2. What we will cover…
#
#
#
#
Today’s cyber security landscape
SMBs = False sense of security
Your role in mitigating cyber
threats at work
Appendix: Takeaways – Securing your
cyber space
3. Today’s Cyber Security landscape
Manual
Digital
Virtual
Advances in technology are
continuously reshaping methods of
storing, accessing, sharing and
transferring data…
5. Today’s Cyber Security landscape
Cyber crime vectors include:
#
#
#
#
#
#
#
Unsuspecting Users
Social engineering
0 day exploits
Unpatched systems
Default/weak credentials
Mobile applications
USB devices
6. Today’s Cyber Security landscape
The Risks:
#
#
#
#
#
#
Financial loss
Loss of intellectual property
Loss of customer confidence
Identity theft
Utilization of resources
Being a hacker’s puppet!
7. Today’s Cyber Security landscape
In the news*…
#
#
#
#
Adobe breach impacted at least 38
million users
New variant of trojan targeting SAP
users
Google “outraged” at alleged NSA
hacking
Hackers exploit latest
Windows zero-day vulnerability
* See notes section for credit to article/news…
8. SMBs – False sense of Security
Despite overwhelming validation that
cyber threats continue rising, small
and medium-sized businesses (SMBs)
insist in perpetuating the fallacy:
We are not a hacker target!
9. SMBs – False sense of Security
A few statistics*:
#
#
#
#
96% of businesses are unprepared for
a cyber attack
50% of targeted attacks were aimed
at SMBs
37% of breaches affected financial
sector
Mobile malware increased 58% in 2012
* See notes section for credit to report references…
10. SMBs – False sense of Security
A few more…
#
#
#
Almost two-thirds of data breaches
are caused by human errors
Weak or stolen credentials account
for 76% of network intrusions
The United States accounts for
almost 50% of the world’s data
security breaches
* See notes section for credit to report references…
11. Cyber Security @ work
How can YOU mitigate the risks of
cyber threats @ work:
Use strong passwords (don’t recycle)
Use encryption
Foster social media etiquette
Lock your PC & mobile devices
Avoid “free” WIFI
Be vigilant - training & awareness
12. In summary…
#
#
#
#
Don’t underestimate cyber
adversaries
Cyber security is everyone’s
responsibility
Cyber security is a
continuous process
Training and awareness is
just one piece of the puzzle…
14. Cyber Security @ home
Use a firewall – software/hardware.
Password protect your WIFI, never use the default
credentials
Check the default security settings on all your
devices (computers, printers, tablets, etc.)
Automate security patches
Automate signature updates for anti-virus software.
Plug & Scan: all USB devices, email attachments and
downloadable files should be checked for viruses
Be diligent – Don’t open attachments or click on
links from unknown sources!
15. Social Media Etiquette
# Depending on the purpose of your social media account, you
don’t need to provide all your personal information – tailor
the account to your needs (including privacy settings).
# Remove all metadata from pictures and documents before
sending or uploading.
# Be mindful that in cyberspace, it is almost impossible to
distinguish between a “friend” & a “foe”. Don’t feel
obligated to “Like”, “Friend” or “Follow” profiles of people
you don’t actually know.
# There’s an App for that! Yes, most social media providers
have an App for mobile phones and tablets. Be sure to
manage the privacy, notifications and location services
settings to avoid oversharing.
# Stop.Think.Post – Remember, once you hit the upload, share,
tweet or send button, you have no control regarding the
destiny of that “post“!
16. Do you know what your kids
are browsing?
#
#
#
#
Create separate user accounts (user name &
password) if you share devices that connect to the
internet with other members of your household and
apply the principle of least privilege to each
account (separate from administrator account).
Manage internet access on all devices (game
consoles, tablets, smart phones, printers, etc.)
If your kids use social media, be sure to “friend”
&/or “follow” them.
Take off your technology blinders and stay current
with the latest cyber trends & threats…awareness
is key!
17. For your viewing enjoyment…
#
Short Film – The Dawn of the Net:
http://www.youtube.com/watch?v=RhvKm0RdUY0&feature=youtu.be
#
#
Video – 10 top time-saving tech tips by David
Pogue: https://www.youtube.com/watch?v=QoT0-2vu9m4&feature=youtu.be
Video – History of computer viruses:
http://www.youtube.com/watch?v=1g1yZVWrbtE#!
#
TedTalk – Mikko Hypponen: How the NSA betrayed the
world’s trust – time to act
http://www.ted.com/talks/mikko_hypponen_how_the_nsa_betrayed_the_world_s
_trust_time_to_act.html?awesm=on.ted.com_NSAbetray&utm_content=awesmpublisher&utm_campaign=&utm_source=t.co&utm_medium=on.ted.com-static