SlideShare a Scribd company logo
1 of 14
© 2018 WSI. All rights reserved.
Your Business Can’t Afford to Ignore
5 Cybersecurity
Threats
2
© 2018 WSI. All rights reserved.
3
© 2018 WSI. All rights reserved.
1. Everyone Is A Potential Cybercrime
Victim (Yes, You Too)
2. Once The Bad Guys Get Your Stuff,
There’s No Getting It Back
3. Failing to Use Two-Factor
Authentication Can Put You At Risk
4. Cyber Criminals Prey on Weak
Passwords
5. Letting Your Guard Down on Social
Media
5 Cybersecurity Threats
4
© 2018 WSI. All rights reserved.
"Cybersecurity costs will reach 1
trillion dollars in five years - and it
still won't be nearly enough to stop
the bad guys!"
The Unfortunate Reality
- Scott Augenbaum, Retired FBI Special Agent, Cybercrime Division
5
© 2018 WSI. All rights reserved.
Everyone Is A Potential Cybercrime Victim
(Yes, You Too)
Misconception
“It will never happen to me, I have nothing of
value.”
“We have security measures in place, we’re
safe.”
“We have much bigger competitors. They’ll
get targeted, not us.”
Reality
Everyone has sensitive information they need
to safeguard.
Everyone uses common technologies that
exist outside of basic protection (e.g. email,
social media)
Whether you’re an individual with five pieces
of information or a global corporation with 50
million, you’re a potential cybercrime victim.
6
© 2018 WSI. All rights reserved.
Once the Bad Guys Get Your Stuff,
There’s No Getting it Back
• This isn’t like getting your car stolen
– There’s no insurance policy to
recover your losses
• Important to be proactive, not
reactive
• Businesses have an obligation to
protect their the online accounts of
their customers
• A cybersecurity breach isn’t a
mistake, it’s a failure that couple
have been avoided
7
© 2018 WSI. All rights reserved.
Failing to Use Two-Factor Authentication
Can Put You At Risk
• Two-factor authentication is a method or technology that confirms a user’s identity
by any combination of two different factors:
– Something they know (usually a password)
– Something they have (a text message sent to their phone)
– Or, something they are (voice or fingerprint).
• 85% of all data breaches could be prevented using
two-factor authentication
8
© 2018 WSI. All rights reserved.
Cybercriminals Prey on Weak Passwords
• 70% of people use the same password for multiple
accounts
• Reduce the chance of a cyberattack by using:
– Two-factor authentication + strong passwords
• Our recommendations:
– Have separate passwords for mission-critical accounts
– Don’t use week passwords for anything
– Come up with a password creation system and USE it
– Or, find a password management tool with two-factor
authentication
9
© 2018 WSI. All rights reserved.
• Passwords should include:
– 12 characters in length
– Both uppercase and
lowercase letters
– Special character and a
number
– Personal passphrases
• A phrase that has personal
meaning that you can
remember
Criteria for a Strong Password Creation System
Example of a strong password system:
#9ILFbtlCC9#
Special character
and number
Special character
and number
Personal passphrase
I love fall because the leaves change color
10
© 2018 WSI. All rights reserved.
Letting Your Guard Down on Social Media
• Still a lack of concern for security on social media
• Many of us often use social information to login to
third party accounts and apps
• For cybercriminals, social media is the gateway to
your more personal information
– Some people use similar passwords for social accounts
as other mission critical accounts (e.g. bank accounts)
– Can learn a lot about your personal details (e.g. job,
address) but trolling someone’s social media accounts
11
© 2018 WSI. All rights reserved.
DO’S
• Use service providers that offer two-
factor authentication
• Use our password creation system to
generate mission-critical passwords.
• Use different passwords for mission-
critical accounts
• Use different passwords for as many of
your accounts as possible
• Think before you click, no matter what
you’re doing online
• Protect yourself on social media
DON’TS
• Never believe that it can’t happen to you
– it can and it will
• Don’t assume the FBI, or anybody else,
can get your stuff back
• Never use a service provider unless they
offer two-factor authentication
• Don’t use the same password for mission-
critical accounts
• Don’t get complacent about your
cybersecurity
• Don’t let your guard down on social
media
Cybersecurity Do’s & Don’ts
12
© 2018 WSI. All rights reserved.
Please Don’t Ignore Your Cybersecurity
• Here are three takeaways I’d like you to remember:
#1 - Think before you act. Think before you click. You are your own
firewall, so question everything, and if you aren’t sure, don’t click.
#2 - Don’t do business with people or companies that don’t use
two-factor authentication. Period. No exceptions.
#3 - Use strong passwords, and don’t use the same password for
two different mission-critical accounts.
13
© 2018 WSI. All rights reserved.
Want to improve your
cybersecurity?
Request a copy of WSI’s
Cybersecurity eBook
We help ideas realize their potential by leveraging the
Internet & its many unrecognized opportunities.
© 2017 WSI. All rights reserved.

