Enviar búsqueda
Cargar
DWP-Cybersecurity-2023.pdf
•
0 recomendaciones
•
47 vistas
DWP Information Architects Inc.
Seguir
A basic 101 level talk on business cybersecurity for 2023.
Leer menos
Leer más
PYMES y liderazgo
Denunciar
Compartir
Denunciar
Compartir
1 de 31
Descargar ahora
Descargar para leer sin conexión
Recomendados
Red Team Apocalypse
Red Team Apocalypse
Beau Bullock
Compliance made easy. Pass your audits stress-free.
Compliance made easy. Pass your audits stress-free.
AlgoSec
Straight Talk About the Cloud: Why Some Company's Are Leveraing Modern Techno...
Straight Talk About the Cloud: Why Some Company's Are Leveraing Modern Techno...
BCS ProSoft
The Notorious 9: Is Your Data Secure in the Cloud?
The Notorious 9: Is Your Data Secure in the Cloud?
BCS ProSoft
Red Team Apocalypse (RVAsec Edition)
Red Team Apocalypse (RVAsec Edition)
Beau Bullock
Implementing security for your library | PLAN Tech Day Conference
Implementing security for your library | PLAN Tech Day Conference
Brian Pichman
Rothke - A Pragmatic Approach To Purchasing Information Security Products
Rothke - A Pragmatic Approach To Purchasing Information Security Products
Ben Rothke
Aegis Personal Cybersecurity 101
Aegis Personal Cybersecurity 101
Nick Powers
Recomendados
Red Team Apocalypse
Red Team Apocalypse
Beau Bullock
Compliance made easy. Pass your audits stress-free.
Compliance made easy. Pass your audits stress-free.
AlgoSec
Straight Talk About the Cloud: Why Some Company's Are Leveraing Modern Techno...
Straight Talk About the Cloud: Why Some Company's Are Leveraing Modern Techno...
BCS ProSoft
The Notorious 9: Is Your Data Secure in the Cloud?
The Notorious 9: Is Your Data Secure in the Cloud?
BCS ProSoft
Red Team Apocalypse (RVAsec Edition)
Red Team Apocalypse (RVAsec Edition)
Beau Bullock
Implementing security for your library | PLAN Tech Day Conference
Implementing security for your library | PLAN Tech Day Conference
Brian Pichman
Rothke - A Pragmatic Approach To Purchasing Information Security Products
Rothke - A Pragmatic Approach To Purchasing Information Security Products
Ben Rothke
Aegis Personal Cybersecurity 101
Aegis Personal Cybersecurity 101
Nick Powers
Keeping your business safe online cosy club
Keeping your business safe online cosy club
Get up to Speed
Protecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry Ransomware
Quick Heal Technologies Ltd.
Web & Cloud Security in the real world
Web & Cloud Security in the real world
Madhu Akula
2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomware
AlgoSec
Tietoturvallisuuden_kevatseminaari_2013_Jarno_Niemela
Tietoturvallisuuden_kevatseminaari_2013_Jarno_Niemela
Valtiokonttori / Statskontoret / State Treasury of Finland
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
Robert Conti Jr.
It security the condensed version
It security the condensed version
Brian Pichman
Protecting Your IP: Data Security for Software Technology
Protecting Your IP: Data Security for Software Technology
Shawn Tuma
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?
Mark Williams
The How and Why of Container Vulnerability Management
The How and Why of Container Vulnerability Management
Tim Mackey
The How and Why of Container Vulnerability Management
The How and Why of Container Vulnerability Management
Black Duck by Synopsys
An Introduction To IT Security And Privacy - Servers And More
An Introduction To IT Security And Privacy - Servers And More
Blake Carver
Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!
MarketingArrowECS_CZ
Czech Tech Pitch Day - Babel / OKsystem (Martin Kudrnac)
Czech Tech Pitch Day - Babel / OKsystem (Martin Kudrnac)
Jan Fried
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015
Ajin Abraham
Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015
Claus Cramon Houmann
Modern Web Security
Modern Web Security
Bill Condo
Managing WorkSpaces at Scale | AWS Public Sector Summit 2016
Managing WorkSpaces at Scale | AWS Public Sector Summit 2016
Amazon Web Services
A question of trust - understanding Open Source risks
A question of trust - understanding Open Source risks
Tim Mackey
Ransomware: Mitigation Through Preparation
Ransomware: Mitigation Through Preparation
Hostway|HOSTING
DWP Cybersecurity 101 for Nonprofits
DWP Cybersecurity 101 for Nonprofits
DWP Information Architects Inc.
