Whole Systems Serviceswww.wholesystemsservices.com
Local and Remote Support
Computer Security for Small Business
or, Computer Threats to a Small Business
Two Kinds of BadMalware/”Virus”
Mess Up Your Computer
Trick You to send Money/CC #s
Grab your Address Book/Contacts
Propagate to other machines
Botnets
Not interested in your data -- Use your machine
Silently Build a Network of Compromised Machines
Security Weak Points
Human
Network
Computer
Or, How Do “They” Get In?
Human Weak Points
Browser : “Click Here”
eMail: “Open This Attachment”
Loaner USB Stick
Network Weak Points
DSL/Cable Modem
Admin Password
The “Router” - Wired
Admin Password
Wireless “Router”
Owner Password
Access Password
Or, Four Passwords You Didn’t Know You Had
Psst! Did Your Internet Service
Print those passwords for you?
“I put it here somewhere...”
Tell you how to change them?
Single Most Important Reason for Keeping
Hardware and Software Current
Frequent “Patches” and Updates Are Often Fixing Security Vulnerabilities
Malware Protection
Scan your Hard Disk regularly?
Do Live Scans
USB Sticks
eMail Attachments
Downloaded files
Does your Malware Tool:
The Best Malware Protection is a
Full, Current Backup Full, Current Backup
Backup? What’s That?
What To Do:Turn on Automatic Updates (Windows)
Accept Software Updates (Mac)
Use Current Versions of your Programs
Get off of Windows XP
Whole Systems Serviceswww.wholesystemsservices.com
Local and Remote Support