![Page 1: 5 Network Security Threats Facing Businesses Today](https://reader036.vdocuments.us/reader036/viewer/2022081518/554d5c14b4c905003b8b4c99/html5/thumbnails/1.jpg)
Top 5 Security Threats Facing Businesses TodayKey Considerations in Protecting Your Data and Your Future
Network Security Series Part 1 of 2
![Page 2: 5 Network Security Threats Facing Businesses Today](https://reader036.vdocuments.us/reader036/viewer/2022081518/554d5c14b4c905003b8b4c99/html5/thumbnails/2.jpg)
How to Interact TodayType your questions and comments here throughout the webinar. We will answer them periodically or at the end.
or…
Email your questions to [email protected] and we will reply to you by the end of the day.
![Page 3: 5 Network Security Threats Facing Businesses Today](https://reader036.vdocuments.us/reader036/viewer/2022081518/554d5c14b4c905003b8b4c99/html5/thumbnails/3.jpg)
Dustin HallSales/Marketing Manager
Meet Your Presenters
Stephen NelmsSenior IT Consultant
![Page 4: 5 Network Security Threats Facing Businesses Today](https://reader036.vdocuments.us/reader036/viewer/2022081518/554d5c14b4c905003b8b4c99/html5/thumbnails/4.jpg)
Who is this webinar for?
Business Owners Executives Office
Administrators Business Managers IT Staff Members
![Page 5: 5 Network Security Threats Facing Businesses Today](https://reader036.vdocuments.us/reader036/viewer/2022081518/554d5c14b4c905003b8b4c99/html5/thumbnails/5.jpg)
The Key Takeaways
The 5 major security threats facing your business
today
How these threats work
Tips to protecting your network• More on Network Security Components in Part 2 of the Series
![Page 6: 5 Network Security Threats Facing Businesses Today](https://reader036.vdocuments.us/reader036/viewer/2022081518/554d5c14b4c905003b8b4c99/html5/thumbnails/6.jpg)
Today’s attendees will receive…
Network Assessment + Risk Reportby Velocity Network Solutions
![Page 7: 5 Network Security Threats Facing Businesses Today](https://reader036.vdocuments.us/reader036/viewer/2022081518/554d5c14b4c905003b8b4c99/html5/thumbnails/7.jpg)
The 5 threats we’ll cover…
Malware
Torrents (peer-to-peer networks)
Snowshoe Spamming
Hacking-as-a-Service
Mobile Threats
![Page 8: 5 Network Security Threats Facing Businesses Today](https://reader036.vdocuments.us/reader036/viewer/2022081518/554d5c14b4c905003b8b4c99/html5/thumbnails/8.jpg)
Malware
Torrents (peer-to-peer networks)
Snowshoe Spamming
Hacking-as-a-Service
Mobile Threats
![Page 9: 5 Network Security Threats Facing Businesses Today](https://reader036.vdocuments.us/reader036/viewer/2022081518/554d5c14b4c905003b8b4c99/html5/thumbnails/9.jpg)
Malware
malicious software used to gather sensitive data, infiltrate private networks or harm general operations.
computer virusesransomwarewormstrojan horsesrootkitskeyloggersdialersspywareadwaremalicious BHOsrogue security software
![Page 10: 5 Network Security Threats Facing Businesses Today](https://reader036.vdocuments.us/reader036/viewer/2022081518/554d5c14b4c905003b8b4c99/html5/thumbnails/10.jpg)
Tips to Protect Your Network
Use enterprise grade anti-malware software Have a backup & disaster recovery solution in
place Limit which websites employees can visit Educate staff on best practices
![Page 11: 5 Network Security Threats Facing Businesses Today](https://reader036.vdocuments.us/reader036/viewer/2022081518/554d5c14b4c905003b8b4c99/html5/thumbnails/11.jpg)
Malware
Torrents (peer-to-peer networks)
Snowshoe Spamming
Hacking-as-a-Service
Mobile Threats
![Page 12: 5 Network Security Threats Facing Businesses Today](https://reader036.vdocuments.us/reader036/viewer/2022081518/554d5c14b4c905003b8b4c99/html5/thumbnails/12.jpg)
Torrents (peer-to-peer networks)
a way of sharing often pirated files such as music, video, software, etc. within a peer-to-peer network by simultaneously downloading and uploading segments of each file.
BitTorrentThe Pirate BayTorrentzKickass TorrentsIsoHuntExtraTorrent1337xEZTVBitSnoopTorrentReactor
![Page 13: 5 Network Security Threats Facing Businesses Today](https://reader036.vdocuments.us/reader036/viewer/2022081518/554d5c14b4c905003b8b4c99/html5/thumbnails/13.jpg)
Tips to Protect Your Network
Safest bet…don’t use them! Use a PC that’s off your business’s network Scan the files for viruses and wait for results
![Page 14: 5 Network Security Threats Facing Businesses Today](https://reader036.vdocuments.us/reader036/viewer/2022081518/554d5c14b4c905003b8b4c99/html5/thumbnails/14.jpg)
Malware
Torrents (peer-to-peer networks)
Snowshoe Spamming
Hacking-as-a-Service
Mobile Threats
![Page 15: 5 Network Security Threats Facing Businesses Today](https://reader036.vdocuments.us/reader036/viewer/2022081518/554d5c14b4c905003b8b4c99/html5/thumbnails/15.jpg)
Snowshoe Spamming
a spamming technique in which a spammer uses a multitude of IP addresses in order to widely disperse spam messages. This large spread of IP addresses increases the difficulty in identifying the source, allowing it to reach more email inboxes.
