SlideShare a Scribd company logo
Don't Be The Next Target!
Protecting Your Business From The Latest Threats
Welcome!
Today’s subject:
Protecting Your Company from Ransomware
Trends
SMB’s Are More And More Digital
Small and Medium business has to compete more and more
with Mega-stores. Most have:
● Web Sites
● eCommerce Orders
● Paypal
● Square
● Multiple Email Accounts
● Social Media Accounts
● Etc...
Trends
Big Data – Your Data
Facebook leverages big data in it’s marketing
Most businesses use Facebook in their marketing
Every social media platform uses big data
Trends
Most SMB’s will be in the cloud soon
Cloud services are lowering:
● Costs
● Complexities
● I.T. Staff
Trends
Bring Your Own Device(BYOD) is happening
So what is happening to Security?
Where is Business going to be exposed?
Around the World
● Daily Cyber Attacks Against US Gov
● Dams, Water Treatment, Power Grids
● ISIS Paying Big Money to Hackers
In The News
● Hollywood Hospital - $17,000 in Ransom
● Apple – 600,000 Incidents of Ransomware so far
● iPhone Encryption – FBI hacked it
In The News
“The New York State Attorney General’s office
said that the number of breach notifications
issued by his office had risen 40% during 2016
compared with the same period a year earlier.”
- WSJ 05/05/16
What Are The Threats?
Bots, Phishing, Social Engineering, Malware of all sorts
Who Has Been Affected?
Millions spent to respond and Millions in lost revenue
The Heritage Foundation
Issue Brief #4487 on Cyber Security November 18, 2015
● Morgan Stanley – 350,000 Client Records Stolen
● Anthem – 80 Million Client Records Stolen
● Penn State – 18,000 Student Records Stolen
● All Had Passwords - Firewalls - AntiVirus
What Are The Threats?
BYOD (Bring Your Own Device):
● 20 Years Ago Software was Expensive
● Now iPhone Apps are Free or 99 cents
● Just Search for what you need and install it
What Could Go Wrong?
What Are The Threats?
Social Media:
● People used to keep things private
● Now everyone’s life is public
● So our exposure to risk is at new levels
● Now it’s Easy for Hackers to find personal info to
use in a Social Engineering or Phishing Attack
What Are The Threats?
Cheap Wireless Routers:
● Installed Randomly for Convenience
● Can be an Easy Gateway into your company data
from hundreds of feet away
● Most are never monitored for illegal access
What Are The Threats?
False Security:
● Passwords Don’t Work – Malware Doesn’t Care
● Insider Threats are Huge – Employees Steal Data
● The FBI says it takes an average of 14 months for
companies to detect an intruder. Most won’t know
until it’s too late.
What Are The Threats?
Internal:
“90% of I.T. employees indicate that if they lost their jobs,
they’d take sensitive company data with them...
59% of employees who leave an organization voluntarily
or involuntarily, say they take sensitive data with them.”
Deloitte via WSJ – 05/02/16
Who Are The Targets?
“...SMB’s make much more attractive targets for cyber-
thieves”
“...a data breach involving an SMB can be far more
devastating for the company than a similar type breach at
a larger company.”
csattorneys.com Nov 5, 2014
Ransomware
“The FBI said the number of so-called
ransomware attacks is on the rise. Hackers break
into a corporate network, encrypt data and hold it
ransom until the victim agrees to pay...”
- WSJ 05/04/16
Ransomware
“More small businesses are falling victim to
“ransomware…”
“...Bitcoin is a preferred method of payment,
partly because the use of bitcoin makes
payments difficult to track.”
WSJ – April 15, 2015
Ransomware
“...About 30% of ransomware victims pay to