More Related Content

What's hot

Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceInderjeet Singh
 
Health Information Privacy and Security (October 21, 2020)
Health Information Privacy and Security (October 21, 2020)Health Information Privacy and Security (October 21, 2020)
Health Information Privacy and Security (October 21, 2020)Nawanan Theera-Ampornpunt
 
A Comedy of Errors in Web Application Security
A Comedy of Errors in Web Application SecurityA Comedy of Errors in Web Application Security
A Comedy of Errors in Web Application SecurityRob Dudley
 
Artificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityArtificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityOlivier Busolini
 
Cyberattacks the-next-healthcare-epidemic
Cyberattacks the-next-healthcare-epidemicCyberattacks the-next-healthcare-epidemic
Cyberattacks the-next-healthcare-epidemicKate Barney
 
Ict H A C K I N G
Ict    H A C K I N GIct    H A C K I N G
Ict H A C K I N GHafizra Mas
 
Presentation: True Stories from the Threat Hunting Files
Presentation: True Stories from the Threat Hunting FilesPresentation: True Stories from the Threat Hunting Files
Presentation: True Stories from the Threat Hunting FilesDomainTools
 
Cyber and Data Risks
Cyber and Data RisksCyber and Data Risks
Cyber and Data Risksrisksmith
 
Cybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive MeasuresCybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive MeasuresAditya Ratnaparkhi
 
Whitepaper Avira about Artificial Intelligence to cyber security
Whitepaper Avira  about Artificial Intelligence to cyber securityWhitepaper Avira  about Artificial Intelligence to cyber security
Whitepaper Avira about Artificial Intelligence to cyber securityGopiRajan4
 
Cybersecurity & Data Protection: Thinking About Risk & Compliance
Cybersecurity & Data Protection: Thinking About Risk & ComplianceCybersecurity & Data Protection: Thinking About Risk & Compliance
Cybersecurity & Data Protection: Thinking About Risk & ComplianceShawn Tuma
 
Expert FSO Insider Threat Awareness
Expert FSO Insider Threat AwarenessExpert FSO Insider Threat Awareness
Expert FSO Insider Threat AwarenessEric Schiowitz
 
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...Black Duck by Synopsys
 
Information security
Information securityInformation security
Information securityVarshil Patel
 
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...Netpluz Asia Pte Ltd
 
Ethical Hacking & IT Security Courses in SIFS
Ethical Hacking & IT Security Courses in SIFSEthical Hacking & IT Security Courses in SIFS
Ethical Hacking & IT Security Courses in SIFSSifs India
 
Cyber Security: The Strategic View
Cyber Security: The Strategic ViewCyber Security: The Strategic View
Cyber Security: The Strategic ViewCisco Canada
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsNetLockSmith
 

What's hot (20)

Cyber attack
Cyber attackCyber attack
Cyber attack
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial Intelligence
 
Health Information Privacy and Security (October 21, 2020)
Health Information Privacy and Security (October 21, 2020)Health Information Privacy and Security (October 21, 2020)
Health Information Privacy and Security (October 21, 2020)
 
A Comedy of Errors in Web Application Security
A Comedy of Errors in Web Application SecurityA Comedy of Errors in Web Application Security
A Comedy of Errors in Web Application Security
 
Artificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityArtificial Intelligence and Cybersecurity
Artificial Intelligence and Cybersecurity
 
