SlideShare una empresa de Scribd logo
1 de 49
Descargar para leer sin conexión
Protecting the irreplaceable | f-secure.com
Threat Eye-Opener
Bryan Ford – Head of Operator Sales

August 15th, 2012



Protecting the irreplaceable | f-secure.com
Agenda
• Definition of Terms
• History of Malware
• Recent Attacks – Stuxnet & Ghost Click
• Online Safety Tips
• Mobile Threats
• Frontier Secure
• Q&A




| © August 15, 2012, F-Secure Corporation
Industry Terms
• Malware - Software that is intended to damage or disable computers and
  computer systems
• Botnets - A botnet is a collection of internet-connected computers whose
  security defenses have been breached and control ceded to an unknown party
• SSL - (Secure Sockets Layer) is the standard security technology for
  establishing an encrypted link between a web server and a browser




| © August 15, 2012, F-Secure Corporation
We used to be fighting these...




• Chen-Ing Hau                              Joseph McElroy         Benny
  Author of                                 Hacked the Fermi lab   Ex-29A
  the CIH virus
                                            network




| © August 15, 2012, F-Secure Corporation
Case Tariq al-Daour




| © August 15, 2012, F-Secure Corporation
Malware Trends




| © August 15, 2012, F-Secure Corporation
Malware Trends

 Number of malware
                                            •   Numbers continue to rise
                                                exponentially




| © August 15, 2012, F-Secure Corporation
Malware Trends




| © August 15, 2012, F-Secure Corporation
Malware Trends
• Malware writing is becoming more professional




| © August 15, 2012, F-Secure Corporation
Malware Trends
• Malware writing is becoming more professional
• Previously undiscovered vulnerabilities are worth a lot on the black market




| © August 15, 2012, F-Secure Corporation
Malware Trends


• Previously undiscovered vulnerabilities are worth a lot on the black market




| © August 15, 2012, F-Secure Corporation
Malware Trends




Q: How expensive would such vulnerabilities be?




| © August 15, 2012, F-Secure Corporation
Malware Trends




A: A single form of malware in a popular version of
Windows could go for anything between $50,000 to
$500,000.




| © August 15, 2012, F-Secure Corporation
Malware Trends
• The aims are simple and depend on the group involved:
• Money from spam, scams and fakes
• Hacktivism to increase public exposure of an issue




| © August 15, 2012, F-Secure Corporation
Malware Trends
• The aims are simple and depend on the group involved:
• Money from spam, scams and fakes
• Hacktivism to increase public exposure of an issue




| © August 15, 2012, F-Secure Corporation
Malware Trends


• Money from spam, scams and fakes
• Hacktivism to increase public exposure of an issue




| © August 15, 2012, F-Secure Corporation
Malware Trends



• Hacktivism to increase public exposure of an issue




| © August 15, 2012, F-Secure Corporation
Malware Trends




| © August 15, 2012, F-Secure Corporation
| © August 15, 2012, F-Secure Corporation
| © August 15, 2012, F-Secure Corporation
Malware trends




| © August 15, 2012, F-Secure Corporation
Malware trends
Case:




| © August 15, 2012, F-Secure Corporation
Malware trends
Case:
Stuxnet




| © August 15, 2012, F-Secure Corporation
Malware trends
Case:
Stuxnet

More information:




| © August 15, 2012, F-Secure Corporation
Malware trends
Case:
Stuxnet

More information:
http://www.f-secure.com/weblog/
archives/00002066.html




| © August 15, 2012, F-Secure Corporation
Malware trends
Case:
Stuxnet

More information:
http://www.f-secure.com/weblog/
archives/00002066.html




| © August 15, 2012, F-Secure Corporation
Malware trends
Case:
”Ghost Click”




More information:
http://www.f-secure.com/weblog/archives/
00002268.html



| © August 15, 2012, F-Secure Corporation
Malware trends
Case:
”Ghost Click”




More information:
http://www.f-secure.com/weblog/archives/
00002268.html



| © August 15, 2012, F-Secure Corporation
Safer online banking




| © August 15, 2012, F-Secure Corporation
Safer online banking




| © August 15, 2012, F-Secure Corporation
Safer online banking

       • Banks provide safety instuctions
       • No pop-ups
       • PIN only asked once

