SlideShare a Scribd company logo
Cyber 101 Training
For SMB End Users
Http://Defensative.com
www.Defensative.comwww.Defensative.com
62% of Cyber Attacks are aimed
at Small Business
-- Verizon Cyber Crime Survey
>50% of small-to-medium sized
businesses had experienced at
least one data breach
-- Ponemon Institute
www.Defensative.com
• Money – Ransom-ware
• Your companies data
– Personally Identifiable Info (PII)
– Protected Health Information (PHI)
– CC Numbers and/or Financial Info
– Intellectual property – copyrights, trademarks & patents,
business plans, customer lists, etc.
• Your data & access to your customers networks…
– The Target breach happened due to an HVAC vendor (more)
What are they after?
www.Defensative.com
Everyoneisatarget… http://www.databreaches.net/
https://www.privacyrights.org/data-breach
http://www.heritage.org/research/reports/2014/10/cyber-attacks-on-us-companies-in-2014
www.Defensative.com
What Is A Breach Going to Cost Your Company?
A National Cyber Security Alliance study showed that 36 percent of cyber attacks are conducted against
SMBs. Of those, up to 60 percent go out of business within six months of an attack.
• Anti-Virus – Necessary but…
– 92% of infosec professionals have totally lost
confidence in antivirus (here)
• “.. a crypting service takes a bad guy’s piece of malware and scans it against all of the available antivirus tools on the
market today — to see how many of them detect the code as malicious. The service then runs some custom encryption
routines to obfuscate the malware so that it hardly resembles the piece of code that was detected as bad by most of the
tools out there. And it repeats this scanning and crypting process in an iterative fashion until the malware is found to be
completely undetectable by all of the antivirus tools on the market.” (here) -- Brian Krebs
• Firewall – Necessary as a first line of defense
but…
www.Defensative.com
Isn’t a firewall and Anti-Virus enough?
You can have all the Prevention tools (Anti-Virus, Firewalls,
Automatic Patching, Backups, Robust Password Protection etc..) and
still be vulnerable to employees going to bad websites, clicking on
bad links or compromised attachments and allowing the bad guy
through the firewall where they can introduce code onto your
network that can Sniff your traffic, Copy your data &/or Control your
devices… You are the weakest link
• Do you have an Android phone? Have you connected it to your
companies WIFI? Have you downloaded misc apps… You might
just be the problem…
Your are the weakest link…
You probably have received a fake email or text message with a website created
to look like it’s from an authentic company.
What it will do:
• Trick you into giving them information by asking you to update, validate or
confirm your account. It is often presented in a manner than seems official
and intimidating, to encourage you to take action.
• Convince you to download Malware
Did you know 39 Percent of Employees Admit to Opening Suspicious Emails
www.Defensative.com
How Will You Be Attacked: Phishing
(social engineering) – The #1 attack vector!
www.Defensative.com
Example:
www.Defensative.com
Example Phishing Phone call
www.Defensative.com
Great article on how to recognize Phishing…
Click this link if video does not play…
• Pharming
• Cross Site Scripting
• Denial of Service
• SQL Injection
• Dictionary Attack
• Botnets
• Scanning
**see appendix for details
www.Defensative.com
Other ways you will get hacked…
www.Defensative.com
www.Defensative.com
Example of items you should see referenced in your companies employee
policy doc’s about cyber security:
• Use of encryption
• Email (corporate and personal)
• Use of social networking
• Password Construction Guidelines
• Security Response Plan
• Remote Access
• Wireless Communication
• Bring Your Own Device To Work (BYOD)
Here are some detailed examples:
• Sample Policy (here)
• SANS (here)
Are you aware of your companies
Corporate Cyber Policy?
Examples:
• PCI-DSS
• FINRA
• HIPAA
www.Defensative.com
Does your company have to comply
with Regulatory/Policy mandates?