regain their data, estimates Tom Kellermann,
chief cybersecurity officer for Trend Micro Inc.,
an Irving, Texas, cybersecurity firm.”
WSJ – April 15, 2015
How Can You Be Safe?
Start with 3 important questions:
1) What are you Protecting?
2) What are the Threats?
3) What is happening right now?
What Are You Trying To Protect?
● Company Secrets, Intellectual Property
● Customer Emails, Credit Card Details, Purchases
● Company Accounting System
● Patient Health Records
● What’s Important?
What Are Your Threats To That?
● Contractors?
● Service Providers?
● Employees?
● Hackers?
● Ransomware?
What Is Happening – Right Now?
● Do you know – right now – what is
happening to that data?
● How will you respond to a breach?
● You are liable for it, Not the I.T. dept.
What Can Be Done?
Think about home security:
What secures a home?
Locks – Alarms – Dogs – What Else?
What Can Be Done?
Home Security
Protect Detect Respond
Doors
Windows
Locks
Fence
Alarms
Motion Sensors
Crime Watch
Monitoring
Dog
Gun
Police
Insurance
Which column is most important?
What Can Be Done?
Protect Detect Respond
Doors
Windows
Locks
Fence
Alarms
Motion Sensors
Crime Watch
Monitoring
Dog
Gun
Police
Insurance
Must Have – But
They ALL Break
Must Be Able To
Detect The Break
Must Be Able To
Respond Quickly
You Cannot keep people out – But you can
detect them
A System
Security is not Firewalls, Passwords Or Encryption
Security Is A System
The System is a combination of People, Policies, Training
and Technology all working together
(When) Will It Happen To You?
● That is the question.
● Everyday I work with small business who have
Malware of all sorts on their business and
personal computers.
● Much of it is designed to be a back door into the
computer – bypassing firewalls and anti-virus.
● And some... the evil Ransomware
● Most SMB’s have no system to Detect and
Respond in time
Compliance
Do Industry Compliance Standards = Security?
PCI-DSS, HIPAA, Etc
If Compliance = Security how do Hospitals, Financial
Institutions and Retailers get hacked every day?
Compliance <> Security!
Cost and Liability
The Ponemon Institute and Symantec estimates that it
costs businesses $188 per record lost.
Just 1000 records = $188,000 in one breach!
Businesses also suffer potentially priceless damage to
their reputation and trust.
Cyber Insurance
“...Cyber liability insurance coverage (CLIC) has been
available for more than 12 years…
The average cost of a data breach to the affected
business is $3.8 million...a 23 percent increase since
2013...”
CNN.com June 30, 2015
Attitude?
“Security is also a Frame of Mind...
It’s about Culture, Structure and Strategy...
Every aspect of doing business requires looking at it
through a security lens...”
Paraphrased from TheGuardian.com Mar 11, 2014
How Do You Answer...
● Do you have Policies in place for proper handling of
company data?
● Do you have a system to provide Security
Intelligence?
● Do you have an Employee Cyber Security Training
Program?
Remember – Cybercrime is the fastest growing
industry!
Key Points
● Biggest Threat = Ransomware - Easy Money For Hackers
● Malware is SMART – Typical Anti-Virus is almost useless
● Most Big co’s have been hacked. SMB’s are even Easier
● Targeted Social Engineering attacks are growing fast
● Employee Security Awareness Training is a Must!
Key Points
● Compliance is NOT security
● Security is a State of Mind
● Liability for exposing customer data is Real & Expensive
● A Complete System is required for modern security
What Is Your Risk?
Is your customer data leaking right now?
How do you know?
We can help you find out – right now
Thank You!

