The New Data Security Risk

Post on 25-Jun-2015

337 views 0 download

Tags:

transcript

The NewSecurity Threat

Your Computers at Risk

Presented by Placer Computers

How cyber-criminals are winning the Malware wars

PC Magazine:

A Zero-Day Attack is a virus or other malware exploit that takes advantage of a hole in a program or operating system before the software developer has made a fix available...”

Zero Day Attacks

Cyber-criminals create over 60,000 new Malware attacks EVERY DAY!

Antivirus/Antispyware software can’t protect against these new threats until AFTER they strike.

Once the malware gets in, it seeks and attacks program vulnerabilities

Am I At Risk?

Improved Microsoft security updates make 3rd party software attacks more attractive

3rd party software less likely to be regularly updated by PC owner

Cyber-criminals know this so they seek the easiest targets

How Did This Happen?

Average PC has 24-26 non-Microsoft (3rd party) apps

Gregg Keiser, Computer World July 2010:

“While vulnerabilities in Windows XP and Vista will climb by 31% and 34% respectively this year compared to 2009, bugs in 3rd party apps will jump by 92%”

Is There a Trend?

California Civil Code 1798.81.5A business… shall implement and maintain reasonable security procedures and practices appropriate… to protect the personal information from unauthorized access… or disclosure.

California Financial Code 4057An entity that negligently discloses or shares nonpublic personal information… shall be liable, irrespective of the amount of damages suffered… for a civil penalty not to exceed $2,500 per violation. ($500,000 max)

How Will It Effect Me?

There is a solution

Placer Computers

Placer Computers

Security Management

KEEPING YOUR SOFTWARE UP TO DATE

Placer Computers

SO WHAT CAN

PLACER COMPUTERSDO FOR YOU?

Placer Computers

STEP 1:

Security Scan

Identify software vulnerabilities

www.PlacerComputers.com

Placer Computers

STEP 2:

Locate Missing Updates

Microsoft critical/optional patches3rd Party program updates/patches

www.PlacerComputers.com

Placer Computers

STEP 3:

Identify End-of-Life Software

Programs no longer supported are risky!

www.PlacerComputers.com

Placer Computers

STEP 4:

Download, install security updates

Ensures that all software is up-to-date

www.PlacerComputers.com

Placer Computers

STEP 5:

Find replacements for EOL programs

Many free options are available. We willresearch and provide recommendations

www.PlacerComputers.com

Placer Computers

STEP 6:

Scan and repair privacy leaks

Most programs leave a trail of personal data

www.PlacerComputers.com

Placer Computers

STEP 7:

Spyware Scan

Catch any malware that gotpast your Antivirus software

www.PlacerComputers.com

Placer Computers

STEP 8:

System Cleanup and Optimization

Clean your computer in/outOptimize your PC to run better

www.PlacerComputers.com

Placer Computers

BOOK NOW AND SAVE:

50% off

530-388-8811www.PlacerComputers.com