       • https:// address (Hypertext Transfer Protocol over Secure Socket Layer)
       • always when banking and dealing with credit card number in an online
         store

       • Paying with credit card or online payment service provider (PayPal) is
         safer




| © August 15, 2012, F-Secure Corporation
Safer online banking

       • Banks provide safety instuctions
       • No pop-ups
       • PIN only asked once

       • https:// address (Hypertext Transfer Protocol over Secure Socket Layer)
       • always when banking and dealing with credit card number in an online
         store

       • Paying with credit card or online payment service provider (PayPal) is
         safer




| © August 15, 2012, F-Secure Corporation
Safer online banking

       • Banks provide safety instuctions
       • No pop-ups
       • PIN only asked once

       • https:// address (Hypertext Transfer Protocol over Secure Socket Layer)
       • always when banking and dealing with credit card number in an online
         store

       • Paying with credit card or online payment service provider (PayPal) is
         safer




| © August 15, 2012, F-Secure Corporation
Safer social networking




| © August 15, 2012, F-Secure Corporation
Safer social networking




| © August 15, 2012, F-Secure Corporation
Safer social networking

 • Danger of revealing too much
 • Caution with personal details
 • Pictures stay on the Internet forever

 •   Privacy?
 •   Privacy settings
 •   Strong passwords
 •   Identity theft, spam, targeted attacks

 • Maintaining a good reputation




| © August 15, 2012, F-Secure Corporation
Safer social networking

 • Danger of revealing too much
 • Caution with personal details
 • Pictures stay on the Internet forever

 •   Privacy?
 •   Privacy settings
 •   Strong passwords
 •   Identity theft, spam, targeted attacks

 • Maintaining a good reputation




| © August 15, 2012, F-Secure Corporation
Safer social networking

 • Danger of revealing too much
 • Caution with personal details
 • Pictures stay on the Internet forever

 •   Privacy?
 •   Privacy settings
 •   Strong passwords
 •   Identity theft, spam, targeted attacks

 • Maintaining a good reputation




| © August 15, 2012, F-Secure Corporation
Safer social networking

 • Danger of revealing too much
 • Caution with personal details
 • Pictures stay on the Internet forever

 •   Privacy?
 •   Privacy settings
 •   Strong passwords
 •   Identity theft, spam, targeted attacks

 • Maintaining a good reputation




| © August 15, 2012, F-Secure Corporation
Well-being in a mobile world




| © August 15, 2012, F-Secure Corporation
Well-being in a mobile world
• Lots of information on your mobile
• Crime against Android multiplying
• Malware via Bluetooth and web download
• Spy-tools
• Recording
• Monitoring calls, SMS, multimedia, email
• Locating phone via GPS




| © August 15, 2012, F-Secure Corporation
Well-being in a mobile world
• Lots of information on your mobile
• Crime against Android multiplying
• Malware via Bluetooth and web download
• Spy-tools
• Recording
• Monitoring calls, SMS, multimedia, email
• Locating phone via GPS




| © August 15, 2012, F-Secure Corporation
Well-being in a mobile world
• Lots of information on your mobile
• Crime against Android multiplying
• Malware via Bluetooth and web download
• Spy-tools
• Recording
• Monitoring calls, SMS, multimedia, email
• Locating phone via GPS




| © August 15, 2012, F-Secure Corporation
Well-being in a mobile world
• Lots of information on your mobile
• Crime against Android multiplying
• Malware via Bluetooth and web download
• Spy-tools
• Recording
• Monitoring calls, SMS, multimedia, email
• Locating phone via GPS




| © August 15, 2012, F-Secure Corporation
Well-being in a mobile world
• Lots of information on your mobile
• Crime against Android multiplying
• Malware via Bluetooth and web download
• Spy-tools
• Recording
• Monitoring calls, SMS, multimedia, email
• Locating phone via GPS




| © August 15, 2012, F-Secure Corporation
Frontier Secure – Max Security
•       Single Integrated product :
    •     Antivirus Protection

    •     Anti Spyware
    •     Personal Firewall
    •     Browsing Protection
    •     Spam Filtering
    •     Automatic Updates

• Live 24/7 Support
• PC & Mac Support




| © August 15, 2012, F-Secure Corporation
Q&A

www.frontier.com/security




| © August 15, 2012, F-Secure Corporation
Brought to you by:




A MORE DEDICATED CONNECTION




 Thank You
 Call: 1-866-408-0233

Más contenido relacionado

Similar a Security for Small Business

Ghostery Enterprise Security Study
Ghostery Enterprise Security StudyGhostery Enterprise Security Study
Ghostery Enterprise Security StudyGhostery, Inc.
 
