SlideShare ist ein Scribd-Unternehmen logo
1 von 34
Downloaden Sie, um offline zu lesen
Who the Heck is
Denis Wilson
and Why Should
I Listen to Him?
“I am a veteran technology strategist who
specializes in developing highly-effective
and rock-solid computing systems for
small businesses.”
▪ Worked with Microsoft and their partners for over
20 years
▪ Certified by Microsoft on cloud computing and
small business
▪ Very knowledgeable in vertical markets like
healthcare, finance and insurance, legal and CPA
firms, construction and engineering, manufacturing,
and nonprofit
▪ Experienced in compliance environment like HIPAA
and FINRA.
▪ Author and speaker on the subject of SMB
technology for SCORE, SBDCs, EDCs, WBCs, SBA, and a
variety of business associations
Slide Deck Availability
Available at:
Slide Share:
http://www.slideshare.net/dwpia/
I also have over 15 presentations that are posted at the same
location for your perusal.
Ask me to connect with you on Facebook, LinkedIn or Twitter if
you would like to get my blog posts, and curated posts on small
business technology and processes.
• Overview of Cybercrime
• IssuesThat NonprofitsHave Had
• Tips to Protect Your SmallNonprofit
93 percent of all money is digital. That’s what is at risk here. –Bill Nelson
Bill Nelson, Financial Services Information Sharing & Analysis Center
What is cybercrime?
Cybercrime is criminal activity involving the internet, a computer system, or
computer technology.
http://news.microsoft.com/stories/cybercrime/index.html
Cybercrime activity is the highest, ever
Cybercrime is a big global business
• The cybercrime industry has evolved with
the PC/computer/mobile device
ecosystem
• Today, cybercrime is more organized and
motivated than at any time in history
Insights about one group of three
Blackhats indicted in 2018
• Stole information on 100 million people
• Breached 12 companies, including
• Concealed at least $100 million in Swiss
and other accounts
• Hackers and conspirators were in more
than a dozen countries
• One of the indicted had hundreds of
employees
http://www.bloomberg.com/news/articles/2018-11-10/hackers-accused-by-u-s-of-targeting-top-banks-mutual-funds
The bad actors are not a monolithic group
Tools, techniques, motivations, and business models vary by cybercriminal region
Non-Professional
• Non-professional
cybercriminals
• Use crime kits to make
spending money
• Little to no business or
technical expertise
• Even though they are not
professional, their impact
can be significant
Blackhats
• Treatcybercrime asa
business
• Businessandtechnical
expertise
• Oftenworkinaclosed
groupofother
professional
cybercriminals
• Criminalreputationis
everything
Grayhats
• Theybelievetheyare
offeringlegitimate
services. However,their
customerscanbeboth
“legitimate”orcriminal
• Ranasabusiness
Hactivists
• Individualsorgroups
whohackforasocial
cause,without
economicmotivation
• Havebothtechnical
peopleandfollowers
State
Sponsored
• Nationalsecurityand/or
economicmotivation
• Technicalexpertise
• Work inaclosedgroupof
otherprofessionals
• OftenuseBlackhat
resourcesand/or
techniquestomasktheir
identity
Some elite Blackhats, some elite
hactivists, and most state sponsored
actors use “APT” techniques
Often defenders treat all bad actors the same
The cybercrime problem is broad
• More professional cybercrime services make
it easier for would-be attackers to become
cybercriminals
• Many cybercriminals don’t need technical abilities
when entering the world of cybercrime
• In many regions, it is socially acceptable to
steal from victims on the Internet
• The line is blurring between state sponsored
attackers and cybercriminals
• Elite teams of attackers that have the same
resources, skills, and patience as state actors
8
and getting worse
• The Urban Institute’s National Center for Charitable Statistics was
the victim of a malicious attack that compromised 600–700
organizations.
• In Muncie, Indiana, a small nonprofit organization called the Little
Red Door had all their data stolen from their server and held
ransom for a whopping $43,000. If the nonprofit paid, the hackers
claimed, they would return the data and not publish it.
Tips to keep your
nonprofit business
safe
Our data has
to be secure.
What does
my modern
business need?
We need to reopen our
business quickly after an
emergency.
40% of businesses
hit by disaster
never reopen
FEMA 2013
60% SMB technology leaders
cited data security or privacy
as a concern
Boston Consulting Group study
Protect and control
your data
Be prepared for the
unexpected
The manageable
side of risk
management.
What my modern business does not need
Step 1
Follow best practices when using
your computer resources
Strengthen your computer’s
defenses
Keep the firewall on (work, home, and public networks)
Install legitimate anti-malware software (http:/aka.ms/wkactd )
Keep software up to date (automatically)
1 statistics noted from Flexera software
1
Get business apps up and running
now
BACK UP – BACK UP – BACK UP
Use a cost-effective disaster recovery to bring back computer
functionality
Use cloud for hosting and/or backup
Replica software, or other similar utilities
1 statistics noted from Flexera software
Step 2
Train your users
on to deal with
malware when
it happens
➢ Train your users to use
malware and phishing
protection in their
browsers.
➢ Keep Antivirus on and
updated
Don’t be tricked into downloading malware
Ctrl F4
Don’t be tricked into downloading malware
Close pop-up messages carefully
Step 3
Protect company
data and
financial assets
Controlling access
Managing mobile devices
Protecting data
Backing up your files
Ready for the unexpected
Solutions for safeguarding your business
Protect company data and financial assets
Encrypt confidential data
Use rights management solutions to handle sensitive data
Train your users to identify scams and fraud
Use HoneyTrap accounts in your domain. Notify on
successful and unsuccessful logins
How to evade scams
Look for telltale signs
Think before you click
Keep sensitive information private
Train employees to identify socially engineered
attacks
www.snopes.com
Step 4
Create strong
passwords
Keep them private
Don’t reuse them
Create strong passwords
Which passwords are strong?
Password1 123456
$wanR!ceRedD00r
qwerty
MsAw3yO!D
SwanRiceRedDoor
My son Aiden was 3 years old in December
DenisW
Strong passwords are not enough
Protect your accounts and passwords
Make passwords strong (still needed)
Keep them private (don’t share among users)
Use unique passwords for different websites
Employees should not use company e-mail accounts as their identifier
(on third-party website)
Defend against checkers
Enable disabling accounts on too many invalid login attempts
Don’t use unsure interfaces (e.g. unprotected POP/IMAP/SMTP)
Monitor for compromised account checkers
Step 5
Guard data and
devices when
you’re on the go
Guard company data when you’re on the go
Connect securely
Save sensitive activities for trusted connections
Confirm the connection
Encrypt storage on mobile devices
Flash drives: watch out for unknowns and disable auto run
Enable features like Work Folders and cloud storage to
manage work data on mobile devices
What to do if there are problems
Have a predefined process and checklist to identify company
identities, data, services, and applications on the device
Report abuse and other problems
Immediately report phishing
Immediately report missing devices or theft of company data
Change all passwords
Wipe mobile phones
bit.ly/2kQygk2
This is the link for our quick
survey and the chance at the
door-prize
bit.ly/2kQygk2
Telephone: 866-995-4488
Email: info@DWPInformationArchitects.com
Website: www.DWPInformationArchitects.com

