SlideShare ist ein Scribd-Unternehmen logo
1 von 26
Top 5 Security Threats
Facing Businesses Today
Key Considerations in Protecting
Your Data and Your Future
Network Security Series
Part 1 of 2
How to Interact Today
Type your questions and
comments here
throughout the webinar.
We will answer them
periodically or at the end.
or…
Email your questions to
sales@velocityns.com and
we will reply to you by the
end of the day.
Dustin Hall
Sales/Marketing Manager
Meet Your Presenters
Stephen Nelms
Senior IT Consultant
Who is this webinar for?
 Business Owners
 Executives
 Office Administrators
 Business Managers
 IT Staff Members
The Key Takeaways
The 5 major security threats facing your business today
How these threats work
Tips to protecting your network
• More on Network Security Components in Part 2 of the Series
Today’s attendees will receive…
Network Assessment + Risk Report
by Velocity Network Solutions
The 5 threats we’ll cover…
Malware
Torrents (peer-to-peer networks)
Snowshoe Spamming
Hacking-as-a-Service
Mobile Threats
Malware
Torrents (peer-to-peer networks)
Snowshoe Spamming
Hacking-as-a-Service
Mobile Threats
Malware
malicious software used to gather sensitive data,
infiltrate private networks or harm general operations.
computer viruses
ransomware
worms
trojan horses
rootkits
keyloggers
dialers
spyware
adware
malicious BHOs
rogue security software
Tips to Protect Your Network
 Use enterprise grade anti-malware software
 Have a backup & disaster recovery solution in place
 Limit which websites employees can visit
 Educate staff on best practices
Malware
Torrents (peer-to-peer networks)
Snowshoe Spamming
Hacking-as-a-Service
Mobile Threats
Torrents (peer-to-peer networks)
a way of sharing often pirated files such as music, video,
software, etc. within a peer-to-peer network by
simultaneously downloading and uploading segments of
each file.
BitTorrent
The Pirate Bay
Torrentz
Kickass Torrents
IsoHunt
ExtraTorrent
1337x
EZTV
BitSnoop
TorrentReactor
Tips to Protect Your Network
 Safest bet…don’t use them!
 Use a PC that’s off your business’s network
 Scan the files for viruses and wait for results
Malware
Torrents (peer-to-peer networks)
Snowshoe Spamming
Hacking-as-a-Service
Mobile Threats
Snowshoe Spamming
a spamming technique in which a spammer uses a
multitude of IP addresses in order to widely disperse
spam messages. This large spread of IP addresses
increases the difficulty in identifying the source,
allowing it to reach more email inboxes.
Tips to Protect Your Network
 Impossible to protect yourself 100% BUT thee are still
solid options
 Use enterprise grade anti-spam software
 Be smart about which emails you open and what files
you download
Malware
Torrents (peer-to-peer networks)
Snowshoe Spamming
Hacking-as-a-Service
Mobile Threats
Hacking-as-a-Service
people who wish to engage in cybercrime can pay
money to gain access to hacking tools and services
provided by expert hackers.
attacks-as-a-service
malware-as-a-service
fraud-as-a-service
cybercrime-as-a-service
Tips to Protect Your Network
 Engage a well-rounded security toolset
 Hire a professional IT firm or employee to stay current
with upgrades and updates
 DO NOT assume that hackers are not interested in
your particular business!
Malware
Torrents (peer-to-peer networks)
Snowshoe Spamming
Hacking-as-a-Service
Mobile Threats
Mobile Threats
hackers are increasingly targeting mobile devices from a
number of different angles as mobile devices tend to
store a plethora of personal and business information.
Cyber attacks on mobile devices jumped by 500% in 2012*
Of the 3 major cell phone manufacturers (Android,
Blackberry and Apple), Android’s OS is the least secure,
with Blackberry being the most secure*
*Tom Kellerman - “Cybersecurity for small business: Hackers and mobile devices -
2013's top threats” – 6/12/2013 – courtesy of thestar.com
Tips to Protect Your Network
 Enable and use passwords to access devices
 Enable and use data encryption
 Update OS and security items regularly
What we covered today
Malware
Torrents (peer-to-peer networks)
Snowshoe Spamming
Hacking-as-a-Service
Mobile Threats
How Velocity Network Solutions can help…
Develop a network security plan
Proactively monitor and update your network
Standardize your environment
Troubleshoot potentially hazardous issues
Backup and disaster recovery
and much more…
Join us for part 2 of our
Network Security Webinar Series
Wednesday, October 9th @ 11:00am PT
“5 Must-Have Components of a Secure Network”
Thank you for attending and
we’ll see you at the next webinar!
Phone: (818) 780-3600 x306 Email: dhall@velocityns.com
www.VelocityNS.com

