SlideShare una empresa de Scribd logo
1 de 10
Whats up for today? 
Some chitchat about your baby…
The dark side of the internet 
• Phishing 
• Social engineering 
• Hacking (vulnerabilities & misconfigurations) 
• Injection (iFRAME) 
• DDOS 
• DNS hijacking 
• Cookie hijacking/stealing 
• MITM (Man In The Middle) 
• Xss and SQL injection 
• 3rd Parties
Serious cases 
• 13 October 2014 1 million dutch e-mail 
accounts compromised. 
• 5600 Dutch websites hacked (SQL injection) 
• Target hack, costs 40 million $, Home depot 
60 Miljon $ ( total costs in revenue and 
security measures) 
• In two years 2 Billion account credentials 
breached ( including CC and person 
credentials)
Data Breaches Leads to Drop in Sales 
• Target Earnings Slide 46% After Data Breach 
• One third of consumers will shop elsewhere if 
their retailer of choice is breached, according 
to new research 
• Downtime and massive costs after data 
breach or malware infection.
What can/must we do? 
• Audit/Pentest 
• Source code check 
• Scanning pro software * 
• WAF * (Web Application Firewall) 
• Encrypt your database, encrypt credentials, if hacked it wont be worth decrypting due to time 
• Dedicated Hosting 
• HTTPS, Perfect Forward Secrecy, HSTS (HTTP Strict Transport Security) 
• MASKING * 
• Malware Analyses, day round * 
• DDOS protection * 
• Secure DNS * (ask hosting company) 
• Blacklisting checks * 
• Monitor your security 
• Security is a must, create budget! (its not IF, but WHEN you will get hacked) 
• Backupfallbackupfallback crisis scenario’s and documentation 
• Backoffice security, don’t let your twelve year old kid download movies on your work laptop 
• Educate the thing between chair and keyboard! Know your software platform(s) (sorry if its you) 
• Communicate with your customer about your cyber initiatives, but be very clear in how! 
* Do it yourself, approx. 400 euro a year.
What can/must we do? 
• Audit/Pentest 
• Source code check 
• Scanning pro software * 
• WAF * (Web Application Firewall) 
• Encrypt your database, encrypt credentials, if hacked it wont be worth decrypting due to time 
• Dedicated Hosting 
• HTTPS, Perfect Forward Secrecy, HSTS (HTTP Strict Transport Security) 
• MASKING * 
• Malware Analyses, day round * 
• DDOS protection * 
• Secure DNS * (ask hosting company) 
• Blacklisting checks * 
• Monitor your security 
• Security is a must, create budget! (its not IF, but WHEN you will get hacked) 
• Backupfallbackupfallback crisis scenario’s and documentation 
• Backoffice security, don’t let your twelve year old kid download movies on your work laptop 
• Educate the thing between chair and keyboard! Know your software platform(s) (sorry if its you) 
• Communicate with your customer about your cyber initiatives, but be very clear in how! 
* Do it yourself, approx. 400 euro a year.
Treat (not thread) your baby like a baby 
Create the safe environment you want your baby to growup in. 
For you, your family, your customer and your future. 
Happy Selling!
CONTACT 
Remo Hardeman 
Omerta Information Security 
remo@omerta.nl 
Visits 
Boompjes 57 
7e verdieping 
3011 XB Rotterdam 
SOCIAL MEDIA 
facebook.com/ 
omertanetherlands 
TWITTER 
https://twitter.com/ 
@omerta_infosec
CONTACT 
Remo Hardeman 
Omerta Information Security 
remo@omerta.nl 
Visits 
Boompjes 57 
7e verdieping 
3011 XB Rotterdam 
SOCIAL MEDIA 
facebook.com/ 
omertanetherlands 
TWITTER 
https://twitter.com/ 
@omerta_infosec

Más contenido relacionado

La actualidad más candente

Anonymous internet
Anonymous internetAnonymous internet
Anonymous internetVong Borey
 
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.Trend Micro
 
Dark web by Pranesh Kulkarni
Dark web by Pranesh KulkarniDark web by Pranesh Kulkarni
Dark web by Pranesh KulkarniPraneshKulkarni22
 
