win the most productivity tool for your business worth ... · confidential information, violating...

30
“Enter your business card for an opportunity to win the most productivity tool for your business worth over $200 Cyber Security And For Business Seminar

Upload: others

Post on 08-Apr-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: win the most productivity tool for your business worth ... · confidential information, violating privacy laws and ... Experienced in programing (C++, C#, Java) several financial

“Enter your business card for an opportunity to win the most productivity tool for your business

worth over $200

Cyber Security And For Business Seminar

Page 2: win the most productivity tool for your business worth ... · confidential information, violating privacy laws and ... Experienced in programing (C++, C#, Java) several financial

“How Cyber Criminals Are Targeting Small Businesses, What You Can Do Now To Avoid

Costly Cyber Security Breaches, Data Loss, Theft And To Protect Your Business Online”

Cyber Security And For Business Seminar

Your Presenter: Femi Dada, A+, Security +, MCP, MCTS

President, Smarthost Design Technologies, LLC

Page 3: win the most productivity tool for your business worth ... · confidential information, violating privacy laws and ... Experienced in programing (C++, C#, Java) several financial

• What Cyber Security is in simple terms, and what methods hackers are using to steal money from businesses.

• Critical policies, procedures and protections EVERY Business must have in place NOW before allowing employee to connect to the internet, use application, send and receive emails or work online.

• BotNets, Trojans Malware, What are the best strategies you need to have in place.

• New Legal issues introduced with disclosing confidential information, violating privacy laws and how to reduce or eliminate your risk

• Answers to your questions.

Today We’re Going To Cover

Page 4: win the most productivity tool for your business worth ... · confidential information, violating privacy laws and ... Experienced in programing (C++, C#, Java) several financial

Who Is Femi Dada? Femi Dada, Founder & CEO of Smarthost Design Technologies, a an experienced IT consultant and strategist with specialty in integrating and designing highly effective, technology and network systems for businesses and professional services organizations.

I founded Smarthost Design Technologies after migrating to the US while studding at UMUC. Graduated with a BSc. In Computer Science. Experienced in programing (C++, C#, Java) several financial web application back when I was a Web GURU, but more specifically I know how to create and implement technology plans and support solution that gives businesses the peace of mind, allowing them to add new clients, increase sales and make more money – as a result of implementing the right technology solution to support their core business objectives.

Page 5: win the most productivity tool for your business worth ... · confidential information, violating privacy laws and ... Experienced in programing (C++, C#, Java) several financial

Who Is Femi Dada? My experience includes enterprise level network infrastructure and services Desk support, Branch Banking support through SunTrust Bank, Industrial manufacturing system automation at CTI Group, Modis-IT and other firms. Femi was part of a team lead on successful Migration of HCPSC, DCPS, Constellation Energy (BGE) system infrastructure and enterprise email and website self services project among others.

A graduate of the University of Maryland University College(UMUC), Femi holds the multiple Microsoft Certified Technology Specialist (MCTS), MCDS, MCP credential. In early 2000’s, Femi was among the first Microsoft Small Business Specialist Engineers of which there are tens of thousands today.

Page 6: win the most productivity tool for your business worth ... · confidential information, violating privacy laws and ... Experienced in programing (C++, C#, Java) several financial

• Spent over a decade researching, developing, testing and refining IT solution for small & mid-size businesses including government contractors, professional services companies.

• We have served about 50 clients spanning the DC, MD, and VA area from a brand new startups to multi-million dollar IT firms including large health care provider.

• I’ve spent well over 200 hours talking to Business Owners – Managers – researching and discovering what they look for when outsourcing their IT support or buying IT services.

• I have also over 18 months attended industry trade show, verifying vendors solutions, test their solutions, and have spent real money to purchase their solution and put it to test.

• Currently serve on the Board of Greater Beltsville Business Association (GBBA) helping local business and charities in the Beltsville area.

Who Is Femi Dada?

Page 7: win the most productivity tool for your business worth ... · confidential information, violating privacy laws and ... Experienced in programing (C++, C#, Java) several financial

The Evolution Of IT: A Brief History

Page 8: win the most productivity tool for your business worth ... · confidential information, violating privacy laws and ... Experienced in programing (C++, C#, Java) several financial

So What IS Cyber Security ?