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Network security
Network securityNetwork security
Network security
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Brute force-attack presentation
Brute force-attack presentationBrute force-attack presentation
Brute force-attack presentation
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Network security
Network security Network security
Network security
 
VULNERABILITY ( CYBER SECURITY )
VULNERABILITY ( CYBER SECURITY )VULNERABILITY ( CYBER SECURITY )
VULNERABILITY ( CYBER SECURITY )
 
Threat Intelligence
Threat IntelligenceThreat Intelligence
Threat Intelligence
 
unified threat management by Nisha Menon K
 unified threat management by Nisha Menon K unified threat management by Nisha Menon K
unified threat management by Nisha Menon K
 
What is malware
What is malwareWhat is malware
What is malware
 
Network Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and TechniquesNetwork Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and Techniques
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Network Security
Network SecurityNetwork Security
Network Security
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and Firewall
 
Firewall
FirewallFirewall
Firewall
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
 
Banner grabbing
Banner grabbingBanner grabbing
Banner grabbing
 
Network security
Network securityNetwork security
Network security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Wireless Attacks
Wireless AttacksWireless Attacks
Wireless Attacks
 

Andere mochten auch

Advanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldAdvanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldCisco Canada
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurityMatthew Rosenquist
 
Big Data for Small Businesses
Big Data for Small BusinessesBig Data for Small Businesses
Big Data for Small BusinessesVivastream
 
Certificate of Completion- Data Privacy and Security
Certificate of Completion- Data Privacy and SecurityCertificate of Completion- Data Privacy and Security
Certificate of Completion- Data Privacy and SecurityLatha Menon
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security TipsInfusionsoft
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb esSonny Hashmi
 
Security Bootcamp for Startups and Small Businesses
Security Bootcamp for Startups and Small Businesses Security Bootcamp for Startups and Small Businesses
Security Bootcamp for Startups and Small Businesses Alison Gianotto
 
About Python
About PythonAbout Python
About PythonNattapon
 
Ethical Hacking Course in Sector 14 Gurgaon | Ethical Hacking Training in Gur...
Ethical Hacking Course in Sector 14 Gurgaon | Ethical Hacking Training in Gur...Ethical Hacking Course in Sector 14 Gurgaon | Ethical Hacking Training in Gur...
Ethical Hacking Course in Sector 14 Gurgaon | Ethical Hacking Training in Gur...Prince Makhija
 
Ramathibodi Security Awareness Training (June 3, 2016)
Ramathibodi Security Awareness Training (June 3, 2016)Ramathibodi Security Awareness Training (June 3, 2016)
Ramathibodi Security Awareness Training (June 3, 2016)Nawanan Theera-Ampornpunt
 
Chapter05 การบริหารทรัพยากรฮาร์ดแวร์และซอฟต์แวร์ในองค์กร
Chapter05 การบริหารทรัพยากรฮาร์ดแวร์และซอฟต์แวร์ในองค์กรChapter05 การบริหารทรัพยากรฮาร์ดแวร์และซอฟต์แวร์ในองค์กร
Chapter05 การบริหารทรัพยากรฮาร์ดแวร์และซอฟต์แวร์ในองค์กรAkkadate.Com
 
Robbery Prevention for Small Businesses
Robbery Prevention for Small BusinessesRobbery Prevention for Small Businesses
Robbery Prevention for Small BusinessesFundera
 