Weitere ähnliche Inhalte

Was ist angesagt?

Security Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessSecurity Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessGreg Wartes, MCP
 
Shining a Light on Cyber Threats from the Dark Web
Shining a Light on Cyber Threats from the Dark WebShining a Light on Cyber Threats from the Dark Web
Shining a Light on Cyber Threats from the Dark WebSurfWatch Labs
 
December 2019 Part 10
December 2019 Part 10December 2019 Part 10
December 2019 Part 10seadeloitte
 
Cyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to KnowCyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to KnowSandra Fathi
 
Case Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information SecurityCase Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information SecurityPECB
 
June 2017 - Your Biggest Risk Could Be You
June 2017 - Your Biggest Risk Could Be YouJune 2017 - Your Biggest Risk Could Be You
June 2017 - Your Biggest Risk Could Be Youseadeloitte
 
First Union Bank Report
First Union Bank ReportFirst Union Bank Report
First Union Bank ReportYogesh Kumar
 
140707_Cyber-Security
140707_Cyber-Security140707_Cyber-Security
140707_Cyber-SecurityTara Gravel
 
Cyber Security Protection
Cyber Security ProtectionCyber Security Protection
Cyber Security ProtectionMark Cook
 
Cyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial IndustryCyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial IndustryWilliam McBorrough
 
5 Top Cyber Threats That Will Ruin Your Business
5 Top Cyber Threats That Will Ruin Your Business5 Top Cyber Threats That Will Ruin Your Business
5 Top Cyber Threats That Will Ruin Your BusinessIndusfacePvtLtd
 
Data security best practices for risk awareness and mitigation
Data security best practices for risk awareness and mitigationData security best practices for risk awareness and mitigation
Data security best practices for risk awareness and mitigationNick Chandi
 
