security for small business
DESCRIPTION
A presentation on security for small businesses presented by F-Secure.TRANSCRIPT
![Page 1: Security for Small Business](https://reader033.vdocuments.net/reader033/viewer/2022061222/54bf8e6a4a79598b498b46b8/html5/thumbnails/1.jpg)
Protecting the irreplaceable | f-secure.com
![Page 2: Security for Small Business](https://reader033.vdocuments.net/reader033/viewer/2022061222/54bf8e6a4a79598b498b46b8/html5/thumbnails/2.jpg)
Protecting the irreplaceable | f-secure.com
Threat Eye-Opener
Bryan Ford – Head of Operator Sales
August 15th, 2012
![Page 3: Security for Small Business](https://reader033.vdocuments.net/reader033/viewer/2022061222/54bf8e6a4a79598b498b46b8/html5/thumbnails/3.jpg)
| © August 15, 2012, F-Secure Corporation
Agenda• Definition of Terms
• History of Malware
• Recent Attacks – Stuxnet & Ghost Click
• Online Safety Tips
• Mobile Threats
• Frontier Secure
• Q&A
![Page 4: Security for Small Business](https://reader033.vdocuments.net/reader033/viewer/2022061222/54bf8e6a4a79598b498b46b8/html5/thumbnails/4.jpg)
| © August 15, 2012, F-Secure Corporation
Industry Terms• Malware - Software that is intended to damage or disable computers and
computer systems
• Botnets - A botnet is a collection of internet-connected computers whose security defenses have been breached and control ceded to an unknown party
• SSL - (Secure Sockets Layer) is the standard security technology for establishing an encrypted link between a web server and a browser
![Page 5: Security for Small Business](https://reader033.vdocuments.net/reader033/viewer/2022061222/54bf8e6a4a79598b498b46b8/html5/thumbnails/5.jpg)
| © August 15, 2012, F-Secure Corporation
We used to be fighting these...
• Chen-Ing HauAuthor of the CIH virus
Joseph McElroyHacked the Fermi lab network
BennyEx-29A
![Page 6: Security for Small Business](https://reader033.vdocuments.net/reader033/viewer/2022061222/54bf8e6a4a79598b498b46b8/html5/thumbnails/6.jpg)
| © August 15, 2012, F-Secure Corporation
Case Tariq al-Daour
![Page 7: Security for Small Business](https://reader033.vdocuments.net/reader033/viewer/2022061222/54bf8e6a4a79598b498b46b8/html5/thumbnails/7.jpg)
| © August 15, 2012, F-Secure Corporation
Malware Trends
![Page 8: Security for Small Business](https://reader033.vdocuments.net/reader033/viewer/2022061222/54bf8e6a4a79598b498b46b8/html5/thumbnails/8.jpg)
| © August 15, 2012, F-Secure Corporation
Malware Trends
• Numbers continue to rise exponentially
Number of malware
![Page 9: Security for Small Business](https://reader033.vdocuments.net/reader033/viewer/2022061222/54bf8e6a4a79598b498b46b8/html5/thumbnails/9.jpg)
| © August 15, 2012, F-Secure Corporation
Malware Trends
![Page 10: Security for Small Business](https://reader033.vdocuments.net/reader033/viewer/2022061222/54bf8e6a4a79598b498b46b8/html5/thumbnails/10.jpg)
| © August 15, 2012, F-Secure Corporation
• Malware writing is becoming more professional
Malware Trends
![Page 11: Security for Small Business](https://reader033.vdocuments.net/reader033/viewer/2022061222/54bf8e6a4a79598b498b46b8/html5/thumbnails/11.jpg)
| © August 15, 2012, F-Secure Corporation
• Malware writing is becoming more professional
• Previously undiscovered vulnerabilities are worth a lot on the black market
Malware Trends
![Page 12: Security for Small Business](https://reader033.vdocuments.net/reader033/viewer/2022061222/54bf8e6a4a79598b498b46b8/html5/thumbnails/12.jpg)
| © August 15, 2012, F-Secure Corporation
• Previously undiscovered vulnerabilities are worth a lot on the black market
Malware Trends
![Page 13: Security for Small Business](https://reader033.vdocuments.net/reader033/viewer/2022061222/54bf8e6a4a79598b498b46b8/html5/thumbnails/13.jpg)
| © August 15, 2012, F-Secure Corporation
Malware Trends
Q: How expensive would such vulnerabilities be?