If so they are subject to Big Fines
If they are not in compliance
so don’t get them in trouble…
Unfortunately many websites and services today still offer un-encrypted
login. With un-encrypted login, the password is NOT encrypted and considered
"cleartext" and can be easily decoded!
www.Defensative.com
What You Must Do – use HTTPS
More here, and here
Software vendors such as Adobe, Microsoft, Oracle and others produce frequent security
patches that plug holes that can be exploited by bad actors.
If you don't install these patches on a regular basis on your hosts, desktops, laptops and
phones your infrastructure will be at risk and will eventually be compromised.
CVE Details is a good place to keep up on the patches. They consolidate vulnerability data
from the National Vulnerability Database (NVD ) and www.exploit-db.com . Another great
site is Mitre's CVE site here .
Here are 2 examples to give you some perspective on how many vulnerabilities a software
can contain:
• Here is a list of Adobe Flash vulnerabilities.
• Here is a list of Oracle Java vulnerabilities.
• Here is a simple chart that shows how many vulnerabilities
have been published over the years in the Windows 7 OS
www.Defensative.com
What You Must Do – Keep Software up to date
Examples:
• BitTorrent - you have no control over what the BitTorrent user is downloading
and you don't want to end up like this guy . ( or these people )
• TOR – You don’t know who is sniffing on the exit nodes (example)
• TFTP – It’s all in clear text (more)
• Misc Android Apps – 97% of mobile malware is on Android (more)
(example)
www.Defensative.com
What You Must Do – Don’t use risky software
• Use Secure Passwords (more)
• Use throw away passwords on non-mission critical
sites
• Understand Password Managers may not be that
secure (example)
• Change Default Passwords! (more)
• If available enable two factor authentication (example)
www.Defensative.com
What You Must Do – Passwords…
Here are 7 Tips to Prevent Mobile Malware
• Understand the mobile risks - A mobile device is a computer and should be protected like one. If you
access the corporate network with their mobile device you should understand the risk imposed by
downloading applications and accessing website that are not from trusted sources. You need to also
know the value of keeping your operating system on the device up to date with the latest security
patches from the manufacturer/mobile provider and operating system vendor.
• Only access corporate data via Wi-Fi over a secure tunnel as over the air networks are exposed to
malicious capturing of wireless traffic. There are several mobile Virtual Private Networking
technologies (VPN) that can be deployed that can allow users to connect through these secure
tunnels.
• Understand your companies Bring Your Own Device to work (BYOD) policies
• Ask your company if they have a Mobile Device Management (MDM) platform and Mobile
Application Management Platforms from companies like Good and others.
• Encrypt your devices - It is very difficult for someone to break in a steal data on an encrypted device
(this goes for the SIM card as well).
• If you use Android then use anti-malware software
www.Defensative.com
What You Must Do – Your phone…
• Change the default password and keep the firmware
up to date on your home internet router
• Don’t connect to random WIFI’s (example)
• Don’t allow others to download programs to
computers or phones that will connect to your
companies network. Here is a Minecraft example.
• Use a Virtual Private Network (VPN) (example,
example)
www.Defensative.com
What You Must Do – Home Networks
& Public WIFI’s…
Pornography and Malware… They go together. (more)
Visitors to Pornhub.com, the 63rd most popular website in the
world (and 41st in the US) have a 53% chance of coming into
contact with malware
www.Defensative.com
What You Must Do – Explicit Sites
Great advice from SecurityMetrics (here)
• Disconnect from the Internet by pulling the network cable from the router to stop
the bleeding of data. Do not turn off your computer/phone/tablet
• Follow your company cyber security policy step by step plan. The company will
usually:
– Document all network changes, notification/detection dates, and people/agencies involved in the
breach
– Segregate all hardware devices in the payment process, or devices suspected of being compromised (if
possible) from other business critical devices.
– Quarantine instead of deleting.
– Preserve firewall settings and firewall logs
– Restrict Internet traffic to only business critical servers and ports outside of the credit card processing
environment.
– Disable (do not delete) remote access capability and wireless access points.