When thieves strike: Executive briefing on SWIFT attacks
When thieves strike: Executive briefing on SWIFT attacksWhen thieves strike: Executive briefing on SWIFT attacks
When thieves strike: Executive briefing on SWIFT attacksSangram Gayal
 
The Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice GuideThe Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice GuideInspiring Women
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and riskEY
 
Why Executives Underinvest In Cybersecurity
Why Executives Underinvest In CybersecurityWhy Executives Underinvest In Cybersecurity
Why Executives Underinvest In CybersecurityHackerOne
 

Was ist angesagt? (20)

Security Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessSecurity Minded - Ransomware Awareness
Security Minded - Ransomware Awareness
 
Shining a Light on Cyber Threats from the Dark Web
Shining a Light on Cyber Threats from the Dark WebShining a Light on Cyber Threats from the Dark Web
Shining a Light on Cyber Threats from the Dark Web
 
December 2019 Part 10
December 2019 Part 10December 2019 Part 10
December 2019 Part 10
 
Cyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to KnowCyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to Know
 
Case Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information SecurityCase Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information Security
 
June 2017 - Your Biggest Risk Could Be You
June 2017 - Your Biggest Risk Could Be YouJune 2017 - Your Biggest Risk Could Be You
June 2017 - Your Biggest Risk Could Be You
 
First Union Bank Report
First Union Bank ReportFirst Union Bank Report
First Union Bank Report
 
Cyber Hygiene
Cyber HygieneCyber Hygiene
Cyber Hygiene
 
140707_Cyber-Security
140707_Cyber-Security140707_Cyber-Security
140707_Cyber-Security
 
Ceh intro
Ceh introCeh intro
Ceh intro
 
Cyber Security Protection
Cyber Security ProtectionCyber Security Protection
Cyber Security Protection
 
Cyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial IndustryCyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial Industry
 
Webinar cybersecurity presentation-6-2018 (final)
Webinar cybersecurity presentation-6-2018 (final)Webinar cybersecurity presentation-6-2018 (final)
Webinar cybersecurity presentation-6-2018 (final)
 
5 Top Cyber Threats That Will Ruin Your Business
5 Top Cyber Threats That Will Ruin Your Business5 Top Cyber Threats That Will Ruin Your Business
5 Top Cyber Threats That Will Ruin Your Business
 
Data security best practices for risk awareness and mitigation
Data security best practices for risk awareness and mitigationData security best practices for risk awareness and mitigation
Data security best practices for risk awareness and mitigation
 
When thieves strike: Executive briefing on SWIFT attacks
When thieves strike: Executive briefing on SWIFT attacksWhen thieves strike: Executive briefing on SWIFT attacks
When thieves strike: Executive briefing on SWIFT attacks
 
PA SB DC Cyber Brief
PA SB DC Cyber Brief PA SB DC Cyber Brief
PA SB DC Cyber Brief
 
The Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice GuideThe Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice Guide
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
 
Why Executives Underinvest In Cybersecurity
Why Executives Underinvest In CybersecurityWhy Executives Underinvest In Cybersecurity
Why Executives Underinvest In Cybersecurity
 

Ähnlich wie DWP Cybersecurity 101 for Nonprofits

Protecting Your Business from Cybercrime - Cybersecurity 101
Protecting Your Business from Cybercrime - Cybersecurity 101Protecting Your Business from Cybercrime - Cybersecurity 101
Protecting Your Business from Cybercrime - Cybersecurity 101David J Rosenthal
 
Small%20Business%20Presentation.pptx
Small%20Business%20Presentation.pptxSmall%20Business%20Presentation.pptx
Small%20Business%20Presentation.pptxKENNEDY GITHAIGA
 
Protecting Your Business From Cybercrime
Protecting Your Business From CybercrimeProtecting Your Business From Cybercrime
Protecting Your Business From CybercrimeDavid J Rosenthal
 
nist_small_business_fundamentals_july_2019.pptx
nist_small_business_fundamentals_july_2019.pptxnist_small_business_fundamentals_july_2019.pptx
nist_small_business_fundamentals_july_2019.pptxJkYt1
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Bala Guntipalli ♦ MBA
 
What Small Business Can Do To Protect Themselves Now in Cybersecurity
What Small Business Can Do To Protect Themselves Now in CybersecurityWhat Small Business Can Do To Protect Themselves Now in Cybersecurity
What Small Business Can Do To Protect Themselves Now in CybersecurityReading Works Detroit
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
 
Digital Outsourcing: Risks, Pitfalls, and Security Considerations
Digital Outsourcing: Risks, Pitfalls, and Security Considerations Digital Outsourcing: Risks, Pitfalls, and Security Considerations
Digital Outsourcing: Risks, Pitfalls, and Security Considerations Peter1020
 