Intro to information security
Intro to information securityIntro to information security
Intro to information securityViraj Ekanayake
 
2017 - Cibersecurity v1.0 (English version)
2017 - Cibersecurity v1.0 (English version)2017 - Cibersecurity v1.0 (English version)
2017 - Cibersecurity v1.0 (English version)Rui Miguel Feio
 
Im260 computer hacking powerpoint
Im260  computer hacking powerpointIm260  computer hacking powerpoint
Im260 computer hacking powerpointcarlyxxjo55
 
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013Cain Ransbottyn
 
Security horrors
Security horrorsSecurity horrors
Security horrorsBoy Baukema
 
Ethical hacking for fun and profit
Ethical hacking for fun and profitEthical hacking for fun and profit
Ethical hacking for fun and profitFlorent Batard
 
The deep web
The deep webThe deep web
The deep webAGDNello
 
Random thoughts on security
Random thoughts on securityRandom thoughts on security
Random thoughts on securityB.A.
 

La actualidad más candente (18)

Anonymous internet
Anonymous internetAnonymous internet
Anonymous internet
 
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
 
Dark web by Pranesh Kulkarni
Dark web by Pranesh KulkarniDark web by Pranesh Kulkarni
Dark web by Pranesh Kulkarni
 
Seguridad de la Información y Controles contra Hackers - Getting hacked 101 ...
Seguridad de la Información y Controles contra Hackers - Getting hacked 101  ...Seguridad de la Información y Controles contra Hackers - Getting hacked 101  ...
Seguridad de la Información y Controles contra Hackers - Getting hacked 101 ...
 
Intro to information security
Intro to information securityIntro to information security
Intro to information security
 
2017 - Cibersecurity v1.0 (English version)
2017 - Cibersecurity v1.0 (English version)2017 - Cibersecurity v1.0 (English version)
2017 - Cibersecurity v1.0 (English version)
 
The Deep Web
The Deep WebThe Deep Web
The Deep Web
 
Im260 computer hacking powerpoint
Im260  computer hacking powerpointIm260  computer hacking powerpoint
Im260 computer hacking powerpoint
 
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
 
Security horrors
Security horrorsSecurity horrors
Security horrors
 
Ethical hacking for fun and profit
Ethical hacking for fun and profitEthical hacking for fun and profit
Ethical hacking for fun and profit
 
The deep web
The deep webThe deep web
The deep web
 
Darknet
DarknetDarknet
Darknet
 
Visual hacking (ec)
Visual hacking (ec)Visual hacking (ec)
Visual hacking (ec)
 
Random thoughts on security
Random thoughts on securityRandom thoughts on security
Random thoughts on security
 
Dark web
Dark webDark web
Dark web
 
Darknet (ec)
Darknet (ec) Darknet (ec)
Darknet (ec)
 
Making Secure Choices
Making Secure ChoicesMaking Secure Choices
Making Secure Choices
 

Destacado (20)

2010 08 15 abc de paraguay
2010 08 15 abc de paraguay2010 08 15 abc de paraguay
2010 08 15 abc de paraguay
 
Rakamlarla Türkiye: Orman ve Su İşleri
Rakamlarla Türkiye: Orman ve Su İşleriRakamlarla Türkiye: Orman ve Su İşleri
Rakamlarla Türkiye: Orman ve Su İşleri
 
Hadis, sunah, khobar, atsar
Hadis, sunah, khobar, atsarHadis, sunah, khobar, atsar
Hadis, sunah, khobar, atsar
 
Bygga om dialogen, nya finansieringsformer och fyra kluster
Bygga om dialogen, nya finansieringsformer och fyra klusterBygga om dialogen, nya finansieringsformer och fyra kluster
Bygga om dialogen, nya finansieringsformer och fyra kluster
 
E-maDe gemiste kans van e mailmarketing
E-maDe gemiste kans van e mailmarketingE-maDe gemiste kans van e mailmarketing
E-maDe gemiste kans van e mailmarketing
 
Mi príncipe azul
Mi príncipe azulMi príncipe azul
Mi príncipe azul
 
Rok 2015 w liczbach
Rok 2015 w liczbachRok 2015 w liczbach
Rok 2015 w liczbach
 
Ativ1 4tecnologianaescola fatimaealessandra
Ativ1 4tecnologianaescola fatimaealessandraAtiv1 4tecnologianaescola fatimaealessandra
Ativ1 4tecnologianaescola fatimaealessandra
 
