SlideShare a Scribd company logo
Who We Are
How to Make Yourself
Hard to Hack!
www.ntiva.com
Did you know? The majority of all
security incidents involve human error.
18%
17%
15%
15%
12%
8%
15%
Employee Error
Insider Misuse
Physical Theft
and LossDenial of Service
Malware
Web app
attacks
Other
*Source: 2016 Verizon Data Breach Investigations Report
How Data Loss Happens!
Just a few years ago, you could build a
moat around your business.
e.g. Firewalls and endpoint security
Now it’s not enough.
The perimeter has been compromised by
millions of cloud-based apps and billions of
devices.
Malware is now one of the fastest
growing causes of data breaches.
User identities and passwords have
become the primary targets.
We’re at a tipping point.
In 2016, 2/3 of businesses surveyed experienced
an average of 5 security breaches.
And hackers compromised more than one
billion identities.
*Source: 2016 Forrester Research – North America
Make it tough on the hackers!
Follow these basic rules
to keep yourself safe!
Start with passwords
Use a unique password for
everything you access.
Change it frequently.
Consider using password
management software.
Make “2FA” your best friend
Use two-factor authentication where
possible.
This adds an extra layer of protection to
basic log-in procedures.
Often this is simply a text message to
your mobile phone.
This is especially important for industries with
strict regulatory compliance requirements.
Data protection software can provide
encryption of devices, email and data
itself (“at rest” and “in transit”)
Consider Data Encryption
They are essential to maintaining security.
Do not ignore those
frequent requests to
update your devices
with the latest
software!
• Open any email or attachments from an unknown sender
• Click an embedded link in a message without hovering your mouse over it to
check the URL (even if you think you know the sender)
• Respond to emails that request password changes or personal information
• Disable the auto lock feature or the password lock on your devices
• Leave devices unattended in a public place or in your car
• Use public Wi-Fi for business email or private transactions – it’s not secure!
NEVER DO THIS
Real Phishing Examples from 2016
Beware of Grammatical Errors and Invalid Domains
Phishing Example #1: Requests for urgent action
Beware of Requests for Urgent Action and Generic Salutations
Beware of Unusual Requests from Colleagues
Beware of “It’s too good to be true!”
Bottom Line:
Cybersecurity now requires a
layered approach.
Summary of Cybersecurity Best Practices
*It’s no longer considered a matter of if data loss will occur – it’s a matter of when.
Document your Security Policies
Use two-factor Authentication
Monitor your Network
Encrypt your DataDeploy Anti-spam & Anti-virus
*Deploy a Back Up and Recovery Solution
Update & Patch Regularly
Educate your Users
Deploy a Password Manager
Perform a Security Risk Assessment
Who We Are
www.ntiva.com
A Managed IT Services Company
Serving Metro DC
IT Consulting
IT Service & Support
Cloud Solutions
Cybersecurity
Learn more at www.ntiva.com

More Related Content

PPTX
Dos and Don'ts of Internet Security
PDF
Cybersecurity Awareness Training Presentation v1.0
PPTX
Understanding the Risk & Challenges of Cyber Security
PPTX
Cybersecurity Awareness Session by Adam
PPTX
Cybersecurity Awareness Training
PPT
Footprintig(Haching)
ODP
Cyber security awareness
PDF
What is CryptoLocker and How Can I Protect My Business From It?
Dos and Don'ts of Internet Security
Cybersecurity Awareness Training Presentation v1.0
Understanding the Risk & Challenges of Cyber Security
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Training
Footprintig(Haching)
Cyber security awareness
What is CryptoLocker and How Can I Protect My Business From It?

What's hot (20)

