SlideShare una empresa de Scribd logo
1 de 31
Descargar para leer sin conexión
Copyright © 2021 Karl W. Palachuk – www.Smallbizthoughts.com
Cybersecurity 2022
Denis S Wilson
denis@dwpia.com
Copyright © 2021 Karl W. Palachuk – www.Smallbizthoughts.com
Agenda
• Cybersecurity basics – setting the stage
• Password security
• Email security
• Recommendations
Copyright © 2021 Karl W. Palachuk – www.Smallbizthoughts.com
Cybersecurity
Basics
Copyright © 2021 Karl W. Palachuk – www.Smallbizthoughts.com
Recent
Cybersecurity
News
• Ransomware is actually down in the last two years
• Ransomware: Malware that encrypts all the data it can
find and demands a payment in order to receive the
encryption keys
• But the cost per incident has more than doubled
• 2019: Average cost to remediate = $761,000
• 2020: Average cost to remediate = $1,850,000
• If you pay the ransom: About 65% of data is recovered
Copyright © 2021 Karl W. Palachuk – www.Smallbizthoughts.com
Recent Cybersecurity News
• Reported cybersecurity incidents are up 800% since the pandemic
started
• See FBI Internet Crime Complaint Center
“Cybercrime is now larger than all other forms of organized crime
put together.”
– Michael George, Navigate
Copyright © 2021 Karl W. Palachuk – www.Smallbizthoughts.com
Largest Attacks
As the technology used in
attacks gets better,
the number of large data
breaches grows
https://informationisbeautiful.net/visualizations/
worlds-biggest-data-breaches-hacks/
Copyright © 2021 Karl W. Palachuk – www.Smallbizthoughts.com
What Are We
Defending
Against?
• Confidentiality
• Unauthorized Access
or Modification
• Integrity
• Unchanged or un-
deleted
• Availability
• Ransomware or
Denial of Service
Copyright © 2021 Karl W. Palachuk – www.Smallbizthoughts.com
There Is No “Targeting”
• Emails, passwords, web sites . . .
• Billions of random attacks every day
• Average days a system is breached before the breach
is identified: 206!
• (IBM, 2019)
Copyright © 2021 Karl W. Palachuk – www.Smallbizthoughts.com
Attack Vectors: Everything!
• Firewall
• AV on Server
• AV on Desktop
• Patches, fixes, updates
• Policies
Users
(Behaviors)
Copyright © 2021 Karl W. Palachuk – www.Smallbizthoughts.com
Password
Security
Copyright © 2021 Karl W. Palachuk – www.Smallbizthoughts.com
The Basics:
Passwords
Copyright © 2021 Karl W. Palachuk – www.Smallbizthoughts.com
Your Password Has Been Compromised
• Almost certainly
• See
https://haveibeenpwned.com
• As of last week . . .
• 565 web sites
• 11.6 billion accounts compromised
Copyright © 2021 Karl W. Palachuk – www.Smallbizthoughts.com
2FA / MFA
• Two-Factor or Multi-Factor
Authentication
• Microsoft Authenticator
• Google Authenticator
• Email
• SMS  Not as secure
Copyright © 2021 Karl W. Palachuk – www.Smallbizthoughts.com
Password Vaults or Managers
• LastPass
• Keeper
• Zoho Vault
• Dashlane
• Bitwarden
• 1Password
• LogMeOnce
• Password Boss
• Nordpass
• StickyPassword
• McAfee
• RoboForm
Copyright © 2021 Karl W. Palachuk – www.Smallbizthoughts.com
Email
Security
Copyright © 2021 Karl W. Palachuk – www.Smallbizthoughts.com
Emails and Social
Engineering
• Their goal: Trick you into
clicking!
• Malware of some kind
• Often ransomware
• . . . Or taking specific actions
• Phishing
• e.g., Wire money
Copyright © 2021 Karl W. Palachuk – www.Smallbizthoughts.com
You Received a Document (or Payment)!
Copyright © 2021 Karl W. Palachuk – www.Smallbizthoughts.com
Email Security
• Banks, etc. will not send important
information directly in email
• Go to their site on your own
• Do not open email from people
you don’t know
• Do not open attachments unless
you asked that person to send
you that attachment
• When in doubt – DELETE!
Copyright © 2021 Karl W. Palachuk – www.Smallbizthoughts.com