More Related Content

PPTX
Lessons v on fraud awareness (digital forensics) [autosaved]
PDF
[Webinar Slides] The Simplest Route to Security and Compliance
PDF
What retailers want you to know about data security
PDF
140707_Cyber-Security
PPTX
11 19-2015 - iasaca membership conference - the state of security
PDF
Modern Adversaries (Amplify Partners)
PDF
Cybersecurity and The Board
PDF
Cyber Security 101: What Your Agency Needs to Know
Lessons v on fraud awareness (digital forensics) [autosaved]
[Webinar Slides] The Simplest Route to Security and Compliance
What retailers want you to know about data security
140707_Cyber-Security
11 19-2015 - iasaca membership conference - the state of security
Modern Adversaries (Amplify Partners)
Cybersecurity and The Board
Cyber Security 101: What Your Agency Needs to Know

What's hot (20)

PPTX
When a Data Breach Happens, What's Your Plan?
PPT
The Security Director's Practical Guide to Cyber Security
PDF
Top 10 leading fraud detection and prevention solution providers
PDF
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
PPTX
SCIONETIX PRESENTATIONaarevised(1)
PDF
Must Know Cyber Security Stats of 2016
PDF
Data Security and MPS
PDF
Cybersecurity in Banking Sector
PDF
Get the FUD out of Cybersecurity! ISACA CSXNA 2016 in Las Vegas
PDF
The Anatomy of a Data Breach
PDF
Reasons to be secure
PDF
Secure Wall - how should companies protect themselves from cyber crime?
PDF
The 2016 Ponemon Cost of a Data Breach Study
PDF
2017 in Review: Infosec Pros Look Back on the Year
PPTX
See How You Measure Up With MaaS360 Mobile Metrics
PDF
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
PPTX
Learning from Verizon 2017 Data Breach Investigations Report – The New Targets
PDF
Close the Loop on Incident Response
DOCX
Possible cyber security threats of 2016
PPTX
Ethics and technologies - Cybersecurity landscape
When a Data Breach Happens, What's Your Plan?
The Security Director's Practical Guide to Cyber Security
Top 10 leading fraud detection and prevention solution providers
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
SCIONETIX PRESENTATIONaarevised(1)
Must Know Cyber Security Stats of 2016
Data Security and MPS
Cybersecurity in Banking Sector
Get the FUD out of Cybersecurity! ISACA CSXNA 2016 in Las Vegas
The Anatomy of a Data Breach
Reasons to be secure
Secure Wall - how should companies protect themselves from cyber crime?
The 2016 Ponemon Cost of a Data Breach Study
2017 in Review: Infosec Pros Look Back on the Year
See How You Measure Up With MaaS360 Mobile Metrics
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
Learning from Verizon 2017 Data Breach Investigations Report – The New Targets
Close the Loop on Incident Response
Possible cyber security threats of 2016
Ethics and technologies - Cybersecurity landscape
Ad

Viewers also liked (11)

PPTX
Dr Roohullah Shabon International Work
PDF
How to Effectively Manage a Data Breach
PDF
Customize it.
ODT
PPTX
Using Simulations for Instruction
DOCX
Materi PAI KELAS VII
PPTX
Top Baseball Pitching Program in the World
DOCX
Silabus pai smp, 21 22 januari 2016
PDF
MANUAL DE UTILIZACION DE PROGRAMA PSPP
PPTX
Thesis Presentation
PDF
超強力レーザーポインターオンラインショップを購入専門店おすすめ
Dr Roohullah Shabon International Work
How to Effectively Manage a Data Breach
Customize it.
Using Simulations for Instruction
Materi PAI KELAS VII
Top Baseball Pitching Program in the World
Silabus pai smp, 21 22 januari 2016
MANUAL DE UTILIZACION DE PROGRAMA PSPP
Thesis Presentation
超強力レーザーポインターオンラインショップを購入専門店おすすめ
Ad

Similar to Forthright Security Lunch and Learn - Ransomware Focus 2 (20)

PDF
IESBGA 2014 Cybercrime Seminar by John Bambenek
PPTX
Cybersecurity Basics of awareness presentation .pptx
PPTX
Cybersecurity Basics of awareness presentation .pptx
PDF
The Rise of Data Breaches in Small Businesses
PDF
Before the Breach: Using threat intelligence to stop attackers in their tracks
PDF
Cybersecurity and liability your david willson
PPTX
Common sense security by Fortium Partners
PDF
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
PPTX
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
PDF
Cyber Defense For SMB's
PPTX
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
PPTX
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
PDF
We are living in a world where cyber security is a top priority for .pdf
PPT
Merit Event - Closing the Back Door in Your Systems
PPTX
Data Security for Nonprofits
PDF
Kaspersky: Global IT Security Risks
PDF
The 10 Secret Codes of Security
PPTX
The CPAs Guide to Buying Cyber Insurance
PPTX
CPA firm Cyber Insurance Specifics
PPTX
Security Minded - Ransomware Awareness
IESBGA 2014 Cybercrime Seminar by John Bambenek
Cybersecurity Basics of awareness presentation .pptx
Cybersecurity Basics of awareness presentation .pptx
The Rise of Data Breaches in Small Businesses
Before the Breach: Using threat intelligence to stop attackers in their tracks
Cybersecurity and liability your david willson
Common sense security by Fortium Partners
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Cyber Defense For SMB's
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
We are living in a world where cyber security is a top priority for .pdf
Merit Event - Closing the Back Door in Your Systems
Data Security for Nonprofits
Kaspersky: Global IT Security Risks
The 10 Secret Codes of Security
The CPAs Guide to Buying Cyber Insurance
CPA firm Cyber Insurance Specifics
Security Minded - Ransomware Awareness