SCORE Whitepaper: Disaster Impact on Small Business
SCORE Whitepaper: Disaster Impact on Small Business
DWP Information Architects Inc.
Más contenido relacionado
Similar a DWP-Cybersecurity-2023.pdf
Keeping your business safe online cosy club
Keeping your business safe online cosy club
Get up to Speed
Protecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry Ransomware
Quick Heal Technologies Ltd.
Web & Cloud Security in the real world
Web & Cloud Security in the real world
Madhu Akula
2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomware
AlgoSec
Tietoturvallisuuden_kevatseminaari_2013_Jarno_Niemela
Tietoturvallisuuden_kevatseminaari_2013_Jarno_Niemela
Valtiokonttori / Statskontoret / State Treasury of Finland
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
Robert Conti Jr.
It security the condensed version
It security the condensed version
Brian Pichman
Protecting Your IP: Data Security for Software Technology
Protecting Your IP: Data Security for Software Technology
Shawn Tuma
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?
Mark Williams
The How and Why of Container Vulnerability Management
The How and Why of Container Vulnerability Management
Tim Mackey
The How and Why of Container Vulnerability Management
The How and Why of Container Vulnerability Management
Black Duck by Synopsys
An Introduction To IT Security And Privacy - Servers And More
An Introduction To IT Security And Privacy - Servers And More
Blake Carver
Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!
MarketingArrowECS_CZ
Czech Tech Pitch Day - Babel / OKsystem (Martin Kudrnac)
Czech Tech Pitch Day - Babel / OKsystem (Martin Kudrnac)
Jan Fried
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015
Ajin Abraham
Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015
Claus Cramon Houmann
Modern Web Security
Modern Web Security
Bill Condo
Managing WorkSpaces at Scale | AWS Public Sector Summit 2016
Managing WorkSpaces at Scale | AWS Public Sector Summit 2016
Amazon Web Services
A question of trust - understanding Open Source risks
A question of trust - understanding Open Source risks
Tim Mackey
Ransomware: Mitigation Through Preparation
Ransomware: Mitigation Through Preparation
Hostway|HOSTING
Similar a DWP-Cybersecurity-2023.pdf
(20)
Keeping your business safe online cosy club
Keeping your business safe online cosy club
Protecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry Ransomware
Web & Cloud Security in the real world
Web & Cloud Security in the real world
2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomware
Tietoturvallisuuden_kevatseminaari_2013_Jarno_Niemela
Tietoturvallisuuden_kevatseminaari_2013_Jarno_Niemela
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
It security the condensed version
It security the condensed version
Protecting Your IP: Data Security for Software Technology
Protecting Your IP: Data Security for Software Technology
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?
The How and Why of Container Vulnerability Management
The How and Why of Container Vulnerability Management
The How and Why of Container Vulnerability Management
The How and Why of Container Vulnerability Management
An Introduction To IT Security And Privacy - Servers And More
An Introduction To IT Security And Privacy - Servers And More
Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!
Czech Tech Pitch Day - Babel / OKsystem (Martin Kudrnac)
Czech Tech Pitch Day - Babel / OKsystem (Martin Kudrnac)
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015
Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015
Modern Web Security
Modern Web Security
Managing WorkSpaces at Scale | AWS Public Sector Summit 2016
Managing WorkSpaces at Scale | AWS Public Sector Summit 2016
A question of trust - understanding Open Source risks
A question of trust - understanding Open Source risks
Ransomware: Mitigation Through Preparation
Ransomware: Mitigation Through Preparation
Más de DWP Information Architects Inc.
DWP Cybersecurity 101 for Nonprofits
DWP Cybersecurity 101 for Nonprofits
DWP Information Architects Inc.
SCORE Whitepaper: Disaster Impact on Small Business
SCORE Whitepaper: Disaster Impact on Small Business
DWP Information Architects Inc.
Microsoft Whitepaper: Running Your Business in the Cloud
Microsoft Whitepaper: Running Your Business in the Cloud
DWP Information Architects Inc.
Microsoft Whitepaper: Cloud Computing Guide for Construction
Microsoft Whitepaper: Cloud Computing Guide for Construction
DWP Information Architects Inc.
Microsoft Whitepaper: Disaster Preparedness Guide
Microsoft Whitepaper: Disaster Preparedness Guide
DWP Information Architects Inc.