Email and
Web Safety
• Float Over Links . . .
• Shortened Links . . .
• http://bit.ly/sample
• Hidden Extensions
• SafeLookingFile.jpg
• SafeLookingFile.jpg.exe
Copyright © 2021 Karl W. Palachuk – www.Smallbizthoughts.com
Email and Web Safety
Extensions that could be dangerous
Programs
• .EXE
• .PIF
• .APPLICATION
• .GADGET
• .MSI
• .MSP
• .COM
• .SCR
• .HTA
• .CPL
• .MSC
• .JAR
Scripts
• .BAT
• .CMD
• .VB, .VBS
• .VBE
• .JS
• .JSE
• .WS, .WSF
• .WSC, .WSH
• .PS1, .PS1XML, .PS2, .PS2XML, .PSC1,
.PSC2
• .MSH, .MSH1, .MSH2, .MSHXML,
.MSH1XML, .MSH2XML
Shortcuts / Other
• .SCF
• .LNK
• .INF
• .REG
Office Macros
• .DOC, .XLS, .PPT
• .DOCM, .DOTM, .XLSM, .XLTM, .XLAM,
.PPTM, .POTM, .PPAM, .PPSM, .SLDM
• – Newer Office extensions
• - Those that end in X (e.g., .DOCX)
contain no macros
• - Those that end in M (e.g., .DOCM) can
contain macros
Copyright © 2021 Karl W. Palachuk – www.Smallbizthoughts.com
Virus Safety Tips
You already have an
anti-virus program!
• Don’t “install”
another one
• Don’t click to fix
things
If something pops
up – close it
• Do not click on
anything
• ALT-F4 is better
than clicking the
“x”
Copyright © 2021 Karl W. Palachuk – www.Smallbizthoughts.com
Social Media – Great for
Social Engineering
What kind of bread are you?
• City where you were born
• Mother’s maiden name
• Favorite pet
• First car
• What street did you grow up on?
Copyright © 2021 Karl W. Palachuk – www.Smallbizthoughts.com
Newsjacking
• Covid !!!
• Thanksgiving
• Christmas
• Hannukah
• New Years
• Superbowl
• Whatever’s in
the headlines
Copyright © 2021 Karl W. Palachuk – www.Smallbizthoughts.com
Recommendations
Copyright © 2021 Karl W. Palachuk – www.Smallbizthoughts.com
Assume You’ll Be Attacked
Large-payoff companies are being targeted
Everyone else is attacked randomly. Everyone!!!!
Backups must be tested!
Be prepared to restore . . . And don’t pay the ransom
Plan your incident response
Copyright © 2021 Karl W. Palachuk – www.Smallbizthoughts.com
Keep
Technology
Fresh
• Old hardware cannot be
secured
• Old software can be patched .
. . to a point
• When software is “no
longer supported” it
cannot be secured
• Apply all patches in a timely
manner!
• Windows, Adobe, Office,
Anti-Virus . . . . Everything
• Reboot at least once a
week
Copyright © 2021 Karl W. Palachuk – www.Smallbizthoughts.com
Only Use Company
Resources
• NO Free DropBox
• Or Free OneDrive or anything else
• No personal cloud storage or email
• No company data on phone unless there’s a
business reason for it
• Data should go on the official cloud share –
NOT the C: drive
Copyright © 2021 Karl W. Palachuk – www.Smallbizthoughts.com
Local
Administrator
• You are not an
administrator on your PC
• Administrator privileges
have to be enabled to
install software –
including viruses
• Your IT Service Provider
will install programs for
you
Copyright © 2021 Karl W. Palachuk – www.Smallbizthoughts.com
Policies
• Data management
• Draft “Data Handling Guide”
• Work from home
• Remote/VPN access
• Acceptable use policy
• e.g., Email on personal devices
• Backup and data retention policy
Copyright © 2021 Karl W. Palachuk – www.Smallbizthoughts.com
Common Cybersecurity Threats
Rogue Software
Malware pretending to be legit
DOS / DDOS
Denial of Service,
Distributed DOS
Password Attacks
Attempt to break in via
username/password
Phishing
Email with evil links
Malware
Code with malicious intent
Many attacks are a subset
of malware
Maladvertising
Infested ads you click on
Drive-by Downloads
Malware installed on your system
Man in the Middle
Intercept data and impersonate
Copyright © 2021 Karl W. Palachuk – www.Smallbizthoughts.com
Questions . . . Comments
Slides at www.SlideShare.com/dwpia
Denis S Wilson
DWP Information Architects
denis@dwpia.com

