win the most productivity tool for your business worth ... · confidential information, violating...
TRANSCRIPT
“Enter your business card for an opportunity to win the most productivity tool for your business
worth over $200
Cyber Security And For Business Seminar
“How Cyber Criminals Are Targeting Small Businesses, What You Can Do Now To Avoid
Costly Cyber Security Breaches, Data Loss, Theft And To Protect Your Business Online”
Cyber Security And For Business Seminar
Your Presenter: Femi Dada, A+, Security +, MCP, MCTS
President, Smarthost Design Technologies, LLC
• What Cyber Security is in simple terms, and what methods hackers are using to steal money from businesses.
• Critical policies, procedures and protections EVERY Business must have in place NOW before allowing employee to connect to the internet, use application, send and receive emails or work online.
• BotNets, Trojans Malware, What are the best strategies you need to have in place.
• New Legal issues introduced with disclosing confidential information, violating privacy laws and how to reduce or eliminate your risk
• Answers to your questions.
Today We’re Going To Cover
Who Is Femi Dada? Femi Dada, Founder & CEO of Smarthost Design Technologies, a an experienced IT consultant and strategist with specialty in integrating and designing highly effective, technology and network systems for businesses and professional services organizations.
I founded Smarthost Design Technologies after migrating to the US while studding at UMUC. Graduated with a BSc. In Computer Science. Experienced in programing (C++, C#, Java) several financial web application back when I was a Web GURU, but more specifically I know how to create and implement technology plans and support solution that gives businesses the peace of mind, allowing them to add new clients, increase sales and make more money – as a result of implementing the right technology solution to support their core business objectives.
Who Is Femi Dada? My experience includes enterprise level network infrastructure and services Desk support, Branch Banking support through SunTrust Bank, Industrial manufacturing system automation at CTI Group, Modis-IT and other firms. Femi was part of a team lead on successful Migration of HCPSC, DCPS, Constellation Energy (BGE) system infrastructure and enterprise email and website self services project among others.
A graduate of the University of Maryland University College(UMUC), Femi holds the multiple Microsoft Certified Technology Specialist (MCTS), MCDS, MCP credential. In early 2000’s, Femi was among the first Microsoft Small Business Specialist Engineers of which there are tens of thousands today.
• Spent over a decade researching, developing, testing and refining IT solution for small & mid-size businesses including government contractors, professional services companies.
• We have served about 50 clients spanning the DC, MD, and VA area from a brand new startups to multi-million dollar IT firms including large health care provider.
• I’ve spent well over 200 hours talking to Business Owners – Managers – researching and discovering what they look for when outsourcing their IT support or buying IT services.
• I have also over 18 months attended industry trade show, verifying vendors solutions, test their solutions, and have spent real money to purchase their solution and put it to test.
• Currently serve on the Board of Greater Beltsville Business Association (GBBA) helping local business and charities in the Beltsville area.
Who Is Femi Dada?
The Evolution Of IT: A Brief History
So What IS Cyber Security ?
Cyber security, is the security of the internet, all electronic foot print inter connected to the data that are passing and stored through it. (computers, networks, programs and data from unintended or unauthorized access, change or destruction).
Why Is Protecting you PC, Network
important to your businesses Governments, military, corporations, financial institutions,
hospitals and businesses collect, process and store a great deal of
confidential information on computers and transmit that data
across networks to other computers. With the growing volume
and sophistication of cyber attacks, ongoing attention is required
to protect sensitive business and personal information, as well as
safeguard national security.
During a Senate hearing in March 2013, the nation's top
intelligence officials warned that cyber attacks and digital spying
are the top threat to national security, eclipsing terrorism.