Forthright Security Lunch and Learn - Ransomware Focus 2

  • 1. Don't Be The Next Target! Protecting Your Business From The Latest Threats Welcome! Today’s subject: Protecting Your Company from Ransomware
  • 2. Trends SMB’s Are More And More Digital Small and Medium business has to compete more and more with Mega-stores. Most have: ● Web Sites ● eCommerce Orders ● Paypal ● Square ● Multiple Email Accounts ● Social Media Accounts ● Etc...
  • 3. Trends Big Data – Your Data Facebook leverages big data in it’s marketing Most businesses use Facebook in their marketing Every social media platform uses big data
  • 4. Trends Most SMB’s will be in the cloud soon Cloud services are lowering: ● Costs ● Complexities ● I.T. Staff
  • 5. Trends Bring Your Own Device(BYOD) is happening So what is happening to Security? Where is Business going to be exposed?
  • 6. Around the World ● Daily Cyber Attacks Against US Gov ● Dams, Water Treatment, Power Grids ● ISIS Paying Big Money to Hackers
  • 7. In The News ● Hollywood Hospital - $17,000 in Ransom ● Apple – 600,000 Incidents of Ransomware so far ● iPhone Encryption – FBI hacked it
  • 8. In The News “The New York State Attorney General’s office said that the number of breach notifications issued by his office had risen 40% during 2016 compared with the same period a year earlier.” - WSJ 05/05/16
  • 9. What Are The Threats? Bots, Phishing, Social Engineering, Malware of all sorts Who Has Been Affected? Millions spent to respond and Millions in lost revenue The Heritage Foundation Issue Brief #4487 on Cyber Security November 18, 2015 ● Morgan Stanley – 350,000 Client Records Stolen ● Anthem – 80 Million Client Records Stolen ● Penn State – 18,000 Student Records Stolen ● All Had Passwords - Firewalls - AntiVirus
  • 10. What Are The Threats? BYOD (Bring Your Own Device): ● 20 Years Ago Software was Expensive ● Now iPhone Apps are Free or 99 cents ● Just Search for what you need and install it What Could Go Wrong?
  • 11. What Are The Threats? Social Media: ● People used to keep things private ● Now everyone’s life is public ● So our exposure to risk is at new levels ● Now it’s Easy for Hackers to find personal info to use in a Social Engineering or Phishing Attack
  • 12. What Are The Threats? Cheap Wireless Routers: ● Installed Randomly for Convenience ● Can be an Easy Gateway into your company data from hundreds of feet away ● Most are never monitored for illegal access
  • 13. What Are The Threats? False Security: ● Passwords Don’t Work – Malware Doesn’t Care ● Insider Threats are Huge – Employees Steal Data ● The FBI says it takes an average of 14 months for companies to detect an intruder. Most won’t know until it’s too late.
  • 14. What Are The Threats? Internal: “90% of I.T. employees indicate that if they lost their jobs, they’d take sensitive company data with them... 59% of employees who leave an organization voluntarily or involuntarily, say they take sensitive data with them.” Deloitte via WSJ – 05/02/16
  • 15. Who Are The Targets? “...SMB’s make much more attractive targets for cyber- thieves” “...a data breach involving an SMB can be far more devastating for the company than a similar type breach at a larger company.” csattorneys.com Nov 5, 2014
  • 16. Ransomware “The FBI said the number of so-called ransomware attacks is on the rise. Hackers break into a corporate network, encrypt data and hold it ransom until the victim agrees to pay...” - WSJ 05/04/16
  • 17. Ransomware “More small businesses are falling victim to “ransomware…” “...Bitcoin is a preferred method of payment, partly because the use of bitcoin makes payments difficult to track.” WSJ – April 15, 2015
