SlideShare a Scribd company logo
1 of 26
The Top 7 (Latest) Ways Employees
Cause Cybercrime Infections
Meet Our Speakers

Jason Dettbarn
Senior Technology
Analyst

Cynthia James
Director Business
Development, CISSP

Alex Brandt
VP Americas
About Our Experts: Kaspersky
• Founded in 1997; largest private anti-malware company –
100% focused on anti-malware
• Over $700M annual revenues
• Presence in 19 countries
• #1 vendor in Germany, France, Spain, Eastern Europe
• Protecting over 300 million end points
• America’s distribution: 12,000 outlets; top two vendors
(revenue & units shipping)
• Top supplier to OEMs/ISVs of anti-malware worldwide
Today’s Agenda










Cybercrime Threatscape: Malware Growth
Current Malware: Comprehension Gap
The Top (Latest) 7 Ways Employees Cause Cyber
Crime Infections
Security Solution Overview
3 Tips for CyberSafety at Home
Giveaway
Questions & Answers
Cybercrime Threatscape:
Malware Growth
200k unique malware samples PER YEAR were identified in 2006; 2M
in 2007…now it’s up to 200K malware samples PER DAY.

The quality of malware improves every year.
Current Malware:
Comprehension Gap
• Recent years have seen exponential growth in malware.
• Anyone can enter the cybercrime game.
• Cybercriminals earn over $100B a year.

Over 200K Per DAY

Where most employees/end users
think we still are

Where we really
are today (2013)

Cybercrime will never stop.
#1. Poor Password Management

present

The Top 7 (Latest) Ways
Employees Cause
Cybercrime Infections
#1. Poor Password Management
•

Same password, all
sites and servers
(personal and
business)

•

Easy to guess from
Facebook
#2. “Don’t Bore Me With Safety”
•

Users ignore
warnings

•

Users ignore usage
policies

•

Users don’t inform IT
of known security
issues
#3. Promiscuous Use of WIFI
•
•

On average we have 4.5
personal internet connected
devices
How many walk into work each
day?
•
How many WIFIs have we
frequented in between?
•
How secure are they?
•
To get infected only takes
ONE malicious participant
from one network OR
•
ONE device which the
owner doesn’t realize is
infected
#4. Users DEMAND
•

To be always
on, always
connected

•

To all social media

•

To get the latest
features
…regardless of the
security issues
#5. They Are Easy APT Targets
Cybercriminals target
social media for clues
• The (new) defacto
“morals clause” in
employment
agreements (don’t hurt
the brand)
• Behavior broadcasts
over social media
• Don’t upset
hacktivists!
•
#6. Companies Under-Estimate
The Insider Threat
•

•
•

1 incident of
insider fraud
per week per
year
75% caused
financial loss
It’s very easy to
sell data these
days
#7. Privileges Accumulate…
And Are Abused
•
•
•

When employees
change jobs, do rights
to data change?
Are passwords reset
when employees
leave?
Are admin passwords
or backdoors
documented and
closed?
Special Giveaway!




Kaspersky CyberSecurity Digest
- Free Security Bulletin
Free Kaseya Security Bundle Trial
Interested? Just respond to the Poll located on the
right bottom corner of your Webex platform!

Next: The Latest in Mobile Threats
The Latest in Mobile Threats


Top infection vector – infected apps


“Crackers” are widely available: open app, insert
malware, repost it
Infected via ads



Malware is downloaded for Windows or Android





Infection via SMS or email

Profit model: 1.) SMS premium messaging; 2.) theft
of assets (APTs); 3.) stealing authentication codes
 Advertisers receive the same information we
provide the app (geolocation apps for example)
Biggest problem: Android updates take 6 months to
get

Remediation Recommendations
–
–
–

Purchase apps from legitimate storefronts (“Verify
Apps”)
Use AV on smartphones to defend against APTs
Help employees with their devices:
•
•
•
•

