 No 1 Vipp HIgh...
 
call girls in Sant Nagar (DELHI) 🔝 >༒9953056974 🔝 genuine Escort Service 🔝✔️✔️
call girls in Sant Nagar (DELHI) 🔝 >༒9953056974 🔝 genuine Escort Service 🔝✔️✔️call girls in Sant Nagar (DELHI) 🔝 >༒9953056974 🔝 genuine Escort Service 🔝✔️✔️
call girls in Sant Nagar (DELHI) 🔝 >༒9953056974 🔝 genuine Escort Service 🔝✔️✔️
 
Kopar Khairane Russian Call Girls Number-9833754194-Navi Mumbai Fantastic Unl...
Kopar Khairane Russian Call Girls Number-9833754194-Navi Mumbai Fantastic Unl...Kopar Khairane Russian Call Girls Number-9833754194-Navi Mumbai Fantastic Unl...
Kopar Khairane Russian Call Girls Number-9833754194-Navi Mumbai Fantastic Unl...
 
VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
 
Diva-Thane European Call Girls Number-9833754194-Diva Busty Professional Call...
Diva-Thane European Call Girls Number-9833754194-Diva Busty Professional Call...Diva-Thane European Call Girls Number-9833754194-Diva Busty Professional Call...
Diva-Thane European Call Girls Number-9833754194-Diva Busty Professional Call...
 
(INDIRA) Call Girl Mumbai Call Now 8250077686 Mumbai Escorts 24x7
(INDIRA) Call Girl Mumbai Call Now 8250077686 Mumbai Escorts 24x7(INDIRA) Call Girl Mumbai Call Now 8250077686 Mumbai Escorts 24x7
(INDIRA) Call Girl Mumbai Call Now 8250077686 Mumbai Escorts 24x7
 
VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...
VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...
VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...
 
Mira Road Memorable Call Grls Number-9833754194-Bhayandar Speciallty Call Gir...
Mira Road Memorable Call Grls Number-9833754194-Bhayandar Speciallty Call Gir...Mira Road Memorable Call Grls Number-9833754194-Bhayandar Speciallty Call Gir...
Mira Road Memorable Call Grls Number-9833754194-Bhayandar Speciallty Call Gir...
 
Top Rated Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
Top Rated  Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...Top Rated  Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
Top Rated Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
 
Bandra High Profile Sexy Call Girls,9833754194-Khar Road Speciality Call Girl...
Bandra High Profile Sexy Call Girls,9833754194-Khar Road Speciality Call Girl...Bandra High Profile Sexy Call Girls,9833754194-Khar Road Speciality Call Girl...
Bandra High Profile Sexy Call Girls,9833754194-Khar Road Speciality Call Girl...
 
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...
 
Webinar on E-Invoicing for Fintech Belgium
Webinar on E-Invoicing for Fintech BelgiumWebinar on E-Invoicing for Fintech Belgium
Webinar on E-Invoicing for Fintech Belgium
 
(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7
(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7
(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7
 
VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...
VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...
VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...
 
Kharghar Blowjob Housewife Call Girls NUmber-9833754194-CBD Belapur Internati...
Kharghar Blowjob Housewife Call Girls NUmber-9833754194-CBD Belapur Internati...Kharghar Blowjob Housewife Call Girls NUmber-9833754194-CBD Belapur Internati...
Kharghar Blowjob Housewife Call Girls NUmber-9833754194-CBD Belapur Internati...
 
VIP Independent Call Girls in Mira Bhayandar 🌹 9920725232 ( Call Me ) Mumbai ...
VIP Independent Call Girls in Mira Bhayandar 🌹 9920725232 ( Call Me ) Mumbai ...VIP Independent Call Girls in Mira Bhayandar 🌹 9920725232 ( Call Me ) Mumbai ...
VIP Independent Call Girls in Mira Bhayandar 🌹 9920725232 ( Call Me ) Mumbai ...
 
Mira Road Awesome 100% Independent Call Girls NUmber-9833754194-Dahisar Inter...
Mira Road Awesome 100% Independent Call Girls NUmber-9833754194-Dahisar Inter...Mira Road Awesome 100% Independent Call Girls NUmber-9833754194-Dahisar Inter...
Mira Road Awesome 100% Independent Call Girls NUmber-9833754194-Dahisar Inter...
 
VIP Kalyan Call Girls 🌐 9920725232 🌐 Make Your Dreams Come True With Mumbai E...
VIP Kalyan Call Girls 🌐 9920725232 🌐 Make Your Dreams Come True With Mumbai E...VIP Kalyan Call Girls 🌐 9920725232 🌐 Make Your Dreams Come True With Mumbai E...
VIP Kalyan Call Girls 🌐 9920725232 🌐 Make Your Dreams Come True With Mumbai E...
 