Cyberattacks the-next-healthcare-epidemic
Cyberattacks the-next-healthcare-epidemicCyberattacks the-next-healthcare-epidemic
Cyberattacks the-next-healthcare-epidemic
 
Ict H A C K I N G
Ict    H A C K I N GIct    H A C K I N G
Ict H A C K I N G
 
Presentation: True Stories from the Threat Hunting Files
Presentation: True Stories from the Threat Hunting FilesPresentation: True Stories from the Threat Hunting Files
Presentation: True Stories from the Threat Hunting Files
 
Cyber and Data Risks
Cyber and Data RisksCyber and Data Risks
Cyber and Data Risks
 
Cybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive MeasuresCybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive Measures
 
Whitepaper Avira about Artificial Intelligence to cyber security
Whitepaper Avira  about Artificial Intelligence to cyber securityWhitepaper Avira  about Artificial Intelligence to cyber security
Whitepaper Avira about Artificial Intelligence to cyber security
 
Cybersecurity & Data Protection: Thinking About Risk & Compliance
Cybersecurity & Data Protection: Thinking About Risk & ComplianceCybersecurity & Data Protection: Thinking About Risk & Compliance
Cybersecurity & Data Protection: Thinking About Risk & Compliance
 
Expert FSO Insider Threat Awareness
Expert FSO Insider Threat AwarenessExpert FSO Insider Threat Awareness
Expert FSO Insider Threat Awareness
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
 
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
 
Information security
Information securityInformation security
Information security
 
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
 
Ethical Hacking & IT Security Courses in SIFS
Ethical Hacking & IT Security Courses in SIFSEthical Hacking & IT Security Courses in SIFS
Ethical Hacking & IT Security Courses in SIFS
 
Cyber Security: The Strategic View
Cyber Security: The Strategic ViewCyber Security: The Strategic View
Cyber Security: The Strategic View
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness Infographics
 

Similar to 5 Cybersecurity Threats Your Business Can't Afford to Ignore

Cybersecurity Awareness Overview.pptx
Cybersecurity Awareness Overview.pptxCybersecurity Awareness Overview.pptx
Cybersecurity Awareness Overview.pptxsanap6
 
Cybersecurity Awareness Overview.pptx
Cybersecurity Awareness Overview.pptxCybersecurity Awareness Overview.pptx
Cybersecurity Awareness Overview.pptxinstaeditz009
 
Cybersecurity Awareness Overview.pptx
Cybersecurity Awareness Overview.pptxCybersecurity Awareness Overview.pptx
Cybersecurity Awareness Overview.pptxAfsanaMumal2
 
Cybersecurity Awareness Overview- BSBXCS402.pptx
Cybersecurity Awareness Overview- BSBXCS402.pptxCybersecurity Awareness Overview- BSBXCS402.pptx
Cybersecurity Awareness Overview- BSBXCS402.pptxitsamuamit11
 
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...nexxtep
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBCapyn
 
Phishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxPhishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxStephen Jesukanth Martin
 
How to Recognize a Fake Email.pptx
How to Recognize a Fake Email.pptxHow to Recognize a Fake Email.pptx
How to Recognize a Fake Email.pptxSultan593473
 
The Immune System of Internet
The Immune System of InternetThe Immune System of Internet
The Immune System of InternetMohit Kanwar
 
What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?Entrance Exam Info
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingSachin Saini
 
Are you at risk on the World Wide Web?
Are you at risk on the World Wide Web? Are you at risk on the World Wide Web?
Are you at risk on the World Wide Web? TechGenie
 
Cyber Security - Moving Past "Best Practices"
Cyber Security - Moving Past "Best Practices"Cyber Security - Moving Past "Best Practices"
Cyber Security - Moving Past "Best Practices"Billtrust
 
Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015
Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015
Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015StampedeCon
 
Netwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech TalkNetwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech TalkNetWatcher
 

Similar to 5 Cybersecurity Threats Your Business Can't Afford to Ignore (20)

Cybersecurity Awareness Overview.pptx
Cybersecurity Awareness Overview.pptxCybersecurity Awareness Overview.pptx
Cybersecurity Awareness Overview.pptx
 
Cybersecurity Awareness Overview.pptx
Cybersecurity Awareness Overview.pptxCybersecurity Awareness Overview.pptx
Cybersecurity Awareness Overview.pptx
 