Turn Bluetooth to undiscoverable
Warn them about malicious apps
Require them to register every mobile device which
uses the corporate wifi
Push data about “cybersafety at home”
3 Tips for Cyber Safety at Home
•
•

•

Go long – longer passphrases are
much more secure
No online banking except over
secured wifi
Safety/privacy - tell kids & teens:
–
–

How geolocators in photos work
Privacy doesn’t exist - don’t share
family details online
Poor Password
Management

Privileges
Accumulate…
And Are Abused

Companies
Under-Estimate
the Insider Threat

“Don’t Bore Me
With Safety”

The Top
Seven

They are Easy
APT Targets

Users DEMAND

Promiscuous Use
of WIFI
The Power of Layered Security
Kaseya Security Stack
Endpoint
Monitoring
& Hardening

Antivirus

AntiMalware

Remediation
Agent
Procedures

Monitoring

Monitoring
Kaseya
Antivirus
Passwords

Kaseya
AntiMalware

Service Desk
& PSA

USB
Block Processes

Scheduling &
Management
Layered Security:
Let’s Take a Look
About Our Experts: Kaseya

“Providing Enterprise-Class IT Systems
Management for Everybody”
www.kaseya.com
UNIFIED MANAGEMENT
Discover the State of IT

Manage the State of IT

Automate the State of
IT

•
•
•
•

• Scheduling
• Procedures
• API/Messaging

• Reporting
• Dashboards
• Interactive Data Views

Systems
Assets
Mobile Devices
Network Devices

IT Configuration Management
•
•
•

•
•
•

Remote Management
Software Deployment
Power Management

Image Deployment
Desktop Migration
Mobile Device Management

Business Continuity
•
•

Asset Management
•

Network Discover & AD

• Hardware/Software

•
•

Asset Management
Virtual Machine Management

AntiVirus
AntiMalware

•
•

Patch Management
Software Updates

•

File & Folder Backup

Service Delivery
•
•
•

Security
•
•

Image Backup
Image Virtualization

Service Desk/Ticketing
Policy Management
Service Billing

•
•

Policy Compliance
Time Tracking

Systems Monitoring
•
•
•

Systems Checks & Alerts
Agent Monitoring
Enterprise Monitoring

•
•

Agent-less Monitoring
Log Monitoring

www.kaseya.com
www.kaseya.com
Q&A / Resources
Discover:
http://www.kaseya.com/resources/webi
nars/en/kaseya-solution-overview

Contact us:
1 (877) 926-0001
sales@kaseya.com

Try Kaseya:
http://www.kaseya.com/lps/global/lp/p
roduct-preview.aspx
Use Promo Code: security072013

Visit us:
www.kaseya.com
www.kaseya.com

More Related Content

More from Kaseya

Advanced Administration: Kaseya Traverse
Advanced Administration: Kaseya TraverseAdvanced Administration: Kaseya Traverse
Advanced Administration: Kaseya TraverseKaseya
 
Advanced Administration: Kaseya BYOD Suite
Advanced Administration: Kaseya BYOD SuiteAdvanced Administration: Kaseya BYOD Suite
Advanced Administration: Kaseya BYOD SuiteKaseya
 
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...Kaseya
 
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...Kaseya
 
Security and Backup II: Vision and Direction
Security and Backup II: Vision and DirectionSecurity and Backup II: Vision and Direction
Security and Backup II: Vision and DirectionKaseya
 
Security and Backup I: OEM Architecture
Security and Backup I: OEM ArchitectureSecurity and Backup I: OEM Architecture
Security and Backup I: OEM ArchitectureKaseya
 
Kaseya Monitoring Suite Overview
Kaseya Monitoring Suite OverviewKaseya Monitoring Suite Overview
Kaseya Monitoring Suite OverviewKaseya
 
Kaseya Asset Discovery Overview
Kaseya Asset Discovery OverviewKaseya Asset Discovery Overview
Kaseya Asset Discovery OverviewKaseya
 
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...Kaseya
 
Automation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
Automation Desk I: Leveraging Service Desk as a Hub for Advanced AutomationAutomation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
Automation Desk I: Leveraging Service Desk as a Hub for Advanced AutomationKaseya
 
