1 of 29

Cyber Security: Entrepreneurs

September 27, 2018

2 of 29

Audience

  • The Business Owner
  • The Accounting Dept
  • Admin System Users

3 of 29

Objective

At the end of this presentation you will be aware of common scams and how to make them less likely

4 of 29

Who Is Being Targeted?

5 of 29

Users

  • Gateway
  • Source Of Information

6 of 29

Accounting

  • Where The Money Is
  • Actually Issue Payments

7 of 29

The Owner

  • Has The Authority
  • Has Access
  • Directives Are Less Questioned

8 of 29

Who Is Doing It?

9 of 29

Attacker Profile

  • India (85%), Africa, China
  • English Speaking Low Labor
  • Low Tech, Persistent

10 of 29

What Is The Impact

11 of 29

$5.3 Billion

  • Oct 2013 - Dec 2016
  • Email Compromises

12 of 29

How Are They Doing It?

13 of 29

The Email Scam

You get a seemingly legit email asking you to confirm

  • You Account Info
  • Package Acceptance
  • Block a Purchase
  • Pay to release a check
  • Install software

This is sometimes called ‘Phishing’

The email includes a link to a site like:

  • apple.account.info
  • usps.package-release.com

Usually they are after your name and password, but sometimes opening an attached PDF or following a link itself is enough to infect your system

14 of 29

The Spear Phishing Scam

You get email from a coworker or business partner with tailored information

  • Asking you to authorize payment or issue a check for a doctored invoice
  • Release confidential information
  • Install a new version of software X, attached or via a link

Linked resources will be similar

  • apple.account.info
  • usps.package-release.com

15 of 29

Why did they do it?

It’s easy. They use tools to send many thousands of emails, blanketing organizations.

Any software is for remote control and monitoring

Spear techniques are high reward

The reward is access to:

  • Your email
  • Your itunes, etc
  • Your entire computer (Ransomware)
  • Your banking or payment system
    • Direct deposit
    • Accounts payable

16 of 29

How Do I Guard Against It?

17 of 29

Beware The Link And Attachment

Never click on a link in any email unless you solicited that information.

Google “Apple Account Status” and follow those links if you want to check your account.

Similarly with attachments.

Always run Anti-Virus software when opening files from anyone, including your contacts.

Verify invoices and payments

18 of 29

The Phone Ploy

The Tech Support Call

  • You get a pop-up saying you’re infected and it comes with a number
  • You give ‘Apple’ a call for support with mistaken phone number from google

The Imposter Call

  • Utility or IRS calls; A sense of urgency; your power is about to he be cut, the local police are on their way

The Billing Confirmation

  • You get a call when you arrive somewhere asking to confirm payment

19 of 29

Why did they do it?

Labor costs are cheap

Their goal is to change your credit card.

Other rewards are similar as before

The reward is access to:

  • Your email
  • Your itunes
  • Your entire computer
  • Your banking or payment system
    • Direct deposit
    • Accounts payable

20 of 29

How Do I Guard Against It?

21 of 29

Beware The Unsolicited Phone Call

Never release any information to someone who calls you.

Never trust caller ID.

If you must, call them back and research the number they supply vs the advertised contacts.

22 of 29

Services and Support

Business Promotion and Coaching

Directory List and Advertising Scams

Credit Card Processing and Equip Leasing

Changing Online Reviews

Hire the coaching service Ivy Capital to develop your online business and earn up to $10,000 a month working just five to 10 hours a week. You’d just need to pay $2,000 to $20,000 for Ivy’s program, products and services

23 of 29

Why did they do it?

The Federal Trade Commission announced last week that Ivy is accused of taking more than $100 million from unsuspecting entrepreneurs who “got very little in return and found it difficult to get their money back if they canceled.”

24 of 29

How Do I Guard Against It?

25 of 29

Get 3rd Party Recommendations

Speak with colleagues who’ve had experience working with coaches to launch an online business.

Tap into your industry association for referrals. Your favorite bloggers might have connections, too.

Look for experts in business magazines and books from credible publishers

Take advantage of free or low-cost training before spending serious money.

26 of 29

Wrapping Up

27 of 29

Devices

Keep Software Up To Date. Set it to Auto

Data

Backup and Seperate Your Files

Creds

Use a Password Manager and Different Passwords. MFA

Operate

Train Your Employees

28 of 29

MFA

https://www.google.com/landing/2step/

https://www.facebook.com/notes/facebook-engineering/introducing-login-approvals/10150172618258920/

29 of 29

Summary

Email

Never click on a link in any email unless you solicited that information.

Phone

Never release any information to someone who calls you.

Coaching and Services

Always use personal referrals and industry reviews