Dr Web Mobile Security Licensing
|
|
- Neal Terry
- 3 years ago
- Views:
Transcription
1 Defend what you create DWCERT Dr.Web Mobile Security sales Course outline I. Modern threats to mobile devices II. Dr.Web mobile device protection products III. Dr.Web Mobile Security delivery versions IV. Dr.Web Mobile Security licensing history V. Dr.Web Mobile Security licensing VI. Dr.Web OEM Mobile VII. Sales support Doctor Web, 2014
2 I. Modern threats to mobile devices Most malware is created to infect Android-powered devices because this OS is so widespread. Threats to Android Modern handhelds, running OSs with great possibilities, are attractive targets for hacker attacks. This is evidenced by the steady growth in the number of new malicious programs, designed for mobile devices, being received by the Dr.Web anti-virus lab. These small gadgets provide cybercriminals with more opportunities for spying than PCs do. Many of them are equipped with cameras, and any mobile phone has a microphone. Some devices have a GPS navigator. All of these tools are helpful in different situations so long as the owner maintains control of the device. If that control is intercepted by criminals, mobile devices take on other possibilities. Confidential information stored on a device can be accessed: passwords (e.g., online banking system passwords or social network account passwords), bank account numbers and many other details. This opens up opportunities for criminals to blackmail users, collect and sell their information, or swap out their data for bogus information (Flexispy, Mobile Spy, Mobistealth, Android.AntaresSpy.1). People use mobile devices in both their private and professional lives. Employees working at home or travelling on business use their personal devices to store corporate information and enter company websites. That s why the theft of confidential information and passwords from personal devices is so dangerous. Some mobile device functions can be blocked or managed remotely for example, criminals can intercept inbound short messages in order to harm users or their business competitors at just the right moment (Android.Plankton, Android.Gongfu (Android.DreamExploid), Android.GoldDream). SMS messages can be sent and calls to premium-rate numbers made without user consent, resulting in direct monetary damage (Android.SmsSend). Criminals can steal money from user bank accounts and from online payment systems. Criminals can spy on users they can eavesdrop on conversations (toggle on the microphone), receive data from a GPS navigator on a user s location (to see whether they are present or absent in certain locations), take pictures of a user s location (turn on a camera and video recorder); and track what websites a user has visited, as well as incoming and outgoing calls, messages, and SMS. Banking Trojans for mobile devices Today, programs that intercept SMS containing mtan codes, which many enterprises use to confirm online financial transactions, are the most dangerous. Examples The banking Trojan Android.SpyEye.1. When users visit a bank website whose address is present in the Trojan horse's configuration file, this malicious program inserts texts or web forms into web pages, so customers loading a page of the bank s site into their browsers will see a message stating that a new bank security policy has been introduced and that in order to access their account (online banking system), they need to install a special application on their mobile device that will supposedly prevent the interception of their short messages, but will actually contain the Trojan horse. The malicious program Android.Pincer which can intercept short messages. This malicious program is spread as a security certificate that supposedly must be installed onto an Android device. If a careless user installs the program and attempts to launch it, Android.Pincer.2.origin will display a fake notification about the certificate s successful installation. Having launched successfully at startup, Android. Pincer.2.origin will connect to a remote server belonging to criminals and send it information about the 2
3 mobile device. Android.Pincer.2.origin makes it possible for a malicious program to be used for targeted attacks and to steal specific messages, for example, those containing mtan codes sent by banks. To familiarize yourself more thoroughly with mobile phone viruses, refer to Android threats in How do malicious programs penetrate mobile devices? 