Microsoft Whitepaper: Cloud Privacy Guide
Microsoft Whitepaper: Cloud Privacy Guide
DWP Information Architects Inc.
What is the Cloud: and how does it reduce cost by 50%
What is the Cloud: and how does it reduce cost by 50%
DWP Information Architects Inc.
Office 365: Why 98% of the Fortune 100 have adopted this tech
Office 365: Why 98% of the Fortune 100 have adopted this tech
DWP Information Architects Inc.
Must Know Cyber Security Stats of 2016
Must Know Cyber Security Stats of 2016
DWP Information Architects Inc.
Modern Workplace: Office 2016
Modern Workplace: Office 2016
DWP Information Architects Inc.
SEO: How to Get More People to Your Website
SEO: How to Get More People to Your Website
DWP Information Architects Inc.
Windows 10: Ease-of-use, multiple platforms, and security (plus fun stuff).
Windows 10: Ease-of-use, multiple platforms, and security (plus fun stuff).
DWP Information Architects Inc.
ModernBiz: Business Anywhere
ModernBiz: Business Anywhere
DWP Information Architects Inc.
Small Business Technology Trends: And They Are All Cloud
Small Business Technology Trends: And They Are All Cloud
DWP Information Architects Inc.
ModernBiz CRM
ModernBiz CRM
DWP Information Architects Inc.
SEO and SEM
SEO and SEM
DWP Information Architects Inc.
Safeguard Your Business
Safeguard Your Business
DWP Information Architects Inc.
Connect With Customers: and Office 2013 Tips and Tricks
Connect With Customers: and Office 2013 Tips and Tricks
DWP Information Architects Inc.
Continuum / Channelnomics Webcast
Continuum / Channelnomics Webcast
DWP Information Architects Inc.
Más de DWP Information Architects Inc.
(19)
DWP Cybersecurity 101 for Nonprofits
DWP Cybersecurity 101 for Nonprofits
SCORE Whitepaper: Disaster Impact on Small Business
SCORE Whitepaper: Disaster Impact on Small Business
Microsoft Whitepaper: Running Your Business in the Cloud
Microsoft Whitepaper: Running Your Business in the Cloud
Microsoft Whitepaper: Cloud Computing Guide for Construction
Microsoft Whitepaper: Cloud Computing Guide for Construction
Microsoft Whitepaper: Disaster Preparedness Guide
Microsoft Whitepaper: Disaster Preparedness Guide
Microsoft Whitepaper: Cloud Privacy Guide
Microsoft Whitepaper: Cloud Privacy Guide
What is the Cloud: and how does it reduce cost by 50%
What is the Cloud: and how does it reduce cost by 50%
Office 365: Why 98% of the Fortune 100 have adopted this tech
Office 365: Why 98% of the Fortune 100 have adopted this tech
Must Know Cyber Security Stats of 2016
Must Know Cyber Security Stats of 2016
Modern Workplace: Office 2016
Modern Workplace: Office 2016
SEO: How to Get More People to Your Website
SEO: How to Get More People to Your Website
Windows 10: Ease-of-use, multiple platforms, and security (plus fun stuff).
Windows 10: Ease-of-use, multiple platforms, and security (plus fun stuff).
ModernBiz: Business Anywhere
ModernBiz: Business Anywhere
Small Business Technology Trends: And They Are All Cloud
Small Business Technology Trends: And They Are All Cloud
ModernBiz CRM
ModernBiz CRM
SEO and SEM
SEO and SEM
Safeguard Your Business
Safeguard Your Business
Connect With Customers: and Office 2013 Tips and Tricks
Connect With Customers: and Office 2013 Tips and Tricks
Continuum / Channelnomics Webcast
Continuum / Channelnomics Webcast
Último
VIP Chandigarh Call Girls 7001035870 Enjoy Call Girls With Our Escorts
VIP Chandigarh Call Girls 7001035870 Enjoy Call Girls With Our Escorts
sonatiwari757
High Profile Call Girls in Lucknow | Whatsapp No 🧑🏼❤️💋🧑🏽 8923113531 𓀇 VIP ...
High Profile Call Girls in Lucknow | Whatsapp No 🧑🏼❤️💋🧑🏽 8923113531 𓀇 VIP ...
gurkirankumar98700
Tirupati Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Tirupati Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Damini Dixit
VIP 7001035870 Find & Meet Hyderabad Call Girls Jubilee Hills high-profile Ca...