NATO Cyber Security Conference: Creating IT-Security Start-Ups
NATO Cyber Security Conference: Creating IT-Security Start-UpsNATO Cyber Security Conference: Creating IT-Security Start-Ups
NATO Cyber Security Conference: Creating IT-Security Start-UpsBenjamin Rohé
 
The ever increasing threat of cyber crime
The ever increasing threat of cyber crimeThe ever increasing threat of cyber crime
The ever increasing threat of cyber crimeNathan Desfontaines
 
Developing Mobile Trust in Today's E-Privacy Landscape - Webinar 11/19/2015
Developing Mobile Trust in Today's E-Privacy Landscape - Webinar 11/19/2015Developing Mobile Trust in Today's E-Privacy Landscape - Webinar 11/19/2015
Developing Mobile Trust in Today's E-Privacy Landscape - Webinar 11/19/2015Ghostery, Inc.
 
Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Business Days
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security SeminarJeremy Quadri
 
Ghostery Enterprise EU Security Study
Ghostery Enterprise EU Security StudyGhostery Enterprise EU Security Study
Ghostery Enterprise EU Security StudyGhostery, Inc.
 
Info Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsInfo Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsGDSCCVR
 
Mobile Workplace Risks
Mobile Workplace RisksMobile Workplace Risks
Mobile Workplace RisksParag Deodhar
 
Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.Advanced monitoring
 
Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor
Data Breaches - Sageworks, Inc., Webinar Series by Douglas JamborData Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor
Data Breaches - Sageworks, Inc., Webinar Series by Douglas JamborTurner and Associates, Inc.
 
Appaloosa & AppDome: deploy & protect mobile applications
Appaloosa & AppDome: deploy & protect mobile applicationsAppaloosa & AppDome: deploy & protect mobile applications
Appaloosa & AppDome: deploy & protect mobile applicationsJulien Ott
 
Don't Trust, And Verify - Mobile Application Attacks
Don't Trust, And Verify - Mobile Application AttacksDon't Trust, And Verify - Mobile Application Attacks
Don't Trust, And Verify - Mobile Application AttacksPrathan Phongthiproek
 
BYOD and Security Trends
BYOD and Security TrendsBYOD and Security Trends
BYOD and Security TrendsCisco Russia
 
IT Security and Wire Fraud Awareness Slide Deck
IT Security and Wire Fraud Awareness Slide DeckIT Security and Wire Fraud Awareness Slide Deck
IT Security and Wire Fraud Awareness Slide DeckDon Gulling
 
CyberSource MRC Survey - Top 9 Fraud Attacks and Winning Mitigating Strategie...
CyberSource MRC Survey - Top 9 Fraud Attacks and Winning Mitigating Strategie...CyberSource MRC Survey - Top 9 Fraud Attacks and Winning Mitigating Strategie...
CyberSource MRC Survey - Top 9 Fraud Attacks and Winning Mitigating Strategie...Visa
 
Top Strategies to Capture Security Intelligence for Applications
Top Strategies to Capture Security Intelligence for ApplicationsTop Strategies to Capture Security Intelligence for Applications
Top Strategies to Capture Security Intelligence for ApplicationsDenim Group
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things The Center for Identity
 

Similar a Security for Small Business (20)

Ghostery Enterprise Security Study
Ghostery Enterprise Security StudyGhostery Enterprise Security Study
Ghostery Enterprise Security Study
 
NATO Cyber Security Conference: Creating IT-Security Start-Ups
NATO Cyber Security Conference: Creating IT-Security Start-UpsNATO Cyber Security Conference: Creating IT-Security Start-Ups
NATO Cyber Security Conference: Creating IT-Security Start-Ups
 