– Call a PFI. Once the breach is contained by steps 1-7, consult with a forensic PFI to plan a compromise
analysis.
www.Defensative.com
What You Must Do – Know what you should
do if you suspect you have been compromised
Appendix
www.Defensative.com
You or one of your employees may be pointed to a malicious and
illegitimate website by redirecting the legitimate URL. Even if the
URL is entered correctly, it can still be redirected to a fake
website.
What it can do:
• Convince you that the site is real and legitimate by looking
almost identical to the actual site down to the smallest
details. You may even enter your personal information and
unknowingly give it to someone with malicious intent.
• Convince you to download Malware.
www.Defensative.com
How Will You Be Attacked: Pharming
You or one of your employees opens a website
that has embed hidden scripts, mainly in the
web content, to steal information such as
cookies and the information within the cookie
(eg passwords, billing info).
www.Defensative.com
How Will You Be Attacked: XSS
Cross Site Scripting
A bad actor will attempt to make one of your
network resources unavailable to its intended
users by saturating the target with external
communications requests, so much so that it
cannot respond to legitimate traffic, or responds
so slowly as to be rendered essentially
unavailable.
www.Defensative.com
How Will You Be Attacked:
Denial of Service (DOS)
A bad actor may try to get valuable information
from your website by exploiting vulnerabilities in
the sites databases.
www.Defensative.com
How Will You Be Attacked:
SQL Injection
www.Defensative.com
A brute force attempt to guess your network
assets passwords, by using common words and
letter combinations, such as “Password” or
“abc123”.
How Will You Be Attacked:
Dictionary Attack
A collection of software robots, or 'bots', that creates an army of
infected computers (known as ‘zombies') that are remotely
controlled by the originator. Yours may be one of them and you
may not even know it.
What they can do:
• Send emails on your behalf
• Spread all types of malware
• Can use your computer as part of a denial of service attack
against other systems
How Will You Be Attacked:
Botnets
Your hosts are being scanned daily by server farms all over the
world looking for current vulnerabilities (example: Heartbleed)
that you may not have patched yet…
What they can do:
• Take control of your company….
How Will You Be Attacked:
Scanning

More Related Content

PDF
Cyber security awareness presentation nepal
PPTX
Basic Security Training for End Users
PPTX
Cybersecurity Awareness Session by Adam
PPTX
Information Security Awareness Training Open
PPT
Employee Security Training[1]@
PDF
End-User Security Awareness
PPTX
Cyber Security 101: Training, awareness, strategies for small to medium sized...
PPSX
Security Awareness Training
Cyber security awareness presentation nepal
Basic Security Training for End Users
Cybersecurity Awareness Session by Adam
Information Security Awareness Training Open
Employee Security Training[1]@
End-User Security Awareness
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Security Awareness Training

What's hot (20)

PPTX
Cyber Security Awareness Program.pptx
PDF
Employee Security Awareness Program
PPTX
Employee Awareness in Cyber Security - Kloudlearn
PPTX
Cybersecurity Awareness
PPTX
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
PPTX
Cybersecurity Attack Vectors: How to Protect Your Organization
PDF
Security Awareness Training
PDF
14 tips to increase cybersecurity awareness
PPTX
Cyber crime & security
PDF
Information Security Awareness for everyone
PDF
Cyber Security Awareness Training
PPTX
Phishing attack
PDF
Information Security Awareness Training
PPTX
Cybersecurity Awareness Overview.pptx
PDF
Cyber Security Awareness
PPTX
Hyphenet Security Awareness Training
PDF
The Secret Of Hacking Trial Pages
PPTX
Social engineering
PPTX
Cyber security
PPT
Cyber Security and Cyber Awareness
Cyber Security Awareness Program.pptx
Employee Security Awareness Program
Employee Awareness in Cyber Security - Kloudlearn
Cybersecurity Awareness
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Cybersecurity Attack Vectors: How to Protect Your Organization
Security Awareness Training
14 tips to increase cybersecurity awareness
Cyber crime & security
Information Security Awareness for everyone
Cyber Security Awareness Training
Phishing attack
Information Security Awareness Training
Cybersecurity Awareness Overview.pptx
Cyber Security Awareness
Hyphenet Security Awareness Training
The Secret Of Hacking Trial Pages
Social engineering
Cyber security
Cyber Security and Cyber Awareness
Ad

Viewers also liked (20)

PPT
BASIC IT AND CYBER SECURITY AWARENESS
PPTX
Social Media Cyber Security Awareness Briefing
PPT
End User Security Awareness Presentation
PPT
Cyber security awareness training by cyber security infotech(csi)
PDF
Cyber Security Awareness (Reduce Personal & Business Risk)
PPT
General Awareness On Cyber Security
PPTX
Netwatcher Credit Union Tech Talk
PPT
Introduction to Cyber Security
PPTX
Cyber security presentation
PPTX
Cyber security
PPTX
Cyber crime and security ppt
PPTX
Cyber 101 for smb execs v1
PDF
IT Security Awareness - How to?