Más contenido relacionado

Similar a DWP-Cybersecurity-2023.pdf

Keeping your business safe online cosy club
Keeping your business safe online cosy clubKeeping your business safe online cosy club
Keeping your business safe online cosy clubGet up to Speed
 
Protecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareProtecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareQuick Heal Technologies Ltd.
 
Web & Cloud Security in the real world
Web & Cloud Security in the real worldWeb & Cloud Security in the real world
Web & Cloud Security in the real worldMadhu Akula
 
2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomware2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomwareAlgoSec
 
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...Robert Conti Jr.
 
It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version Brian Pichman
 
Protecting Your IP: Data Security for Software Technology
Protecting Your IP: Data Security for Software TechnologyProtecting Your IP: Data Security for Software Technology
Protecting Your IP: Data Security for Software TechnologyShawn Tuma
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Mark Williams
 
The How and Why of Container Vulnerability Management
The How and Why of Container Vulnerability ManagementThe How and Why of Container Vulnerability Management
The How and Why of Container Vulnerability ManagementTim Mackey
 
The How and Why of Container Vulnerability Management
The How and Why of Container Vulnerability ManagementThe How and Why of Container Vulnerability Management
The How and Why of Container Vulnerability ManagementBlack Duck by Synopsys
 
An Introduction To IT Security And Privacy - Servers And More
An Introduction To IT Security And Privacy - Servers And MoreAn Introduction To IT Security And Privacy - Servers And More
An Introduction To IT Security And Privacy - Servers And MoreBlake Carver
 
Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!MarketingArrowECS_CZ
 
Czech Tech Pitch Day - Babel / OKsystem (Martin Kudrnac)
Czech Tech Pitch Day - Babel / OKsystem (Martin Kudrnac)Czech Tech Pitch Day - Babel / OKsystem (Martin Kudrnac)
Czech Tech Pitch Day - Babel / OKsystem (Martin Kudrnac)Jan Fried
 
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015Ajin Abraham
 
Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015Claus Cramon Houmann
 
Modern Web Security
Modern Web SecurityModern Web Security
Modern Web SecurityBill Condo
 
Managing WorkSpaces at Scale | AWS Public Sector Summit 2016
Managing WorkSpaces at Scale | AWS Public Sector Summit 2016Managing WorkSpaces at Scale | AWS Public Sector Summit 2016
Managing WorkSpaces at Scale | AWS Public Sector Summit 2016Amazon Web Services
 
A question of trust - understanding Open Source risks
A question of trust - understanding Open Source risksA question of trust - understanding Open Source risks
A question of trust - understanding Open Source risksTim Mackey
 
Ransomware: Mitigation Through Preparation
Ransomware: Mitigation Through PreparationRansomware: Mitigation Through Preparation
Ransomware: Mitigation Through PreparationHostway|HOSTING
 

Similar a DWP-Cybersecurity-2023.pdf (20)

Keeping your business safe online cosy club
Keeping your business safe online cosy clubKeeping your business safe online cosy club
Keeping your business safe online cosy club
 
Protecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareProtecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry Ransomware
 
Web & Cloud Security in the real world
Web & Cloud Security in the real worldWeb & Cloud Security in the real world
Web & Cloud Security in the real world
 
2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomware2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomware
 
Tietoturvallisuuden_kevatseminaari_2013_Jarno_Niemela
Tietoturvallisuuden_kevatseminaari_2013_Jarno_NiemelaTietoturvallisuuden_kevatseminaari_2013_Jarno_Niemela
Tietoturvallisuuden_kevatseminaari_2013_Jarno_Niemela
 
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
 
It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version
 
Protecting Your IP: Data Security for Software Technology
Protecting Your IP: Data Security for Software TechnologyProtecting Your IP: Data Security for Software Technology
Protecting Your IP: Data Security for Software Technology
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?
 
The How and Why of Container Vulnerability Management
The How and Why of Container Vulnerability ManagementThe How and Why of Container Vulnerability Management
The How and Why of Container Vulnerability Management
 
The How and Why of Container Vulnerability Management
The How and Why of Container Vulnerability ManagementThe How and Why of Container Vulnerability Management
The How and Why of Container Vulnerability Management
 
An Introduction To IT Security And Privacy - Servers And More
An Introduction To IT Security And Privacy - Servers And MoreAn Introduction To IT Security And Privacy - Servers And More
An Introduction To IT Security And Privacy - Servers And More
 
Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!
 
Czech Tech Pitch Day - Babel / OKsystem (Martin Kudrnac)
Czech Tech Pitch Day - Babel / OKsystem (Martin Kudrnac)Czech Tech Pitch Day - Babel / OKsystem (Martin Kudrnac)
Czech Tech Pitch Day - Babel / OKsystem (Martin Kudrnac)
 
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015
 
Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015
 
Modern Web Security
Modern Web SecurityModern Web Security
Modern Web Security
 
Managing WorkSpaces at Scale | AWS Public Sector Summit 2016
Managing WorkSpaces at Scale | AWS Public Sector Summit 2016Managing WorkSpaces at Scale | AWS Public Sector Summit 2016
Managing WorkSpaces at Scale | AWS Public Sector Summit 2016
 
A question of trust - understanding Open Source risks
A question of trust - understanding Open Source risksA question of trust - understanding Open Source risks
A question of trust - understanding Open Source risks
 
Ransomware: Mitigation Through Preparation
Ransomware: Mitigation Through PreparationRansomware: Mitigation Through Preparation
Ransomware: Mitigation Through Preparation
 

Más de DWP Information Architects Inc.