The ever increasing threat of cyber crime
The ever increasing threat of cyber crimeThe ever increasing threat of cyber crime
The ever increasing threat of cyber crime
 
Developing Mobile Trust in Today's E-Privacy Landscape - Webinar 11/19/2015
Developing Mobile Trust in Today's E-Privacy Landscape - Webinar 11/19/2015Developing Mobile Trust in Today's E-Privacy Landscape - Webinar 11/19/2015
Developing Mobile Trust in Today's E-Privacy Landscape - Webinar 11/19/2015
 
Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security Seminar
 
Ghostery Enterprise EU Security Study
Ghostery Enterprise EU Security StudyGhostery Enterprise EU Security Study
Ghostery Enterprise EU Security Study
 
Info Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsInfo Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study Jams
 
KPMG-converted.pptx
KPMG-converted.pptxKPMG-converted.pptx
KPMG-converted.pptx
 
Mobile Workplace Risks
Mobile Workplace RisksMobile Workplace Risks
Mobile Workplace Risks
 
Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.
 
Security risks with fake apps
Security risks with fake appsSecurity risks with fake apps
Security risks with fake apps
 
Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor
Data Breaches - Sageworks, Inc., Webinar Series by Douglas JamborData Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor
Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor
 
Appaloosa & AppDome: deploy & protect mobile applications
Appaloosa & AppDome: deploy & protect mobile applicationsAppaloosa & AppDome: deploy & protect mobile applications
Appaloosa & AppDome: deploy & protect mobile applications
 
Don't Trust, And Verify - Mobile Application Attacks
Don't Trust, And Verify - Mobile Application AttacksDon't Trust, And Verify - Mobile Application Attacks
Don't Trust, And Verify - Mobile Application Attacks
 
BYOD and Security Trends
BYOD and Security TrendsBYOD and Security Trends
BYOD and Security Trends
 
IT Security and Wire Fraud Awareness Slide Deck
IT Security and Wire Fraud Awareness Slide DeckIT Security and Wire Fraud Awareness Slide Deck
IT Security and Wire Fraud Awareness Slide Deck
 
CyberSource MRC Survey - Top 9 Fraud Attacks and Winning Mitigating Strategie...
CyberSource MRC Survey - Top 9 Fraud Attacks and Winning Mitigating Strategie...CyberSource MRC Survey - Top 9 Fraud Attacks and Winning Mitigating Strategie...
CyberSource MRC Survey - Top 9 Fraud Attacks and Winning Mitigating Strategie...
 
Top Strategies to Capture Security Intelligence for Applications
Top Strategies to Capture Security Intelligence for ApplicationsTop Strategies to Capture Security Intelligence for Applications
Top Strategies to Capture Security Intelligence for Applications
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
 

Último

SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 MonthsIndeedSEO
 
Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...
Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...
Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...pujan9679
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentationuneakwhite
 
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAIGetting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAITim Wilson
 
Kalyan Call Girl 98350*37198 Call Girls in Escort service book now
Kalyan Call Girl 98350*37198 Call Girls in Escort service book nowKalyan Call Girl 98350*37198 Call Girls in Escort service book now
Kalyan Call Girl 98350*37198 Call Girls in Escort service book nowranineha57744
 
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSCROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSpanmisemningshen123
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...ssuserf63bd7
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwaitdaisycvs
 
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGpr788182
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Adnet Communications
 
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTSDurg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTSkajalroy875762
 
Pre Engineered Building Manufacturers Hyderabad.pptx
Pre Engineered  Building Manufacturers Hyderabad.pptxPre Engineered  Building Manufacturers Hyderabad.pptx
Pre Engineered Building Manufacturers Hyderabad.pptxRoofing Contractor
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165meghakumariji156
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfAdmir Softic
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizharallensay1
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 

Último (20)

SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...
Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...
Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAIGetting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
 
Kalyan Call Girl 98350*37198 Call Girls in Escort service book now
Kalyan Call Girl 98350*37198 Call Girls in Escort service book nowKalyan Call Girl 98350*37198 Call Girls in Escort service book now
Kalyan Call Girl 98350*37198 Call Girls in Escort service book now
 
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSCROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
WheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond InsightsWheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond Insights
 