VIP 7001035870 Find & Meet Hyderabad Call Girls Jubilee Hills high-profile Ca...
aditipandeya
(COD) ̄Young Call Girls In Defence Colony , New Delhi꧁❤ 7042364481❤꧂ Escorts S...
(COD) ̄Young Call Girls In Defence Colony , New Delhi꧁❤ 7042364481❤꧂ Escorts S...
Hot Call Girls In Sector 58 (Noida)
Dehradun Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Dehradun Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Damini Dixit
Top Call Girls In Indira Nagar Lucknow ( Lucknow ) 🔝 8923113531 🔝 Cash Payment
Top Call Girls In Indira Nagar Lucknow ( Lucknow ) 🔝 8923113531 🔝 Cash Payment
anilsa9823
CALL ON ➥8923113531 🔝Call Girls Sushant Golf City Lucknow best sexual service...
CALL ON ➥8923113531 🔝Call Girls Sushant Golf City Lucknow best sexual service...
anilsa9823
call girls in Siolim Escorts Book Tonight Now Call 8588052666
call girls in Siolim Escorts Book Tonight Now Call 8588052666
nishakur201
VIP 7001035870 Find & Meet Hyderabad Call Girls Secunderabad high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Secunderabad high-profile Cal...
aditipandeya
CALL ON ➥8923113531 🔝Call Girls Mohanlalganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Mohanlalganj Lucknow best sexual service
anilsa9823
Top Call Girls In Arjunganj ( Lucknow ) ✨ 8923113531 ✨ Cash Payment
Top Call Girls In Arjunganj ( Lucknow ) ✨ 8923113531 ✨ Cash Payment
anilsa9823
Call girls in Andheri with phone number 9892124323
Call girls in Andheri with phone number 9892124323
Pooja Nehwal
Lucknow 💋 Escort Service in Lucknow ₹7.5k Pick Up & Drop With Cash Payment 89...
Lucknow 💋 Escort Service in Lucknow ₹7.5k Pick Up & Drop With Cash Payment 89...
anilsa9823
VIP 7001035870 Find & Meet Hyderabad Call Girls Gachibowli high-profile Call ...
VIP 7001035870 Find & Meet Hyderabad Call Girls Gachibowli high-profile Call ...
aditipandeya
Último
(15)
VIP Chandigarh Call Girls 7001035870 Enjoy Call Girls With Our Escorts
VIP Chandigarh Call Girls 7001035870 Enjoy Call Girls With Our Escorts
High Profile Call Girls in Lucknow | Whatsapp No 🧑🏼❤️💋🧑🏽 8923113531 𓀇 VIP ...
High Profile Call Girls in Lucknow | Whatsapp No 🧑🏼❤️💋🧑🏽 8923113531 𓀇 VIP ...
Tirupati Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Tirupati Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
VIP 7001035870 Find & Meet Hyderabad Call Girls Jubilee Hills high-profile Ca...
VIP 7001035870 Find & Meet Hyderabad Call Girls Jubilee Hills high-profile Ca...
(COD) ̄Young Call Girls In Defence Colony , New Delhi꧁❤ 7042364481❤꧂ Escorts S...
(COD) ̄Young Call Girls In Defence Colony , New Delhi꧁❤ 7042364481❤꧂ Escorts S...
Dehradun Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Dehradun Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Top Call Girls In Indira Nagar Lucknow ( Lucknow ) 🔝 8923113531 🔝 Cash Payment
Top Call Girls In Indira Nagar Lucknow ( Lucknow ) 🔝 8923113531 🔝 Cash Payment
CALL ON ➥8923113531 🔝Call Girls Sushant Golf City Lucknow best sexual service...
CALL ON ➥8923113531 🔝Call Girls Sushant Golf City Lucknow best sexual service...
call girls in Siolim Escorts Book Tonight Now Call 8588052666
call girls in Siolim Escorts Book Tonight Now Call 8588052666
VIP 7001035870 Find & Meet Hyderabad Call Girls Secunderabad high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Secunderabad high-profile Cal...
CALL ON ➥8923113531 🔝Call Girls Mohanlalganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Mohanlalganj Lucknow best sexual service
Top Call Girls In Arjunganj ( Lucknow ) ✨ 8923113531 ✨ Cash Payment
Top Call Girls In Arjunganj ( Lucknow ) ✨ 8923113531 ✨ Cash Payment
Call girls in Andheri with phone number 9892124323
Call girls in Andheri with phone number 9892124323
Lucknow 💋 Escort Service in Lucknow ₹7.5k Pick Up & Drop With Cash Payment 89...
