security for small business
Post on 21-Jan-2015
281 Views
Preview:
DESCRIPTION
TRANSCRIPT
Protecting the irreplaceable | f-secure.com
Protecting the irreplaceable | f-secure.com
Threat Eye-Opener
Bryan Ford – Head of Operator Sales
August 15th, 2012
| © August 15, 2012, F-Secure Corporation
Agenda• Definition of Terms
• History of Malware
• Recent Attacks – Stuxnet & Ghost Click
• Online Safety Tips
• Mobile Threats
• Frontier Secure
• Q&A
| © August 15, 2012, F-Secure Corporation
Industry Terms• Malware - Software that is intended to damage or disable computers and
computer systems
• Botnets - A botnet is a collection of internet-connected computers whose security defenses have been breached and control ceded to an unknown party
• SSL - (Secure Sockets Layer) is the standard security technology for establishing an encrypted link between a web server and a browser
| © August 15, 2012, F-Secure Corporation
We used to be fighting these...
• Chen-Ing HauAuthor of the CIH virus
Joseph McElroyHacked the Fermi lab network
BennyEx-29A
| © August 15, 2012, F-Secure Corporation
Case Tariq al-Daour
| © August 15, 2012, F-Secure Corporation
Malware Trends
| © August 15, 2012, F-Secure Corporation
Malware Trends
• Numbers continue to rise exponentially
Number of malware
| © August 15, 2012, F-Secure Corporation
Malware Trends
| © August 15, 2012, F-Secure Corporation
• Malware writing is becoming more professional
Malware Trends
| © August 15, 2012, F-Secure Corporation
• Malware writing is becoming more professional
• Previously undiscovered vulnerabilities are worth a lot on the black market
Malware Trends
| © August 15, 2012, F-Secure Corporation
• Previously undiscovered vulnerabilities are worth a lot on the black market
Malware Trends
| © August 15, 2012, F-Secure Corporation
Malware Trends
Q: How expensive would such vulnerabilities be?
| © August 15, 2012, F-Secure Corporation
Malware Trends
A: A single form of malware in a popular version of Windows could go for anything between $50,000 to $500,000.
| © August 15, 2012, F-Secure Corporation
Malware Trends
• The aims are simple and depend on the group involved:
• Money from spam, scams and fakes
• Hacktivism to increase public exposure of an issue
| © August 15, 2012, F-Secure Corporation
Malware Trends
• The aims are simple and depend on the group involved:
• Money from spam, scams and fakes
• Hacktivism to increase public exposure of an issue
| © August 15, 2012, F-Secure Corporation
Malware Trends
• Money from spam, scams and fakes
• Hacktivism to increase public exposure of an issue
| © August 15, 2012, F-Secure Corporation
Malware Trends
• Hacktivism to increase public exposure of an issue
| © August 15, 2012, F-Secure Corporation
Malware Trends
| © August 15, 2012, F-Secure Corporation
| © August 15, 2012, F-Secure Corporation
| © August 15, 2012, F-Secure Corporation
Malware trends
| © August 15, 2012, F-Secure Corporation
Malware trends
Case:
| © August 15, 2012, F-Secure Corporation
Malware trends
Case:Stuxnet
| © August 15, 2012, F-Secure Corporation
Malware trends
Case:Stuxnet
More information:
| © August 15, 2012, F-Secure Corporation
Malware trends
Case:Stuxnet
More information:http://www.f-secure.com/weblog/archives/00002066.html
| © August 15, 2012, F-Secure Corporation
Malware trends
Case:Stuxnet
More information:http://www.f-secure.com/weblog/archives/00002066.html
| © August 15, 2012, F-Secure Corporation
Malware trends
Case:”Ghost Click”
More information:http://www.f-secure.com/weblog/archives/00002268.html
| © August 15, 2012, F-Secure Corporation
Malware trends
Case:”Ghost Click”
More information:http://www.f-secure.com/weblog/archives/00002268.html
| © August 15, 2012, F-Secure Corporation
Safer online banking
| © August 15, 2012, F-Secure Corporation
Safer online banking
| © August 15, 2012, F-Secure Corporation
Safer online banking
• Banks provide safety instuctions• No pop-ups• PIN only asked once
• https:// address (Hypertext Transfer Protocol over Secure Socket Layer)• always when banking and dealing with credit card number in an online