Cybersecurity Awareness Overview.pptx
Cybersecurity Awareness Overview.pptxCybersecurity Awareness Overview.pptx
Cybersecurity Awareness Overview.pptx
 
Social Engineering and Identity Theft
Social Engineering and Identity TheftSocial Engineering and Identity Theft
Social Engineering and Identity Theft
 
Cybersecurity Awareness Overview- BSBXCS402.pptx
Cybersecurity Awareness Overview- BSBXCS402.pptxCybersecurity Awareness Overview- BSBXCS402.pptx
Cybersecurity Awareness Overview- BSBXCS402.pptx
 
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...
 
Masterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy BasicsMasterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy Basics
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBC
 
Personal Threat Models
Personal Threat ModelsPersonal Threat Models
Personal Threat Models
 
Phishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxPhishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptx
 
NEDMA18 Keynote: Cyber Security – what you need to know, what you need to do
NEDMA18 Keynote: Cyber Security – what you need to know, what you need to doNEDMA18 Keynote: Cyber Security – what you need to know, what you need to do
NEDMA18 Keynote: Cyber Security – what you need to know, what you need to do
 
How to Recognize a Fake Email.pptx
How to Recognize a Fake Email.pptxHow to Recognize a Fake Email.pptx
How to Recognize a Fake Email.pptx
 
The Immune System of Internet
The Immune System of InternetThe Immune System of Internet
The Immune System of Internet
 
What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
E commerce
E commerce E commerce
E commerce
 
Are you at risk on the World Wide Web?
Are you at risk on the World Wide Web? Are you at risk on the World Wide Web?
Are you at risk on the World Wide Web?
 
Cyber Security - Moving Past "Best Practices"
Cyber Security - Moving Past "Best Practices"Cyber Security - Moving Past "Best Practices"
Cyber Security - Moving Past "Best Practices"
 
Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015
Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015
Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015
 
Netwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech TalkNetwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech Talk
 

More from WSI WebAnalys

WSI Whitepaper social location mobile marketing
WSI Whitepaper social location mobile marketingWSI Whitepaper social location mobile marketing
WSI Whitepaper social location mobile marketingWSI WebAnalys
 
Outperform your competitors with social selling
Outperform your competitors with social sellingOutperform your competitors with social selling
Outperform your competitors with social sellingWSI WebAnalys
 
Social Selling Uppsala
Social Selling UppsalaSocial Selling Uppsala
Social Selling UppsalaWSI WebAnalys
 
Affärsnyttan med Twitter workshop gävle
Affärsnyttan med Twitter workshop gävleAffärsnyttan med Twitter workshop gävle
Affärsnyttan med Twitter workshop gävleWSI WebAnalys
 
5 tips för att förstå och förbättra din kunds köpcykel
5 tips för att förstå och förbättra din kunds köpcykel5 tips för att förstå och förbättra din kunds köpcykel
5 tips för att förstå och förbättra din kunds köpcykelWSI WebAnalys
 
Utbildningar i Social Selling B2B
Utbildningar i Social Selling B2BUtbildningar i Social Selling B2B
Utbildningar i Social Selling B2BWSI WebAnalys
 
WSI:s App för Lokala Butiker, Salonger, Restauranger och Caféer.
WSI:s App för Lokala Butiker, Salonger, Restauranger och Caféer.WSI:s App för Lokala Butiker, Salonger, Restauranger och Caféer.
WSI:s App för Lokala Butiker, Salonger, Restauranger och Caféer.WSI WebAnalys
 
15 Ways to Improve Your Website's Conversion Rate
15 Ways to Improve Your Website's Conversion Rate15 Ways to Improve Your Website's Conversion Rate
15 Ways to Improve Your Website's Conversion RateWSI WebAnalys
 
Marknadsföring på sociala medier
Marknadsföring på sociala medierMarknadsföring på sociala medier
Marknadsföring på sociala medierWSI WebAnalys
 
WSI_WISDOM_BOOK_Internetmarknadsföring - kundrefererenser
WSI_WISDOM_BOOK_Internetmarknadsföring - kundrefererenserWSI_WISDOM_BOOK_Internetmarknadsföring - kundrefererenser
WSI_WISDOM_BOOK_Internetmarknadsföring - kundrefererenserWSI WebAnalys
 