Lucknow 💋 Escort Service in Lucknow ₹7.5k Pick Up & Drop With Cash Payment 89...
VIP 7001035870 Find & Meet Hyderabad Call Girls Gachibowli high-profile Call ...
VIP 7001035870 Find & Meet Hyderabad Call Girls Gachibowli high-profile Call ...
DWP-Cybersecurity-2023.pdf
1.
Copyright © 2021
Karl W. Palachuk – www.Smallbizthoughts.com Cybersecurity 2022 Denis S Wilson denis@dwpia.com
2.
Copyright © 2021
Karl W. Palachuk – www.Smallbizthoughts.com Agenda • Cybersecurity basics – setting the stage • Password security • Email security • Recommendations
3.
Copyright © 2021
Karl W. Palachuk – www.Smallbizthoughts.com Cybersecurity Basics
4.
Copyright © 2021
Karl W. Palachuk – www.Smallbizthoughts.com Recent Cybersecurity News • Ransomware is actually down in the last two years • Ransomware: Malware that encrypts all the data it can find and demands a payment in order to receive the encryption keys • But the cost per incident has more than doubled • 2019: Average cost to remediate = $761,000 • 2020: Average cost to remediate = $1,850,000 • If you pay the ransom: About 65% of data is recovered
5.
Copyright © 2021
Karl W. Palachuk – www.Smallbizthoughts.com Recent Cybersecurity News • Reported cybersecurity incidents are up 800% since the pandemic started • See FBI Internet Crime Complaint Center “Cybercrime is now larger than all other forms of organized crime put together.” – Michael George, Navigate
6.
Copyright © 2021
Karl W. Palachuk – www.Smallbizthoughts.com Largest Attacks As the technology used in attacks gets better, the number of large data breaches grows https://informationisbeautiful.net/visualizations/ worlds-biggest-data-breaches-hacks/
7.
Copyright © 2021
Karl W. Palachuk – www.Smallbizthoughts.com What Are We Defending Against? • Confidentiality • Unauthorized Access or Modification • Integrity • Unchanged or un- deleted • Availability • Ransomware or Denial of Service
8.
Copyright © 2021
Karl W. Palachuk – www.Smallbizthoughts.com There Is No “Targeting” • Emails, passwords, web sites . . . • Billions of random attacks every day • Average days a system is breached before the breach is identified: 206! • (IBM, 2019)
9.
Copyright © 2021
Karl W. Palachuk – www.Smallbizthoughts.com Attack Vectors: Everything! • Firewall • AV on Server • AV on Desktop • Patches, fixes, updates • Policies Users (Behaviors)
10.
Copyright © 2021
Karl W. Palachuk – www.Smallbizthoughts.com Password Security
11.
Copyright © 2021
Karl W. Palachuk – www.Smallbizthoughts.com The Basics: Passwords
12.
Copyright © 2021
Karl W. Palachuk – www.Smallbizthoughts.com Your Password Has Been Compromised • Almost certainly • See https://haveibeenpwned.com • As of last week . . . • 565 web sites • 11.6 billion accounts compromised
13.
Copyright © 2021
Karl W. Palachuk – www.Smallbizthoughts.com 2FA / MFA • Two-Factor or Multi-Factor Authentication • Microsoft Authenticator • Google Authenticator • Email • SMS Not as secure
14.
Copyright © 2021
Karl W. Palachuk – www.Smallbizthoughts.com Password Vaults or Managers • LastPass • Keeper • Zoho Vault • Dashlane • Bitwarden • 1Password • LogMeOnce • Password Boss • Nordpass • StickyPassword • McAfee • RoboForm
15.
Copyright © 2021
Karl W. Palachuk – www.Smallbizthoughts.com Email Security
16.
Copyright © 2021
Karl W. Palachuk – www.Smallbizthoughts.com Emails and Social Engineering • Their goal: Trick you into clicking! • Malware of some kind • Often ransomware • . . . Or taking specific actions • Phishing • e.g., Wire money
17.
Copyright © 2021
Karl W. Palachuk – www.Smallbizthoughts.com You Received a Document (or Payment)!
18.
Copyright © 2021
Karl W. Palachuk – www.Smallbizthoughts.com Email Security • Banks, etc. will not send important information directly in email • Go to their site on your own • Do not open email from people you don’t know • Do not open attachments unless you asked that person to send you that attachment • When in doubt – DELETE!