Information system security wk7-1-ids-ips
Information system security wk7-1-ids-ipsInformation system security wk7-1-ids-ips
Information system security wk7-1-ids-ipsBee Lalita
 
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...David J Rosenthal
 
Security Guide For Small Business
Security Guide For Small BusinessSecurity Guide For Small Business
Security Guide For Small BusinessBrendanRose
 

Andere mochten auch (19)

The Cyber Threat Landscape
The Cyber Threat LandscapeThe Cyber Threat Landscape
The Cyber Threat Landscape
 
Advanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldAdvanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real World
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 
Big Data for Small Businesses
Big Data for Small BusinessesBig Data for Small Businesses
Big Data for Small Businesses
 
Certificate of Completion- Data Privacy and Security
Certificate of Completion- Data Privacy and SecurityCertificate of Completion- Data Privacy and Security
Certificate of Completion- Data Privacy and Security
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security Tips
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
 
Security Bootcamp for Startups and Small Businesses
Security Bootcamp for Startups and Small Businesses Security Bootcamp for Startups and Small Businesses
Security Bootcamp for Startups and Small Businesses
 
Social network security
Social network securitySocial network security
Social network security
 
About Python
About PythonAbout Python
About Python
 
Network designmkp
Network designmkpNetwork designmkp
Network designmkp
 
Ethical Hacking Course in Sector 14 Gurgaon | Ethical Hacking Training in Gur...
Ethical Hacking Course in Sector 14 Gurgaon | Ethical Hacking Training in Gur...Ethical Hacking Course in Sector 14 Gurgaon | Ethical Hacking Training in Gur...
Ethical Hacking Course in Sector 14 Gurgaon | Ethical Hacking Training in Gur...
 
Information Security For Small Business
Information Security For Small BusinessInformation Security For Small Business
Information Security For Small Business
 
Ramathibodi Security Awareness Training (June 3, 2016)
Ramathibodi Security Awareness Training (June 3, 2016)Ramathibodi Security Awareness Training (June 3, 2016)
Ramathibodi Security Awareness Training (June 3, 2016)
 
Chapter05 การบริหารทรัพยากรฮาร์ดแวร์และซอฟต์แวร์ในองค์กร
Chapter05 การบริหารทรัพยากรฮาร์ดแวร์และซอฟต์แวร์ในองค์กรChapter05 การบริหารทรัพยากรฮาร์ดแวร์และซอฟต์แวร์ในองค์กร
Chapter05 การบริหารทรัพยากรฮาร์ดแวร์และซอฟต์แวร์ในองค์กร
 
Robbery Prevention for Small Businesses
Robbery Prevention for Small BusinessesRobbery Prevention for Small Businesses
Robbery Prevention for Small Businesses
 
Information system security wk7-1-ids-ips
Information system security wk7-1-ids-ipsInformation system security wk7-1-ids-ips
Information system security wk7-1-ids-ips
 
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
 
Security Guide For Small Business
Security Guide For Small BusinessSecurity Guide For Small Business
Security Guide For Small Business
 

Ähnlich wie 5 Network Security Threats Facing Businesses Today

7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences MagazineThe Lifesciences Magazine
 
5 Cyber Security Threats That Small Businesses Face And How To Stop Them
5 Cyber Security Threats That Small Businesses Face And How To Stop Them5 Cyber Security Threats That Small Businesses Face And How To Stop Them
5 Cyber Security Threats That Small Businesses Face And How To Stop ThemAnvesh Vision Private Limited
 
Cyber Security and types of internet threats.pptx
Cyber Security and types of internet threats.pptxCyber Security and types of internet threats.pptx
Cyber Security and types of internet threats.pptxSample Assignment
 
Security Threats for SMBs
Security Threats for SMBsSecurity Threats for SMBs
Security Threats for SMBsGFI Software
 
Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...
Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...
Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...Mverve1
 
Guarding the Digital Fortress.pdf
Guarding the Digital Fortress.pdfGuarding the Digital Fortress.pdf
Guarding the Digital Fortress.pdfMverve1
 
