cyber security presentation - it will never happen to me

19
Cyber Security Seminar “It Will Never Happen to Me”

Upload: simon-salter

Post on 11-Feb-2017

17 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Cyber Security Presentation - IT Will Never Happen To Me

Cyber Security Seminar

“It Will Never Happen to Me”

Page 2: Cyber Security Presentation - IT Will Never Happen To Me

What is Cyber Crime

Webopedia Definition

• Cyber crime encompasses any criminal act dealing with computers and networks(called hacking) 

• Additionally, cyber crime also includes traditional crimes conducted through the internet

• For example; hate crimes, telemarketing and Internet fraud, identity theft,

• Credit card account thefts are considered to be cyber crimes when the illegal activities are committed through the use of a computer and the Internet.

Page 3: Cyber Security Presentation - IT Will Never Happen To Me

Cyber Crime Statistics

*Crime rate in England and Wales soars as cybercrime is included for first time

• The sharp rise in the headline figures is due to the inclusion of an estimated 5.1m online fraud incidents and 2.5m cybercrime offences for the first time

• The detailed figures for online fraud show 14% of victims lost less than £20, 27% lost less than £100 and a further 37% lost less than £500. One per cent lost more than £5,000.

• The virus or malware, known as Dridex netted criminals £20m in funds from UK Banks in 1 heist

• Report also stated is was reported to have netted over $100m worldwide

Page 4: Cyber Security Presentation - IT Will Never Happen To Me

What is Ransomware

• Ransomware is a strain of malware (malicious software) that encrypts or locks all of the files on your computer or server, and then demands a payment (or ransom) to unlock your files.

• It takes many forms, including its most infamous incarnation, Cryptolocker.

• Other strains include Locky, Teslacrypt, and Cryptowall.

• In some instances, ransomware’s presence can be betrayed by a .EXE file extension - but cyber criminals are getting more and more sophisticated, so this often isn’t the case.

Page 5: Cyber Security Presentation - IT Will Never Happen To Me

How Does Ransomware Spread ?

• Like many viruses, the most common source of infection is from emails, when a user opens contaminated attachments or clicks a malicious link. However, there are many other sources, like rogue USB sticks, or even joining free WiFi networks.

How can I Remove it ?

• Unfortunately, there’s no sure-fire way to remove Ransomware.

• Even paying up doesn’t always work; criminals have been known to ask for higher and higher sums, or claim to have lost the ‘key’.

• The best approach is to access your backups.

Page 6: Cyber Security Presentation - IT Will Never Happen To Me

What can I do to avoid Ransomware?

• There are three major forms of protection:

• Preventative measures,

• Anti-virus & backup.

• Preventative measures are the first lines of defence against Ransomware: education can ensure that staff are aware of the risks and know what to look out for, and changing system permissions can lower the risk of infection.

• Anti-virus is a must for all businesses, and can detect and deflect a high percentage of attacks.

Page 7: Cyber Security Presentation - IT Will Never Happen To Me

What can I do to avoid Ransomware? Cont’d

• However, due to the ever-changing nature of Ransomware, these steps aren’t 100% effective. That’s when you need a backup and business continuity solution. This allows you to roll back to a point prior to infection.

Page 8: Cyber Security Presentation - IT Will Never Happen To Me

Who would want to hack us ?

Page 9: Cyber Security Presentation - IT Will Never Happen To Me

• What have we got that can't be found elsewhere more easily

• Credit/Debit Card Details

• Online Account Details such as Pay Pal

• Scanning of passports or credit cards

Who would want to hack us ?

Page 10: Cyber Security Presentation - IT Will Never Happen To Me

• There are basic kinds of phishing

• Blanket

• Spear Phishing

• Whaling

Types of attacks?

Page 11: Cyber Security Presentation - IT Will Never Happen To Me

Example of Social Engineering

Page 12: Cyber Security Presentation - IT Will Never Happen To Me

Example of Blanket Attack

Page 13: Cyber Security Presentation - IT Will Never Happen To Me

Example of Blanket Attack

Page 14: Cyber Security Presentation - IT Will Never Happen To Me

Example of Blanket Attack

Page 15: Cyber Security Presentation - IT Will Never Happen To Me

Example of Blanket Attack

Page 16: Cyber Security Presentation - IT Will Never Happen To Me

Example of Blanket Attack

Page 17: Cyber Security Presentation - IT Will Never Happen To Me

• They will ring you up to inform you , “you have an issue with Internet Traffic from your connection “ you may have spyware

• Call reference you Credit Card being used

• Scammers who pretend to be tech support from Microsoft

Tech Support Scammers

Page 18: Cyber Security Presentation - IT Will Never Happen To Me

• Crypto Locker , CryptoDefense and CryptoWall

• 5 Stages of Crypto Ransomware

1. Installation2. Contacting Headquarters3. Hand Shake and Keys4. Encryption5. Extortion

Most Commonly known attack !

Page 19: Cyber Security Presentation - IT Will Never Happen To Me

• You don’t get calls from your Bank about the Balance in your account

• You don’t get phone calls from Microsoft Technical Support or other support

agents

• You don’t get emails from HMRC “ You are owed credit and to contact them”

• You probably don’t have a long lost Relative in the Congo who has Millions that

they need you to hold for them just short term

• Passwords should be changed regularly and not use common ones

How Do we Protect OurselvesEducating our users on the Do’s and Don'ts is a Major factor in reducing he impact to your Business