![Page 14: Security for Small Business](https://reader033.vdocuments.net/reader033/viewer/2022061222/54bf8e6a4a79598b498b46b8/html5/thumbnails/14.jpg)
| © August 15, 2012, F-Secure Corporation
Malware Trends
A: A single form of malware in a popular version of Windows could go for anything between $50,000 to $500,000.
![Page 15: Security for Small Business](https://reader033.vdocuments.net/reader033/viewer/2022061222/54bf8e6a4a79598b498b46b8/html5/thumbnails/15.jpg)
| © August 15, 2012, F-Secure Corporation
Malware Trends
• The aims are simple and depend on the group involved:
• Money from spam, scams and fakes
• Hacktivism to increase public exposure of an issue
![Page 16: Security for Small Business](https://reader033.vdocuments.net/reader033/viewer/2022061222/54bf8e6a4a79598b498b46b8/html5/thumbnails/16.jpg)
| © August 15, 2012, F-Secure Corporation
Malware Trends
• The aims are simple and depend on the group involved:
• Money from spam, scams and fakes
• Hacktivism to increase public exposure of an issue
![Page 17: Security for Small Business](https://reader033.vdocuments.net/reader033/viewer/2022061222/54bf8e6a4a79598b498b46b8/html5/thumbnails/17.jpg)
| © August 15, 2012, F-Secure Corporation
Malware Trends
• Money from spam, scams and fakes
• Hacktivism to increase public exposure of an issue
![Page 18: Security for Small Business](https://reader033.vdocuments.net/reader033/viewer/2022061222/54bf8e6a4a79598b498b46b8/html5/thumbnails/18.jpg)
| © August 15, 2012, F-Secure Corporation
Malware Trends
• Hacktivism to increase public exposure of an issue
![Page 19: Security for Small Business](https://reader033.vdocuments.net/reader033/viewer/2022061222/54bf8e6a4a79598b498b46b8/html5/thumbnails/19.jpg)
| © August 15, 2012, F-Secure Corporation
Malware Trends
![Page 20: Security for Small Business](https://reader033.vdocuments.net/reader033/viewer/2022061222/54bf8e6a4a79598b498b46b8/html5/thumbnails/20.jpg)
| © August 15, 2012, F-Secure Corporation
![Page 21: Security for Small Business](https://reader033.vdocuments.net/reader033/viewer/2022061222/54bf8e6a4a79598b498b46b8/html5/thumbnails/21.jpg)
| © August 15, 2012, F-Secure Corporation
![Page 22: Security for Small Business](https://reader033.vdocuments.net/reader033/viewer/2022061222/54bf8e6a4a79598b498b46b8/html5/thumbnails/22.jpg)
| © August 15, 2012, F-Secure Corporation
Malware trends
![Page 23: Security for Small Business](https://reader033.vdocuments.net/reader033/viewer/2022061222/54bf8e6a4a79598b498b46b8/html5/thumbnails/23.jpg)
| © August 15, 2012, F-Secure Corporation
Malware trends
Case:
![Page 24: Security for Small Business](https://reader033.vdocuments.net/reader033/viewer/2022061222/54bf8e6a4a79598b498b46b8/html5/thumbnails/24.jpg)
| © August 15, 2012, F-Secure Corporation
Malware trends
Case:Stuxnet
![Page 25: Security for Small Business](https://reader033.vdocuments.net/reader033/viewer/2022061222/54bf8e6a4a79598b498b46b8/html5/thumbnails/25.jpg)
| © August 15, 2012, F-Secure Corporation
Malware trends
Case:Stuxnet
More information:
![Page 26: Security for Small Business](https://reader033.vdocuments.net/reader033/viewer/2022061222/54bf8e6a4a79598b498b46b8/html5/thumbnails/26.jpg)
| © August 15, 2012, F-Secure Corporation
Malware trends
Case:Stuxnet
More information:http://www.f-secure.com/weblog/archives/00002066.html
![Page 27: Security for Small Business](https://reader033.vdocuments.net/reader033/viewer/2022061222/54bf8e6a4a79598b498b46b8/html5/thumbnails/27.jpg)
| © August 15, 2012, F-Secure Corporation
Malware trends
Case:Stuxnet
More information:http://www.f-secure.com/weblog/archives/00002066.html
![Page 28: Security for Small Business](https://reader033.vdocuments.net/reader033/viewer/2022061222/54bf8e6a4a79598b498b46b8/html5/thumbnails/28.jpg)
| © August 15, 2012, F-Secure Corporation
Malware trends
Case:”Ghost Click”