Presentation2 [Autosaved].pdf
Presentation2 [Autosaved].pdfPresentation2 [Autosaved].pdf
Presentation2 [Autosaved].pdfMustafasahibZada3
 
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about CybersecurityMark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecuritycentralohioissa
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessJoel Cardella
 
Cyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceCyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceNational Retail Federation
 
I’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextI’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextBrian Pichman
 
Quantifying Cyber Risk, Insurance and The Value of Personal Data
Quantifying Cyber Risk, Insurance and The Value of Personal DataQuantifying Cyber Risk, Insurance and The Value of Personal Data
Quantifying Cyber Risk, Insurance and The Value of Personal DataSteven Schwartz
 
Cyber Security for Financial Planners
Cyber Security for Financial PlannersCyber Security for Financial Planners
Cyber Security for Financial PlannersMichael O'Phelan
 
Introduction to the Current Threat Landscape
Introduction to the Current Threat LandscapeIntroduction to the Current Threat Landscape
Introduction to the Current Threat LandscapeMelbourne IT
 
Netwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldNetwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldnetwealthInvest
 
Top 6 things_small_businesses_q12015
Top 6 things_small_businesses_q12015Top 6 things_small_businesses_q12015
Top 6 things_small_businesses_q12015anpapathanasiou
 

Ähnlich wie DWP Cybersecurity 101 for Nonprofits (20)

Protecting Your Business from Cybercrime - Cybersecurity 101
Protecting Your Business from Cybercrime - Cybersecurity 101Protecting Your Business from Cybercrime - Cybersecurity 101
Protecting Your Business from Cybercrime - Cybersecurity 101
 
Small%20Business%20Presentation.pptx
Small%20Business%20Presentation.pptxSmall%20Business%20Presentation.pptx
Small%20Business%20Presentation.pptx
 
Protecting Your Business From Cybercrime
Protecting Your Business From CybercrimeProtecting Your Business From Cybercrime
Protecting Your Business From Cybercrime
 
nist_small_business_fundamentals_july_2019.pptx
nist_small_business_fundamentals_july_2019.pptxnist_small_business_fundamentals_july_2019.pptx
nist_small_business_fundamentals_july_2019.pptx
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...
 
What Small Business Can Do To Protect Themselves Now in Cybersecurity
What Small Business Can Do To Protect Themselves Now in CybersecurityWhat Small Business Can Do To Protect Themselves Now in Cybersecurity
What Small Business Can Do To Protect Themselves Now in Cybersecurity
 
A data-centric program
A data-centric program A data-centric program
A data-centric program
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Digital Outsourcing: Risks, Pitfalls, and Security Considerations
Digital Outsourcing: Risks, Pitfalls, and Security Considerations Digital Outsourcing: Risks, Pitfalls, and Security Considerations
Digital Outsourcing: Risks, Pitfalls, and Security Considerations
 
Presentation2 [Autosaved].pdf
Presentation2 [Autosaved].pdfPresentation2 [Autosaved].pdf
Presentation2 [Autosaved].pdf
 
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about CybersecurityMark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing business
 
Cyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceCyber Security for the Small Business Experience
Cyber Security for the Small Business Experience
 
Cyber Security and Data Protection
Cyber Security and Data ProtectionCyber Security and Data Protection
Cyber Security and Data Protection
 
I’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextI’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take Next
 
Quantifying Cyber Risk, Insurance and The Value of Personal Data
Quantifying Cyber Risk, Insurance and The Value of Personal DataQuantifying Cyber Risk, Insurance and The Value of Personal Data
Quantifying Cyber Risk, Insurance and The Value of Personal Data
 
Cyber Security for Financial Planners
Cyber Security for Financial PlannersCyber Security for Financial Planners
Cyber Security for Financial Planners
 
Introduction to the Current Threat Landscape
Introduction to the Current Threat LandscapeIntroduction to the Current Threat Landscape
Introduction to the Current Threat Landscape
 
Netwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldNetwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital world
 
Top 6 things_small_businesses_q12015
Top 6 things_small_businesses_q12015Top 6 things_small_businesses_q12015
Top 6 things_small_businesses_q12015
 

Mehr von DWP Information Architects Inc.

Microsoft Whitepaper: Running Your Business in the Cloud
Microsoft Whitepaper: Running Your Business in the CloudMicrosoft Whitepaper: Running Your Business in the Cloud
Microsoft Whitepaper: Running Your Business in the CloudDWP Information Architects Inc.
 