Modelos atomicos
Modelos atomicosModelos atomicos
Modelos atomicos
 
Sons da Nova
Sons da NovaSons da Nova
Sons da Nova
 
Campaña solidaria
Campaña solidariaCampaña solidaria
Campaña solidaria
 
Prueva slidesher
Prueva slidesherPrueva slidesher
Prueva slidesher
 
Revista consultora
Revista consultoraRevista consultora
Revista consultora
 
Atividades de casa copy
Atividades de casa copyAtividades de casa copy
Atividades de casa copy
 
Flag ashley w
Flag ashley wFlag ashley w
Flag ashley w
 
Organigrama estuctural
Organigrama estucturalOrganigrama estuctural
Organigrama estuctural
 
Dia mundial da saúde rpc tv 17.04
Dia mundial da saúde   rpc tv 17.04Dia mundial da saúde   rpc tv 17.04
Dia mundial da saúde rpc tv 17.04
 
James serna 123
James serna 123James serna 123
James serna 123
 
I. E. SANTA ANA
I. E. SANTA ANAI. E. SANTA ANA
I. E. SANTA ANA
 
Prêmios internacionais
Prêmios internacionaisPrêmios internacionais
Prêmios internacionais
 

Similar a Dark Side Internet & Data Breaches Lead Sales Drop

Iron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyIron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyGabor Szathmari
 
Refugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityRefugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityGianluca Varisco
 
It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version Brian Pichman
 
Implementing security for your library | PLAN Tech Day Conference
Implementing security for  your library | PLAN Tech Day ConferenceImplementing security for  your library | PLAN Tech Day Conference
Implementing security for your library | PLAN Tech Day ConferenceBrian Pichman
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security PracticeBrian Pichman
 
DEF CON 23 - Weston Hecker - goodbye memory scraping malware
DEF CON 23 - Weston Hecker - goodbye memory scraping malwareDEF CON 23 - Weston Hecker - goodbye memory scraping malware
DEF CON 23 - Weston Hecker - goodbye memory scraping malwareFelipe Prado
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfMansoorAhmed57263
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptOoXair
 
Data security best practices for risk awareness and mitigation
Data security best practices for risk awareness and mitigationData security best practices for risk awareness and mitigation
Data security best practices for risk awareness and mitigationNick Chandi
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer SecurityVibrant Event
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Vibrant Event
 
Better to Ask Permission? Best Practices for Privacy and Security
Better to Ask Permission? Best Practices for Privacy and SecurityBetter to Ask Permission? Best Practices for Privacy and Security
Better to Ask Permission? Best Practices for Privacy and SecurityEric Kavanagh
 
Meeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeMeeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeNet at Work
 
Cybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaCybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaSteve Poole
 
م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...
م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...
م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...Egyptian Engineers Association
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security InnovationPriyanka Aash
 

Similar a Dark Side Internet & Data Breaches Lead Sales Drop (20)

Iron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyIron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data Responsibly
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
 
Refugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityRefugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on Security
 
It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version
 
Implementing security for your library | PLAN Tech Day Conference
Implementing security for  your library | PLAN Tech Day ConferenceImplementing security for  your library | PLAN Tech Day Conference
Implementing security for your library | PLAN Tech Day Conference
 
Cyber threat trends
Cyber threat trendsCyber threat trends
Cyber threat trends
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security Practice
 
DEF CON 23 - Weston Hecker - goodbye memory scraping malware
DEF CON 23 - Weston Hecker - goodbye memory scraping malwareDEF CON 23 - Weston Hecker - goodbye memory scraping malware
DEF CON 23 - Weston Hecker - goodbye memory scraping malware
 