Kaseya Technology Alliance Partner Landscape
Kaseya Technology Alliance Partner LandscapeKaseya Technology Alliance Partner Landscape
Kaseya Technology Alliance Partner LandscapeKaseya
 
Advanced Administration: Kaseya Virtual Administrator
Advanced Administration: Kaseya Virtual AdministratorAdvanced Administration: Kaseya Virtual Administrator
Advanced Administration: Kaseya Virtual AdministratorKaseya
 
Kaseya Corporate Update and Roadmap Q1 2014
Kaseya Corporate Update and Roadmap Q1 2014Kaseya Corporate Update and Roadmap Q1 2014
Kaseya Corporate Update and Roadmap Q1 2014Kaseya
 
The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management Kaseya
 
Kaseya BYOD Suite
Kaseya BYOD SuiteKaseya BYOD Suite
Kaseya BYOD SuiteKaseya
 
MSP Best Practice Integrating your RMM with your PSA Solution for Maximum Pr...
MSP Best Practice  Integrating your RMM with your PSA Solution for Maximum Pr...MSP Best Practice  Integrating your RMM with your PSA Solution for Maximum Pr...
MSP Best Practice Integrating your RMM with your PSA Solution for Maximum Pr...Kaseya
 
Making Money in the Cloud Part II…Is Your MSP Team Ready?
Making Money in the Cloud   Part II…Is Your MSP Team Ready?Making Money in the Cloud   Part II…Is Your MSP Team Ready?
Making Money in the Cloud Part II…Is Your MSP Team Ready?Kaseya
 
5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD Policy5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD PolicyKaseya
 
Systems Management 2.0: How to Gain Control of Unruly & Distributed Networks
Systems Management 2.0: How to Gain Control of Unruly & Distributed NetworksSystems Management 2.0: How to Gain Control of Unruly & Distributed Networks
Systems Management 2.0: How to Gain Control of Unruly & Distributed NetworksKaseya
 
Kaseya Connect 2013: A step by-step sales process guaranteed to supercharge r...
Kaseya Connect 2013: A step by-step sales process guaranteed to supercharge r...Kaseya Connect 2013: A step by-step sales process guaranteed to supercharge r...
Kaseya Connect 2013: A step by-step sales process guaranteed to supercharge r...Kaseya
 

More from Kaseya (20)

Advanced Administration: Kaseya Traverse
Advanced Administration: Kaseya TraverseAdvanced Administration: Kaseya Traverse
Advanced Administration: Kaseya Traverse
 
Advanced Administration: Kaseya BYOD Suite
Advanced Administration: Kaseya BYOD SuiteAdvanced Administration: Kaseya BYOD Suite
Advanced Administration: Kaseya BYOD Suite
 
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
 
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
 
Security and Backup II: Vision and Direction
Security and Backup II: Vision and DirectionSecurity and Backup II: Vision and Direction
Security and Backup II: Vision and Direction
 
Security and Backup I: OEM Architecture
Security and Backup I: OEM ArchitectureSecurity and Backup I: OEM Architecture
Security and Backup I: OEM Architecture
 
Kaseya Monitoring Suite Overview
Kaseya Monitoring Suite OverviewKaseya Monitoring Suite Overview
Kaseya Monitoring Suite Overview
 
Kaseya Asset Discovery Overview
Kaseya Asset Discovery OverviewKaseya Asset Discovery Overview
Kaseya Asset Discovery Overview
 
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
 
Automation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
Automation Desk I: Leveraging Service Desk as a Hub for Advanced AutomationAutomation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
Automation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
 
Kaseya Technology Alliance Partner Landscape
Kaseya Technology Alliance Partner LandscapeKaseya Technology Alliance Partner Landscape
Kaseya Technology Alliance Partner Landscape
 
Advanced Administration: Kaseya Virtual Administrator
Advanced Administration: Kaseya Virtual AdministratorAdvanced Administration: Kaseya Virtual Administrator
Advanced Administration: Kaseya Virtual Administrator
 
