Jun 25, 2015
The NewSecurity Threat
Your Computers at Risk
Presented by Placer Computers
How cyber-criminals are winning the Malware wars
PC Magazine:
A Zero-Day Attack is a virus or other malware exploit that takes advantage of a hole in a program or operating system before the software developer has made a fix available...”
Zero Day Attacks
Cyber-criminals create over 60,000 new Malware attacks EVERY DAY!
Antivirus/Antispyware software can’t protect against these new threats until AFTER they strike.
Once the malware gets in, it seeks and attacks program vulnerabilities
Am I At Risk?
Improved Microsoft security updates make 3rd party software attacks more attractive
3rd party software less likely to be regularly updated by PC owner
Cyber-criminals know this so they seek the easiest targets
How Did This Happen?
Average PC has 24-26 non-Microsoft (3rd party) apps
Gregg Keiser, Computer World July 2010:
“While vulnerabilities in Windows XP and Vista will climb by 31% and 34% respectively this year compared to 2009, bugs in 3rd party apps will jump by 92%”
Is There a Trend?
California Civil Code 1798.81.5A business… shall implement and maintain reasonable security procedures and practices appropriate… to protect the personal information from unauthorized access… or disclosure.
California Financial Code 4057An entity that negligently discloses or shares nonpublic personal information… shall be liable, irrespective of the amount of damages suffered… for a civil penalty not to exceed $2,500 per violation. ($500,000 max)
How Will It Effect Me?
There is a solution
Placer Computers
Placer Computers
Security Management
KEEPING YOUR SOFTWARE UP TO DATE
Placer Computers
SO WHAT CAN
PLACER COMPUTERSDO FOR YOU?
Placer Computers
STEP 1:
Security Scan
Identify software vulnerabilities
www.PlacerComputers.com
Placer Computers
STEP 2:
Locate Missing Updates
Microsoft critical/optional patches3rd Party program updates/patches
www.PlacerComputers.com
Placer Computers
STEP 3:
Identify End-of-Life Software
Programs no longer supported are risky!
www.PlacerComputers.com
Placer Computers
STEP 4:
Download, install security updates
Ensures that all software is up-to-date
www.PlacerComputers.com
Placer Computers
STEP 5:
Find replacements for EOL programs
Many free options are available. We willresearch and provide recommendations
www.PlacerComputers.com
Placer Computers
STEP 6:
Scan and repair privacy leaks
Most programs leave a trail of personal data
www.PlacerComputers.com
Placer Computers
STEP 7:
Spyware Scan
Catch any malware that gotpast your Antivirus software
www.PlacerComputers.com
Placer Computers
STEP 8:
System Cleanup and Optimization
Clean your computer in/outOptimize your PC to run better
www.PlacerComputers.com
Placer Computers
BOOK NOW AND SAVE:
50% off
530-388-8811www.PlacerComputers.com