Microsoft Whitepaper: Cloud Computing Guide for Construction
Microsoft Whitepaper: Cloud Computing Guide for ConstructionMicrosoft Whitepaper: Cloud Computing Guide for Construction
Microsoft Whitepaper: Cloud Computing Guide for ConstructionDWP Information Architects Inc.
 
Office 365: Why 98% of the Fortune 100 have adopted this tech
Office 365: Why 98% of the Fortune 100 have adopted this techOffice 365: Why 98% of the Fortune 100 have adopted this tech
Office 365: Why 98% of the Fortune 100 have adopted this techDWP Information Architects Inc.
 
Windows 10: Ease-of-use, multiple platforms, and security (plus fun stuff).
Windows 10: Ease-of-use, multiple platforms, and security (plus fun stuff).Windows 10: Ease-of-use, multiple platforms, and security (plus fun stuff).
Windows 10: Ease-of-use, multiple platforms, and security (plus fun stuff).DWP Information Architects Inc.
 
Small Business Technology Trends: And They Are All Cloud
Small Business Technology Trends: And They Are All CloudSmall Business Technology Trends: And They Are All Cloud
Small Business Technology Trends: And They Are All CloudDWP Information Architects Inc.
 

Mehr von DWP Information Architects Inc. (19)

DWP-Cybersecurity-2023.pdf
DWP-Cybersecurity-2023.pdfDWP-Cybersecurity-2023.pdf
DWP-Cybersecurity-2023.pdf
 
SCORE Whitepaper: Disaster Impact on Small Business
SCORE Whitepaper: Disaster Impact on Small BusinessSCORE Whitepaper: Disaster Impact on Small Business
SCORE Whitepaper: Disaster Impact on Small Business
 
Microsoft Whitepaper: Running Your Business in the Cloud
Microsoft Whitepaper: Running Your Business in the CloudMicrosoft Whitepaper: Running Your Business in the Cloud
Microsoft Whitepaper: Running Your Business in the Cloud
 
Microsoft Whitepaper: Cloud Computing Guide for Construction
Microsoft Whitepaper: Cloud Computing Guide for ConstructionMicrosoft Whitepaper: Cloud Computing Guide for Construction
Microsoft Whitepaper: Cloud Computing Guide for Construction
 
Microsoft Whitepaper: Disaster Preparedness Guide
Microsoft Whitepaper: Disaster Preparedness GuideMicrosoft Whitepaper: Disaster Preparedness Guide
Microsoft Whitepaper: Disaster Preparedness Guide
 
Microsoft Whitepaper: Cloud Privacy Guide
Microsoft Whitepaper: Cloud Privacy GuideMicrosoft Whitepaper: Cloud Privacy Guide
Microsoft Whitepaper: Cloud Privacy Guide
 
What is the Cloud: and how does it reduce cost by 50%
What is the Cloud: and how does it reduce cost by 50%What is the Cloud: and how does it reduce cost by 50%
What is the Cloud: and how does it reduce cost by 50%
 
Office 365: Why 98% of the Fortune 100 have adopted this tech
Office 365: Why 98% of the Fortune 100 have adopted this techOffice 365: Why 98% of the Fortune 100 have adopted this tech
Office 365: Why 98% of the Fortune 100 have adopted this tech
 
Must Know Cyber Security Stats of 2016
Must Know Cyber Security Stats of 2016Must Know Cyber Security Stats of 2016
Must Know Cyber Security Stats of 2016
 
Modern Workplace: Office 2016
 Modern Workplace: Office 2016 Modern Workplace: Office 2016
Modern Workplace: Office 2016
 
SEO: How to Get More People to Your Website
SEO: How to Get More People to Your WebsiteSEO: How to Get More People to Your Website
SEO: How to Get More People to Your Website
 
Windows 10: Ease-of-use, multiple platforms, and security (plus fun stuff).
Windows 10: Ease-of-use, multiple platforms, and security (plus fun stuff).Windows 10: Ease-of-use, multiple platforms, and security (plus fun stuff).
Windows 10: Ease-of-use, multiple platforms, and security (plus fun stuff).
 