Kaseya Corporate Update and Roadmap Q1 2014
Kaseya Corporate Update and Roadmap Q1 2014Kaseya Corporate Update and Roadmap Q1 2014
Kaseya Corporate Update and Roadmap Q1 2014
 
The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management
 
Kaseya BYOD Suite
Kaseya BYOD SuiteKaseya BYOD Suite
Kaseya BYOD Suite
 
MSP Best Practice Integrating your RMM with your PSA Solution for Maximum Pr...
MSP Best Practice  Integrating your RMM with your PSA Solution for Maximum Pr...MSP Best Practice  Integrating your RMM with your PSA Solution for Maximum Pr...
MSP Best Practice Integrating your RMM with your PSA Solution for Maximum Pr...
 
Making Money in the Cloud Part II…Is Your MSP Team Ready?
Making Money in the Cloud   Part II…Is Your MSP Team Ready?Making Money in the Cloud   Part II…Is Your MSP Team Ready?
Making Money in the Cloud Part II…Is Your MSP Team Ready?
 
5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD Policy5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD Policy
 
Systems Management 2.0: How to Gain Control of Unruly & Distributed Networks
Systems Management 2.0: How to Gain Control of Unruly & Distributed NetworksSystems Management 2.0: How to Gain Control of Unruly & Distributed Networks
Systems Management 2.0: How to Gain Control of Unruly & Distributed Networks
 
Kaseya Connect 2013: A step by-step sales process guaranteed to supercharge r...
Kaseya Connect 2013: A step by-step sales process guaranteed to supercharge r...Kaseya Connect 2013: A step by-step sales process guaranteed to supercharge r...
Kaseya Connect 2013: A step by-step sales process guaranteed to supercharge r...
 

Recently uploaded

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 

Recently uploaded (20)