Cyber security, is the security of the internet, all electronic foot print inter connected to the data that are passing and stored through it. (computers, networks, programs and data from unintended or unauthorized access, change or destruction).

Page 9: win the most productivity tool for your business worth ... · confidential information, violating privacy laws and ... Experienced in programing (C++, C#, Java) several financial

Why Is Protecting you PC, Network

important to your businesses Governments, military, corporations, financial institutions,

hospitals and businesses collect, process and store a great deal of

confidential information on computers and transmit that data

across networks to other computers. With the growing volume

and sophistication of cyber attacks, ongoing attention is required

to protect sensitive business and personal information, as well as

safeguard national security.

During a Senate hearing in March 2013, the nation's top

intelligence officials warned that cyber attacks and digital spying

are the top threat to national security, eclipsing terrorism.

Page 10: win the most productivity tool for your business worth ... · confidential information, violating privacy laws and ... Experienced in programing (C++, C#, Java) several financial

• Virus attacks are no longer just viruses (they may include payload)

• Wireless and wired network sniffers packet • Widespread denial-of-service attacks • Botnets and Zombies • Spoofing Hijacking sessions • Automated probes and scans • GUI intruder tools (fake speedup my computer tools) • Automated widespread attacks • .exe code attacks (against browsers) + Compress files • Techniques to analyze code to identify vulnerabilities • Internet social engineering attacks

So, Why us. I’m just a small businesses

Page 11: win the most productivity tool for your business worth ... · confidential information, violating privacy laws and ... Experienced in programing (C++, C#, Java) several financial

• Ransom Ware

• Fake Antivirus Programs

• Stranded Abroad- Send me western union money

• Email Spoofing

• Bank account website redirect

• Mobile Apps

Methods Hackers are using to Steal from

businesses

Page 12: win the most productivity tool for your business worth ... · confidential information, violating privacy laws and ... Experienced in programing (C++, C#, Java) several financial

Poisonous Links

Ransom ware, Fake Antivirus, poisonous

search links

Page 13: win the most productivity tool for your business worth ... · confidential information, violating privacy laws and ... Experienced in programing (C++, C#, Java) several financial

Ransom ware, Fake Antivirus, poisonous

search links

Page 14: win the most productivity tool for your business worth ... · confidential information, violating privacy laws and ... Experienced in programing (C++, C#, Java) several financial

Ransom ware, Fake Antivirus, poisonous

search links

Page 15: win the most productivity tool for your business worth ... · confidential information, violating privacy laws and ... Experienced in programing (C++, C#, Java) several financial

A recent report from McAfee shows an astonishing rise in malware designed to attack mobile devices, from 792 samples in 2011 to 36,699 in 2012, just one year later!

Malware: A Rapidly Growing Concern

Page 16: win the most productivity tool for your business worth ... · confidential information, violating privacy laws and ... Experienced in programing (C++, C#, Java) several financial

A writer once asked a literary agent, “What kind of writing pays the most?” Her answer was simple: “Ransom notes.”

That's sort of what's happening in the cybercrime world — sensitive data in the wrong hands is used to extort money.

Data Breaches

Dangers On The Rise…

Page 17: win the most productivity tool for your business worth ... · confidential information, violating privacy laws and ... Experienced in programing (C++, C#, Java) several financial

Bank Account Website Redirect

Page 18: win the most productivity tool for your business worth ... · confidential information, violating privacy laws and ... Experienced in programing (C++, C#, Java) several financial

Bank Account Website Redirect

Robot forms

Page 19: win the most productivity tool for your business worth ... · confidential information, violating privacy laws and ... Experienced in programing (C++, C#, Java) several financial

• Employee loss of productivity time • Law suites against businesses for

work place harassment • In appropriate images display on

computer screen • Loss of customer data, critical

company assets • Embarrassment • Loss of integrity with prime, vendors

and partners • And more (just think about it)

Effects on Businesses

Page 20: win the most productivity tool for your business worth ... · confidential information, violating privacy laws and ... Experienced in programing (C++, C#, Java) several financial

