Keeping You and Your Business Safe Online

Page created by Robin Rivera
 
CONTINUE READING
Keeping You and Your Business Safe Online
Keeping You and Your Business Safe Online
Keeping You and Your Business Safe Online
Keeping You and Your Business Safe Online
Keeping You and Your Business Safe Online
Keeping You and Your Business Safe Online
Keeping You and Your Business Safe Online
Keeping You and Your Business Safe Online
Keeping You and Your Business Safe Online
Top Impersonated Companies
Keeping You and Your Business Safe Online
Keeping You and Your Business Safe Online
FBI Internet Crime Report 2018

351,936 reported complaints

  Non-payment / non-delivery
  Extortion
  Personal data base breeches
FBI Internet Crime Report 2018

Most financially costly
  Business email Compromise
  Romance or Confidence Fraud
  Investment Scams
The flaw lies in PC- Doctor Toolbox systems analysis software …and pre-installed on PCs made

  by some of the biggest computer retailers, including Dell, Alienware, Staples and Corsair.
Crippling Ransomware Attacks
           Targeting US cities on the Rise

Targeted ransomware attacks on local US government
entities -- cities, police stations and schools -- are on
the rise, costing millions

Some pay off the perpetrators in an effort to untangle
themselves and restore vital systems.
At least 170 county, city or state government
systems have been attacked since 2013, including
at least 45 police and sheriff's offices.

This year, there have been more than 20 reported
public-sector attacks.
“the most destructive and costly N.S.A. breach in history”
Malware

1971- Creeper Worm
1974 – Wabbit
1982 – Elk Cloner
1991 – Michelangelo Virus
1999 – Melissa Virus
2000 – ILOVEYOU Worm
2010 – Stuxnet Worm
2017 – WannaCry Ransomware
Malware Infection Symptoms

•   Near 100% CPU usage
•   Slow computer or web browser speeds
•   Problems connecting to networks
•   Freezing
•   Crashing
•   Modified or deleted files
Malware Infection Symptoms

• Unwanted advertisements appearing on screen
• Strange files, programs or desktop icons
• Programs running, turn off or reconfiguring
  themselves
• Strange computer behavior
• Emails sent without the users’ knowledge
What happens in the cloud doesn't necessarily stay in the
     cloud — a lesson that actress Bella Thorne has learned the
     hard way.

"Once you take that picture it goes into the cloud and
it's available to any hacker who wants it, and if you
don't know that in 2019 that this is an issue, I'm sorry.
You don't get to do that."

                  Whoopi Goldberg commenting on Bella Thorne’s leaked nude photos
Mitigation Measures
VPN
The cache (pronounced "cash") is a space in your
computer's hard drive and in RAM memory where your
browser saves copies of previously visited Web pages.

Instead of downloading an image from a recently viewed
website, it will load the image from your cache folder,
thereby making the browsing process a little quicker.
Clearing Cache
https://myactivity.google.com/
A DNS cache (sometimes called DNS resolver cache) is a
temporary database, maintained by a computer's
operating system, that contains records of all the recent
visits and attempted visits to websites and other internet
domains.
Clearing DNS Cache

Click “Start” - type the word “Command” in the Start
search field.

Right-click the command prompt icon and select the
option to “Run as Administrator”.

In the open prompt, type ipconfig /flushdns

You should receive a message of your success as
confirmation when the cache is cleared.
“The only privacy that exists is in your own head.”
Phone Number Port-Out Scam

1. Your information is           4. Your phone provider cancels
   stolen. Whether from your        your phone service.
   mail, online, or you click a
   malicious link and fill out a 5. Your phone number is ported
   form.                            to a new provider.
2. An identity thief finds and
   buys your PII on a Dark Web
   marketplace.                  6. With your phone number, the
                                    identity thief steals your
3. The scammer convinces            money and accounts.
   your phone service that they
   are you.
https://haveibeenpwned.com
https://www.dehashed.com
https://haveibeenpwned.com/Passwords
You can also read