Cyber Security Expert, A Challenging Role
Cyber Security Expert, A Challenging RoleCyber Security Expert, A Challenging Role
Cyber Security Expert, A Challenging RoleSamidha Takle
 
Securing Your Small Business Network
Securing Your Small Business NetworkSecuring Your Small Business Network
Securing Your Small Business NetworkAnindita Ghatak
 
Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?SOCVault
 
Cybersecurity a short business guide
Cybersecurity   a short business guideCybersecurity   a short business guide
Cybersecurity a short business guidelarry1401
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdfPavelVtek3
 
Cyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful BusinessCyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful BusinessFibonalabs
 
Beware of cyber security threats
Beware of cyber security threatsBeware of cyber security threats
Beware of cyber security threatsSam Vohra
 
Should You Pay Ransomware.pdf
Should You Pay Ransomware.pdfShould You Pay Ransomware.pdf
Should You Pay Ransomware.pdfKavitaDubey18
 
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest MindsWhitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest MindsHappiest Minds Technologies
 

Ähnlich wie 5 Network Security Threats Facing Businesses Today (20)

7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine
 
5 Cyber Security Threats That Small Businesses Face And How To Stop Them
5 Cyber Security Threats That Small Businesses Face And How To Stop Them5 Cyber Security Threats That Small Businesses Face And How To Stop Them
5 Cyber Security Threats That Small Businesses Face And How To Stop Them
 
Data security
 Data security  Data security
Data security
 
Cyber Security and types of internet threats.pptx
Cyber Security and types of internet threats.pptxCyber Security and types of internet threats.pptx
Cyber Security and types of internet threats.pptx
 
Security Threats for SMBs
Security Threats for SMBsSecurity Threats for SMBs
Security Threats for SMBs
 
Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...
Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...
Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...
 
Guarding the Digital Fortress.pdf
Guarding the Digital Fortress.pdfGuarding the Digital Fortress.pdf
Guarding the Digital Fortress.pdf
 
Cybersecurity-NSIC.pdf
Cybersecurity-NSIC.pdfCybersecurity-NSIC.pdf
Cybersecurity-NSIC.pdf
 
Cyber Security Expert, A Challenging Role
Cyber Security Expert, A Challenging RoleCyber Security Expert, A Challenging Role
Cyber Security Expert, A Challenging Role
 
Securing Your Small Business Network
Securing Your Small Business NetworkSecuring Your Small Business Network
Securing Your Small Business Network
 
Information Security Seminar
Information Security SeminarInformation Security Seminar
Information Security Seminar
 
Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?
 
Cybersecurity a short business guide
Cybersecurity   a short business guideCybersecurity   a short business guide
Cybersecurity a short business guide
 
What is ransomware?
What is ransomware?What is ransomware?
What is ransomware?
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdf
 
Cyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful BusinessCyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful Business
 
Information security
Information securityInformation security
Information security
 
Beware of cyber security threats
Beware of cyber security threatsBeware of cyber security threats
Beware of cyber security threats
 
Should You Pay Ransomware.pdf
Should You Pay Ransomware.pdfShould You Pay Ransomware.pdf
Should You Pay Ransomware.pdf
 
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest MindsWhitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
 

