Your Trusted Partner In All Things IT. 20 Years of IT Experience University Automotive Food Service...

Post on 26-Dec-2015

214 views 0 download

Tags:

Transcript of Your Trusted Partner In All Things IT. 20 Years of IT Experience University Automotive Food Service...

Your Trusted Partner In All Things IT

• 20 Years of IT Experience• University• Automotive• Food Service• Banking• Insurance• Legal• Medical• Dental• Software Development

“David is someone that can take any piece of electronic equipment, its manual, and 10 minutes, and tell you what you need to know to use it.”

– David Steele, former instructor

DAVID WILSON

The attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication.

PHISHING

PHISHING PREVENTION• Look at the Email Header

• Does the sender’s domain match the company• Do I have an account with this company?• Have I given my email address to this organization before? • Is the email addressed to only me, or to an “undisclosed list”

• Look at the Content

• Do the links in the email match with the sender’s email?• Are there a lot of typos in the message? • Are you being asked for account information or a password?• Are you being promised a large sum of money after paying at “processing

fee”?

PHISHING PREVENTION

CRYPTOLOCKER• Ransomware trojan which targeted computers running

Microsoft Windows

• Believed to have first been posted to the Internet on 5 September 2013

• CryptoLocker propagated via infected email attachments, and via an existing botnet; when activated, the malware encrypts certain types of files stored on local and mounted network drives using RSA public-key cryptography, with the private key stored only on the malware's control servers

• The malware then displays a message which offers to decrypt the data if a payment (through either Bitcoin or a pre-paid cash voucher) is made by a stated deadline, and threatened to delete the private key if the deadline passes. If the deadline is not met, the malware offered to decrypt data via an online service provided by the malware's operators, for a significantly higher price in Bitcoin.

CRYPTOLOCKER

CRYPTOLOCKER

CRYPTOLOCKER

CRYPTOLOCKER

CRYPTOLOCKER

CRYPTOLOCKER

CRYPTOLOCKER

CRYPTOLOCKER

CRYPTOLOCKER

CRYPTOLOCKER

PROTECT YOURSELF• Think twice, click once.

• Is the URL going to where I am expecting it to go?

• Use Antivirus / Malware Protection• Free is better than nothing, but you get

what you pay for.

• Keep and maintain a backup of your files• A weekly backup of your files is

essential for anyone running a business

PROTECT YOURSELF• Separate Business and Personal E-mail

• Utilizing you@yourdomain.com adds a layer of professionalism for your business, as well as helps eliminate some of the spam and phishing mail you will receive

• Keep your computers and other devices up to date!• Adobe and Microsoft releases new system patches

on the 2nd Tuesday of EVERY month

• Use complex passwords• Adding numbers and CAPITALIZED letters to your

passwords will go a long way in keeping people from guessing your passwords

QUESTIONS

ONLINE

@itSynergi

@itSynergiHelp

ONLINE

facebook.com/itsynergi

ONLINE

google.com/+itsynergi

linkedin.com/company/itsynergi

THANK YOU

WWW.ITSYNERGI.COM | 678.250.9995 | INFO@ITSYNERGI.COM

YOUR TRUSTED PARTNER IN ALL THINGS IT