Microsoft Whitepaper: Running Your Business in the Cloud
Microsoft Whitepaper: Running Your Business in the CloudMicrosoft Whitepaper: Running Your Business in the Cloud
Microsoft Whitepaper: Running Your Business in the CloudDWP Information Architects Inc.
 
Microsoft Whitepaper: Cloud Computing Guide for Construction
Microsoft Whitepaper: Cloud Computing Guide for ConstructionMicrosoft Whitepaper: Cloud Computing Guide for Construction
Microsoft Whitepaper: Cloud Computing Guide for ConstructionDWP Information Architects Inc.
 
Office 365: Why 98% of the Fortune 100 have adopted this tech
Office 365: Why 98% of the Fortune 100 have adopted this techOffice 365: Why 98% of the Fortune 100 have adopted this tech
Office 365: Why 98% of the Fortune 100 have adopted this techDWP Information Architects Inc.
 
Windows 10: Ease-of-use, multiple platforms, and security (plus fun stuff).
Windows 10: Ease-of-use, multiple platforms, and security (plus fun stuff).Windows 10: Ease-of-use, multiple platforms, and security (plus fun stuff).
Windows 10: Ease-of-use, multiple platforms, and security (plus fun stuff).DWP Information Architects Inc.
 
Small Business Technology Trends: And They Are All Cloud
Small Business Technology Trends: And They Are All CloudSmall Business Technology Trends: And They Are All Cloud
Small Business Technology Trends: And They Are All CloudDWP Information Architects Inc.
 

Más de DWP Information Architects Inc. (19)

DWP Cybersecurity 101 for Nonprofits
DWP Cybersecurity 101 for NonprofitsDWP Cybersecurity 101 for Nonprofits
DWP Cybersecurity 101 for Nonprofits
 
SCORE Whitepaper: Disaster Impact on Small Business
SCORE Whitepaper: Disaster Impact on Small BusinessSCORE Whitepaper: Disaster Impact on Small Business
SCORE Whitepaper: Disaster Impact on Small Business
 
Microsoft Whitepaper: Running Your Business in the Cloud
Microsoft Whitepaper: Running Your Business in the CloudMicrosoft Whitepaper: Running Your Business in the Cloud
Microsoft Whitepaper: Running Your Business in the Cloud
 
Microsoft Whitepaper: Cloud Computing Guide for Construction
Microsoft Whitepaper: Cloud Computing Guide for ConstructionMicrosoft Whitepaper: Cloud Computing Guide for Construction
Microsoft Whitepaper: Cloud Computing Guide for Construction
 
Microsoft Whitepaper: Disaster Preparedness Guide
Microsoft Whitepaper: Disaster Preparedness GuideMicrosoft Whitepaper: Disaster Preparedness Guide
Microsoft Whitepaper: Disaster Preparedness Guide
 
Microsoft Whitepaper: Cloud Privacy Guide
Microsoft Whitepaper: Cloud Privacy GuideMicrosoft Whitepaper: Cloud Privacy Guide
Microsoft Whitepaper: Cloud Privacy Guide
 
What is the Cloud: and how does it reduce cost by 50%
What is the Cloud: and how does it reduce cost by 50%What is the Cloud: and how does it reduce cost by 50%
What is the Cloud: and how does it reduce cost by 50%
 
Office 365: Why 98% of the Fortune 100 have adopted this tech
Office 365: Why 98% of the Fortune 100 have adopted this techOffice 365: Why 98% of the Fortune 100 have adopted this tech
Office 365: Why 98% of the Fortune 100 have adopted this tech
 
Must Know Cyber Security Stats of 2016
Must Know Cyber Security Stats of 2016Must Know Cyber Security Stats of 2016
Must Know Cyber Security Stats of 2016
 
Modern Workplace: Office 2016
 Modern Workplace: Office 2016 Modern Workplace: Office 2016
Modern Workplace: Office 2016
 
SEO: How to Get More People to Your Website
SEO: How to Get More People to Your WebsiteSEO: How to Get More People to Your Website
SEO: How to Get More People to Your Website
 
Windows 10: Ease-of-use, multiple platforms, and security (plus fun stuff).
Windows 10: Ease-of-use, multiple platforms, and security (plus fun stuff).Windows 10: Ease-of-use, multiple platforms, and security (plus fun stuff).
Windows 10: Ease-of-use, multiple platforms, and security (plus fun stuff).
 
