Upload
garey-junior-brooks
View
215
Download
2
Tags:
Embed Size (px)
Citation preview
The Strickland Group
• Founded in 2001• 25 employees• Information Technology consulting– Software Development– HelpDesk Support– Network Infrastructure Management
About me
• Evan Meade, Sr. Vice President of Network Infrastructure
• Manage network infrastructure for SMB clients
• Clients in many industries • from Colorado to Pennsylvania
True Benefits
• Instant Credit reports• Medical Records Sharing• Real time access to your bank or credit card
accounts• Photo sharing with distant friends
And True Risks
• Target Hack of 2013– 40 million credit cards stolen– paid $67 million to settle(http://money.cnn.com/2013/12/18/news/companies/target-credit-card/)
• 22 Million current and former government employees• Fingerprints, SSN, Security Clearing info• Suspected that Chinese government building a database
(https://en.wikipedia.org/wiki/Office_of_Personnel_Management_data_breach )
Office of Personnel Management
• Journalist and two hackers remotely took control of a Jeep Grand Cherokee
• First turned on A/C• Then Radio, blasting hip hop at full volume• Hackers put their picture on his dash display• Sprayed Windshield fluid• Finally, the hackers cut the transmission while journalist was
on the highway(http://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/)
Self Driving Car?
What does the future hold?
• Social Hacking• Government sponsored hacking • More and more viruses• Viruses targeting mobile devices
Cryptowall
• Computer gets virus– Email attachment– Link– Compromised website– Malicious Ad– Vulnerable software like java, flash, silverlight,
adobe, etc.
• Infected computer phones home– Connects via TOR or i2p peer to peer protocol– Impossible to trace
• Generates unique 2048-bit RSA key pair
• Checks location of infected computer• If in Belarus, Ukraine, Russia, or Kazakhstan,
uninstall and go away
Otherwise…
• Encrypts local files (spreadsheets, pictures, text files, documents, pdf files)
• Then scans for network drives and encrypts them
• Turns off windows Snapshots• Drops Decrypt instructions in each folder
where files were infected with “Ransom note”
2. Restore
• We recommend Datto backups• Fully managed backup solution• Backs up hourly to local appliance• Sends offsite nightly• Can virtualize on the device or in the cloud
3. Pay the Ransom
• …and cross your fingers• Bitcoin – usually about $500 worth• Payee is anonymous• No Guarantee you’ll get your files• Hard to obtain