PPT
Avoid the Legal Traps of Relocating Jobs
PDF
Net Generation
PPTX
National Cyber Security Awareness Month - Michael Kaiser
PPTX
READ - Risk Exposure Awareness and Deflection - creating an organization-wide...
PDF
C-Sec Pro
PPTX
Cyber safety 101
PDF
Cyber security-awareness-for-social-media-users - Devsena Mishra
BASIC IT AND CYBER SECURITY AWARENESS
Social Media Cyber Security Awareness Briefing
End User Security Awareness Presentation
Cyber security awareness training by cyber security infotech(csi)
Cyber Security Awareness (Reduce Personal & Business Risk)
General Awareness On Cyber Security
Netwatcher Credit Union Tech Talk
Introduction to Cyber Security
Cyber security presentation
Cyber security
Cyber crime and security ppt
Cyber 101 for smb execs v1
IT Security Awareness - How to?
Avoid the Legal Traps of Relocating Jobs
Net Generation
National Cyber Security Awareness Month - Michael Kaiser
READ - Risk Exposure Awareness and Deflection - creating an organization-wide...
C-Sec Pro
Cyber safety 101
Cyber security-awareness-for-social-media-users - Devsena Mishra
Ad

Similar to Cyber security awareness for end users (20)

PPTX
CyberCare Pro - Cybersecurity for SME's updated.pptx
PPTX
Internet safety and you
PPTX
Lecture 2.pptx
PPTX
Lecture 2.pptx
PPTX
Cyber Security for Financial Planners
PDF
Data security best practices for risk awareness and mitigation
PPTX
Breakfast Briefings - February 2018
PPTX
Cyber Security Seminar
PPTX
Cybersecurity - Keeping Your Business Protected
PDF
Measure To Avoid Cyber Attacks
PDF
Measures to Avoid Cyber-attacks
PDF
Introduction to information security
PPTX
cybersecurity understanding in simple way
PPTX
Security Minded - Ransomware Awareness
PPTX
COMPUTER SEMINAR network security threats .pptx
PDF
Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014
PDF
Tietoturvallisuuden_kevatseminaari_2013_Jarno_Niemela
PPT
Chapter1 intro network_security_sunorganised
PPTX
Information Security Basics for Businesses and Individuals
PDF
100 Cyber Attack Vectors Every Business Must Know
CyberCare Pro - Cybersecurity for SME's updated.pptx
Internet safety and you
Lecture 2.pptx
Lecture 2.pptx
Cyber Security for Financial Planners
Data security best practices for risk awareness and mitigation
Breakfast Briefings - February 2018
Cyber Security Seminar
Cybersecurity - Keeping Your Business Protected
Measure To Avoid Cyber Attacks
Measures to Avoid Cyber-attacks
Introduction to information security
cybersecurity understanding in simple way
Security Minded - Ransomware Awareness
COMPUTER SEMINAR network security threats .pptx
Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014
Tietoturvallisuuden_kevatseminaari_2013_Jarno_Niemela
Chapter1 intro network_security_sunorganised
Information Security Basics for Businesses and Individuals
100 Cyber Attack Vectors Every Business Must Know

Recently uploaded (20)

PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
A Presentation on Artificial Intelligence
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
A comparative analysis of optical character recognition models for extracting...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Machine learning based COVID-19 study performance prediction
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
cuic standard and advanced reporting.pdf
PPTX
1. Introduction to Computer Programming.pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Empathic Computing: Creating Shared Understanding
PDF
Spectral efficient network and resource selection model in 5G networks
Diabetes mellitus diagnosis method based random forest with bat algorithm
A Presentation on Artificial Intelligence
20250228 LYD VKU AI Blended-Learning.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Network Security Unit 5.pdf for BCA BBA.