ModernBiz: Business Anywhere
ModernBiz: Business AnywhereModernBiz: Business Anywhere
ModernBiz: Business Anywhere
 
Small Business Technology Trends: And They Are All Cloud
Small Business Technology Trends: And They Are All CloudSmall Business Technology Trends: And They Are All Cloud
Small Business Technology Trends: And They Are All Cloud
 
ModernBiz CRM
ModernBiz CRMModernBiz CRM
ModernBiz CRM
 
SEO and SEM
SEO and SEMSEO and SEM
SEO and SEM
 
Safeguard Your Business
Safeguard Your BusinessSafeguard Your Business
Safeguard Your Business
 
Connect With Customers: and Office 2013 Tips and Tricks
Connect With Customers: and Office 2013 Tips and TricksConnect With Customers: and Office 2013 Tips and Tricks
Connect With Customers: and Office 2013 Tips and Tricks
 
Continuum / Channelnomics Webcast
Continuum / Channelnomics WebcastContinuum / Channelnomics Webcast
Continuum / Channelnomics Webcast
 

Último

VIP Chandigarh Call Girls 7001035870 Enjoy Call Girls With Our Escorts
VIP Chandigarh Call Girls 7001035870 Enjoy Call Girls With Our EscortsVIP Chandigarh Call Girls 7001035870 Enjoy Call Girls With Our Escorts
VIP Chandigarh Call Girls 7001035870 Enjoy Call Girls With Our Escortssonatiwari757
 
High Profile Call Girls in Lucknow | Whatsapp No 🧑🏼‍❤️‍💋‍🧑🏽 8923113531 𓀇 VIP ...
High Profile Call Girls in Lucknow | Whatsapp No 🧑🏼‍❤️‍💋‍🧑🏽 8923113531 𓀇 VIP ...High Profile Call Girls in Lucknow | Whatsapp No 🧑🏼‍❤️‍💋‍🧑🏽 8923113531 𓀇 VIP ...
High Profile Call Girls in Lucknow | Whatsapp No 🧑🏼‍❤️‍💋‍🧑🏽 8923113531 𓀇 VIP ...gurkirankumar98700
 
Tirupati Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Tirupati Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceTirupati Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Tirupati Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceDamini Dixit
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Jubilee Hills high-profile Ca...
VIP 7001035870 Find & Meet Hyderabad Call Girls Jubilee Hills high-profile Ca...VIP 7001035870 Find & Meet Hyderabad Call Girls Jubilee Hills high-profile Ca...
VIP 7001035870 Find & Meet Hyderabad Call Girls Jubilee Hills high-profile Ca...aditipandeya
 
(COD) ̄Young Call Girls In Defence Colony , New Delhi꧁❤ 7042364481❤꧂ Escorts S...
(COD) ̄Young Call Girls In Defence Colony , New Delhi꧁❤ 7042364481❤꧂ Escorts S...(COD) ̄Young Call Girls In Defence Colony , New Delhi꧁❤ 7042364481❤꧂ Escorts S...
(COD) ̄Young Call Girls In Defence Colony , New Delhi꧁❤ 7042364481❤꧂ Escorts S...Hot Call Girls In Sector 58 (Noida)
 
Dehradun Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Dehradun Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceDehradun Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Dehradun Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceDamini Dixit
 
Top Call Girls In Indira Nagar Lucknow ( Lucknow ) 🔝 8923113531 🔝 Cash Payment
Top Call Girls In Indira Nagar Lucknow ( Lucknow  ) 🔝 8923113531 🔝  Cash PaymentTop Call Girls In Indira Nagar Lucknow ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment
Top Call Girls In Indira Nagar Lucknow ( Lucknow ) 🔝 8923113531 🔝 Cash Paymentanilsa9823
 
CALL ON ➥8923113531 🔝Call Girls Sushant Golf City Lucknow best sexual service...
CALL ON ➥8923113531 🔝Call Girls Sushant Golf City Lucknow best sexual service...CALL ON ➥8923113531 🔝Call Girls Sushant Golf City Lucknow best sexual service...
CALL ON ➥8923113531 🔝Call Girls Sushant Golf City Lucknow best sexual service...anilsa9823
 
call girls in Siolim Escorts Book Tonight Now Call 8588052666
call girls in Siolim Escorts Book Tonight Now Call 8588052666call girls in Siolim Escorts Book Tonight Now Call 8588052666
call girls in Siolim Escorts Book Tonight Now Call 8588052666nishakur201
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Secunderabad high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Secunderabad high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Secunderabad high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Secunderabad high-profile Cal...aditipandeya
 
CALL ON ➥8923113531 🔝Call Girls Mohanlalganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Mohanlalganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Mohanlalganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Mohanlalganj Lucknow best sexual serviceanilsa9823
 
Top Call Girls In Arjunganj ( Lucknow ) ✨ 8923113531 ✨ Cash Payment
Top Call Girls In Arjunganj ( Lucknow  ) ✨ 8923113531 ✨  Cash PaymentTop Call Girls In Arjunganj ( Lucknow  ) ✨ 8923113531 ✨  Cash Payment
Top Call Girls In Arjunganj ( Lucknow ) ✨ 8923113531 ✨ Cash Paymentanilsa9823
 
