Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

Cyber Security

No description
by

William McGillivray

on 9 June 2016

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Cyber Security

Cyber Security
WHAT IS THE KEY TO
?
Common Sense?
If in Doubt!
www.navertech.com
William McGillivray, Commercial Director
Text here
Threats can come from credible sources, such as existing clients/suppliers. they may have become infected and are unknowingly transmitting to their contacts.
If they have been compromised LET THEM KNOW
Security
Online Threats
Threat mitigation
Phishing

Malware infection through users clicking on malicious e-mail attachments or website links.

Hacking

Exploitation of known vulnerabilities in Internet connected servers and devices using widely available tools and techniques.
Boundary firewalls and internet gateways

Secure configuration

Access control

Malware protection

Patch management

DATA BACKUPS!

Secure Passwords!
Contrary to popular belief

Anti-Malware/Virus tools are

NOT

100% effective
People require to be able to do things such as open attachments/click on web links.


People are the weakest link in ANY security system.
Passwords

Never use any word which is related to you and may be easy to guess, for example by looking at your social media pages. Absolutely never use:

Pet’s name
Other family members’ name
Favourite holiday
Current partner’s name
Child’s name
Place of birth
Something related to your favourite sports team


http://security.stackexchange.com/questions/6095/xkcd-936-short-complex-password-or-long-dictionary-passphrase
Servers/PC's, email systems, websites etc are under constant attack.
The important thing is that protection measures are not circumvented.
It is NEVER too much bother to check a concern with your IT support company!
More information: https://www.cyberstreetwise.com/cyberessentials/
Cyber Essentials is a new Government-backed and industry supported scheme to guide businesses in protecting themselves against cyber threats.
Phishing scams are when fraudsters send malicious fake emails, social network posts and texts to tempt you in or try to gain your trust to take your sensitive information and/or money.

Phishing emails sometimes pretend to be from your bank or they may ask for your logon details for certain other accounts like PayPal or your email account. If you’ve ever received an email saying you’ve won a lottery you’ve never entered or have inherited vast sums, this too is a phishing email trying to get hold of your personal details.

The emails, texts and posts often contain embedded links which encourage you to click.



Advice:

If in doubt, delete it.

Phishing
Them

Hacking

Cyber criminals will try to hack your computer/ tablet/smartphone to gain access to your systems and sensitive information in order to commit fraud and other crimes.

Advice:

Download vendor software and app updates when prompted – they provide security fixes as well as design changes

Install and keep anti virus software up to date on all devices

Use strong passwords

Use firewalls at home and your business


You
Full transcript