Private Date and PRYING Eyes - Talking Cybersecurity at After Work Network
Private Date and PRYING Eyes - Talking Cybersecurity at After Work NetworkPrivate Date and PRYING Eyes - Talking Cybersecurity at After Work Network
Private Date and PRYING Eyes - Talking Cybersecurity at After Work Network
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
Data security best practices for risk awareness and mitigation
Data security best practices for risk awareness and mitigationData security best practices for risk awareness and mitigation
Data security best practices for risk awareness and mitigation
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer SecurityEthical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
Better to Ask Permission? Best Practices for Privacy and Security
Better to Ask Permission? Best Practices for Privacy and SecurityBetter to Ask Permission? Best Practices for Privacy and Security
Better to Ask Permission? Best Practices for Privacy and Security
 
Meeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeMeeting the Cybersecurity Challenge
Meeting the Cybersecurity Challenge
 
Cybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaCybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 Sofia
 
م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...
م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...
م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security Innovation
 

Más de Onno Hansen-Staszyński

A Minimum Viable Product definition for a socially relevant educational tech...
A Minimum Viable Product definition for a socially relevant educational  tech...A Minimum Viable Product definition for a socially relevant educational  tech...
A Minimum Viable Product definition for a socially relevant educational tech...Onno Hansen-Staszyński
 
Jak pracowac profilaktycznie z dzieckiem w wieku 13-15 lat (wydanie nr 2)
Jak pracowac profilaktycznie z dzieckiem w wieku 13-15 lat (wydanie nr 2)Jak pracowac profilaktycznie z dzieckiem w wieku 13-15 lat (wydanie nr 2)
Jak pracowac profilaktycznie z dzieckiem w wieku 13-15 lat (wydanie nr 2)Onno Hansen-Staszyński
 
Anemelo handbook background information v2
Anemelo handbook background information v2Anemelo handbook background information v2
Anemelo handbook background information v2Onno Hansen-Staszyński
 
Second training session 2018 athens programme
Second training session 2018 athens programmeSecond training session 2018 athens programme
Second training session 2018 athens programmeOnno Hansen-Staszyński
 

Más de Onno Hansen-Staszyński (20)

De lege horizon.pdf
De lege horizon.pdfDe lege horizon.pdf
De lege horizon.pdf
 
Marxisme en Oost-Europa.pdf
Marxisme en Oost-Europa.pdfMarxisme en Oost-Europa.pdf
Marxisme en Oost-Europa.pdf
 
CASE STUDY - MIL in wartime.pdf
CASE STUDY - MIL in wartime.pdfCASE STUDY - MIL in wartime.pdf
CASE STUDY - MIL in wartime.pdf
 
My point of view
My point of viewMy point of view
My point of view
 
How big food can nudge youngsters
How big food can nudge youngstersHow big food can nudge youngsters
How big food can nudge youngsters
 
A Minimum Viable Product definition for a socially relevant educational tech...
A Minimum Viable Product definition for a socially relevant educational  tech...A Minimum Viable Product definition for a socially relevant educational  tech...
A Minimum Viable Product definition for a socially relevant educational tech...
 
ANEMELO newsletter 3
ANEMELO newsletter 3ANEMELO newsletter 3
ANEMELO newsletter 3
 
Jak pracowac profilaktycznie z dzieckiem w wieku 13-15 lat (wydanie nr 2)
Jak pracowac profilaktycznie z dzieckiem w wieku 13-15 lat (wydanie nr 2)Jak pracowac profilaktycznie z dzieckiem w wieku 13-15 lat (wydanie nr 2)
Jak pracowac profilaktycznie z dzieckiem w wieku 13-15 lat (wydanie nr 2)
 
Anemelo handbook background information v2
Anemelo handbook background information v2Anemelo handbook background information v2
Anemelo handbook background information v2
 
Dear parent
Dear parentDear parent
Dear parent
 
Certificates
CertificatesCertificates
Certificates
 
Pu dialog - jak zaczynać
Pu dialog - jak zaczynaćPu dialog - jak zaczynać
Pu dialog - jak zaczynać
 
Second training session 2018 athens programme
Second training session 2018 athens programmeSecond training session 2018 athens programme
Second training session 2018 athens programme
 
Pilot questionnaire sup v2.1
Pilot questionnaire sup v2.1Pilot questionnaire sup v2.1
Pilot questionnaire sup v2.1
 
Pilot questionnaire fac v2.1
Pilot questionnaire fac v2.1Pilot questionnaire fac v2.1
Pilot questionnaire fac v2.1
 