• Virus attacks are no longer just viruses (they may include payload)
• Wireless and wired network sniffers packet • Widespread denial-of-service attacks • Botnets and Zombies • Spoofing Hijacking sessions • Automated probes and scans • GUI intruder tools (fake speedup my computer tools) • Automated widespread attacks • .exe code attacks (against browsers) + Compress files • Techniques to analyze code to identify vulnerabilities • Internet social engineering attacks
So, Why us. I’m just a small businesses
• Ransom Ware
• Fake Antivirus Programs
• Stranded Abroad- Send me western union money
• Email Spoofing
• Bank account website redirect
• Mobile Apps
Methods Hackers are using to Steal from
businesses
Poisonous Links
Ransom ware, Fake Antivirus, poisonous
search links
Ransom ware, Fake Antivirus, poisonous
search links
Ransom ware, Fake Antivirus, poisonous
search links
A recent report from McAfee shows an astonishing rise in malware designed to attack mobile devices, from 792 samples in 2011 to 36,699 in 2012, just one year later!
Malware: A Rapidly Growing Concern
A writer once asked a literary agent, “What kind of writing pays the most?” Her answer was simple: “Ransom notes.”
That's sort of what's happening in the cybercrime world — sensitive data in the wrong hands is used to extort money.
Data Breaches
Dangers On The Rise…
Bank Account Website Redirect
Bank Account Website Redirect
Robot forms
• Employee loss of productivity time • Law suites against businesses for
work place harassment • In appropriate images display on
computer screen • Loss of customer data, critical
company assets • Embarrassment • Loss of integrity with prime, vendors
and partners • And more (just think about it)
Effects on Businesses
Internet of things- No guns.. No Blood.. , but
USD 45 Millions robbed from banks
This story is meant to give you an insight on 21st century cyber crime scenario and what the future holds. Apprehending the future of our connected life is one big step towards a secured online life. - See more at: http://www.cyberoam.com/blog/internet-of-things-no-guns-no-bloodshed-usd-45-million-robbed-from-banks-via-atms-within-hours/#sthash.qyHEHKiH.dpuf
Modern Security tools, Use Policy and
+ Training Work Hand In Hand
• Employee Computer Use Policy
– What is allowed and what is not?
• Internet Use Policy
– Allowable sites, use of internet (monster, LinkedIn Facebook, Instigram, Pondora, etc)
• Mobile Devices Use Policy (BYOD) Policy
– Do you provide your user with mobile devices/ user provide, if so; how does Remote wipe, employee checks email from home works?
Critical Policies, Procedures and
Protections Must be in Place
What and How Do I Protect my
business Against Cyber Hackers
1st Get a Business Policy in Place Built to
Direct the use of Technology.
• Employee Computer Use Policy – What is allowed and what is not?
• Internet Use Policy – Allowable sites, use of internet
(monster, LinkedIn Facebook, Instigram, Pondora, etc)
• Mobile Devices Use Policy (BYOD) Policy – Do you provide your user with
mobile device/ user provide, if so; how does Remote wipe, employee checks email from home works?
2nd Implement Policies Built for Business.
Engineered for Security. Ready for the
Future. • Implement the hardware, software tools according to the Policies set
• Replace outdated security hardware in you network (Firewall is not enough anymore)
• Train employee • Minimized use of Social Network (monster,
LinkedIn Facebook, Instigram, Pondora, etc)
• Mobile Devices Use Policy (BYOD) Policy – Do you provide you user with mobile
device/ user provide, if so; how does Remote wipe, employee checks email from home works?
3rd Continuous Security Aware Training.
• Training your staff on what is out there.
• Password selection training (don’t put your password under your key board).
• Website search engine usage(infected web links to virus).
• Software installation (who has permission to install software).
• User account Privilege on computers.
• Windows XP is not secure anymore compared to the risk faced today.
4th make sure that all you PC/Mobile
Devices have Protection. • http://www.avg.com/
• http://www.sophos.com
It’s Not All Sunshine And Roses…
The Dangers
from Cyber Attacks are Real
Questions:
1. Is it true that Apple computers are safer than other computers?
2. Do I really need to worry about someone hacking into my PC?
3. What do think? Is iPhone 5c- Colorful/5s-forward thinking
4. ????
The Winner is ……..??
Thanks to the wonderful picture I found on the internet