PPTX
The Evolution of Cybercrime
PDF
mcafee-10-steps-infographic-d2
PPTX
Cyber security awareness for end users
PDF
Hacker Tricks: How You Can Protect Yourself
PPT
Cyber crime and security
PPTX
Internet security
PDF
Next-level mobile app security: A programmatic approach
PPTX
Computer & internet Security
PPTX
Cyber security
PDF
14 tips to increase cybersecurity awareness
PPTX
Internet Threats
PPTX
What is the Cybersecurity plan for tomorrow?
PPTX
Cyber security
PDF
Cyber-Security Threats: Why We are Losing the Battle (and Probably Don't Even...
PPT
Sahilmod 120315100301-phpapp01
PDF
Security Awareness Training
PPTX
Cybersecurity Cyber Usalama
PPTX
Wannacry & Petya ransomware
PPTX
Web Security
PPTX
Online safety and malwares
The Evolution of Cybercrime
mcafee-10-steps-infographic-d2
Cyber security awareness for end users
Hacker Tricks: How You Can Protect Yourself
Cyber crime and security
Internet security
Next-level mobile app security: A programmatic approach
Computer & internet Security
Cyber security
14 tips to increase cybersecurity awareness
Internet Threats
What is the Cybersecurity plan for tomorrow?
Cyber security
Cyber-Security Threats: Why We are Losing the Battle (and Probably Don't Even...
Sahilmod 120315100301-phpapp01
Security Awareness Training
Cybersecurity Cyber Usalama
Wannacry & Petya ransomware
Web Security
Online safety and malwares

Similar to How to make yourself hard to hack! slide share presentation (20)

PDF
Mc physics colloquium2018-03-30.-handouts
PPTX
Unveiling the dark web. The importance of your cybersecurity posture
PDF
Getting users to care about security
PDF
The State of Data Security
PPT
Social Engineering: Protecting Yourself on the Campus Network
PPTX
2024 Security Outlook & Essential Security Practices
PDF
Introduction to information security
PDF
Wfh security risks - Ed Adams, President, Security Innovation
PDF
Think like a hacker for better security awareness
PDF
PDF
Are Your Security Aware?
PPTX
Cybersecurity awareness _20241220_223916_0000.pptx
PDF
Mark Lanterman - The Risk Report October 2015
PPTX
Cyber Security Awareness Session for Executives and Non-IT professionals
PPTX
CyberCare Pro - Cybersecurity for SME's updated.pptx
PPTX
Private Data and Prying Eyes
PDF
Data security best practices for risk awareness and mitigation
PPTX
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
PPTX
Cybersecurity_Office_everyday Presentation.pptx
PPTX
Information Security Basics for Businesses and Individuals
Mc physics colloquium2018-03-30.-handouts
Unveiling the dark web. The importance of your cybersecurity posture
Getting users to care about security
The State of Data Security
Social Engineering: Protecting Yourself on the Campus Network
2024 Security Outlook & Essential Security Practices
Introduction to information security
Wfh security risks - Ed Adams, President, Security Innovation
Think like a hacker for better security awareness
Are Your Security Aware?
Cybersecurity awareness _20241220_223916_0000.pptx
Mark Lanterman - The Risk Report October 2015
Cyber Security Awareness Session for Executives and Non-IT professionals
CyberCare Pro - Cybersecurity for SME's updated.pptx
Private Data and Prying Eyes
Data security best practices for risk awareness and mitigation
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Cybersecurity_Office_everyday Presentation.pptx
Information Security Basics for Businesses and Individuals

Recently uploaded (20)

PPTX
Why Outsourcing Debt Collection Saves Time and Money.pptx
PPTX
Moving House Why Removals in Melbourne Make It Easy.pptx
PPTX
Day Care Centre Proposal.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
PPTX
AI-Powered-Mobile-App-Development-The-Future-of-Intelligent-Applications.pptx
PDF
Why Infotrench Stands Out as the Best SEO Agency in Noida.pdf
PPTX
Social Media Marketing Services in USA | Boost Your Brand
PDF
Digital Marketing Skills in Demand for 2025.pdf
PDF
Civil Court Sworn Application Frank RafARaci vs Cordell sive Trey De la Pena
PDF
Investhill_Report OCD (2007-2024)_2025-1.pdf
PDF
Bisleri vs Coca Cola.pdf intellectual property rights
PDF
Future of Digital Marketing Trends & Insights.pdf
PDF
AI Staffing for Startups & Growing Businesses | Rubixe
PPTX
Next-Generation Airline Network & Schedule Planning
PPTX
Ealeba Youth Structure Five Core Programs & Projects Executives
PPTX
Telecom Expense Management & Optimization – The ITE Group.pptx
PPTX
Your Trusted SEO Company in San Antonio – Studio0413
PDF
Best Platforms to Buy Verified Cash App Accounts in 2026.pdf
PDF
The Cost of Neglect How Skipping Fire Safety Maintenance Can Lead to Disaster...
PDF
Expert Medical Coding Services for Faster Reimbursements.pdf
PDF
Profitable Farming Starts with AI in Agriculture | Rubixe
Why Outsourcing Debt Collection Saves Time and Money.pptx
Moving House Why Removals in Melbourne Make It Easy.pptx
Day Care Centre Proposal.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
AI-Powered-Mobile-App-Development-The-Future-of-Intelligent-Applications.pptx
Why Infotrench Stands Out as the Best SEO Agency in Noida.pdf
Social Media Marketing Services in USA | Boost Your Brand
Digital Marketing Skills in Demand for 2025.pdf
Civil Court Sworn Application Frank RafARaci vs Cordell sive Trey De la Pena
Investhill_Report OCD (2007-2024)_2025-1.pdf
Bisleri vs Coca Cola.pdf intellectual property rights
Future of Digital Marketing Trends & Insights.pdf
AI Staffing for Startups & Growing Businesses | Rubixe
Next-Generation Airline Network & Schedule Planning
Ealeba Youth Structure Five Core Programs & Projects Executives
Telecom Expense Management & Optimization – The ITE Group.pptx
Your Trusted SEO Company in San Antonio – Studio0413
Best Platforms to Buy Verified Cash App Accounts in 2026.pdf
The Cost of Neglect How Skipping Fire Safety Maintenance Can Lead to Disaster...
Expert Medical Coding Services for Faster Reimbursements.pdf
Profitable Farming Starts with AI in Agriculture | Rubixe

