Summary of FBI Seminar on Internet Security

FIRST OF ALL

HAPPY THANKSGIVING TO YOU AND YOUR FAMILY!!!!

THEN ….. for all of you who could not attend our recent FBI Cyber Security Seminar, we have prepared a recap of the presentation highlights.

Below is a summary of some of the key points covered by Kimo Hildreth of the FBI Task Force and by George Baldonado, President of Oasis Technology.

If you would like more details on the Vulnerability Scan special we are offering, please call Oasis Technology at 805-445-4833.

 

 

Summary of

FBI Seminar on Internet Security

November 14, 2017

 

Business Email Compromise Workshop: BEC       2017.11.17

Speaker: Kimo Hildreth, Ventura County District Attorney Investigator, FBI Outreach Program

Cyber Security Threat-scape

When you receive email, trust your instincts: If it doesn’t smell right, it probably is fraudulent.  Don’t open it. Report it to your IT department.

Between October 2013 and October 2016, Internet losses amounted to 5 billion dollars.  Business Email Compromise (BEC) has an average loss of $130,000.  The average loss from ransomware is $722. And the average bank robbery generates $3,816 of losses.

Ransomware is getting all of the press, but Business Email Compromise (BEC) is getting away with the lion’s share of stolen funds.

In 2016 businesses and individuals in California lost $255 million — made up of 39,000 victims. $14.6 million per month of Internet fraud in Los Angeles alone.

SMBs (Small Midsized Businesses) make up 54% of US sales. Cyber Criminals attack SMB because it is low risk.

60%of small businesses hit by a threat go out of business within 6 months. 

The reason many companies are not protected is because they put profits ahead of security.  Naturally, businesses focus their efforts profits.  However, this culture needs to change so at least there is a balance between the two.

Beware the Internet of things (IOT).  The Internet is NOT secure. Web cams can be opened by a hacker and you will not know. If necessary, cover up your web cam and unplug your microphones.

Real Estate market is prime target. Real estate firms and escrow companies’ emails have been compromised by hackers using a common 4 step process.  As part of this process, last minute instructions via valid appearing email redirects company officials to send funds to bogus accounts that funnels money out of the company and out of the country.

Cracking your password gives hackers full access to your entire system.

Using BEC, such as false invoices, false wire transfer request, etc., hackers impersonate businesses or business officials so that it causes the recipient to erroneously wire money to fake locations.

What YOU can do:

  1. Use strong passwords – a pass “phrase” is a better password than one word.
  2. Answer secret questions with non-standard answers.
  3. Use two factor authentications.
  4. Use different emails and passwords for critical services.
  5. Keep your systems updated.
  6. Backup your data.
  7. Check your system.
  8. Report issue to BEC.  https://www.ic3.gov/media/2016/160614.aspx

 

 

Steps For Businesses to Take to Not be Part of the 1 Trillion Dollars of Worldwide IT Intrusion Losses

Speaker: George Baldonado, President and CEO, Oasis Technology, Inc.

Work with an established IT Managed Service Provider offering Cyber Security services.

Oasis Technology has serviced Fortune 500 clients since 1979.

In 2013 it developed and patented the first Artificial Intelligence powered Cyber Security Protection platform.

Recognize “There are two types of companies in the world: those that know they’ve been hacked, and those that don’t.”   ….Misha Glenny

Should we believe that all firewalls protect our IT networks? No, they all have vulnerabilities. How do I protect my company and myself?

  • Find out how the hackers can get into your network.
  • Actively locate your vulnerabilities.
  • Stop their entry points.

Recommendation:

  • Obtain an external vulnerability scan from an independent, proven, and knowledgeable cyber security firm.
  • Have a vulnerability scan.  It is quick, non-invasive (your network will not be penetrated) and it will provide you with the information to see where your network has vulnerabilities – and then you can plug the holes.

Do Not Assume!!!!!!!!!!!

Most people believe that their Cyber Security bullet proof like the picture below.

When in TRUE FACT it is really like this:

DO NOT THINK IT CANNOT HAPPEN TO YOU

BECAUSE IT CAN AND IT DOES!!

 

Remember to stay Cyber Safe!
Get a reputable “White Hat hack” expert to look at your network and perform a “NON-INVASIVE” vulnerability analysis on your network from the outside.

 

 

Sounds like I may want to get a vulnerability analysis —  what do I do?

  • CALL US at 805-445-4833.
  • We can even go to your site if you are stuck in rut!!

 

26 Secrets that an Identify Thief Does not Want You to Know

What an Identity Thief Does Not Want You to Know — Click here

 

 

Email: georgeb@oasistechnology.com

Page: www.oasistechnology.com

www.facebook.com/oasistechnology

Voice: (805) 445-4833

Fax (805) 445-4839

601 Daily Drive, Suite 226 ● Camarillo, CA 93010 ● (805) 445-4833

TITAN – The Black Hole that hackers hate and firewalls love www.ipstitan.com/titanshow

There are two types of companies in the world: those that know they’ve been hacked, and those that don’t. …Misha Glenny

 

Leave a Comment