Kürzlich hochgeladen

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 

Kürzlich hochgeladen (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 

5 Network Security Threats Facing Businesses Today

  • 1. Top 5 Security Threats Facing Businesses Today Key Considerations in Protecting Your Data and Your Future Network Security Series Part 1 of 2
  • 2. How to Interact Today Type your questions and comments here throughout the webinar. We will answer them periodically or at the end. or… Email your questions to sales@velocityns.com and we will reply to you by the end of the day.
  • 3. Dustin Hall Sales/Marketing Manager Meet Your Presenters Stephen Nelms Senior IT Consultant
  • 4. Who is this webinar for?  Business Owners  Executives  Office Administrators  Business Managers  IT Staff Members
  • 5. The Key Takeaways The 5 major security threats facing your business today How these threats work Tips to protecting your network • More on Network Security Components in Part 2 of the Series
  • 6. Today’s attendees will receive… Network Assessment + Risk Report by Velocity Network Solutions
  • 7. The 5 threats we’ll cover… Malware Torrents (peer-to-peer networks) Snowshoe Spamming Hacking-as-a-Service Mobile Threats
  • 8. Malware Torrents (peer-to-peer networks) Snowshoe Spamming Hacking-as-a-Service Mobile Threats
  • 9. Malware malicious software used to gather sensitive data, infiltrate private networks or harm general operations. computer viruses ransomware worms trojan horses rootkits keyloggers dialers spyware adware malicious BHOs rogue security software
  • 10. Tips to Protect Your Network  Use enterprise grade anti-malware software  Have a backup & disaster recovery solution in place  Limit which websites employees can visit  Educate staff on best practices
  • 11. Malware Torrents (peer-to-peer networks) Snowshoe Spamming Hacking-as-a-Service Mobile Threats
  • 12. Torrents (peer-to-peer networks) a way of sharing often pirated files such as music, video, software, etc. within a peer-to-peer network by simultaneously downloading and uploading segments of each file. BitTorrent The Pirate Bay Torrentz Kickass Torrents IsoHunt ExtraTorrent 1337x EZTV BitSnoop TorrentReactor
  • 13. Tips to Protect Your Network  Safest bet…don’t use them!  Use a PC that’s off your business’s network  Scan the files for viruses and wait for results
  • 14. Malware Torrents (peer-to-peer networks) Snowshoe Spamming Hacking-as-a-Service Mobile Threats
  • 15. Snowshoe Spamming a spamming technique in which a spammer uses a multitude of IP addresses in order to widely disperse spam messages. This large spread of IP addresses increases the difficulty in identifying the source, allowing it to reach more email inboxes.
  • 16. Tips to Protect Your Network  Impossible to protect yourself 100% BUT thee are still solid options  Use enterprise grade anti-spam software  Be smart about which emails you open and what files you download
  • 17. Malware Torrents (peer-to-peer networks) Snowshoe Spamming Hacking-as-a-Service Mobile Threats
  • 18. Hacking-as-a-Service people who wish to engage in cybercrime can pay money to gain access to hacking tools and services provided by expert hackers. attacks-as-a-service malware-as-a-service fraud-as-a-service cybercrime-as-a-service
  • 19. Tips to Protect Your Network  Engage a well-rounded security toolset  Hire a professional IT firm or employee to stay current with upgrades and updates  DO NOT assume that hackers are not interested in your particular business!
  • 20. Malware Torrents (peer-to-peer networks) Snowshoe Spamming Hacking-as-a-Service Mobile Threats
  • 21. Mobile Threats hackers are increasingly targeting mobile devices from a number of different angles as mobile devices tend to store a plethora of personal and business information. Cyber attacks on mobile devices jumped by 500% in 2012* Of the 3 major cell phone manufacturers (Android, Blackberry and Apple), Android’s OS is the least secure, with Blackberry being the most secure* *Tom Kellerman - “Cybersecurity for small business: Hackers and mobile devices - 2013's top threats” – 6/12/2013 – courtesy of thestar.com
  • 22. Tips to Protect Your Network  Enable and use passwords to access devices  Enable and use data encryption  Update OS and security items regularly
  • 23. What we covered today Malware Torrents (peer-to-peer networks) Snowshoe Spamming Hacking-as-a-Service Mobile Threats
  • 24. How Velocity Network Solutions can help… Develop a network security plan Proactively monitor and update your network Standardize your environment Troubleshoot potentially hazardous issues Backup and disaster recovery and much more…
  • 25. Join us for part 2 of our Network Security Webinar Series Wednesday, October 9th @ 11:00am PT “5 Must-Have Components of a Secure Network”
  • 26. Thank you for attending and we’ll see you at the next webinar! Phone: (818) 780-3600 x306 Email: dhall@velocityns.com www.VelocityNS.com