store
• Paying with credit card or online payment service provider (PayPal) is safer
| © August 15, 2012, F-Secure Corporation
Safer online banking
• Banks provide safety instuctions• No pop-ups• PIN only asked once
• https:// address (Hypertext Transfer Protocol over Secure Socket Layer)• always when banking and dealing with credit card number in an online
store
• Paying with credit card or online payment service provider (PayPal) is safer
| © August 15, 2012, F-Secure Corporation
Safer online banking
• Banks provide safety instuctions• No pop-ups• PIN only asked once
• https:// address (Hypertext Transfer Protocol over Secure Socket Layer)• always when banking and dealing with credit card number in an online
store
• Paying with credit card or online payment service provider (PayPal) is safer
| © August 15, 2012, F-Secure Corporation
Safer social networking
| © August 15, 2012, F-Secure Corporation
Safer social networking
| © August 15, 2012, F-Secure Corporation
Safer social networking
• Danger of revealing too much• Caution with personal details• Pictures stay on the Internet forever
• Privacy?• Privacy settings• Strong passwords• Identity theft, spam, targeted attacks
• Maintaining a good reputation
| © August 15, 2012, F-Secure Corporation
Safer social networking
• Danger of revealing too much• Caution with personal details• Pictures stay on the Internet forever
• Privacy?• Privacy settings• Strong passwords• Identity theft, spam, targeted attacks
• Maintaining a good reputation
| © August 15, 2012, F-Secure Corporation
Safer social networking
• Danger of revealing too much• Caution with personal details• Pictures stay on the Internet forever
• Privacy?• Privacy settings• Strong passwords• Identity theft, spam, targeted attacks
• Maintaining a good reputation
| © August 15, 2012, F-Secure Corporation
Safer social networking
• Danger of revealing too much• Caution with personal details• Pictures stay on the Internet forever
• Privacy?• Privacy settings• Strong passwords• Identity theft, spam, targeted attacks
• Maintaining a good reputation
| © August 15, 2012, F-Secure Corporation
Well-being in a mobile world
| © August 15, 2012, F-Secure Corporation
Well-being in a mobile world• Lots of information on your mobile
• Crime against Android multiplying
• Malware via Bluetooth and web download
• Spy-tools
• Recording
• Monitoring calls, SMS, multimedia, email
• Locating phone via GPS
| © August 15, 2012, F-Secure Corporation
Well-being in a mobile world• Lots of information on your mobile
• Crime against Android multiplying
• Malware via Bluetooth and web download
• Spy-tools
• Recording
• Monitoring calls, SMS, multimedia, email
• Locating phone via GPS
| © August 15, 2012, F-Secure Corporation
Well-being in a mobile world• Lots of information on your mobile
• Crime against Android multiplying
• Malware via Bluetooth and web download
• Spy-tools
• Recording
• Monitoring calls, SMS, multimedia, email
• Locating phone via GPS
| © August 15, 2012, F-Secure Corporation
Well-being in a mobile world• Lots of information on your mobile
• Crime against Android multiplying
• Malware via Bluetooth and web download
• Spy-tools
• Recording
• Monitoring calls, SMS, multimedia, email
• Locating phone via GPS
| © August 15, 2012, F-Secure Corporation
Well-being in a mobile world• Lots of information on your mobile
• Crime against Android multiplying
• Malware via Bluetooth and web download
• Spy-tools
• Recording
• Monitoring calls, SMS, multimedia, email
• Locating phone via GPS
| © August 15, 2012, F-Secure Corporation
Frontier Secure – Max Security
• Single Integrated product :
• Antivirus Protection
• Anti Spyware
• Personal Firewall
• Browsing Protection
• Spam Filtering
• Automatic Updates
• Live 24/7 Support
• PC & Mac Support
| © August 15, 2012, F-Secure Corporation
Q&A
www.frontier.com/security
A MORE DEDICATED CONNECTION
Brought to you by:
Thank YouCall: 1-866-408-0233
top related