More information:http://www.f-secure.com/weblog/archives/00002268.html
![Page 29: Security for Small Business](https://reader033.vdocuments.net/reader033/viewer/2022061222/54bf8e6a4a79598b498b46b8/html5/thumbnails/29.jpg)
| © August 15, 2012, F-Secure Corporation
Malware trends
Case:”Ghost Click”
More information:http://www.f-secure.com/weblog/archives/00002268.html
![Page 30: Security for Small Business](https://reader033.vdocuments.net/reader033/viewer/2022061222/54bf8e6a4a79598b498b46b8/html5/thumbnails/30.jpg)
| © August 15, 2012, F-Secure Corporation
Safer online banking
![Page 31: Security for Small Business](https://reader033.vdocuments.net/reader033/viewer/2022061222/54bf8e6a4a79598b498b46b8/html5/thumbnails/31.jpg)
| © August 15, 2012, F-Secure Corporation
Safer online banking
![Page 32: Security for Small Business](https://reader033.vdocuments.net/reader033/viewer/2022061222/54bf8e6a4a79598b498b46b8/html5/thumbnails/32.jpg)
| © August 15, 2012, F-Secure Corporation
Safer online banking
• Banks provide safety instuctions• No pop-ups• PIN only asked once
• https:// address (Hypertext Transfer Protocol over Secure Socket Layer)• always when banking and dealing with credit card number in an online
store
• Paying with credit card or online payment service provider (PayPal) is safer
![Page 33: Security for Small Business](https://reader033.vdocuments.net/reader033/viewer/2022061222/54bf8e6a4a79598b498b46b8/html5/thumbnails/33.jpg)
| © August 15, 2012, F-Secure Corporation
Safer online banking
• Banks provide safety instuctions• No pop-ups• PIN only asked once
• https:// address (Hypertext Transfer Protocol over Secure Socket Layer)• always when banking and dealing with credit card number in an online
store
• Paying with credit card or online payment service provider (PayPal) is safer
![Page 34: Security for Small Business](https://reader033.vdocuments.net/reader033/viewer/2022061222/54bf8e6a4a79598b498b46b8/html5/thumbnails/34.jpg)
| © August 15, 2012, F-Secure Corporation
Safer online banking
• Banks provide safety instuctions• No pop-ups• PIN only asked once
• https:// address (Hypertext Transfer Protocol over Secure Socket Layer)• always when banking and dealing with credit card number in an online
store
• Paying with credit card or online payment service provider (PayPal) is safer
![Page 35: Security for Small Business](https://reader033.vdocuments.net/reader033/viewer/2022061222/54bf8e6a4a79598b498b46b8/html5/thumbnails/35.jpg)
| © August 15, 2012, F-Secure Corporation
Safer social networking
![Page 36: Security for Small Business](https://reader033.vdocuments.net/reader033/viewer/2022061222/54bf8e6a4a79598b498b46b8/html5/thumbnails/36.jpg)
| © August 15, 2012, F-Secure Corporation
Safer social networking
![Page 37: Security for Small Business](https://reader033.vdocuments.net/reader033/viewer/2022061222/54bf8e6a4a79598b498b46b8/html5/thumbnails/37.jpg)
| © August 15, 2012, F-Secure Corporation
Safer social networking
• Danger of revealing too much• Caution with personal details• Pictures stay on the Internet forever
• Privacy?• Privacy settings• Strong passwords• Identity theft, spam, targeted attacks
• Maintaining a good reputation
![Page 38: Security for Small Business](https://reader033.vdocuments.net/reader033/viewer/2022061222/54bf8e6a4a79598b498b46b8/html5/thumbnails/38.jpg)
| © August 15, 2012, F-Secure Corporation
Safer social networking
• Danger of revealing too much• Caution with personal details• Pictures stay on the Internet forever
• Privacy?• Privacy settings• Strong passwords• Identity theft, spam, targeted attacks
• Maintaining a good reputation
![Page 39: Security for Small Business](https://reader033.vdocuments.net/reader033/viewer/2022061222/54bf8e6a4a79598b498b46b8/html5/thumbnails/39.jpg)
| © August 15, 2012, F-Secure Corporation
Safer social networking