Chat protocol nl dee v3.1
Chat protocol nl dee v3.1Chat protocol nl dee v3.1
Chat protocol nl dee v3.1
 
Pilot questionnaire par v2.1
Pilot questionnaire par v2.1Pilot questionnaire par v2.1
Pilot questionnaire par v2.1
 
Actieplan fac v4.1
Actieplan fac v4.1Actieplan fac v4.1
Actieplan fac v4.1
 
Actieplan sup v4.1
Actieplan sup v4.1Actieplan sup v4.1
Actieplan sup v4.1
 
Newsletter 2
Newsletter 2Newsletter 2
Newsletter 2
 

Último

Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Lucknow
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 

Último (20)

Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 

Dark Side Internet & Data Breaches Lead Sales Drop

  • 1.
  • 2. Whats up for today? Some chitchat about your baby…
  • 3. The dark side of the internet • Phishing • Social engineering • Hacking (vulnerabilities & misconfigurations) • Injection (iFRAME) • DDOS • DNS hijacking • Cookie hijacking/stealing • MITM (Man In The Middle) • Xss and SQL injection • 3rd Parties
  • 4. Serious cases • 13 October 2014 1 million dutch e-mail accounts compromised. • 5600 Dutch websites hacked (SQL injection) • Target hack, costs 40 million $, Home depot 60 Miljon $ ( total costs in revenue and security measures) • In two years 2 Billion account credentials breached ( including CC and person credentials)
  • 5. Data Breaches Leads to Drop in Sales • Target Earnings Slide 46% After Data Breach • One third of consumers will shop elsewhere if their retailer of choice is breached, according to new research • Downtime and massive costs after data breach or malware infection.
  • 6. What can/must we do? • Audit/Pentest • Source code check • Scanning pro software * • WAF * (Web Application Firewall) • Encrypt your database, encrypt credentials, if hacked it wont be worth decrypting due to time • Dedicated Hosting • HTTPS, Perfect Forward Secrecy, HSTS (HTTP Strict Transport Security) • MASKING * • Malware Analyses, day round * • DDOS protection * • Secure DNS * (ask hosting company) • Blacklisting checks * • Monitor your security • Security is a must, create budget! (its not IF, but WHEN you will get hacked) • Backupfallbackupfallback crisis scenario’s and documentation • Backoffice security, don’t let your twelve year old kid download movies on your work laptop • Educate the thing between chair and keyboard! Know your software platform(s) (sorry if its you) • Communicate with your customer about your cyber initiatives, but be very clear in how! * Do it yourself, approx. 400 euro a year.
  • 7. What can/must we do? • Audit/Pentest • Source code check • Scanning pro software * • WAF * (Web Application Firewall) • Encrypt your database, encrypt credentials, if hacked it wont be worth decrypting due to time • Dedicated Hosting • HTTPS, Perfect Forward Secrecy, HSTS (HTTP Strict Transport Security) • MASKING * • Malware Analyses, day round * • DDOS protection * • Secure DNS * (ask hosting company) • Blacklisting checks * • Monitor your security • Security is a must, create budget! (its not IF, but WHEN you will get hacked) • Backupfallbackupfallback crisis scenario’s and documentation • Backoffice security, don’t let your twelve year old kid download movies on your work laptop • Educate the thing between chair and keyboard! Know your software platform(s) (sorry if its you) • Communicate with your customer about your cyber initiatives, but be very clear in how! * Do it yourself, approx. 400 euro a year.
  • 8. Treat (not thread) your baby like a baby Create the safe environment you want your baby to growup in. For you, your family, your customer and your future. Happy Selling!
  • 9. CONTACT Remo Hardeman Omerta Information Security remo@omerta.nl Visits Boompjes 57 7e verdieping 3011 XB Rotterdam SOCIAL MEDIA facebook.com/ omertanetherlands TWITTER https://twitter.com/ @omerta_infosec
  • 10. CONTACT Remo Hardeman Omerta Information Security remo@omerta.nl Visits Boompjes 57 7e verdieping 3011 XB Rotterdam SOCIAL MEDIA facebook.com/ omertanetherlands TWITTER https://twitter.com/ @omerta_infosec