More from WSI WebAnalys (10)

WSI Whitepaper social location mobile marketing
WSI Whitepaper social location mobile marketingWSI Whitepaper social location mobile marketing
WSI Whitepaper social location mobile marketing
 
Outperform your competitors with social selling
Outperform your competitors with social sellingOutperform your competitors with social selling
Outperform your competitors with social selling
 
Social Selling Uppsala
Social Selling UppsalaSocial Selling Uppsala
Social Selling Uppsala
 
Affärsnyttan med Twitter workshop gävle
Affärsnyttan med Twitter workshop gävleAffärsnyttan med Twitter workshop gävle
Affärsnyttan med Twitter workshop gävle
 
5 tips för att förstå och förbättra din kunds köpcykel
5 tips för att förstå och förbättra din kunds köpcykel5 tips för att förstå och förbättra din kunds köpcykel
5 tips för att förstå och förbättra din kunds köpcykel
 
Utbildningar i Social Selling B2B
Utbildningar i Social Selling B2BUtbildningar i Social Selling B2B
Utbildningar i Social Selling B2B
 
WSI:s App för Lokala Butiker, Salonger, Restauranger och Caféer.
WSI:s App för Lokala Butiker, Salonger, Restauranger och Caféer.WSI:s App för Lokala Butiker, Salonger, Restauranger och Caféer.
WSI:s App för Lokala Butiker, Salonger, Restauranger och Caféer.
 
15 Ways to Improve Your Website's Conversion Rate
15 Ways to Improve Your Website's Conversion Rate15 Ways to Improve Your Website's Conversion Rate
15 Ways to Improve Your Website's Conversion Rate
 
Marknadsföring på sociala medier
Marknadsföring på sociala medierMarknadsföring på sociala medier
Marknadsföring på sociala medier
 
WSI_WISDOM_BOOK_Internetmarknadsföring - kundrefererenser
WSI_WISDOM_BOOK_Internetmarknadsföring - kundrefererenserWSI_WISDOM_BOOK_Internetmarknadsföring - kundrefererenser
WSI_WISDOM_BOOK_Internetmarknadsföring - kundrefererenser
 

Recently uploaded

Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...meghakumariji156
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentationuneakwhite
 
Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow ChallengesFalcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow Challengeshemanthkumar470700
 
Cannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannaBusinessPlans
 
New 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateNew 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateCannaBusinessPlans
 
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecZurliaSoop
 
Structuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdfStructuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdflaloo_007
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel
 
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in OmanMifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Omaninstagramfab782445
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptxnandhinijagan9867
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon investment
 
Rice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna ExportsRice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna ExportsShree Krishna Exports
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
Arti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfArti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfwill854175
 
Cracking the 'Career Pathing' Slideshare
Cracking the 'Career Pathing' SlideshareCracking the 'Career Pathing' Slideshare
Cracking the 'Career Pathing' SlideshareWorkforce Group
 

Recently uploaded (20)

Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow ChallengesFalcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
 
Cannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 Updated
 
New 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateNew 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck Template
 
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
 
Structuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdfStructuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdf
 
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pillsMifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
Buy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail AccountsBuy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail Accounts
 
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in OmanMifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
Rice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna ExportsRice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna Exports
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Arti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfArti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdf
 
Cracking the 'Career Pathing' Slideshare
Cracking the 'Career Pathing' SlideshareCracking the 'Career Pathing' Slideshare
Cracking the 'Career Pathing' Slideshare
 