19.
Copyright © 2021
Karl W. Palachuk – www.Smallbizthoughts.com Email and Web Safety • Float Over Links . . . • Shortened Links . . . • http://bit.ly/sample • Hidden Extensions • SafeLookingFile.jpg • SafeLookingFile.jpg.exe
20.
Copyright © 2021
Karl W. Palachuk – www.Smallbizthoughts.com Email and Web Safety Extensions that could be dangerous Programs • .EXE • .PIF • .APPLICATION • .GADGET • .MSI • .MSP • .COM • .SCR • .HTA • .CPL • .MSC • .JAR Scripts • .BAT • .CMD • .VB, .VBS • .VBE • .JS • .JSE • .WS, .WSF • .WSC, .WSH • .PS1, .PS1XML, .PS2, .PS2XML, .PSC1, .PSC2 • .MSH, .MSH1, .MSH2, .MSHXML, .MSH1XML, .MSH2XML Shortcuts / Other • .SCF • .LNK • .INF • .REG Office Macros • .DOC, .XLS, .PPT • .DOCM, .DOTM, .XLSM, .XLTM, .XLAM, .PPTM, .POTM, .PPAM, .PPSM, .SLDM • – Newer Office extensions • - Those that end in X (e.g., .DOCX) contain no macros • - Those that end in M (e.g., .DOCM) can contain macros
21.
Copyright © 2021
Karl W. Palachuk – www.Smallbizthoughts.com Virus Safety Tips You already have an anti-virus program! • Don’t “install” another one • Don’t click to fix things If something pops up – close it • Do not click on anything • ALT-F4 is better than clicking the “x”
22.
Copyright © 2021
Karl W. Palachuk – www.Smallbizthoughts.com Social Media – Great for Social Engineering What kind of bread are you? • City where you were born • Mother’s maiden name • Favorite pet • First car • What street did you grow up on?
23.
Copyright © 2021
Karl W. Palachuk – www.Smallbizthoughts.com Newsjacking • Covid !!! • Thanksgiving • Christmas • Hannukah • New Years • Superbowl • Whatever’s in the headlines
24.
Copyright © 2021
Karl W. Palachuk – www.Smallbizthoughts.com Recommendations
25.
Copyright © 2021
Karl W. Palachuk – www.Smallbizthoughts.com Assume You’ll Be Attacked Large-payoff companies are being targeted Everyone else is attacked randomly. Everyone!!!! Backups must be tested! Be prepared to restore . . . And don’t pay the ransom Plan your incident response
26.
Copyright © 2021
Karl W. Palachuk – www.Smallbizthoughts.com Keep Technology Fresh • Old hardware cannot be secured • Old software can be patched . . . to a point • When software is “no longer supported” it cannot be secured • Apply all patches in a timely manner! • Windows, Adobe, Office, Anti-Virus . . . . Everything • Reboot at least once a week
27.
Copyright © 2021
Karl W. Palachuk – www.Smallbizthoughts.com Only Use Company Resources • NO Free DropBox • Or Free OneDrive or anything else • No personal cloud storage or email • No company data on phone unless there’s a business reason for it • Data should go on the official cloud share – NOT the C: drive
28.
Copyright © 2021
Karl W. Palachuk – www.Smallbizthoughts.com Local Administrator • You are not an administrator on your PC • Administrator privileges have to be enabled to install software – including viruses • Your IT Service Provider will install programs for you
29.
Copyright © 2021
Karl W. Palachuk – www.Smallbizthoughts.com Policies • Data management • Draft “Data Handling Guide” • Work from home • Remote/VPN access • Acceptable use policy • e.g., Email on personal devices • Backup and data retention policy
30.
Copyright © 2021
Karl W. Palachuk – www.Smallbizthoughts.com Common Cybersecurity Threats Rogue Software Malware pretending to be legit DOS / DDOS Denial of Service, Distributed DOS Password Attacks Attempt to break in via username/password Phishing Email with evil links Malware Code with malicious intent Many attacks are a subset of malware Maladvertising Infested ads you click on Drive-by Downloads Malware installed on your system Man in the Middle Intercept data and impersonate
31.
Copyright © 2021
Karl W. Palachuk – www.Smallbizthoughts.com Questions . . . Comments Slides at www.SlideShare.com/dwpia Denis S Wilson DWP Information Architects denis@dwpia.com
Descargar ahora