1. Through software vulnerabilities. A vulnerability is a flaw in an operating system or application software that can be exploited by a virus to corrupt data and interfere with its operation. Theoretically, any error in program code can be used to cause harm to the system in general. All software has vulnerabilities. Most are in Windows, affecting PCs and laptops, and in Android, affecting mobile devices. Software developers do their best to close vulnerabilities, especially critical ones, but sometimes virus writers find them before that happens (i.e., zero-day exploits that are still only known to virus writers or have not yet been closed by the software vendor). The vast majority of today's "successful" Trojans penetrate a system via vulnerabilities, including zero-day vulnerabilities. An anti-virus tries to close the vulnerabilities that create such points of intrusion, but most often it is a struggle with the aftermath virus writers find vulnerabilities before developers do. To eliminate vulnerabilities (close the gap in defense), users should update their mobile device s software in a timely manner all the programs, not just the anti-virus. Like people of any other profession, programmers who write programs for mobile devices can make mistakes. According to statistics, one in five Android programs has a vulnerability or, in other words, a gap that helps criminals introduce Trojans to mobile devices and carry out their activities. 2. Through the Internet. Many websites, regardless of their content, can be infected with viruses or malicious scripts. The user doesn t need to do anything to acquire the Trojan horse: infection occurs automatically when users visit infected sites. Astonishing fact Websites that are more likely to be sources of malware and phishing attacks Sites related to technologies and telecommunications Business websites: business media, business news portals, accounting-related sites and forums, online courses/lectures, services to improve business efficiency Adult content websites and resources for downloading free programs Through these sites, the criminals who compromised them can watch for victims and redirect them to infected sites. Pirated distributions can also carry viruses or Trojans. 3. Through the unwitting actions of users. Even if a malicious program can t exploit a vulnerability to penetrate a system/software, users are always ready to help. Most modern malicious programs aren t viruses because they can t self-proliferate. They are created in the hope that users will distribute them. Using different tricks (social engineering techniques), criminals make their victims install malicious programs, open malicious files, visit compromised sites, etc. For example, Android.Plankton, which collects and transmits information about compromised devices, was downloaded manually more than 150,000 times (!) from the official application store Android Market (formerly known as Google Play). 3
4 Is an anti-virus enough to protect a mobile device? The Dr.Web for Android Light anti-virus offers protection against viruses and malicious programs, particularly Trojans. But, today, this level of protection isn t enough. Only comprehensive protection, such as Dr.Web for Android, can protect against any type of malware used by fraudsters for cybercrimes. Such protection should include an anti-virus, anti-spam, anti-theft and an URL filter like Dr.Web Cloud Checker. What is the purpose of the Anti-spam? Dr.Web Anti-spam shields against unwanted calls and SMS messages. What does the URL filter Cloud Checker do? The URL filter Cloud Checker limits access to potentially dangerous sites. It is especially useful for children who don t understand the danger of some websites. IMPORTANT! Some anti-virus vendors claim to have a parental control component in their Android protection products. However, a product possessing full control over this operating system is IMPOSSIBLE to create at present. The default settings for the Android browser and the Google Chrome browser for Android do not allow true parental control to be employed since any user can open a page anonymously, and no software can trace that user s steps. Therefore, unlike its competitors, Doctor Web does not position its URL filter Dr.Web Cloud Checker as a parental control tool. What is the purpose of the Anti-theft? Mobile devices are at risk of being lost or stolen. Information (including access passwords and logins) can wind up in the hands of hackers. A single anti-virus can t protect information if the violator or the person who found the device wants to examine it. Dr.Web Anti-theft helps find lost or stolen mobile devices, blocks them, and, if necessary, remotely deletes private information from them. Customers who forget their lock codes can use the anti-theft unlocking self-service portal at II. Dr.Web mobile device protection products The Dr.Web Mobile Security commercial product consists of three Dr.Web software products. Buyers of one license for Dr.Web Mobile Security are entitled to use one of three Dr.Web software products. Protection components Dr.Web software products Dr.Web for Android Dr.Web for Symbian OS Dr.Web for Windows Mobile Anti-virus Anti-spam Anti-theft + URL filter + 4
