32
Medical Center- Computer Safety and Awareness Training MODULE 01: Email scams, phishing, and virus attachments

Malware Awareness Training

Embed Size (px)

Citation preview

Page 1: Malware Awareness Training

Medical Center-Computer Safety and Awareness Training

MODULE 01: Email scams, phishing, and virus attachments

Page 2: Malware Awareness Training

Keyword- Awareness• Increasing and diverse populations connecting to the internet• Dramatically increasing vectors• Increasingly available tools for hacking• Increasing value of patient data, market price for one CC

record= 1.00US, one full medical record= 50.00US.• Small hospitals are an exceptionally vulnerable target: low

budgets = weakened security.

Page 3: Malware Awareness Training

The Changing Reality of Computing in Today’s Worldmakes continual training needed.

• Human nature• We do not want barriers to our work, • we seek the most expedient path, • A call to action, • respond to seemingly sincere requests for help. EX- Franklin

Jyubuti, displaced refugee from South Africa.• People become victims, avoid blaming others- counter

productive, need an open environment of reporting.

Page 4: Malware Awareness Training

• Human nature• We do not want barriers to our work, • we seek the most expedient path, • A call to action, • respond to seemingly sincere requests for help. EX- Franklin

Jyubuti, displaced refugee from South Africa.• People become victims, avoid blaming others- counter

productive, need an open environment of reporting.

The Changing Reality of Computing in Today’s Worldmakes continual training needed.

Page 5: Malware Awareness Training

• Human nature• We do not want barriers to our work, • we seek the most expedient path, • A call to action, • respond to seemingly sincere requests for help. EX- Franklin

Jyubuti, displaced refugee from South Africa.• People become victims, avoid blaming others- counter

productive, need an open environment of reporting.

The Changing Reality of Computing in Today’s Worldmakes continual training needed.

Page 6: Malware Awareness Training

The Changing Reality of Computing in Today’s Worldmakes continual training needed.

• Human nature• We do not want barriers to our work, • we seek the most expedient path, • A call to action, • respond to seemingly sincere requests for help. EX- Franklin

Jyubuti, displaced refugee from South Africa.• People become victims, avoid blaming others- counter

productive, need an open environment of reporting.

Page 7: Malware Awareness Training

The Changing Reality of Computing in Today’s Worldmakes continual training needed.

• Human nature• We do not want barriers to our work, • we seek the most expedient path, • A call to action, • respond to seemingly sincere requests for help. EX- Franklin

Jyubuti, displaced refugee from South Africa.• People become victims, avoid blaming ourselves or others-

counter productive, need an open environment of reporting.

Page 8: Malware Awareness Training

The Changing Reality of Computing in Today’s Worldmakes continual training needed.

• Human nature• We do not want barriers to our work, • we seek the most expedient path, • A call to action, • respond to seemingly sincere requests for help. EX- Franklin

Jyubuti, displaced refugee from South Africa.• People become victims, avoid blaming ourselves or others-

counter productive, need an open environment of reporting.

Page 9: Malware Awareness Training

The Changing Reality of Computing in Today’s Worldmakes continual training needed.

• Human nature• We do not want barriers to our work, • we seek the most expedient path, • A call to action, • respond to seemingly sincere requests for help. EX- Franklin

Jyubuti, displaced refugee from South Africa.• People become victims, avoid blaming ourselves or others-

counter productive, need an open environment of reporting.

Page 10: Malware Awareness Training

Keyword- Awareness

Cost 2015 2016Healthcare 42,000,000 71,000,000

Hollywood Presbyterian Hospital said it had paid $17,000 in ransom money to regain access to files that had been locked in a ransomware attack. Expect such attacks to increase, says James Scott,

senior fellow at the Institute for Critical Infrastructure Security (ICIT), which recently released a report on the ransomware threat to organizations in critical infrastructure sectors.

“Hospitals are an easy target for many reasons,” Scott says. “Employees typically lack cyber hygiene training and their technology landscape, in most cases, is eerily absent of layered security centric protocols.“

Scott predicts that adversaries are going to start using ransomware as a diversionary tactic while they steal electronic health records and other sensitive data from healthcare networks. “The ransom will be secondary to the primary revenue generated by the sale of the data,” Scott says.

Firms that fall victim to infection from file encrypting ransomware should simply pay the ransom, Joseph Bonavolonta, an assistant special agent with the FBI.

Page 11: Malware Awareness Training

Keyword- Awareness-Email

Page 12: Malware Awareness Training

Keyword- Awareness-Email

Page 13: Malware Awareness Training

Keyword- Awareness-Email

Page 14: Malware Awareness Training

Keyword- Awareness-Email

Page 15: Malware Awareness Training

Keyword- Awareness-Email

Page 16: Malware Awareness Training

Keyword- Awareness-Email

Page 17: Malware Awareness Training

Keyword- Awareness-Email

Page 18: Malware Awareness Training

Keyword- Awareness-Email

Page 19: Malware Awareness Training

Keyword- Awareness-Email

Page 20: Malware Awareness Training

Keyword- Awareness-Email

Page 21: Malware Awareness Training

Keyword- Awareness-Email

Page 22: Malware Awareness Training

Keyword- Awareness-Email

Page 23: Malware Awareness Training

Keyword- Awareness-Websites

Page 24: Malware Awareness Training

Keyword- Awareness-Websites

Page 25: Malware Awareness Training

Keyword- Awareness-Websites

Page 26: Malware Awareness Training

Keyword- Awareness-Websites

Page 27: Malware Awareness Training

Keyword- Awareness-Websites

Page 28: Malware Awareness Training

Keyword- Awareness-Websites

Page 29: Malware Awareness Training

Keyword- Awareness= Defense

Page 30: Malware Awareness Training

Keyword- Awareness= DefenseWatch what you click In most cases, computers are unwittingly infected by users clicking on cleverly disguised malware links. 

Browse trusted websites. Avoid suspicious-looking sites and be wary of pop-up boxes that ask you to click on unfamiliar links. Be wary of social media notificationsScrutinize social media notifications and check links by hovering your mouse over them to confirm link addresses before clicking. If you suspect you are infected- UNPLUG, DO NOT SHUT DOWN!Call for help!

What symptoms indicate a computer has been compromised?Computer performs unusually slowComputer reboots on its ownWeb browser jumps to the wrong pagesWeb browser won’t display certain pagesEmails aren’t displayed properlyEmails randomly disappearPop-up ads randomly display on your screen

Page 31: Malware Awareness Training

Keyword- Awareness= DefenseIf you suspect:

UNPLUG,

CALL FOR HELP,

SING SOFTLY WHILE YOU WAIT HELP TO ARRIVE.

Page 32: Malware Awareness Training