Date post: | 09-May-2015 |
Category: |
Technology |
Upload: | velocity-network-solutions |
View: | 686 times |
Download: | 1 times |
Top 5 Security Threats Facing Businesses TodayKey Considerations in Protecting Your Data and Your Future
Network Security Series Part 1 of 2
How to Interact TodayType your questions and comments here throughout the webinar. We will answer them periodically or at the end.
or…
Email your questions to [email protected] and we will reply to you by the end of the day.
Dustin HallSales/Marketing Manager
Meet Your Presenters
Stephen NelmsSenior IT Consultant
Who is this webinar for?
Business Owners Executives Office
Administrators Business Managers IT Staff Members
The Key Takeaways
The 5 major security threats facing your business
today
How these threats work
Tips to protecting your network• More on Network Security Components in Part 2 of the Series
Today’s attendees will receive…
Network Assessment + Risk Reportby Velocity Network Solutions
The 5 threats we’ll cover…
Malware
Torrents (peer-to-peer networks)
Snowshoe Spamming
Hacking-as-a-Service
Mobile Threats
Malware
Torrents (peer-to-peer networks)
Snowshoe Spamming
Hacking-as-a-Service
Mobile Threats
Malware
malicious software used to gather sensitive data, infiltrate private networks or harm general operations.
computer virusesransomwarewormstrojan horsesrootkitskeyloggersdialersspywareadwaremalicious BHOsrogue security software
Tips to Protect Your Network
Use enterprise grade anti-malware software Have a backup & disaster recovery solution in
place Limit which websites employees can visit Educate staff on best practices
Malware
Torrents (peer-to-peer networks)
Snowshoe Spamming
Hacking-as-a-Service
Mobile Threats
Torrents (peer-to-peer networks)
a way of sharing often pirated files such as music, video, software, etc. within a peer-to-peer network by simultaneously downloading and uploading segments of each file.
BitTorrentThe Pirate BayTorrentzKickass TorrentsIsoHuntExtraTorrent1337xEZTVBitSnoopTorrentReactor
Tips to Protect Your Network
Safest bet…don’t use them! Use a PC that’s off your business’s network Scan the files for viruses and wait for results
Malware
Torrents (peer-to-peer networks)
Snowshoe Spamming
Hacking-as-a-Service
Mobile Threats
Snowshoe Spamming
a spamming technique in which a spammer uses a multitude of IP addresses in order to widely disperse spam messages. This large spread of IP addresses increases the difficulty in identifying the source, allowing it to reach more email inboxes.
Tips to Protect Your Network
Impossible to protect yourself 100% BUT thee are still solid options
Use enterprise grade anti-spam software Be smart about which emails you open and
what files you download
Malware
Torrents (peer-to-peer networks)
Snowshoe Spamming
Hacking-as-a-Service
Mobile Threats
Hacking-as-a-Service
people who wish to engage in cybercrime can pay money to gain access to hacking tools and services provided by expert hackers.
attacks-as-a-servicemalware-as-a-servicefraud-as-a-servicecybercrime-as-a-service
Tips to Protect Your Network
Engage a well-rounded security toolset Hire a professional IT firm or employee to stay
current with upgrades and updates DO NOT assume that hackers are not
interested in your particular business!
Malware
Torrents (peer-to-peer networks)
Snowshoe Spamming
Hacking-as-a-Service
Mobile Threats
Mobile Threats
hackers are increasingly targeting mobile devices from a number of different angles as mobile devices tend to store a plethora of personal and business information.
Cyber attacks on mobile devices jumped by 500% in 2012*Of the 3 major cell phone manufacturers (Android, Blackberry and Apple), Android’s OS is the least secure, with Blackberry being the most secure*
*Tom Kellerman - “Cybersecurity for small business: Hackers and mobile devices - 2013's top threats” – 6/12/2013 – courtesy of thestar.com
Tips to Protect Your Network
Enable and use passwords to access devices Enable and use data encryption Update OS and security items regularly
What we covered today
Malware
Torrents (peer-to-peer networks)
Snowshoe Spamming
Hacking-as-a-Service
Mobile Threats
How Velocity Network Solutions can help…
Develop a network security plan
Proactively monitor and update your network
Standardize your environment
Troubleshoot potentially hazardous issues
Backup and disaster recovery
and much more…
Join us for part 2 of ourNetwork Security Webinar Series Wednesday, October 9th @ 11:00am PT
“5 Must-Have Components of a Secure Network”
Thank you for attending andwe’ll see you at the next webinar!
Phone: (818) 780-3600 x306 Email: [email protected]
www.VelocityNS.com