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
A comparative analysis of optical character recognition models for extracting...
Digital-Transformation-Roadmap-for-Companies.pptx
MYSQL Presentation for SQL database connectivity
Machine learning based COVID-19 study performance prediction
The Rise and Fall of 3GPP – Time for a Sabbatical?
cuic standard and advanced reporting.pdf
1. Introduction to Computer Programming.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Assigned Numbers - 2025 - Bluetooth® Document
Empathic Computing: Creating Shared Understanding
Spectral efficient network and resource selection model in 5G networks

Cyber security awareness for end users

  • 1. Cyber 101 Training For SMB End Users Http://Defensative.com www.Defensative.comwww.Defensative.com
  • 2. 62% of Cyber Attacks are aimed at Small Business -- Verizon Cyber Crime Survey >50% of small-to-medium sized businesses had experienced at least one data breach -- Ponemon Institute www.Defensative.com
  • 3. • Money – Ransom-ware • Your companies data – Personally Identifiable Info (PII) – Protected Health Information (PHI) – CC Numbers and/or Financial Info – Intellectual property – copyrights, trademarks & patents, business plans, customer lists, etc. • Your data & access to your customers networks… – The Target breach happened due to an HVAC vendor (more) What are they after? www.Defensative.com
  • 5. www.Defensative.com What Is A Breach Going to Cost Your Company? A National Cyber Security Alliance study showed that 36 percent of cyber attacks are conducted against SMBs. Of those, up to 60 percent go out of business within six months of an attack.
  • 6. • Anti-Virus – Necessary but… – 92% of infosec professionals have totally lost confidence in antivirus (here) • “.. a crypting service takes a bad guy’s piece of malware and scans it against all of the available antivirus tools on the market today — to see how many of them detect the code as malicious. The service then runs some custom encryption routines to obfuscate the malware so that it hardly resembles the piece of code that was detected as bad by most of the tools out there. And it repeats this scanning and crypting process in an iterative fashion until the malware is found to be completely undetectable by all of the antivirus tools on the market.” (here) -- Brian Krebs • Firewall – Necessary as a first line of defense but… www.Defensative.com Isn’t a firewall and Anti-Virus enough?
  • 7. You can have all the Prevention tools (Anti-Virus, Firewalls, Automatic Patching, Backups, Robust Password Protection etc..) and still be vulnerable to employees going to bad websites, clicking on bad links or compromised attachments and allowing the bad guy through the firewall where they can introduce code onto your network that can Sniff your traffic, Copy your data &/or Control your devices… You are the weakest link • Do you have an Android phone? Have you connected it to your companies WIFI? Have you downloaded misc apps… You might just be the problem… Your are the weakest link…
  • 8. You probably have received a fake email or text message with a website created to look like it’s from an authentic company. What it will do: • Trick you into giving them information by asking you to update, validate or confirm your account. It is often presented in a manner than seems official and intimidating, to encourage you to take action. • Convince you to download Malware Did you know 39 Percent of Employees Admit to Opening Suspicious Emails www.Defensative.com How Will You Be Attacked: Phishing (social engineering) – The #1 attack vector! www.Defensative.com Example:
  • 9. www.Defensative.com Example Phishing Phone call www.Defensative.com Great article on how to recognize Phishing… Click this link if video does not play…
  • 10. • Pharming • Cross Site Scripting • Denial of Service • SQL Injection • Dictionary Attack • Botnets • Scanning **see appendix for details www.Defensative.com Other ways you will get hacked… www.Defensative.com
  • 11. www.Defensative.com Example of items you should see referenced in your companies employee policy doc’s about cyber security: • Use of encryption • Email (corporate and personal) • Use of social networking • Password Construction Guidelines • Security Response Plan • Remote Access • Wireless Communication • Bring Your Own Device To Work (BYOD) Here are some detailed examples: • Sample Policy (here) • SANS (here) Are you aware of your companies Corporate Cyber Policy?