Call girls in Andheri with phone number 9892124323
Call girls in Andheri with phone number 9892124323Call girls in Andheri with phone number 9892124323
Call girls in Andheri with phone number 9892124323Pooja Nehwal
 
Lucknow 💋 Escort Service in Lucknow ₹7.5k Pick Up & Drop With Cash Payment 89...
Lucknow 💋 Escort Service in Lucknow ₹7.5k Pick Up & Drop With Cash Payment 89...Lucknow 💋 Escort Service in Lucknow ₹7.5k Pick Up & Drop With Cash Payment 89...
Lucknow 💋 Escort Service in Lucknow ₹7.5k Pick Up & Drop With Cash Payment 89...anilsa9823
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Gachibowli high-profile Call ...
VIP 7001035870 Find & Meet Hyderabad Call Girls Gachibowli high-profile Call ...VIP 7001035870 Find & Meet Hyderabad Call Girls Gachibowli high-profile Call ...
VIP 7001035870 Find & Meet Hyderabad Call Girls Gachibowli high-profile Call ...aditipandeya
 

Último (15)

VIP Chandigarh Call Girls 7001035870 Enjoy Call Girls With Our Escorts
VIP Chandigarh Call Girls 7001035870 Enjoy Call Girls With Our EscortsVIP Chandigarh Call Girls 7001035870 Enjoy Call Girls With Our Escorts
VIP Chandigarh Call Girls 7001035870 Enjoy Call Girls With Our Escorts
 
High Profile Call Girls in Lucknow | Whatsapp No 🧑🏼‍❤️‍💋‍🧑🏽 8923113531 𓀇 VIP ...
High Profile Call Girls in Lucknow | Whatsapp No 🧑🏼‍❤️‍💋‍🧑🏽 8923113531 𓀇 VIP ...High Profile Call Girls in Lucknow | Whatsapp No 🧑🏼‍❤️‍💋‍🧑🏽 8923113531 𓀇 VIP ...
High Profile Call Girls in Lucknow | Whatsapp No 🧑🏼‍❤️‍💋‍🧑🏽 8923113531 𓀇 VIP ...
 
Tirupati Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Tirupati Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceTirupati Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Tirupati Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Jubilee Hills high-profile Ca...
VIP 7001035870 Find & Meet Hyderabad Call Girls Jubilee Hills high-profile Ca...VIP 7001035870 Find & Meet Hyderabad Call Girls Jubilee Hills high-profile Ca...
VIP 7001035870 Find & Meet Hyderabad Call Girls Jubilee Hills high-profile Ca...
 
(COD) ̄Young Call Girls In Defence Colony , New Delhi꧁❤ 7042364481❤꧂ Escorts S...
(COD) ̄Young Call Girls In Defence Colony , New Delhi꧁❤ 7042364481❤꧂ Escorts S...(COD) ̄Young Call Girls In Defence Colony , New Delhi꧁❤ 7042364481❤꧂ Escorts S...
(COD) ̄Young Call Girls In Defence Colony , New Delhi꧁❤ 7042364481❤꧂ Escorts S...
 
Dehradun Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Dehradun Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceDehradun Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Dehradun Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 
Top Call Girls In Indira Nagar Lucknow ( Lucknow ) 🔝 8923113531 🔝 Cash Payment
Top Call Girls In Indira Nagar Lucknow ( Lucknow  ) 🔝 8923113531 🔝  Cash PaymentTop Call Girls In Indira Nagar Lucknow ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment
Top Call Girls In Indira Nagar Lucknow ( Lucknow ) 🔝 8923113531 🔝 Cash Payment
 
CALL ON ➥8923113531 🔝Call Girls Sushant Golf City Lucknow best sexual service...
CALL ON ➥8923113531 🔝Call Girls Sushant Golf City Lucknow best sexual service...CALL ON ➥8923113531 🔝Call Girls Sushant Golf City Lucknow best sexual service...
CALL ON ➥8923113531 🔝Call Girls Sushant Golf City Lucknow best sexual service...
 
call girls in Siolim Escorts Book Tonight Now Call 8588052666
call girls in Siolim Escorts Book Tonight Now Call 8588052666call girls in Siolim Escorts Book Tonight Now Call 8588052666
call girls in Siolim Escorts Book Tonight Now Call 8588052666
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Secunderabad high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Secunderabad high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Secunderabad high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Secunderabad high-profile Cal...
 
