Top Banner
22
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: The New Data Security Risk
Page 2: The New Data Security Risk

The NewSecurity Threat

Page 3: The New Data Security Risk

Your Computers at Risk

Presented by Placer Computers

How cyber-criminals are winning the Malware wars

Page 4: The New Data Security Risk

PC Magazine:

A Zero-Day Attack is a virus or other malware exploit that takes advantage of a hole in a program or operating system before the software developer has made a fix available...”

Zero Day Attacks

Page 5: The New Data Security Risk

Cyber-criminals create over 60,000 new Malware attacks EVERY DAY!

Antivirus/Antispyware software can’t protect against these new threats until AFTER they strike.

Once the malware gets in, it seeks and attacks program vulnerabilities

Am I At Risk?

Page 6: The New Data Security Risk

Improved Microsoft security updates make 3rd party software attacks more attractive

3rd party software less likely to be regularly updated by PC owner

Cyber-criminals know this so they seek the easiest targets

How Did This Happen?

Page 7: The New Data Security Risk

Average PC has 24-26 non-Microsoft (3rd party) apps

Gregg Keiser, Computer World July 2010:

“While vulnerabilities in Windows XP and Vista will climb by 31% and 34% respectively this year compared to 2009, bugs in 3rd party apps will jump by 92%”

Is There a Trend?

Page 8: The New Data Security Risk

California Civil Code 1798.81.5A business… shall implement and maintain reasonable security procedures and practices appropriate… to protect the personal information from unauthorized access… or disclosure.

California Financial Code 4057An entity that negligently discloses or shares nonpublic personal information… shall be liable, irrespective of the amount of damages suffered… for a civil penalty not to exceed $2,500 per violation. ($500,000 max)

How Will It Effect Me?

Page 9: The New Data Security Risk

There is a solution

Page 10: The New Data Security Risk
Page 11: The New Data Security Risk

Placer Computers

Page 12: The New Data Security Risk

Placer Computers

Security Management

KEEPING YOUR SOFTWARE UP TO DATE

Page 13: The New Data Security Risk

Placer Computers

SO WHAT CAN

PLACER COMPUTERSDO FOR YOU?

Page 14: The New Data Security Risk

Placer Computers

STEP 1:

Security Scan

Identify software vulnerabilities

www.PlacerComputers.com

Page 15: The New Data Security Risk

Placer Computers

STEP 2:

Locate Missing Updates

Microsoft critical/optional patches3rd Party program updates/patches

www.PlacerComputers.com

Page 16: The New Data Security Risk

Placer Computers

STEP 3:

Identify End-of-Life Software

Programs no longer supported are risky!

www.PlacerComputers.com

Page 17: The New Data Security Risk

Placer Computers

STEP 4:

Download, install security updates

Ensures that all software is up-to-date

www.PlacerComputers.com

Page 18: The New Data Security Risk

Placer Computers

STEP 5:

Find replacements for EOL programs

Many free options are available. We willresearch and provide recommendations

www.PlacerComputers.com

Page 19: The New Data Security Risk

Placer Computers

STEP 6:

Scan and repair privacy leaks

Most programs leave a trail of personal data

www.PlacerComputers.com

Page 20: The New Data Security Risk

Placer Computers

STEP 7:

Spyware Scan

Catch any malware that gotpast your Antivirus software

www.PlacerComputers.com

Page 21: The New Data Security Risk

Placer Computers

STEP 8:

System Cleanup and Optimization

Clean your computer in/outOptimize your PC to run better

www.PlacerComputers.com

Page 22: The New Data Security Risk

Placer Computers

BOOK NOW AND SAVE:

50% off

530-388-8811www.PlacerComputers.com