Cyber Security User Overview
Martin Dinham Martin.Dinham@cfsystems.co.uk 01209 340030
Cyber Security User Overview Martin Dinham - - PowerPoint PPT Presentation
Cyber Security User Overview Martin Dinham Martin.Dinham@cfsystems.co.uk 01209 340030 Some context Daily Mail online, April 2017 52 % the number of small businesses that had a security breach in 2016 UK Government Cyber Security
Cyber Security User Overview
Martin Dinham Martin.Dinham@cfsystems.co.uk 01209 340030
Daily Mail online, April 2017
the number of small businesses that had a security breach in 2016
UK Government Cyber Security Breaches Survey 2017
a breach, experienced a serious business impact
UK Government Information Security Breaches Survey 2017
2016 US social engineering report – the cyberminute
Consequences
How can an attack happen?
Malware
“Software used to disrupt computer operations, deliver viruses, gather sensitive information, gain access to systems or display unwanted advertising”
Zero Day Exploit
“A cyber attack that occurs on the same day that a vulnerability is discovered, it is zero day because the attack is launched before a fix becomes available.”
into surrendering confidential information
aimed at a specific organisation
Phishing/Spear Phishing
CEO/BEC
CEO/BEC Fraud – Chief Executive / Business Email Crime - Impersonating senior executives to coerce staff into taking certain actions, often financially detrimental 1 in 3 companies have been victims of CEO fraud emails
Whaling
Phishing campaigns that are targeted at senior level
due to their highly focused nature can be harder to detect than standard phishing attacks.
Ransomware
A malware that encrypts or locks files, and then demands payment of the “ransom” to decrypt or unlock them. Paying the ransom encourages the criminals and there is no guarantee that you will retrieve all your files. Regular backups are the key to combating ransomware.
Malvertising
The use of online advertising to distribute malware or scams with little or no user interaction required. Executed by hiding malicious code within relatively safe
The ads can lead the victim to unreliable content or directly infect a victim’s device. Links in social media can be particularly dangerous
A security infrastructure should be built using multiple security controls to safeguard network resources and data Antivirus is not sufficient and has led to a false sense of security
IT Security
IT User Security
Technique used by cybercriminals to lure unsuspecting users into revealing confidential data, infecting devices or taking other actions for the benefit of the criminals. Humans are:
Trusting Generally helpful by nature Inquisitive
The more sophisticated attacks will not just use email and social media, cybercriminals will add authenticity with telephone calls to “back up” their chosen scam.
The Human Factor – Social Engineering
Phishing CEO/BEC Fraud Whaling Support scams
The Human Factor – Social Engineering
Emails are dangerous!
Email is the prime delivery mechanism for cyber crime attempts
Because…..
attachments
Ransomware statistics
days or more
back
Web browsing
and https in the URL
take you to malware infected or phishing websites
search bar
software – these often contain malware
Passwords
Bad Practice
Favourites (eg teams/holidays)
Passwords
Telephone numbers Simple sequences Actual names Family/pet names Birthdays
Worst Passwords of 2017
Portable storage
Critical issues
understand them?
your policies?
The value of the data on a device usually exceeds the value of the device itself – Often by a factor of 100
Lost or stolen devices?
The business significance of cyber security
an SME supplier that suffered a data breach
cyber security clauses
KPMG
What does this mean ?
enough…
technology
Tel 01209 340030 Martin.dinham@cfsystems.co.uk www.cfsystems.co.uk
@CFSystems CF Systems Ltd CF Systems Ltd