CALL ON ➥8923113531 🔝Call Girls Mohanlalganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Mohanlalganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Mohanlalganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Mohanlalganj Lucknow best sexual service
 
Top Call Girls In Arjunganj ( Lucknow ) ✨ 8923113531 ✨ Cash Payment
Top Call Girls In Arjunganj ( Lucknow  ) ✨ 8923113531 ✨  Cash PaymentTop Call Girls In Arjunganj ( Lucknow  ) ✨ 8923113531 ✨  Cash Payment
Top Call Girls In Arjunganj ( Lucknow ) ✨ 8923113531 ✨ Cash Payment
 
Call girls in Andheri with phone number 9892124323
Call girls in Andheri with phone number 9892124323Call girls in Andheri with phone number 9892124323
Call girls in Andheri with phone number 9892124323
 
Lucknow 💋 Escort Service in Lucknow ₹7.5k Pick Up & Drop With Cash Payment 89...
Lucknow 💋 Escort Service in Lucknow ₹7.5k Pick Up & Drop With Cash Payment 89...Lucknow 💋 Escort Service in Lucknow ₹7.5k Pick Up & Drop With Cash Payment 89...
Lucknow 💋 Escort Service in Lucknow ₹7.5k Pick Up & Drop With Cash Payment 89...
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Gachibowli high-profile Call ...
VIP 7001035870 Find & Meet Hyderabad Call Girls Gachibowli high-profile Call ...VIP 7001035870 Find & Meet Hyderabad Call Girls Gachibowli high-profile Call ...
VIP 7001035870 Find & Meet Hyderabad Call Girls Gachibowli high-profile Call ...
 