  • 12. Examples: • PCI-DSS • FINRA • HIPAA www.Defensative.com Does your company have to comply with Regulatory/Policy mandates? If so they are subject to Big Fines If they are not in compliance so don’t get them in trouble…
  • 13. Unfortunately many websites and services today still offer un-encrypted login. With un-encrypted login, the password is NOT encrypted and considered "cleartext" and can be easily decoded! www.Defensative.com What You Must Do – use HTTPS More here, and here
  • 14. Software vendors such as Adobe, Microsoft, Oracle and others produce frequent security patches that plug holes that can be exploited by bad actors. If you don't install these patches on a regular basis on your hosts, desktops, laptops and phones your infrastructure will be at risk and will eventually be compromised. CVE Details is a good place to keep up on the patches. They consolidate vulnerability data from the National Vulnerability Database (NVD ) and www.exploit-db.com . Another great site is Mitre's CVE site here . Here are 2 examples to give you some perspective on how many vulnerabilities a software can contain: • Here is a list of Adobe Flash vulnerabilities. • Here is a list of Oracle Java vulnerabilities. • Here is a simple chart that shows how many vulnerabilities have been published over the years in the Windows 7 OS www.Defensative.com What You Must Do – Keep Software up to date
  • 15. Examples: • BitTorrent - you have no control over what the BitTorrent user is downloading and you don't want to end up like this guy . ( or these people ) • TOR – You don’t know who is sniffing on the exit nodes (example) • TFTP – It’s all in clear text (more) • Misc Android Apps – 97% of mobile malware is on Android (more) (example) www.Defensative.com What You Must Do – Don’t use risky software
  • 16. • Use Secure Passwords (more) • Use throw away passwords on non-mission critical sites • Understand Password Managers may not be that secure (example) • Change Default Passwords! (more) • If available enable two factor authentication (example) www.Defensative.com What You Must Do – Passwords…
  • 17. Here are 7 Tips to Prevent Mobile Malware • Understand the mobile risks - A mobile device is a computer and should be protected like one. If you access the corporate network with their mobile device you should understand the risk imposed by downloading applications and accessing website that are not from trusted sources. You need to also know the value of keeping your operating system on the device up to date with the latest security patches from the manufacturer/mobile provider and operating system vendor. • Only access corporate data via Wi-Fi over a secure tunnel as over the air networks are exposed to malicious capturing of wireless traffic. There are several mobile Virtual Private Networking technologies (VPN) that can be deployed that can allow users to connect through these secure tunnels. • Understand your companies Bring Your Own Device to work (BYOD) policies • Ask your company if they have a Mobile Device Management (MDM) platform and Mobile Application Management Platforms from companies like Good and others. • Encrypt your devices - It is very difficult for someone to break in a steal data on an encrypted device (this goes for the SIM card as well). • If you use Android then use anti-malware software www.Defensative.com What You Must Do – Your phone…
  • 18. • Change the default password and keep the firmware up to date on your home internet router • Don’t connect to random WIFI’s (example) • Don’t allow others to download programs to computers or phones that will connect to your companies network. Here is a Minecraft example. • Use a Virtual Private Network (VPN) (example, example) www.Defensative.com What You Must Do – Home Networks & Public WIFI’s…
  • 19. Pornography and Malware… They go together. (more) Visitors to Pornhub.com, the 63rd most popular website in the world (and 41st in the US) have a 53% chance of coming into contact with malware www.Defensative.com What You Must Do – Explicit Sites