ModernBiz: Business Anywhere
ModernBiz: Business AnywhereModernBiz: Business Anywhere
ModernBiz: Business Anywhere
 
Small Business Technology Trends: And They Are All Cloud
Small Business Technology Trends: And They Are All CloudSmall Business Technology Trends: And They Are All Cloud
Small Business Technology Trends: And They Are All Cloud
 
ModernBiz CRM
ModernBiz CRMModernBiz CRM
ModernBiz CRM
 
SEO and SEM
SEO and SEMSEO and SEM
SEO and SEM
 
Safeguard Your Business
Safeguard Your BusinessSafeguard Your Business
Safeguard Your Business
 
Connect With Customers: and Office 2013 Tips and Tricks
Connect With Customers: and Office 2013 Tips and TricksConnect With Customers: and Office 2013 Tips and Tricks
Connect With Customers: and Office 2013 Tips and Tricks
 
Continuum / Channelnomics Webcast
Continuum / Channelnomics WebcastContinuum / Channelnomics Webcast
Continuum / Channelnomics Webcast
 

Kürzlich hochgeladen

PPT Item # 4 - 231 Encino Ave (Significance Only)
PPT Item # 4 - 231 Encino Ave (Significance Only)PPT Item # 4 - 231 Encino Ave (Significance Only)
PPT Item # 4 - 231 Encino Ave (Significance Only)ahcitycouncil
 
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Chakan Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
Top Rated Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated  Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...Top Rated  Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...Call Girls in Nagpur High Profile
 
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...Suhani Kapoor
 
VIP Kolkata Call Girl Jatin Das Park 👉 8250192130 Available With Room
VIP Kolkata Call Girl Jatin Das Park 👉 8250192130  Available With RoomVIP Kolkata Call Girl Jatin Das Park 👉 8250192130  Available With Room
VIP Kolkata Call Girl Jatin Das Park 👉 8250192130 Available With Roomishabajaj13
 
(SUHANI) Call Girls Pimple Saudagar ( 7001035870 ) HI-Fi Pune Escorts Service
(SUHANI) Call Girls Pimple Saudagar ( 7001035870 ) HI-Fi Pune Escorts Service(SUHANI) Call Girls Pimple Saudagar ( 7001035870 ) HI-Fi Pune Escorts Service
(SUHANI) Call Girls Pimple Saudagar ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...
The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...
The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...ranjana rawat
 
(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service
(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service
(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Climate change and safety and health at work
Climate change and safety and health at workClimate change and safety and health at work
Climate change and safety and health at workChristina Parmionova
 
Expressive clarity oral presentation.pptx
Expressive clarity oral presentation.pptxExpressive clarity oral presentation.pptx
Expressive clarity oral presentation.pptxtsionhagos36
 
Postal Ballots-For home voting step by step process 2024.pptx
Postal Ballots-For home voting step by step process 2024.pptxPostal Ballots-For home voting step by step process 2024.pptx
Postal Ballots-For home voting step by step process 2024.pptxSwastiRanjanNayak
 
Night 7k to 12k Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...
Night 7k to 12k  Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...Night 7k to 12k  Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...
Night 7k to 12k Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...aartirawatdelhi
 
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile ServiceCunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile ServiceHigh Profile Call Girls
 
Human-AI Collaboration for Virtual Capacity in Emergency Operation Centers (E...
Human-AI Collaborationfor Virtual Capacity in Emergency Operation Centers (E...Human-AI Collaborationfor Virtual Capacity in Emergency Operation Centers (E...
Human-AI Collaboration for Virtual Capacity in Emergency Operation Centers (E...Hemant Purohit
 
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...Suhani Kapoor
 

Kürzlich hochgeladen (20)

PPT Item # 4 - 231 Encino Ave (Significance Only)
PPT Item # 4 - 231 Encino Ave (Significance Only)PPT Item # 4 - 231 Encino Ave (Significance Only)
PPT Item # 4 - 231 Encino Ave (Significance Only)
 
Delhi Russian Call Girls In Connaught Place ➡️9999965857 India's Finest Model...
Delhi Russian Call Girls In Connaught Place ➡️9999965857 India's Finest Model...Delhi Russian Call Girls In Connaught Place ➡️9999965857 India's Finest Model...
Delhi Russian Call Girls In Connaught Place ➡️9999965857 India's Finest Model...
 
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Chakan Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance Booking
 
Top Rated Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated  Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...Top Rated  Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
 
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...
 