DWP-Cybersecurity-2023.pdf

  • 1. Copyright © 2021 Karl W. Palachuk – www.Smallbizthoughts.com Cybersecurity 2022 Denis S Wilson denis@dwpia.com
  • 2. Copyright © 2021 Karl W. Palachuk – www.Smallbizthoughts.com Agenda • Cybersecurity basics – setting the stage • Password security • Email security • Recommendations
  • 3. Copyright © 2021 Karl W. Palachuk – www.Smallbizthoughts.com Cybersecurity Basics
  • 4. Copyright © 2021 Karl W. Palachuk – www.Smallbizthoughts.com Recent Cybersecurity News • Ransomware is actually down in the last two years • Ransomware: Malware that encrypts all the data it can find and demands a payment in order to receive the encryption keys • But the cost per incident has more than doubled • 2019: Average cost to remediate = $761,000 • 2020: Average cost to remediate = $1,850,000 • If you pay the ransom: About 65% of data is recovered
  • 5. Copyright © 2021 Karl W. Palachuk – www.Smallbizthoughts.com Recent Cybersecurity News • Reported cybersecurity incidents are up 800% since the pandemic started • See FBI Internet Crime Complaint Center “Cybercrime is now larger than all other forms of organized crime put together.” – Michael George, Navigate
  • 6. Copyright © 2021 Karl W. Palachuk – www.Smallbizthoughts.com Largest Attacks As the technology used in attacks gets better, the number of large data breaches grows https://informationisbeautiful.net/visualizations/ worlds-biggest-data-breaches-hacks/
  • 7. Copyright © 2021 Karl W. Palachuk – www.Smallbizthoughts.com What Are We Defending Against? • Confidentiality • Unauthorized Access or Modification • Integrity • Unchanged or un- deleted • Availability • Ransomware or Denial of Service
  • 8. Copyright © 2021 Karl W. Palachuk – www.Smallbizthoughts.com There Is No “Targeting” • Emails, passwords, web sites . . . • Billions of random attacks every day • Average days a system is breached before the breach is identified: 206! • (IBM, 2019)
  • 9. Copyright © 2021 Karl W. Palachuk – www.Smallbizthoughts.com Attack Vectors: Everything! • Firewall • AV on Server • AV on Desktop • Patches, fixes, updates • Policies Users (Behaviors)
  • 10. Copyright © 2021 Karl W. Palachuk – www.Smallbizthoughts.com Password Security
  • 11. Copyright © 2021 Karl W. Palachuk – www.Smallbizthoughts.com The Basics: Passwords
  • 12. Copyright © 2021 Karl W. Palachuk – www.Smallbizthoughts.com Your Password Has Been Compromised • Almost certainly • See https://haveibeenpwned.com • As of last week . . . • 565 web sites • 11.6 billion accounts compromised
  • 13. Copyright © 2021 Karl W. Palachuk – www.Smallbizthoughts.com 2FA / MFA • Two-Factor or Multi-Factor Authentication • Microsoft Authenticator • Google Authenticator • Email • SMS  Not as secure
  • 14. Copyright © 2021 Karl W. Palachuk – www.Smallbizthoughts.com Password Vaults or Managers • LastPass • Keeper • Zoho Vault • Dashlane • Bitwarden • 1Password • LogMeOnce • Password Boss • Nordpass • StickyPassword • McAfee • RoboForm
  • 15. Copyright © 2021 Karl W. Palachuk – www.Smallbizthoughts.com Email Security
  • 16. Copyright © 2021 Karl W. Palachuk – www.Smallbizthoughts.com Emails and Social Engineering • Their goal: Trick you into clicking! • Malware of some kind • Often ransomware • . . . Or taking specific actions • Phishing • e.g., Wire money
  • 17. Copyright © 2021 Karl W. Palachuk – www.Smallbizthoughts.com You Received a Document (or Payment)!
  • 18. Copyright © 2021 Karl W. Palachuk – www.Smallbizthoughts.com Email Security • Banks, etc. will not send important information directly in email • Go to their site on your own • Do not open email from people you don’t know • Do not open attachments unless you asked that person to send you that attachment • When in doubt – DELETE!
  • 19. Copyright © 2021 Karl W. Palachuk – www.Smallbizthoughts.com Email and Web Safety • Float Over Links . . . • Shortened Links . . . • http://bit.ly/sample • Hidden Extensions • SafeLookingFile.jpg • SafeLookingFile.jpg.exe
  • 20. Copyright © 2021 Karl W. Palachuk – www.Smallbizthoughts.com Email and Web Safety Extensions that could be dangerous Programs • .EXE • .PIF • .APPLICATION • .GADGET • .MSI • .MSP • .COM • .SCR • .HTA • .CPL • .MSC • .JAR Scripts • .BAT • .CMD • .VB, .VBS • .VBE • .JS • .JSE • .WS, .WSF • .WSC, .WSH • .PS1, .PS1XML, .PS2, .PS2XML, .PSC1, .PSC2 • .MSH, .MSH1, .MSH2, .MSHXML, .MSH1XML, .MSH2XML Shortcuts / Other • .SCF • .LNK • .INF • .REG Office Macros • .DOC, .XLS, .PPT • .DOCM, .DOTM, .XLSM, .XLTM, .XLAM, .PPTM, .POTM, .PPAM, .PPSM, .SLDM • – Newer Office extensions • - Those that end in X (e.g., .DOCX) contain no macros • - Those that end in M (e.g., .DOCM) can contain macros
  • 21. Copyright © 2021 Karl W. Palachuk – www.Smallbizthoughts.com Virus Safety Tips You already have an anti-virus program! • Don’t “install” another one • Don’t click to fix things If something pops up – close it • Do not click on anything • ALT-F4 is better than clicking the “x”
  • 22. Copyright © 2021 Karl W. Palachuk – www.Smallbizthoughts.com Social Media – Great for Social Engineering What kind of bread are you? • City where you were born • Mother’s maiden name • Favorite pet • First car • What street did you grow up on?
  • 23. Copyright © 2021 Karl W. Palachuk – www.Smallbizthoughts.com Newsjacking • Covid !!! • Thanksgiving • Christmas • Hannukah • New Years • Superbowl • Whatever’s in the headlines
  • 24. Copyright © 2021 Karl W. Palachuk – www.Smallbizthoughts.com Recommendations
  • 25. Copyright © 2021 Karl W. Palachuk – www.Smallbizthoughts.com Assume You’ll Be Attacked Large-payoff companies are being targeted Everyone else is attacked randomly. Everyone!!!! Backups must be tested! Be prepared to restore . . . And don’t pay the ransom Plan your incident response
  • 26. Copyright © 2021 Karl W. Palachuk – www.Smallbizthoughts.com Keep Technology Fresh • Old hardware cannot be secured • Old software can be patched . . . to a point • When software is “no longer supported” it cannot be secured • Apply all patches in a timely manner! • Windows, Adobe, Office, Anti-Virus . . . . Everything • Reboot at least once a week
  • 27. Copyright © 2021 Karl W. Palachuk – www.Smallbizthoughts.com Only Use Company Resources • NO Free DropBox • Or Free OneDrive or anything else • No personal cloud storage or email • No company data on phone unless there’s a business reason for it • Data should go on the official cloud share – NOT the C: drive
  • 28. Copyright © 2021 Karl W. Palachuk – www.Smallbizthoughts.com Local Administrator • You are not an administrator on your PC • Administrator privileges have to be enabled to install software – including viruses • Your IT Service Provider will install programs for you
  • 29. Copyright © 2021 Karl W. Palachuk – www.Smallbizthoughts.com Policies • Data management • Draft “Data Handling Guide” • Work from home • Remote/VPN access • Acceptable use policy • e.g., Email on personal devices • Backup and data retention policy
  • 30. Copyright © 2021 Karl W. Palachuk – www.Smallbizthoughts.com Common Cybersecurity Threats Rogue Software Malware pretending to be legit DOS / DDOS Denial of Service, Distributed DOS Password Attacks Attempt to break in via username/password Phishing Email with evil links Malware Code with malicious intent Many attacks are a subset of malware Maladvertising Infested ads you click on Drive-by Downloads Malware installed on your system Man in the Middle Intercept data and impersonate
  • 31. Copyright © 2021 Karl W. Palachuk – www.Smallbizthoughts.com Questions . . . Comments Slides at www.SlideShare.com/dwpia Denis S Wilson DWP Information Architects denis@dwpia.com