How to make yourself hard to hack! slide share presentation

  • 1. Who We Are How to Make Yourself Hard to Hack! www.ntiva.com
  • 2. Did you know? The majority of all security incidents involve human error.
  • 3. 18% 17% 15% 15% 12% 8% 15% Employee Error Insider Misuse Physical Theft and LossDenial of Service Malware Web app attacks Other *Source: 2016 Verizon Data Breach Investigations Report How Data Loss Happens!
  • 4. Just a few years ago, you could build a moat around your business. e.g. Firewalls and endpoint security
  • 5. Now it’s not enough. The perimeter has been compromised by millions of cloud-based apps and billions of devices.
  • 6. Malware is now one of the fastest growing causes of data breaches.
  • 7. User identities and passwords have become the primary targets.
  • 8. We’re at a tipping point. In 2016, 2/3 of businesses surveyed experienced an average of 5 security breaches. And hackers compromised more than one billion identities. *Source: 2016 Forrester Research – North America
  • 9. Make it tough on the hackers! Follow these basic rules to keep yourself safe!
  • 10. Start with passwords Use a unique password for everything you access. Change it frequently. Consider using password management software.
  • 11. Make “2FA” your best friend Use two-factor authentication where possible. This adds an extra layer of protection to basic log-in procedures. Often this is simply a text message to your mobile phone.
  • 12. This is especially important for industries with strict regulatory compliance requirements. Data protection software can provide encryption of devices, email and data itself (“at rest” and “in transit”) Consider Data Encryption
  • 13. They are essential to maintaining security. Do not ignore those frequent requests to update your devices with the latest software!
  • 14. • Open any email or attachments from an unknown sender • Click an embedded link in a message without hovering your mouse over it to check the URL (even if you think you know the sender) • Respond to emails that request password changes or personal information • Disable the auto lock feature or the password lock on your devices • Leave devices unattended in a public place or in your car • Use public Wi-Fi for business email or private transactions – it’s not secure! NEVER DO THIS
  • 16. Beware of Grammatical Errors and Invalid Domains
  • 17. Phishing Example #1: Requests for urgent action Beware of Requests for Urgent Action and Generic Salutations
  • 18. Beware of Unusual Requests from Colleagues
  • 19. Beware of “It’s too good to be true!”
  • 20. Bottom Line: Cybersecurity now requires a layered approach.
  • 21. Summary of Cybersecurity Best Practices *It’s no longer considered a matter of if data loss will occur – it’s a matter of when. Document your Security Policies Use two-factor Authentication Monitor your Network Encrypt your DataDeploy Anti-spam & Anti-virus *Deploy a Back Up and Recovery Solution Update & Patch Regularly Educate your Users Deploy a Password Manager Perform a Security Risk Assessment
  • 22. Who We Are www.ntiva.com A Managed IT Services Company Serving Metro DC IT Consulting IT Service & Support Cloud Solutions Cybersecurity Learn more at www.ntiva.com