5 III. Dr.Web Mobile Security delivery versions Product group Dr.Web Home Security Suite (e-licenses) protection for home Dr.Web Retail Security Suite products for retail Dr.Web OEM products (not for sale to end-users) Commercial licenses Dr.Web Security Space Dr.Web Anti-virus Dr.Web Mobile Security Dr.Web Security Space Dr.Web Anti-virus Dr.Web OEM Mobile E-licenses for 3 months Scratch cards for 3 or 6 months IV. Dr.Web Mobile Security licensing history Doctor Web created the first anti-virus to protect mobile devices running Windows Mobile in At that time, the number of viruses infecting this OS was small, so apart from having to solve technical problems, Doctor Web also had to grapple with a moral issue whether to charge for the anti-virus or not. In my opinion, a virus for mobile devices is only a myth right now, a PR element, nothing else. And, of course, the accompanying hysteria is good for some developers profits. At the moment, we are not seeing any serious viruses targeting mobile devices. They will probably emerge soon, but what we have right now these are not viruses; they are just early attempts, said Igor Daniloff, the creator of the Dr.Web anti-virus. In such a situation, the company s management made the natural and logical decision to give Dr.Web users free Dr.Web Anti-virus for Windows Mobile licenses for home PC protection. The idea that users should not pay for protection against a threat that does not yet exist is consistent with the basic principles of Doctor Web, Ltd., commented Boris Sharov, the company s CEO, on the product s release. On the one hand, we consider it immoral to sell a product that has no real use yet. On the other hand, the rapid development of mobile technologies and the wide application of instant payment services will inevitably result in the emergence of more dangerous viruses for wireless devices. We have no doubts that virus makers have long been working on developing commercial viruses for mobile devices. Such viruses won t be designed to damage devices as was the case with the initial viruses for PCs. They will be sophisticated Trojans and spyware. We do understand that the threat, though latent, is real. That s why our company has developed protection against a possible threat. But, for the moment, no dangerous viruses exist, so there is no threat for users, and, therefore, our new product is free. Any user of Dr.Web for Windows products can get a free license and be ready to address what could become a real threat at any moment. Words uttered back in 2007 proved to be prophetic. From 2007 to this very day, Doctor Web customers who purchase Dr.Web to protect home PCs are entitled to use Dr.Web Mobile Security free of charge. Doctor Web has no plans to change this policy. A product to protect Symbian OS was released in Anti-virus for Android Light was released in August Dr.Web for Android was released in In June 2012, when the quantity of threats to mobile OSs had reached an immense number, and it had became clear that commercially oriented virus writers were taking this segment seriously, Doctor Web started selling individual licenses for Dr.Web Mobile Security. 5
6 V. Dr.Web Mobile Security licensing As the number of devices running Symbian OS and Windows is negligible, licensing is described with respect to the Dr.Web for Android software product. 1. Dr.Web Mobile Security is licensed per number of protected mobile devices. 2. Licensing options for Dr.Web for Android Anti-virus Light Free license Shareware Comprehensive protection Shareware license (after the 14-day free demo period, the customer must purchase a commercial key file) Life Lifetime license Depends on the policy of the App Store where the customer purchased the license, e.g., in Google Play, the license is tied to a Gmail account. License period Lifetime license 6, 12, 24 or 36 months Lifetime license Protection components Anti-virus only Anti-virus Anti-spam Anti-theft URL filter The right to use Dr.Web Mobile Security free of charge 1. Customers of any Dr.Web products for home PC protection (e-licenses or boxed products) are entitled to use Dr.Web Mobile Security free of charge. 2. The number of free Dr.Web Mobile Security licenses equals the number of PCs covered by the purchased license. Demo 1. Dr.Web Web Mobile Security demo usage terms are governed by the rules of demo use. 2. No Dr.Web Mobile Security demo request form exists on the Doctor Web site. 3. Users can request a free demo directly from their device by downloading the program and registering. 4. A demo license serial number isn t sent to the user; a Dr.Web key file is downloaded and installed into the correct directory automatically. 5. The term of a demo license is 14 days; it begins the moment the demo is requested. 6. Customers receive a Shareware demo license i.e., comprehensive protection. 7. The demo for the Light version offers users a limited introduction to the product because it includes only one protection component the Anti-virus. Customers shouldn t be introduced to the Light version of the product first, because they won t be able to test the functionality of all the Dr.Web protection components. 8. After the demo period, the program stops working. To continue using Dr.Web after the demo period is over, a commercial license must be purchased. 6