  • 20. Great advice from SecurityMetrics (here) • Disconnect from the Internet by pulling the network cable from the router to stop the bleeding of data. Do not turn off your computer/phone/tablet • Follow your company cyber security policy step by step plan. The company will usually: – Document all network changes, notification/detection dates, and people/agencies involved in the breach – Segregate all hardware devices in the payment process, or devices suspected of being compromised (if possible) from other business critical devices. – Quarantine instead of deleting. – Preserve firewall settings and firewall logs – Restrict Internet traffic to only business critical servers and ports outside of the credit card processing environment. – Disable (do not delete) remote access capability and wireless access points. – Call a PFI. Once the breach is contained by steps 1-7, consult with a forensic PFI to plan a compromise analysis. www.Defensative.com What You Must Do – Know what you should do if you suspect you have been compromised
  • 22. You or one of your employees may be pointed to a malicious and illegitimate website by redirecting the legitimate URL. Even if the URL is entered correctly, it can still be redirected to a fake website. What it can do: • Convince you that the site is real and legitimate by looking almost identical to the actual site down to the smallest details. You may even enter your personal information and unknowingly give it to someone with malicious intent. • Convince you to download Malware. www.Defensative.com How Will You Be Attacked: Pharming
  • 23. You or one of your employees opens a website that has embed hidden scripts, mainly in the web content, to steal information such as cookies and the information within the cookie (eg passwords, billing info). www.Defensative.com How Will You Be Attacked: XSS Cross Site Scripting
  • 24. A bad actor will attempt to make one of your network resources unavailable to its intended users by saturating the target with external communications requests, so much so that it cannot respond to legitimate traffic, or responds so slowly as to be rendered essentially unavailable. www.Defensative.com How Will You Be Attacked: Denial of Service (DOS)
  • 25. A bad actor may try to get valuable information from your website by exploiting vulnerabilities in the sites databases. www.Defensative.com How Will You Be Attacked: SQL Injection
  • 26. www.Defensative.com A brute force attempt to guess your network assets passwords, by using common words and letter combinations, such as “Password” or “abc123”. How Will You Be Attacked: Dictionary Attack
  • 27. A collection of software robots, or 'bots', that creates an army of infected computers (known as ‘zombies') that are remotely controlled by the originator. Yours may be one of them and you may not even know it. What they can do: • Send emails on your behalf • Spread all types of malware • Can use your computer as part of a denial of service attack against other systems How Will You Be Attacked: Botnets
  • 28. Your hosts are being scanned daily by server farms all over the world looking for current vulnerabilities (example: Heartbleed) that you may not have patched yet… What they can do: • Take control of your company…. How Will You Be Attacked: Scanning

Editor's Notes

  • #5: January Target (retail). In January, Target announced an additional 70 million individuals’ contact information was taken during the December 2013 breach, in which 40 million customer’s credit and debit card information was stolen.[5] Neiman Marcus (retail). Between July and October 2013, the credit card information of 350,000 individuals was stolen, and more than 9,000 of the credit cards have been used fraudulently since the attack.[6] Sophisticated code written by the hackers allowed them to move through company computers, undetected by company employees for months. Michaels (retail). Between May 2013 and January 2014, the payment cards of 2.6 million Michaels customers were affected.[7] Attackers targeted the Michaels POS system to gain access to their systems. Yahoo! Mail (communications). The e-mail service for 273 million users was reportedly hacked in January, although the specific number of accounts affected was not released.[8] April Aaron Brothers (retail). The credit and debit card information for roughly 400,000 customers of Aaron Brothers, a subsidiary of Michaels, was compromised by the same POS system malware.[9] AT&T (communications). For two weeks AT&T was hacked from the inside by personnel who accessed user information, including social security information.[10] May eBay (retail). Cyber attacks in late February and early March led to the compromise of eBay employee log-ins, allowing access to the contact and log-in information for 233 million eBay customers.