29

The Strickland Group Founded in 2001 25 employees Information Technology consulting – Software Development – HelpDesk Support – Network Infrastructure

Embed Size (px)

Citation preview

The Strickland Group

• Founded in 2001• 25 employees• Information Technology consulting– Software Development– HelpDesk Support– Network Infrastructure Management

About me

• Evan Meade, Sr. Vice President of Network Infrastructure

• Manage network infrastructure for SMB clients

• Clients in many industries • from Colorado to Pennsylvania

we live in a post privacy world

and everything is connected

From LightbulbsTo

Thermostats

True Benefits

• Instant Credit reports• Medical Records Sharing• Real time access to your bank or credit card

accounts• Photo sharing with distant friends

And True Risks

• Target Hack of 2013– 40 million credit cards stolen– paid $67 million to settle(http://money.cnn.com/2013/12/18/news/companies/target-credit-card/)

• 22 Million current and former government employees• Fingerprints, SSN, Security Clearing info• Suspected that Chinese government building a database

(https://en.wikipedia.org/wiki/Office_of_Personnel_Management_data_breach )

Office of Personnel Management

• Journalist and two hackers remotely took control of a Jeep Grand Cherokee

• First turned on A/C• Then Radio, blasting hip hop at full volume• Hackers put their picture on his dash display• Sprayed Windshield fluid• Finally, the hackers cut the transmission while journalist was

on the highway(http://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/)

Self Driving Car?

What does the future hold?

• Social Hacking• Government sponsored hacking • More and more viruses• Viruses targeting mobile devices

RansomWare

Cryptowall

• Computer gets virus– Email attachment– Link– Compromised website– Malicious Ad– Vulnerable software like java, flash, silverlight,

adobe, etc.

Examples of malicious ads

• Infected computer phones home– Connects via TOR or i2p peer to peer protocol– Impossible to trace

• Generates unique 2048-bit RSA key pair

• Checks location of infected computer• If in Belarus, Ukraine, Russia, or Kazakhstan,

uninstall and go away

Otherwise…

• Encrypts local files (spreadsheets, pictures, text files, documents, pdf files)

• Then scans for network drives and encrypts them

• Turns off windows Snapshots• Drops Decrypt instructions in each folder

where files were infected with “Ransom note”

Virus then Deletes itself

What happens next?

Options?

1. You can always upgrade

2. Restore

• We recommend Datto backups• Fully managed backup solution• Backs up hourly to local appliance• Sends offsite nightly• Can virtualize on the device or in the cloud

3. Pay the Ransom

• …and cross your fingers• Bitcoin – usually about $500 worth• Payee is anonymous• No Guarantee you’ll get your files• Hard to obtain

Viruses are like ants at a picnic

Eventually, you’re going to find one

What you can do

– Always keep antivirus up to date– Take Regular Backups• Keep them Offline / offsite

– Use an external security device like a packet inspecting firewall

– Don’t click on links in emails or open attachments unless you are certain they are valid

– Keep all your software up to date