  • 18. Ransomware “...About 30% of ransomware victims pay to regain their data, estimates Tom Kellermann, chief cybersecurity officer for Trend Micro Inc., an Irving, Texas, cybersecurity firm.” WSJ – April 15, 2015
  • 19. How Can You Be Safe? Start with 3 important questions: 1) What are you Protecting? 2) What are the Threats? 3) What is happening right now?
  • 20. What Are You Trying To Protect? ● Company Secrets, Intellectual Property ● Customer Emails, Credit Card Details, Purchases ● Company Accounting System ● Patient Health Records ● What’s Important?
  • 21. What Are Your Threats To That? ● Contractors? ● Service Providers? ● Employees? ● Hackers? ● Ransomware?
  • 22. What Is Happening – Right Now? ● Do you know – right now – what is happening to that data? ● How will you respond to a breach? ● You are liable for it, Not the I.T. dept.
  • 23. What Can Be Done? Think about home security: What secures a home? Locks – Alarms – Dogs – What Else?
  • 24. What Can Be Done? Home Security Protect Detect Respond Doors Windows Locks Fence Alarms Motion Sensors Crime Watch Monitoring Dog Gun Police Insurance Which column is most important?
  • 25. What Can Be Done? Protect Detect Respond Doors Windows Locks Fence Alarms Motion Sensors Crime Watch Monitoring Dog Gun Police Insurance Must Have – But They ALL Break Must Be Able To Detect The Break Must Be Able To Respond Quickly You Cannot keep people out – But you can detect them
  • 26. A System Security is not Firewalls, Passwords Or Encryption Security Is A System The System is a combination of People, Policies, Training and Technology all working together
  • 27. (When) Will It Happen To You? ● That is the question. ● Everyday I work with small business who have Malware of all sorts on their business and personal computers. ● Much of it is designed to be a back door into the computer – bypassing firewalls and anti-virus. ● And some... the evil Ransomware ● Most SMB’s have no system to Detect and Respond in time
  • 28. Compliance Do Industry Compliance Standards = Security? PCI-DSS, HIPAA, Etc If Compliance = Security how do Hospitals, Financial Institutions and Retailers get hacked every day? Compliance <> Security!
  • 29. Cost and Liability The Ponemon Institute and Symantec estimates that it costs businesses $188 per record lost. Just 1000 records = $188,000 in one breach! Businesses also suffer potentially priceless damage to their reputation and trust.
  • 30. Cyber Insurance “...Cyber liability insurance coverage (CLIC) has been available for more than 12 years… The average cost of a data breach to the affected business is $3.8 million...a 23 percent increase since 2013...” CNN.com June 30, 2015
  • 31. Attitude? “Security is also a Frame of Mind... It’s about Culture, Structure and Strategy... Every aspect of doing business requires looking at it through a security lens...” Paraphrased from TheGuardian.com Mar 11, 2014
  • 32. How Do You Answer... ● Do you have Policies in place for proper handling of company data? ● Do you have a system to provide Security Intelligence? ● Do you have an Employee Cyber Security Training Program? Remember – Cybercrime is the fastest growing industry!
  • 33. Key Points ● Biggest Threat = Ransomware - Easy Money For Hackers ● Malware is SMART – Typical Anti-Virus is almost useless ● Most Big co’s have been hacked. SMB’s are even Easier ● Targeted Social Engineering attacks are growing fast ● Employee Security Awareness Training is a Must!
  • 34. Key Points ● Compliance is NOT security ● Security is a State of Mind ● Liability for exposing customer data is Real & Expensive ● A Complete System is required for modern security
  • 35. What Is Your Risk? Is your customer data leaking right now? How do you know? We can help you find out – right now Thank You!