5 Cybersecurity Threats Your Business Can't Afford to Ignore

  • 1. © 2018 WSI. All rights reserved. Your Business Can’t Afford to Ignore 5 Cybersecurity Threats
  • 2. 2 © 2018 WSI. All rights reserved.
  • 3. 3 © 2018 WSI. All rights reserved. 1. Everyone Is A Potential Cybercrime Victim (Yes, You Too) 2. Once The Bad Guys Get Your Stuff, There’s No Getting It Back 3. Failing to Use Two-Factor Authentication Can Put You At Risk 4. Cyber Criminals Prey on Weak Passwords 5. Letting Your Guard Down on Social Media 5 Cybersecurity Threats
  • 4. 4 © 2018 WSI. All rights reserved. "Cybersecurity costs will reach 1 trillion dollars in five years - and it still won't be nearly enough to stop the bad guys!" The Unfortunate Reality - Scott Augenbaum, Retired FBI Special Agent, Cybercrime Division
  • 5. 5 © 2018 WSI. All rights reserved. Everyone Is A Potential Cybercrime Victim (Yes, You Too) Misconception “It will never happen to me, I have nothing of value.” “We have security measures in place, we’re safe.” “We have much bigger competitors. They’ll get targeted, not us.” Reality Everyone has sensitive information they need to safeguard. Everyone uses common technologies that exist outside of basic protection (e.g. email, social media) Whether you’re an individual with five pieces of information or a global corporation with 50 million, you’re a potential cybercrime victim.
  • 6. 6 © 2018 WSI. All rights reserved. Once the Bad Guys Get Your Stuff, There’s No Getting it Back • This isn’t like getting your car stolen – There’s no insurance policy to recover your losses • Important to be proactive, not reactive • Businesses have an obligation to protect their the online accounts of their customers • A cybersecurity breach isn’t a mistake, it’s a failure that couple have been avoided
  • 7. 7 © 2018 WSI. All rights reserved. Failing to Use Two-Factor Authentication Can Put You At Risk • Two-factor authentication is a method or technology that confirms a user’s identity by any combination of two different factors: – Something they know (usually a password) – Something they have (a text message sent to their phone) – Or, something they are (voice or fingerprint). • 85% of all data breaches could be prevented using two-factor authentication
  • 8. 8 © 2018 WSI. All rights reserved. Cybercriminals Prey on Weak Passwords • 70% of people use the same password for multiple accounts • Reduce the chance of a cyberattack by using: – Two-factor authentication + strong passwords • Our recommendations: – Have separate passwords for mission-critical accounts – Don’t use week passwords for anything – Come up with a password creation system and USE it – Or, find a password management tool with two-factor authentication
  • 9. 9 © 2018 WSI. All rights reserved. • Passwords should include: – 12 characters in length – Both uppercase and lowercase letters – Special character and a number – Personal passphrases • A phrase that has personal meaning that you can remember Criteria for a Strong Password Creation System Example of a strong password system: #9ILFbtlCC9# Special character and number Special character and number Personal passphrase I love fall because the leaves change color
  • 10. 10 © 2018 WSI. All rights reserved. Letting Your Guard Down on Social Media • Still a lack of concern for security on social media • Many of us often use social information to login to third party accounts and apps • For cybercriminals, social media is the gateway to your more personal information – Some people use similar passwords for social accounts as other mission critical accounts (e.g. bank accounts) – Can learn a lot about your personal details (e.g. job, address) but trolling someone’s social media accounts
  • 11. 11 © 2018 WSI. All rights reserved. DO’S • Use service providers that offer two- factor authentication • Use our password creation system to generate mission-critical passwords. • Use different passwords for mission- critical accounts • Use different passwords for as many of your accounts as possible • Think before you click, no matter what you’re doing online • Protect yourself on social media DON’TS • Never believe that it can’t happen to you – it can and it will • Don’t assume the FBI, or anybody else, can get your stuff back • Never use a service provider unless they offer two-factor authentication • Don’t use the same password for mission- critical accounts • Don’t get complacent about your cybersecurity • Don’t let your guard down on social media Cybersecurity Do’s & Don’ts
  • 12. 12 © 2018 WSI. All rights reserved. Please Don’t Ignore Your Cybersecurity • Here are three takeaways I’d like you to remember: #1 - Think before you act. Think before you click. You are your own firewall, so question everything, and if you aren’t sure, don’t click. #2 - Don’t do business with people or companies that don’t use two-factor authentication. Period. No exceptions. #3 - Use strong passwords, and don’t use the same password for two different mission-critical accounts.
  • 13. 13 © 2018 WSI. All rights reserved. Want to improve your cybersecurity? Request a copy of WSI’s Cybersecurity eBook
  • 14. We help ideas realize their potential by leveraging the Internet & its many unrecognized opportunities. © 2017 WSI. All rights reserved.