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
 
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTSDurg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
 
Pre Engineered Building Manufacturers Hyderabad.pptx
Pre Engineered  Building Manufacturers Hyderabad.pptxPre Engineered  Building Manufacturers Hyderabad.pptx
Pre Engineered Building Manufacturers Hyderabad.pptx
 
Buy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail AccountsBuy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail Accounts
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 

Security for Small Business

  • 2. Threat Eye-Opener Bryan Ford – Head of Operator Sales August 15th, 2012 Protecting the irreplaceable | f-secure.com
  • 3. Agenda • Definition of Terms • History of Malware • Recent Attacks – Stuxnet & Ghost Click • Online Safety Tips • Mobile Threats • Frontier Secure • Q&A | © August 15, 2012, F-Secure Corporation
  • 4. Industry Terms • Malware - Software that is intended to damage or disable computers and computer systems • Botnets - A botnet is a collection of internet-connected computers whose security defenses have been breached and control ceded to an unknown party • SSL - (Secure Sockets Layer) is the standard security technology for establishing an encrypted link between a web server and a browser | © August 15, 2012, F-Secure Corporation
  • 5. We used to be fighting these... • Chen-Ing Hau Joseph McElroy Benny Author of Hacked the Fermi lab Ex-29A the CIH virus network | © August 15, 2012, F-Secure Corporation
  • 6. Case Tariq al-Daour | © August 15, 2012, F-Secure Corporation
  • 7. Malware Trends | © August 15, 2012, F-Secure Corporation
  • 8. Malware Trends Number of malware • Numbers continue to rise exponentially | © August 15, 2012, F-Secure Corporation
  • 9. Malware Trends | © August 15, 2012, F-Secure Corporation
  • 10. Malware Trends • Malware writing is becoming more professional | © August 15, 2012, F-Secure Corporation
  • 11. Malware Trends • Malware writing is becoming more professional • Previously undiscovered vulnerabilities are worth a lot on the black market | © August 15, 2012, F-Secure Corporation
  • 12. Malware Trends • Previously undiscovered vulnerabilities are worth a lot on the black market | © August 15, 2012, F-Secure Corporation
  • 13. Malware Trends Q: How expensive would such vulnerabilities be? | © August 15, 2012, F-Secure Corporation
  • 14. Malware Trends A: A single form of malware in a popular version of Windows could go for anything between $50,000 to $500,000. | © August 15, 2012, F-Secure Corporation
  • 15. Malware Trends • The aims are simple and depend on the group involved: • Money from spam, scams and fakes • Hacktivism to increase public exposure of an issue | © August 15, 2012, F-Secure Corporation
  • 16. Malware Trends • The aims are simple and depend on the group involved: • Money from spam, scams and fakes • Hacktivism to increase public exposure of an issue | © August 15, 2012, F-Secure Corporation
  • 17. Malware Trends • Money from spam, scams and fakes • Hacktivism to increase public exposure of an issue | © August 15, 2012, F-Secure Corporation
  • 18. Malware Trends • Hacktivism to increase public exposure of an issue | © August 15, 2012, F-Secure Corporation
  • 19. Malware Trends | © August 15, 2012, F-Secure Corporation
  • 20. | © August 15, 2012, F-Secure Corporation
  • 21. | © August 15, 2012, F-Secure Corporation
  • 22. Malware trends | © August 15, 2012, F-Secure Corporation
  • 23. Malware trends Case: | © August 15, 2012, F-Secure Corporation
  • 24. Malware trends Case: Stuxnet | © August 15, 2012, F-Secure Corporation
  • 25. Malware trends Case: Stuxnet More information: | © August 15, 2012, F-Secure Corporation
  • 28. Malware trends Case: ”Ghost Click” More information: http://www.f-secure.com/weblog/archives/ 00002268.html | © August 15, 2012, F-Secure Corporation
  • 29. Malware trends Case: ”Ghost Click” More information: http://www.f-secure.com/weblog/archives/ 00002268.html | © August 15, 2012, F-Secure Corporation
  • 30. Safer online banking | © August 15, 2012, F-Secure Corporation
  • 31. Safer online banking | © August 15, 2012, F-Secure Corporation