7 Discount policy No discounts are available for this product. Renewal 1. If a customer chooses Dr.Web Mobile Security to renew the term of their license, the renewal is processed without a discount in other words, the customer must purchase a new Dr.Web Mobile Security license at full price in order to continue using the Dr.Web product. 2. If a customer switches from Dr.Web Mobile Security to Dr.Web Security Space or Dr.Web Anti-virus by purchasing a new license (without a discount), that customer is entitled to renew their Dr.Web Security Space license at the discount that is applicable to this product starting from the second year of use: 1 year 2 years 3 years 40% 41% 42% Benefits for customers who switch from Dr.Web Mobile Security to Dr.Web Security Space or Dr.Web Anti-virus 1. Renewal discounts every year (from the second year of use). 2. Protection for PCs running Windows, Mac OS X or Linux. 3. Free mobile device protection. Renewal types A customer can renew the term of a Dr.Web Mobile Security license in two ways: by purchasing an e-license or a Dr.Web boxed product (a new license at full price). Dr.Web e-licenses Product Dr.Web Security Space Dr.Web Anti-virus Dr.Web Mobile Security Dr.Web boxed products Dr.Web Security Space Dr.Web Anti-virus Gift* License to protect a quantity of mobile devices that is equal in number to the quantity of protected PCs 2 licenses for mobile device protection * Except in cases when a Dr.Web Mobile Security license has been purchased. Renewal reminder 1. Doctor Web provides a system for communicating with the customer about the service while the license is valid. 2. Communication is carried out via . Newsletter templates do not offer customers the opportunity to unsubscribe. 3. If the partner (Actual Supplier) is known, the partner s contact information (taken from their card on the Doctor Web Partners Portal) will be enclosed. 7
8 4. Commercial license renewal reminders are sent to Dr.Web Mobile Security customer addresses 30 days before a license expires and on the day it expires, or 20 and 40 days after a license expires i.e., several attempts are made to win back a customer who hasn t renewed their license. The texts of the messages sent can be found in the Messages service in My Dr.Web Portal. 5. Demo license renewal reminders are sent on the day of the demo request and 10 and 13 days after the demo was given. 6. Information about OEM license reminders can be found below in the corresponding section. Additional purchase (license expansion) Additional purchase is available without any discount. If a customer wants to protect additional mobile devices, they must purchase the needed number of new licenses at full price. Doctor Web s policy on pirated licenses 1. Doctor Web Ltd. monitors sales and tracks evidence of illegal (pirated) license use, blocking pirated licenses in accordance with company policy. 2. Dr.Web Mobile Security customers are entitled to use the one-time option to restore their license via the Licenses service in My Dr.Web Portal or via the support service. VI. Dr.Web OEM Mobile This product is available to customers free of charge. The sale of Dr.Web OEM licenses is forbidden. Delivery versions E-licenses 3 months Scratch cards 3 or 6 months Advantages of Dr.Web OEM Mobile The activation term is unlimited. Free mobile device protection. A license can be transferred to another mobile device in the event of damage or loss. Protection for three OSs of the user s choice. 40% discount for one year if the OEM license is renewed for Dr.Web Security Space (from 1 to 5 PCs). An OEM license can always be renewed regardless of when it expired. OEM license renewal The methods for renewing OEM licenses are similar to those used to renew Dr.Web Mobile Security demo and commercial licenses. Renewal via the Lead Generator Only for co-branding supplies 1. Even if a partner doesn t have access to the Serial Number Generator (SNG), an OEM license can be renewed, bypassing the SNG. This can be done directly in the customer s lead in the Lead Generator, in the OEM Mobile thread. 8