• Danger of revealing too much• Caution with personal details• Pictures stay on the Internet forever
• Privacy?• Privacy settings• Strong passwords• Identity theft, spam, targeted attacks
• Maintaining a good reputation
![Page 40: Security for Small Business](https://reader033.vdocuments.net/reader033/viewer/2022061222/54bf8e6a4a79598b498b46b8/html5/thumbnails/40.jpg)
| © August 15, 2012, F-Secure Corporation
Safer social networking
• Danger of revealing too much• Caution with personal details• Pictures stay on the Internet forever
• Privacy?• Privacy settings• Strong passwords• Identity theft, spam, targeted attacks
• Maintaining a good reputation
![Page 41: Security for Small Business](https://reader033.vdocuments.net/reader033/viewer/2022061222/54bf8e6a4a79598b498b46b8/html5/thumbnails/41.jpg)
| © August 15, 2012, F-Secure Corporation
Well-being in a mobile world
![Page 42: Security for Small Business](https://reader033.vdocuments.net/reader033/viewer/2022061222/54bf8e6a4a79598b498b46b8/html5/thumbnails/42.jpg)
| © August 15, 2012, F-Secure Corporation
Well-being in a mobile world• Lots of information on your mobile
• Crime against Android multiplying
• Malware via Bluetooth and web download
• Spy-tools
• Recording
• Monitoring calls, SMS, multimedia, email
• Locating phone via GPS
![Page 43: Security for Small Business](https://reader033.vdocuments.net/reader033/viewer/2022061222/54bf8e6a4a79598b498b46b8/html5/thumbnails/43.jpg)
| © August 15, 2012, F-Secure Corporation
Well-being in a mobile world• Lots of information on your mobile
• Crime against Android multiplying
• Malware via Bluetooth and web download
• Spy-tools
• Recording
• Monitoring calls, SMS, multimedia, email
• Locating phone via GPS
![Page 44: Security for Small Business](https://reader033.vdocuments.net/reader033/viewer/2022061222/54bf8e6a4a79598b498b46b8/html5/thumbnails/44.jpg)
| © August 15, 2012, F-Secure Corporation
Well-being in a mobile world• Lots of information on your mobile
• Crime against Android multiplying
• Malware via Bluetooth and web download
• Spy-tools
• Recording
• Monitoring calls, SMS, multimedia, email
• Locating phone via GPS
![Page 45: Security for Small Business](https://reader033.vdocuments.net/reader033/viewer/2022061222/54bf8e6a4a79598b498b46b8/html5/thumbnails/45.jpg)
| © August 15, 2012, F-Secure Corporation
Well-being in a mobile world• Lots of information on your mobile
• Crime against Android multiplying
• Malware via Bluetooth and web download
• Spy-tools
• Recording
• Monitoring calls, SMS, multimedia, email
• Locating phone via GPS
![Page 46: Security for Small Business](https://reader033.vdocuments.net/reader033/viewer/2022061222/54bf8e6a4a79598b498b46b8/html5/thumbnails/46.jpg)
| © August 15, 2012, F-Secure Corporation
Well-being in a mobile world• Lots of information on your mobile
• Crime against Android multiplying
• Malware via Bluetooth and web download
• Spy-tools
• Recording
• Monitoring calls, SMS, multimedia, email
• Locating phone via GPS
![Page 47: Security for Small Business](https://reader033.vdocuments.net/reader033/viewer/2022061222/54bf8e6a4a79598b498b46b8/html5/thumbnails/47.jpg)
| © August 15, 2012, F-Secure Corporation
Frontier Secure – Max Security
• Single Integrated product :
• Antivirus Protection
• Anti Spyware
• Personal Firewall
• Browsing Protection
• Spam Filtering
• Automatic Updates
• Live 24/7 Support
• PC & Mac Support
![Page 48: Security for Small Business](https://reader033.vdocuments.net/reader033/viewer/2022061222/54bf8e6a4a79598b498b46b8/html5/thumbnails/48.jpg)
| © August 15, 2012, F-Secure Corporation
Q&A
www.frontier.com/security
![Page 49: Security for Small Business](https://reader033.vdocuments.net/reader033/viewer/2022061222/54bf8e6a4a79598b498b46b8/html5/thumbnails/49.jpg)
A MORE DEDICATED CONNECTION
Brought to you by:
Thank YouCall: 1-866-408-0233