  • 32. Safer online banking • Banks provide safety instuctions • No pop-ups • PIN only asked once • https:// address (Hypertext Transfer Protocol over Secure Socket Layer) • always when banking and dealing with credit card number in an online store • Paying with credit card or online payment service provider (PayPal) is safer | © August 15, 2012, F-Secure Corporation
  • 33. Safer online banking • Banks provide safety instuctions • No pop-ups • PIN only asked once • https:// address (Hypertext Transfer Protocol over Secure Socket Layer) • always when banking and dealing with credit card number in an online store • Paying with credit card or online payment service provider (PayPal) is safer | © August 15, 2012, F-Secure Corporation
  • 34. Safer online banking • Banks provide safety instuctions • No pop-ups • PIN only asked once • https:// address (Hypertext Transfer Protocol over Secure Socket Layer) • always when banking and dealing with credit card number in an online store • Paying with credit card or online payment service provider (PayPal) is safer | © August 15, 2012, F-Secure Corporation
  • 35. Safer social networking | © August 15, 2012, F-Secure Corporation
  • 36. Safer social networking | © August 15, 2012, F-Secure Corporation
  • 37. Safer social networking • Danger of revealing too much • Caution with personal details • Pictures stay on the Internet forever • Privacy? • Privacy settings • Strong passwords • Identity theft, spam, targeted attacks • Maintaining a good reputation | © August 15, 2012, F-Secure Corporation
  • 38. Safer social networking • Danger of revealing too much • Caution with personal details • Pictures stay on the Internet forever • Privacy? • Privacy settings • Strong passwords • Identity theft, spam, targeted attacks • Maintaining a good reputation | © August 15, 2012, F-Secure Corporation
  • 39. Safer social networking • Danger of revealing too much • Caution with personal details • Pictures stay on the Internet forever • Privacy? • Privacy settings • Strong passwords • Identity theft, spam, targeted attacks • Maintaining a good reputation | © August 15, 2012, F-Secure Corporation
  • 40. Safer social networking • Danger of revealing too much • Caution with personal details • Pictures stay on the Internet forever • Privacy? • Privacy settings • Strong passwords • Identity theft, spam, targeted attacks • Maintaining a good reputation | © August 15, 2012, F-Secure Corporation
  • 41. Well-being in a mobile world | © August 15, 2012, F-Secure Corporation
  • 42. Well-being in a mobile world • Lots of information on your mobile • Crime against Android multiplying • Malware via Bluetooth and web download • Spy-tools • Recording • Monitoring calls, SMS, multimedia, email • Locating phone via GPS | © August 15, 2012, F-Secure Corporation
  • 43. Well-being in a mobile world • Lots of information on your mobile • Crime against Android multiplying • Malware via Bluetooth and web download • Spy-tools • Recording • Monitoring calls, SMS, multimedia, email • Locating phone via GPS | © August 15, 2012, F-Secure Corporation
  • 44. Well-being in a mobile world • Lots of information on your mobile • Crime against Android multiplying • Malware via Bluetooth and web download • Spy-tools • Recording • Monitoring calls, SMS, multimedia, email • Locating phone via GPS | © August 15, 2012, F-Secure Corporation
  • 45. Well-being in a mobile world • Lots of information on your mobile • Crime against Android multiplying • Malware via Bluetooth and web download • Spy-tools • Recording • Monitoring calls, SMS, multimedia, email • Locating phone via GPS | © August 15, 2012, F-Secure Corporation
  • 46. Well-being in a mobile world • Lots of information on your mobile • Crime against Android multiplying • Malware via Bluetooth and web download • Spy-tools • Recording • Monitoring calls, SMS, multimedia, email • Locating phone via GPS | © August 15, 2012, F-Secure Corporation
  • 47. Frontier Secure – Max Security • Single Integrated product : • Antivirus Protection • Anti Spyware • Personal Firewall • Browsing Protection • Spam Filtering • Automatic Updates • Live 24/7 Support • PC & Mac Support | © August 15, 2012, F-Secure Corporation
  • 48. Q&A www.frontier.com/security | © August 15, 2012, F-Secure Corporation
  • 49. Brought to you by: A MORE DEDICATED CONNECTION Thank You Call: 1-866-408-0233