With all the hacks happening this year we feel this is an important topic for all internet marketing consultants to understand…
In this presentation you’ll get a brief overview of the various internet-based threats that individuals and businesses face everyday. Learn why you are a target, why security is important, how to identify potential attacks, and how to stop them. Decrease your risk of being attacked by using simple techniques and free services.
- Blake Mitchell Internet Security Expert
- E-MAIL B.Mitchell@NetworkTestLabs.com
- ADDRESS: Network Test Labs 170 – 422 Richards Street Vancouver, BC
Hackers can EASILY gain access to your system
- What is NTL?
- NTL =Network Test Labs
- Hackers and other threats
- How hacker’s can EASILY gain access and take control of your system within minutes.
- Why would someone target you?
- How hacker’s use your information?
- How can you protect your business from hackers?
Top 8 Security Services
- Penetration Testing
- Policy Creation
- Security Threat and Risk Assessment (STRA)
- Enterprise Security Architecture
- Payment Card Industry (PCI) Compliance
- Cyber Security Assessment
- Advanced Persistent Threat (APT) Detection and Remediation
What is a Hacker?
A person who uses computers to gain unauthorized access to data.
What Motivates a Hacker?
- Money – Hacking is a very profitable business
- Personal Beliefs
Why would someone target me?
- Most of the time it’s random and the way of least resistance
Why is this important?
- What is your company’s crown jewels?
- Client’s list, intellectual property, banking information
- You can be fined if a hacker gains access to your customer’s private information
- Is your computer important?
- Family photos
- Nude selfies
- They can collect personal and private information about you like where you work.
Evgeniy Mikhailovich Bogachev – Stole over $100,000,000
What you should know
- Macs can be hacked now too. Nobody is safe
- More malware created in 1 sec than what used to take many years
- Malware can mutate to avoid detection
- A hacker can get into your computer in a matter of minutes
- Staff susceptible to phishing e-mails
- Email attachments disguised as an email from a reputable company that is actually malware to gain access to your system
- Advanced persistent targeted attacks
- Theft of intellectual property
How To Protect Your Business From Hackers
“An ounce of prevention is worth a pound of cure.” Benjamin Franklin
- Always use an antivirus software. Paid is always better than free.
- Enable high-level security such as implementing a Firewall
- Always update your computer’s security patches and apply updates regularly
- Have a public e-mail address for business and a private e-mail address for personal
- Never use an easy password
- Use numbers symbols and letters lowercase and uppercase eg. (gT@(5&uz.”D)
Edward Snowden On Passwords
- Hackers use vulnerabilities in software and your operating systems to gain access to your computer. Make sure everything is always updated.
- Encrypt files with www.prot-on.com
- Encrypt important files – Protect your data
- Control access to your data stored on your computer
- Never use an open router – use cell data before using services like Shaw Open
- Whitelist your devices on your home router – Enable MAC (Media Access Control) address filtering
- Disable wireless broadcasting
- Enable “Guest” mode
- Only WPA-2 access
- Disable WPS services
- Enable 2 factor authentication – Google, Dropbox, OneDrive
- They send a text to your cellphone in combination with your password to gain access
- Check to see if your personal information like credit cards and passwords are posted online
Be aware of the Dark Web
- Buy and sell anything illegal.
- Fake credit cards
- Murder for hire
- You name it, it’s on there.
Dark leaks – Site used to sell government secrets
What is a phishing e-mail?
Emails that are disguised to look like it’s from a reputable company but has links or attachments to malware that help a hacker gain access to your system
Trend Micro found that a whopping 91% of cyber attacks resulting data breach begin with a “spear phishing” e-mail…
Get Gmail. They do a good job at filtering most of these emails out of your inbox.
- I don’t recognize the sender’s email address as someone I ordinarily communicate with.
- This email is from someone outside my organization and it’s not related to my job responsibilities.
- This email was sent from someone inside the organization or from a customer, vendor, or partner and is very unusual or out of character.
- Is the sender’s email address from a suspicious domain? (like micorsoft-support.om)
- I don’t know the sender personally and they were not vouched by someone I trust.
- I don’t have a business relationship nor any past communications with the sender.
- This is an unexpected or unusual email with an embedded hyperlink or an attachment from someone I hadn’t communicated with recently
- I was cc’d on an email sent to one or more people, but I don’t personally know the other people it was sent to.
- I received an email that was also sent to an unusual mix of people.
- For instance a seemingly random group of people at your organization whose last names start with the same letter, or a whole list of unrelated addresses
- Did I receive an email that I normally would get during regular business hours, but it was sent at an unusual time like 3 a.m.?
- Did I get an email with a subject line that is irrelevant or does not match the content?
- Is the email message a reply to something I never sent or request?
- I hover my mouse over a hyperlink that’s displayed in the email message, but the link to address is for a different web site. (This is a big red flag.)
- I received an email that only has long hyperlinks with no further information and the rest of the email is completely blank.
- I received an email with a hyperlink that is a misspelling of a known web site. For instance, www.bankofarnerica.com – the“m”is really two characters –“r & n”)
- The sender included an email attachment that I was not expecting or that makes no sense in relation to the email message.
- (This sender doesn’t ordinarily send me these types of attachments.
- I see an attachment with a possibly dangerous file type. The only file type that is always safe to click on is a .TXT file.
- Is the sender asking me to click on a link or open an attachment to avoid a negative consequence, or to gain something of value?
- Is the email out of the ordinary, or does it have bad grammar or spelling errors?
- Is the sender asking me to click a link or open up an attachment that seems odd or illogical?
- Do I have an uncomfortable gut feeling about the sender’s request to open an attachment or click a link?
- Is the email asking me to look at a compromising or embarrassing picture of myself or someone I know?