Internet of things- No guns.. No Blood.. , but

USD 45 Millions robbed from banks

This story is meant to give you an insight on 21st century cyber crime scenario and what the future holds. Apprehending the future of our connected life is one big step towards a secured online life. - See more at: http://www.cyberoam.com/blog/internet-of-things-no-guns-no-bloodshed-usd-45-million-robbed-from-banks-via-atms-within-hours/#sthash.qyHEHKiH.dpuf

Page 21: win the most productivity tool for your business worth ... · confidential information, violating privacy laws and ... Experienced in programing (C++, C#, Java) several financial

Modern Security tools, Use Policy and

+ Training Work Hand In Hand

Page 22: win the most productivity tool for your business worth ... · confidential information, violating privacy laws and ... Experienced in programing (C++, C#, Java) several financial

• Employee Computer Use Policy

– What is allowed and what is not?

• Internet Use Policy

– Allowable sites, use of internet (monster, LinkedIn Facebook, Instigram, Pondora, etc)

• Mobile Devices Use Policy (BYOD) Policy

– Do you provide your user with mobile devices/ user provide, if so; how does Remote wipe, employee checks email from home works?

Critical Policies, Procedures and

Protections Must be in Place

Page 23: win the most productivity tool for your business worth ... · confidential information, violating privacy laws and ... Experienced in programing (C++, C#, Java) several financial

What and How Do I Protect my

business Against Cyber Hackers

Page 24: win the most productivity tool for your business worth ... · confidential information, violating privacy laws and ... Experienced in programing (C++, C#, Java) several financial

1st Get a Business Policy in Place Built to

Direct the use of Technology.

• Employee Computer Use Policy – What is allowed and what is not?

• Internet Use Policy – Allowable sites, use of internet

(monster, LinkedIn Facebook, Instigram, Pondora, etc)

• Mobile Devices Use Policy (BYOD) Policy – Do you provide your user with

mobile device/ user provide, if so; how does Remote wipe, employee checks email from home works?

Page 25: win the most productivity tool for your business worth ... · confidential information, violating privacy laws and ... Experienced in programing (C++, C#, Java) several financial

2nd Implement Policies Built for Business.

Engineered for Security. Ready for the

Future. • Implement the hardware, software tools according to the Policies set

• Replace outdated security hardware in you network (Firewall is not enough anymore)

• Train employee • Minimized use of Social Network (monster,

LinkedIn Facebook, Instigram, Pondora, etc)

• Mobile Devices Use Policy (BYOD) Policy – Do you provide you user with mobile

device/ user provide, if so; how does Remote wipe, employee checks email from home works?

Page 26: win the most productivity tool for your business worth ... · confidential information, violating privacy laws and ... Experienced in programing (C++, C#, Java) several financial

3rd Continuous Security Aware Training.

• Training your staff on what is out there.

• Password selection training (don’t put your password under your key board).

• Website search engine usage(infected web links to virus).

• Software installation (who has permission to install software).

• User account Privilege on computers.

• Windows XP is not secure anymore compared to the risk faced today.

Page 27: win the most productivity tool for your business worth ... · confidential information, violating privacy laws and ... Experienced in programing (C++, C#, Java) several financial

4th make sure that all you PC/Mobile

Devices have Protection. • http://www.avg.com/

• http://www.sophos.com

Page 28: win the most productivity tool for your business worth ... · confidential information, violating privacy laws and ... Experienced in programing (C++, C#, Java) several financial

It’s Not All Sunshine And Roses…

The Dangers

from Cyber Attacks are Real

Page 29: win the most productivity tool for your business worth ... · confidential information, violating privacy laws and ... Experienced in programing (C++, C#, Java) several financial

Questions:

1. Is it true that Apple computers are safer than other computers?

2. Do I really need to worry about someone hacking into my PC?

3. What do think? Is iPhone 5c- Colorful/5s-forward thinking

4. ????

Page 30: win the most productivity tool for your business worth ... · confidential information, violating privacy laws and ... Experienced in programing (C++, C#, Java) several financial

The Winner is ……..??

Thanks to the wonderful picture I found on the internet