Merit Event - Closing the Back Door in Your Systems

  • 3. Closing the back door Quote "The History of every major Galactic Civilization tends to pass through three distinct and recognizable phases, those of Survival , Inquiry and Sophistication , otherwise known as the How , Why and Where phases. "For instance, the first phase is characterized by the question How can we eat? the second by the question Why do we eat? and the third by the question Where shall we have lunch? .” Douglas Adams
  • 4.
  • 5.
  • 8. The nature of the threat – Who says…
  • 9.
  • 10.
  • 12. The nature of the threat The DTI Security Breaches Report 2006 Found that… “such devices are being used in 84 per cent of companies and, on average, a third of employees are using them in the office”. 90% of those surveyed said they were aware of the potential danger that removable media presents, and a third of organisations admitted that removable media is being used without authorisation.
  • 13. The nature of the threat The DTI Security Breaches Report 2006 "With removable media plummeting in price, soaring memory capacity and more people using them at work, companies need to be aware of how easy it is for staff to use them, lose them or take competitive information away on them, all in the palm of their hands," "If lost or stolen, vast amounts of valuable information could seriously expose a company to extortion, digital identity fraud, or damage to their reputation, integrity and brand."
  • 14.
  • 15. The nature of the threat Quotes ‘ Opportunity makes the thief. If you give them the opportunity to access systems that they shouldn’t, then things can go wrong ’ ‘ There seems to be a fixation on threats from the internet and external hackers but for the criminals, going the insider route is easier and there can be much more financial benefit for them’ ‘ In addition, organised crime gangs have been blackmailing people inside companies to obtain information ‘
  • 16. The nature of the threat Gartner Research "Organisations are increasingly putting themselves at risk by allowing the unauthorized and uncontrolled use of portable storage devices". “These are ideal for anyone intending to steal sensitive and valuable data… The impact of this goes beyond the commercial value of the data.”
  • 17. How Bad Is the Threat? A demonstration
  • 18. How Bad Is the Threat? www.PodSnaffler.co.uk
  • 19.
  • 20. Who’s Vulnerable “ In a recent survey 70% of employees admitted taking information from work to which they were not entitled. As Computer Weekly has commented “ anyone planning to leave will remove most of the information they want well in advance .”
  • 21.
  • 22.
  • 23.
  • 24.
  • 25. Closing the back door Quote “ A learning experience is one of those things that says, 'You know that thing you just did? Don't do that.' ” Douglas Adams “ Human beings, who are almost unique in having the ability to learn from the experience of others, are also remarkable for their apparent disinclination to do so.” Douglas Adams
  • 26. Who’s Vulnerable In the press… BBC 29April Digital cameras, MP3 players and handheld computers could be the tools that disgruntled UK employees use to sabotage computer systems or steal vital data, warn security experts. The removable memory cards inside the devices could be used to bring in software that looks for vulnerabilities on a company's internal network. The innocent-looking devices could also be used to smuggle out confidential or sensitive information. The dangers disgruntled employees posed was highlighted by a survey showing that almost half of the most serious security incidents businesses suffered last year were caused by company workers.
  • 27. In the press… Inside job Computing Magazine 14 April While companies guard against external hacks, it is easy to overlook threats closer to home Last year, more than a dozen employees who had worked for Citibank’s Indian call centre partner Mphasis were arrested for allegedly stealing $350,000 (£199,842) from the bank’s American customers . … Similar threats can occur inside many organisations, warns Floris Van Den Dool, head of consultant Accenture’s European security practice. ‘ There seems to be a fixation on threats from the internet and external hackers but for the criminals , going the insider route is easier and there can be much more financial benefit for them,’ he says… The UK’s former National Hi-Tech Crime Unit produced similar research that suggests 38% of financial fraud results from internal security breaches and collusion . ‘Accessing unsecure business applications from within the organisation is much easier than hacking through the corporate firewall and the potential for fraud is far greater, according to Van Den Dool. But according to a recent survey by the Department of Trade and Industry (DTI), 99%of UK companies are failing to implement all the safeguards available to them to help prevent internal security breaches.
  • 28. Who’s Vulnerable In the press…   insiders infiltrating firms, U.K. cops warn April 25, 2006,  Silicon.com / CNET News.com Employees are still one of the greatest threats to corporate security, as "new-age" mafia gangs infiltrate companies, the U.K.'s crime-fighting agency has said. Speaking on Tuesday Tony Neate, e-crime liaison for the Serious Organised Crime Agency (SOCA), said insider "plants" are causing significant damage to companies. " We have fraud and ID theft, but one of the big threats still comes from the trusted insiders . That is, people inside the company who are attacking the systems," he said. "(Organized crime) has changed. You still have traditional organized crime, but now they have learned to compromise employees and contractors. (They are) new-age, maybe have computer degrees and are enterprising themselves. They have a wide circle of associates and new structures," he added.  
  • 29. Who’s Vulnerable In the press… Beware the enemy within News, Data Theft Almost half the security experts who attended the recent E-Crime Congress in London agreed that internal users were the greatest risk to their IT security. Only 11% of respondents thought that external hackers were more dangerous, while 44% rated external and internal threats equally. The survey also established that only eight percent of respondents felt the “average” company takes a proactive approach to security - with over half (59%) reporting that companies were only reactive.
  • 30. In the press… A Spy Downloads on China … He claims to have downloaded some of these documents from his police computer into his MP3 player and given a sample of them to Australian immigration officials as proof of his claims. The Sydney Mercury Herald .
  • 31.
  • 32.
  • 33.
  • 34. Five Point Action Plan 1. Be aware of the threats & plan an appropriate and proportionate response. 2. Consider threats from insider as well as outside. 3. Ensure you have an appropriate AUP (acceptable use policy) in place and that all staff are aware of it and agree it. 4. Adopt supportive technology to monitor and control use of devices and data… 5. Conduct a security risk assessment - Ensure that this, and your AUP, also covers the use of removable devices - as well as Internet and Email use etc. … (and don’t panic!)
  • 35.
  • 36. An Announcement Gatekeeper AntiTheft for Small businesses .
  • 37. Closing the back door Quote " There is a feeling which persists in England that making a sandwich interesting, attractive, or in any way pleasant to eat is something sinful that only foreigners do.” Douglas Adams
  • 38. Closing the back door Thank you Please visit the demo during lunch…