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 

Top 7 Ways Employees Cause Cybercrime Infections

  • 1. The Top 7 (Latest) Ways Employees Cause Cybercrime Infections
  • 2. Meet Our Speakers Jason Dettbarn Senior Technology Analyst Cynthia James Director Business Development, CISSP Alex Brandt VP Americas
  • 3. About Our Experts: Kaspersky • Founded in 1997; largest private anti-malware company – 100% focused on anti-malware • Over $700M annual revenues • Presence in 19 countries • #1 vendor in Germany, France, Spain, Eastern Europe • Protecting over 300 million end points • America’s distribution: 12,000 outlets; top two vendors (revenue & units shipping) • Top supplier to OEMs/ISVs of anti-malware worldwide
  • 4. Today’s Agenda        Cybercrime Threatscape: Malware Growth Current Malware: Comprehension Gap The Top (Latest) 7 Ways Employees Cause Cyber Crime Infections Security Solution Overview 3 Tips for CyberSafety at Home Giveaway Questions & Answers
  • 5. Cybercrime Threatscape: Malware Growth 200k unique malware samples PER YEAR were identified in 2006; 2M in 2007…now it’s up to 200K malware samples PER DAY. The quality of malware improves every year.
  • 6. Current Malware: Comprehension Gap • Recent years have seen exponential growth in malware. • Anyone can enter the cybercrime game. • Cybercriminals earn over $100B a year. Over 200K Per DAY Where most employees/end users think we still are Where we really are today (2013) Cybercrime will never stop.
  • 7. #1. Poor Password Management present The Top 7 (Latest) Ways Employees Cause Cybercrime Infections
  • 8. #1. Poor Password Management • Same password, all sites and servers (personal and business) • Easy to guess from Facebook
  • 9. #2. “Don’t Bore Me With Safety” • Users ignore warnings • Users ignore usage policies • Users don’t inform IT of known security issues
  • 10. #3. Promiscuous Use of WIFI • • On average we have 4.5 personal internet connected devices How many walk into work each day? • How many WIFIs have we frequented in between? • How secure are they? • To get infected only takes ONE malicious participant from one network OR • ONE device which the owner doesn’t realize is infected
  • 11. #4. Users DEMAND • To be always on, always connected • To all social media • To get the latest features …regardless of the security issues
  • 12. #5. They Are Easy APT Targets Cybercriminals target social media for clues • The (new) defacto “morals clause” in employment agreements (don’t hurt the brand) • Behavior broadcasts over social media • Don’t upset hacktivists! •
  • 13. #6. Companies Under-Estimate The Insider Threat • • • 1 incident of insider fraud per week per year 75% caused financial loss It’s very easy to sell data these days
  • 14. #7. Privileges Accumulate… And Are Abused • • • When employees change jobs, do rights to data change? Are passwords reset when employees leave? Are admin passwords or backdoors documented and closed?
  • 15. Special Giveaway!   Kaspersky CyberSecurity Digest - Free Security Bulletin Free Kaseya Security Bundle Trial Interested? Just respond to the Poll located on the right bottom corner of your Webex platform! Next: The Latest in Mobile Threats
  • 16. The Latest in Mobile Threats  Top infection vector – infected apps  “Crackers” are widely available: open app, insert malware, repost it Infected via ads  Malware is downloaded for Windows or Android   Infection via SMS or email Profit model: 1.) SMS premium messaging; 2.) theft of assets (APTs); 3.) stealing authentication codes  Advertisers receive the same information we provide the app (geolocation apps for example) Biggest problem: Android updates take 6 months to get 
  • 17. Remediation Recommendations – – – Purchase apps from legitimate storefronts (“Verify Apps”) Use AV on smartphones to defend against APTs Help employees with their devices: • • • • Turn Bluetooth to undiscoverable Warn them about malicious apps Require them to register every mobile device which uses the corporate wifi Push data about “cybersafety at home”
  • 18. 3 Tips for Cyber Safety at Home • • • Go long – longer passphrases are much more secure No online banking except over secured wifi Safety/privacy - tell kids & teens: – – How geolocators in photos work Privacy doesn’t exist - don’t share family details online
  • 19. Poor Password Management Privileges Accumulate… And Are Abused Companies Under-Estimate the Insider Threat “Don’t Bore Me With Safety” The Top Seven They are Easy APT Targets Users DEMAND Promiscuous Use of WIFI
  • 20. The Power of Layered Security
  • 21. Kaseya Security Stack Endpoint Monitoring & Hardening Antivirus AntiMalware Remediation Agent Procedures Monitoring Monitoring Kaseya Antivirus Passwords Kaseya AntiMalware Service Desk & PSA USB Block Processes Scheduling & Management
  • 23. About Our Experts: Kaseya “Providing Enterprise-Class IT Systems Management for Everybody” www.kaseya.com
  • 24. UNIFIED MANAGEMENT Discover the State of IT Manage the State of IT Automate the State of IT • • • • • Scheduling • Procedures • API/Messaging • Reporting • Dashboards • Interactive Data Views Systems Assets Mobile Devices Network Devices IT Configuration Management • • • • • • Remote Management Software Deployment Power Management Image Deployment Desktop Migration Mobile Device Management Business Continuity • • Asset Management • Network Discover & AD • Hardware/Software • • Asset Management Virtual Machine Management AntiVirus AntiMalware • • Patch Management Software Updates • File & Folder Backup Service Delivery • • • Security • • Image Backup Image Virtualization Service Desk/Ticketing Policy Management Service Billing • • Policy Compliance Time Tracking Systems Monitoring • • • Systems Checks & Alerts Agent Monitoring Enterprise Monitoring • • Agent-less Monitoring Log Monitoring www.kaseya.com
  • 26. Q&A / Resources Discover: http://www.kaseya.com/resources/webi nars/en/kaseya-solution-overview Contact us: 1 (877) 926-0001 sales@kaseya.com Try Kaseya: http://www.kaseya.com/lps/global/lp/p roduct-preview.aspx Use Promo Code: security072013 Visit us: www.kaseya.com www.kaseya.com