Protecting Your Work Environment from Hacking Threats

Slide Note
Embed
Share

Safeguarding your work environment from hacking is crucial to prevent potential losses. Addressing human errors, hacker infiltration, targeted phishing, and extortion are key steps to enhance security. Implementing measures like device security, two-factor authentication, firewall protection, and employee training can significantly reduce the risk of cyber attacks.


Uploaded on Sep 13, 2024 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. Download presentation by click this link. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

E N D

Presentation Transcript


  1. SECURING YOUR HACK-FREE WORK ENVIRONMENT STARS CAMPUS SOLUTIONS STARSCAMPUS.COM

  2. ASSUMPTION ---$40 Million Revenue Enterprise. I was addicted to hacking, more for the intellectual challenge, the curiosity, the seduction of adventure; not for stealing, or causing damage or writing computer viruses. Kevin Mitnick

  3. 5 MAJOR LOSSES BY HACKING/VULNERABILITY TYPE Human Error $ 3,456,00 Hackers $ 5,920,000 Targeted Phishing $ 1,260,000 Extortion $4,330,000 Hacktivists $6,510,000 It is a fairly open secret that almost all systems can be hacked, somehow. It is a less spoken of secret that such hacking has actually gone quite mainstream. Dan Kaminsky

  4. HUMAN ERROR Insecure / Lost Devices Secure ALL devices including phones Enable REMOTE WIPE / MANAGEMENT/LOCATION Do NOT write down passwords! (Password manager like RoboForm) Two Factor Authentication (2FA) We need to do whatever we can to defend ourselves against hacking. Soren Skou

  5. HACKERS Attempt to Infiltrate your Internal Network Good and properly configured Firewall or Hosting Secure certificates on server (http://ssllabs.com/ssltest/) Patched Servers Patched devices Server Type Sponsored by Homeland Security & Carnegie Mellon: (http://www.kb.cert.org) Hackers are breaking the systems for profit. Before, it was about intellectual curiosity and pursuit of knowledge and thrill, and now hacking is big business. Kevin Mitnick

  6. TARGETED PHISHING Attempt to get Doorway into your Network Often mimics known employees or relationship like a bank, a related service EXPECTATION is key here. Do you EXPECT to get a FILE/PDF/PHOTO/DOCUMENT etc? LOOK at the EMAIL ADDRESS source not the return address. ALWAYS use an antivirus! Most of the computer compromises that we hear about use a technique called spear phishing, which allows an attacker access to a key person's workstation. It's extremely difficult to defend against. Kevin Mitnick

  7. EXTORTION Usually in INSIDE job Remove ALL former employee s accounts/access Often, the person requires a RANSOM to reverse/prevent further damage to data I'm still a hacker. I get paid for it now. I never received any monetary gain from the hacking I did before. The main difference in what I do now compared to what I did then is that I now do it with authorization. Kevin Mitnick

  8. HACKTIVISTS This is again, a TARGETED type of event usually via PHISHING HACKTIVISTS have an agenda to prove May want a Ransom May want to just cause financial damage Example: Wipe out student records at XYZ college because tuition is too high and my student loan is huge! Further, the next generation of terrorists will grow up in a digital world, with ever more powerful and easy- to-use hacking tools at their disposal. Dorothy Denning

More Related Content