![Page 16: 5 Network Security Threats Facing Businesses Today](https://reader036.vdocuments.us/reader036/viewer/2022081518/554d5c14b4c905003b8b4c99/html5/thumbnails/16.jpg)
Tips to Protect Your Network
Impossible to protect yourself 100% BUT thee are still solid options
Use enterprise grade anti-spam software Be smart about which emails you open and
what files you download
![Page 17: 5 Network Security Threats Facing Businesses Today](https://reader036.vdocuments.us/reader036/viewer/2022081518/554d5c14b4c905003b8b4c99/html5/thumbnails/17.jpg)
Malware
Torrents (peer-to-peer networks)
Snowshoe Spamming
Hacking-as-a-Service
Mobile Threats
![Page 18: 5 Network Security Threats Facing Businesses Today](https://reader036.vdocuments.us/reader036/viewer/2022081518/554d5c14b4c905003b8b4c99/html5/thumbnails/18.jpg)
Hacking-as-a-Service
people who wish to engage in cybercrime can pay money to gain access to hacking tools and services provided by expert hackers.
attacks-as-a-servicemalware-as-a-servicefraud-as-a-servicecybercrime-as-a-service
![Page 19: 5 Network Security Threats Facing Businesses Today](https://reader036.vdocuments.us/reader036/viewer/2022081518/554d5c14b4c905003b8b4c99/html5/thumbnails/19.jpg)
Tips to Protect Your Network
Engage a well-rounded security toolset Hire a professional IT firm or employee to stay
current with upgrades and updates DO NOT assume that hackers are not
interested in your particular business!
![Page 20: 5 Network Security Threats Facing Businesses Today](https://reader036.vdocuments.us/reader036/viewer/2022081518/554d5c14b4c905003b8b4c99/html5/thumbnails/20.jpg)
Malware
Torrents (peer-to-peer networks)
Snowshoe Spamming
Hacking-as-a-Service
Mobile Threats
![Page 21: 5 Network Security Threats Facing Businesses Today](https://reader036.vdocuments.us/reader036/viewer/2022081518/554d5c14b4c905003b8b4c99/html5/thumbnails/21.jpg)
Mobile Threats
hackers are increasingly targeting mobile devices from a number of different angles as mobile devices tend to store a plethora of personal and business information.
Cyber attacks on mobile devices jumped by 500% in 2012*Of the 3 major cell phone manufacturers (Android, Blackberry and Apple), Android’s OS is the least secure, with Blackberry being the most secure*
*Tom Kellerman - “Cybersecurity for small business: Hackers and mobile devices - 2013's top threats” – 6/12/2013 – courtesy of thestar.com
![Page 22: 5 Network Security Threats Facing Businesses Today](https://reader036.vdocuments.us/reader036/viewer/2022081518/554d5c14b4c905003b8b4c99/html5/thumbnails/22.jpg)
Tips to Protect Your Network
Enable and use passwords to access devices Enable and use data encryption Update OS and security items regularly
![Page 23: 5 Network Security Threats Facing Businesses Today](https://reader036.vdocuments.us/reader036/viewer/2022081518/554d5c14b4c905003b8b4c99/html5/thumbnails/23.jpg)
What we covered today
Malware
Torrents (peer-to-peer networks)
Snowshoe Spamming
Hacking-as-a-Service
Mobile Threats
![Page 24: 5 Network Security Threats Facing Businesses Today](https://reader036.vdocuments.us/reader036/viewer/2022081518/554d5c14b4c905003b8b4c99/html5/thumbnails/24.jpg)
How Velocity Network Solutions can help…
Develop a network security plan
Proactively monitor and update your network
Standardize your environment
Troubleshoot potentially hazardous issues
Backup and disaster recovery
and much more…
![Page 25: 5 Network Security Threats Facing Businesses Today](https://reader036.vdocuments.us/reader036/viewer/2022081518/554d5c14b4c905003b8b4c99/html5/thumbnails/25.jpg)
Join us for part 2 of ourNetwork Security Webinar Series Wednesday, October 9th @ 11:00am PT
“5 Must-Have Components of a Secure Network”
![Page 26: 5 Network Security Threats Facing Businesses Today](https://reader036.vdocuments.us/reader036/viewer/2022081518/554d5c14b4c905003b8b4c99/html5/thumbnails/26.jpg)
Thank you for attending andwe’ll see you at the next webinar!
Phone: (818) 780-3600 x306 Email: [email protected]
www.VelocityNS.com