[11] eBay issued a statement asking all users to change their passwords. Five Chinese hackers indicted. Five Chinese nationals were indicted for computer hacking and economic espionage of U.S. companies between 2006 and 2014. The targeted companies included Westinghouse Electric (energy and utilities), U.S. subsidiaries of SolarWorld AG (industrial), United States Steel (industrial), Allegheny Technologies (technology), United Steel Workers Union (services), and Alcoa (industrial).[12] Unnamed public works (energy and utilities). According to the Department of Homeland Security, an unnamed public utility’s control systems were accessed by hackers through a brute-force attack[13] on employee’s log-in passwords.[14] June Feedly (communications). Feedly’s 15 million users were temporarily affected by three distributed denial-of-service attacks.[15] Evernote (technology). In the same week as the Feedly cyber attack, Evernote and its 100 million users faced a similar denial-of-service attack.[16] P.F. Chang’s China Bistro (restaurant). Between September 2013 and June 2014, credit and debit card information from 33 P.F. Chang’s restaurants was compromised and reportedly sold online.[17] August U.S. Investigations Services (services). U.S. Investigations Services, a subcontractor for federal employee background checks, suffered a data breach in August, which led to the theft of employee personnel information.[18] Although no specific origin of attack was reported, the company believes the attack was state-sponsored. Community Health Services (health care). At Community Health Service (CHS), the personal data for 4.5 million patients were compromised between April and June.[19] CHS warns that any patient who visited any of its 206 hospital locations over the past five years may have had his or her data compromised. The sophisticated malware used in the attack reportedly originated in China. The FBI warns that other health care firms may also have been attacked. UPS (services). Between January and August, customer information from more than 60 UPS stores was compromised, including financial data,[20] reportedly as a result of the Backoff malware attacks. Defense Industries (defense). Su Bin, a 49-year-old Chinese national, was indicted for hacking defense companies such as Boeing.[21] Between 2009 and 2013, Bin reportedly worked with two other hackers in an attempt to steal manufacturing plans for defense programs, such as the F-35 and F-22 fighter jets. September Home Depot (retail). Cyber criminals reportedly used malware to compromise the credit card information for roughly 56 million shoppers in Home Depot’s 2,000 U.S. and Canadian outlets.[22] Google (communications). Reportedly, 5 million Gmail usernames and passwords were compromised.[23] About 100,000 were released on a Russian forum site. Apple iCloud (technology). Hackers reportedly used passwords hacked with brute-force tactics and third-party applications to access Apple user’s online data storage, leading to the subsequent posting of celebrities’ private photos online.[24] It is uncertain whether users or Apple were at fault for the attack. Goodwill Industries International (retail). Between February 2013 and August 2014, information for roughly 868,000 credit and debit cards was reportedly stolen from 330 Goodwill stores.[25] Malware infected the chain store through infected third-party vendors. SuperValu (retail). SuperValu was attacked between June and July, and suffered another malware attack between late August and September.[26] The first theft included customer and payment card information from some of its Cub Foods, Farm Fresh, Shop ‘n Save, and Shoppers stores. The second attack reportedly involved only payment card data. Bartell Hotels (hotel). The information for up to 55,000 customers was reportedly stolen between February and May.[27] U.S. Transportation Command contractors (transportation). A Senate report revealed that networks of the U.S. Transportation Command’s contractors were successfully breached 50 times between June 2012 and May 2013.[28] At least 20 of the breaches were attributed to attacks originating from China. October J.P. Morgan Chase (financial). An attack in June was not noticed until August.[29] The contact information for 76 million households and 7 million small businesses was compromised. The hackers may have originated in Russia and may have ties to the Russian government. Dairy Queen International (restaurant). Credit and debit card information from 395 Dairy Queen and Orange Julius stores was compromised by the Backoff malware.[30] Snapsave (communications). Reportedly, the photos of 200,000 users were hacked from Snapsave, a third-party app for saving photos from Snapchat, an instant photo-sharing app.[31]