The Federal Budget and Health Care Policy
The Federal Budget and Health Care PolicyThe Federal Budget and Health Care Policy
The Federal Budget and Health Care Policy
 
VIP Kolkata Call Girl Jatin Das Park 👉 8250192130 Available With Room
VIP Kolkata Call Girl Jatin Das Park 👉 8250192130  Available With RoomVIP Kolkata Call Girl Jatin Das Park 👉 8250192130  Available With Room
VIP Kolkata Call Girl Jatin Das Park 👉 8250192130 Available With Room
 
How to Save a Place: 12 Tips To Research & Know the Threat
How to Save a Place: 12 Tips To Research & Know the ThreatHow to Save a Place: 12 Tips To Research & Know the Threat
How to Save a Place: 12 Tips To Research & Know the Threat
 
(SUHANI) Call Girls Pimple Saudagar ( 7001035870 ) HI-Fi Pune Escorts Service
(SUHANI) Call Girls Pimple Saudagar ( 7001035870 ) HI-Fi Pune Escorts Service(SUHANI) Call Girls Pimple Saudagar ( 7001035870 ) HI-Fi Pune Escorts Service
(SUHANI) Call Girls Pimple Saudagar ( 7001035870 ) HI-Fi Pune Escorts Service
 
The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...
The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...
The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...
 
(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service
(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service
(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service
 
Climate change and safety and health at work
Climate change and safety and health at workClimate change and safety and health at work
Climate change and safety and health at work
 
Expressive clarity oral presentation.pptx
Expressive clarity oral presentation.pptxExpressive clarity oral presentation.pptx
Expressive clarity oral presentation.pptx
 
Postal Ballots-For home voting step by step process 2024.pptx
Postal Ballots-For home voting step by step process 2024.pptxPostal Ballots-For home voting step by step process 2024.pptx
Postal Ballots-For home voting step by step process 2024.pptx
 
Call Girls Service Connaught Place @9999965857 Delhi 🫦 No Advance VVIP 🍎 SER...
Call Girls Service Connaught Place @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SER...Call Girls Service Connaught Place @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SER...
Call Girls Service Connaught Place @9999965857 Delhi 🫦 No Advance VVIP 🍎 SER...
 
Night 7k to 12k Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...
Night 7k to 12k  Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...Night 7k to 12k  Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...
Night 7k to 12k Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...
 
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile ServiceCunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
 
Human-AI Collaboration for Virtual Capacity in Emergency Operation Centers (E...
Human-AI Collaborationfor Virtual Capacity in Emergency Operation Centers (E...Human-AI Collaborationfor Virtual Capacity in Emergency Operation Centers (E...
Human-AI Collaboration for Virtual Capacity in Emergency Operation Centers (E...
 
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...
 
Rohini Sector 37 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 37 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 37 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 37 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 

DWP Cybersecurity 101 for Nonprofits

  • 1.
  • 2. Who the Heck is Denis Wilson and Why Should I Listen to Him? “I am a veteran technology strategist who specializes in developing highly-effective and rock-solid computing systems for small businesses.” ▪ Worked with Microsoft and their partners for over 20 years ▪ Certified by Microsoft on cloud computing and small business ▪ Very knowledgeable in vertical markets like healthcare, finance and insurance, legal and CPA firms, construction and engineering, manufacturing, and nonprofit ▪ Experienced in compliance environment like HIPAA and FINRA. ▪ Author and speaker on the subject of SMB technology for SCORE, SBDCs, EDCs, WBCs, SBA, and a variety of business associations
  • 3. Slide Deck Availability Available at: Slide Share: http://www.slideshare.net/dwpia/ I also have over 15 presentations that are posted at the same location for your perusal. Ask me to connect with you on Facebook, LinkedIn or Twitter if you would like to get my blog posts, and curated posts on small business technology and processes.
  • 4. • Overview of Cybercrime • IssuesThat NonprofitsHave Had • Tips to Protect Your SmallNonprofit
  • 5. 93 percent of all money is digital. That’s what is at risk here. –Bill Nelson Bill Nelson, Financial Services Information Sharing & Analysis Center What is cybercrime? Cybercrime is criminal activity involving the internet, a computer system, or computer technology. http://news.microsoft.com/stories/cybercrime/index.html
  • 6. Cybercrime activity is the highest, ever Cybercrime is a big global business • The cybercrime industry has evolved with the PC/computer/mobile device ecosystem • Today, cybercrime is more organized and motivated than at any time in history Insights about one group of three Blackhats indicted in 2018 • Stole information on 100 million people • Breached 12 companies, including • Concealed at least $100 million in Swiss and other accounts • Hackers and conspirators were in more than a dozen countries • One of the indicted had hundreds of employees http://www.bloomberg.com/news/articles/2018-11-10/hackers-accused-by-u-s-of-targeting-top-banks-mutual-funds
  • 7. The bad actors are not a monolithic group Tools, techniques, motivations, and business models vary by cybercriminal region Non-Professional • Non-professional cybercriminals • Use crime kits to make spending money • Little to no business or technical expertise • Even though they are not professional, their impact can be significant Blackhats • Treatcybercrime asa business • Businessandtechnical expertise • Oftenworkinaclosed groupofother professional cybercriminals • Criminalreputationis everything Grayhats • Theybelievetheyare offeringlegitimate services. However,their customerscanbeboth “legitimate”orcriminal • Ranasabusiness Hactivists • Individualsorgroups whohackforasocial cause,without economicmotivation • Havebothtechnical peopleandfollowers State Sponsored • Nationalsecurityand/or economicmotivation • Technicalexpertise • Work inaclosedgroupof otherprofessionals • OftenuseBlackhat resourcesand/or techniquestomasktheir identity Some elite Blackhats, some elite hactivists, and most state sponsored actors use “APT” techniques Often defenders treat all bad actors the same
  • 8. The cybercrime problem is broad • More professional cybercrime services make it easier for would-be attackers to become cybercriminals • Many cybercriminals don’t need technical abilities when entering the world of cybercrime • In many regions, it is socially acceptable to steal from victims on the Internet • The line is blurring between state sponsored attackers and cybercriminals • Elite teams of attackers that have the same resources, skills, and patience as state actors 8 and getting worse
  • 9.
  • 10. • The Urban Institute’s National Center for Charitable Statistics was the victim of a malicious attack that compromised 600–700 organizations. • In Muncie, Indiana, a small nonprofit organization called the Little Red Door had all their data stolen from their server and held ransom for a whopping $43,000. If the nonprofit paid, the hackers claimed, they would return the data and not publish it.
  • 11.
  • 12.
  • 13. Tips to keep your nonprofit business safe
  • 14. Our data has to be secure. What does my modern business need? We need to reopen our business quickly after an emergency. 40% of businesses hit by disaster never reopen FEMA 2013 60% SMB technology leaders cited data security or privacy as a concern Boston Consulting Group study
  • 15. Protect and control your data Be prepared for the unexpected The manageable side of risk management.
  • 16. What my modern business does not need
  • 17. Step 1 Follow best practices when using your computer resources
  • 18. Strengthen your computer’s defenses Keep the firewall on (work, home, and public networks) Install legitimate anti-malware software (http:/aka.ms/wkactd ) Keep software up to date (automatically) 1 statistics noted from Flexera software 1
  • 19. Get business apps up and running now BACK UP – BACK UP – BACK UP Use a cost-effective disaster recovery to bring back computer functionality Use cloud for hosting and/or backup Replica software, or other similar utilities 1 statistics noted from Flexera software
  • 20. Step 2 Train your users on to deal with malware when it happens
  • 21. ➢ Train your users to use malware and phishing protection in their browsers. ➢ Keep Antivirus on and updated Don’t be tricked into downloading malware
  • 22. Ctrl F4 Don’t be tricked into downloading malware Close pop-up messages carefully
  • 23. Step 3 Protect company data and financial assets
  • 24. Controlling access Managing mobile devices Protecting data Backing up your files Ready for the unexpected Solutions for safeguarding your business
  • 25. Protect company data and financial assets Encrypt confidential data Use rights management solutions to handle sensitive data Train your users to identify scams and fraud Use HoneyTrap accounts in your domain. Notify on successful and unsuccessful logins
  • 26. How to evade scams Look for telltale signs Think before you click Keep sensitive information private Train employees to identify socially engineered attacks www.snopes.com
  • 27. Step 4 Create strong passwords Keep them private Don’t reuse them
  • 28. Create strong passwords Which passwords are strong? Password1 123456 $wanR!ceRedD00r qwerty MsAw3yO!D SwanRiceRedDoor My son Aiden was 3 years old in December DenisW
  • 29. Strong passwords are not enough Protect your accounts and passwords Make passwords strong (still needed) Keep them private (don’t share among users) Use unique passwords for different websites Employees should not use company e-mail accounts as their identifier (on third-party website) Defend against checkers Enable disabling accounts on too many invalid login attempts Don’t use unsure interfaces (e.g. unprotected POP/IMAP/SMTP) Monitor for compromised account checkers
  • 30. Step 5 Guard data and devices when you’re on the go
  • 31. Guard company data when you’re on the go Connect securely Save sensitive activities for trusted connections Confirm the connection Encrypt storage on mobile devices Flash drives: watch out for unknowns and disable auto run Enable features like Work Folders and cloud storage to manage work data on mobile devices
  • 32. What to do if there are problems Have a predefined process and checklist to identify company identities, data, services, and applications on the device Report abuse and other problems Immediately report phishing Immediately report missing devices or theft of company data Change all passwords Wipe mobile phones
  • 33. bit.ly/2kQygk2 This is the link for our quick survey and the chance at the door-prize