9 2. In this thread, leads are generated after the customer submits a renewal request via the Renewal Wizard. If the supply of OEM licenses was co-branded, these leads are automatically assigned to a partner the OEM supplier. 3. To generate a renewal license, Renew license must be selected in the client s lead. Promo license renewal service Only for co-branded supplies 1. The customer is offered the opportunity to purchase a new license for Dr.Web Security Space at the full price and get six bonus months instead of the standard five (which is the equivalent of a 40% discount for one year). 2. The promo license renewal service can be found at To use the service, enter the serial number of the client s OEM license into the web form and click Renew. 3. All serial numbers renewed through this web form end up in the partner s report, even if the partner doesn t have access to an SNG. 4. Service limitation: such a renewal is possible only for one year. RenewOEMania 1. RenewOEMania is a programme designed to encourage customers, who did not renew their OEM license before it expired, to renew. 2. To win back this category of customer, depending on how long it has been since the OEM license expired, a bonus term of two to four months is offered in addition to the standard renewal bonus. 3. Customers are made aware of bonuses via . If the Actual Supplier of an OEM license is known (i.e., the supply was co-branded), the will include the partner s contact information which is taken from the partner s card at Doctor Web Partners Portal. 4. The programme for Dr.Web OEM Mobile has been active since June Programme statistics. 9
10 VII. Sales support Dr.Web OEM license co-branding 1. Co-branding is delivered through the following types of sales support for partners the suppliers of OEM licenses: All licenses activated by customers are assigned to a partner, thus protecting future renewals; The partner s contact information is placed in the user s My Dr.Web Portal and in the service letters sent to the user; A banner containing the partner s logo is placed in My Dr.Web Portal; Printed booklets and scratch cards include the partner s logo; 10
11 Links included in renewal reminders will lead to the Renewal Wizard; once submitted, user renewal requests end up in the partner s Lead Generator. 2. The form to be used to order co-branded OEM cards: 3. The co-branding of e-licenses must be coordinated with Doctor Web s supervising manager via the partner support form. Doctor Web, , Russia, Moscow, 3d street Yamskogo polya 2-12A Phone: +7 (495) , +7 (495) (support) Fax: +7 (495)
F-Secure Mobile Security for Business. Getting Started Guide
F-Secure Mobile Security for Business Getting Started Guide F-Secure Mobile Security for Business TOC 3 Contents Chapter 1: F-Secure Mobile Security Portal...5 Overview...6 Administrator access levels...6
More informationTOTAL DEFENSE MOBILE SECURITY USER S GUIDE
TOTAL DEFENSE MOBILE SECURITY USER S GUIDE Publication date 2015.04.09 Copyright 2015 Total Defense Mobile Security LEGAL NOTICE All rights reserved. No part of this book may be reproduced or transmitted
More informationF-Secure Mobile Security. Android
F-Secure Mobile Security Android F-Secure Mobile Security TOC 2 Contents Chapter 1: Installation...4 1.1 Installing...5 1.2 Activating...6 1.3 Configuring the product...7 1.4 Uninstalling the product from
More informationK7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109
K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS v.109 1 The Exchange environment is an important entry point by which a threat or security risk can enter into a network. K7 Mail Security is a complete
More informationKaspersky Security for Mobile Administrator's Guide
Kaspersky Security for Mobile Administrator's Guide APPLICATION VERSION: 10.0 SERVICE PACK 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful and that
More informationDefense Media Activity Guide To Keeping Your Social Media Accounts Secure
Guide To Keeping Your Social Media Accounts Secure Social media is an integral part of the strategic communications and public affairs missions of the Department of Defense. Like any asset, it is something
More informationSophos Mobile Control User guide for Android
Sophos Mobile Control User guide for Android Product version: 2.5 Document date: July 2012 Contents 1 About Sophos Mobile Control... 3 2 Login to the Self Service Portal... 4 3 Set up Sophos Mobile Control
More informationInternet basics 2.3 Protecting your computer
Basics Use this document with the glossary Beginner s guide to Internet basics 2.3 Protecting your computer How can I protect my computer? This activity will show you how to protect your computer from
More informationNational Cyber Security Month 2015: Daily Security Awareness Tips
National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.
More informationFAKE ANTIVIRUS MALWARE This information has come from http://www.bleepingcomputer.com/ - a very useful resource if you are having computer issues.
FAKE ANTIVIRUS MALWARE This information has come from http://www.bleepingcomputer.com/ - a very useful resource if you are having computer issues. The latest tactic currently being used by malware creators
More informationof firms with remote users say Web-borne attacks impacted company financials.
Introduction As the number of users working from outside of the enterprise perimeter increases, the need for more efficient methods of securing the corporate network grows exponentially. In Part 1 of this
More informationInternet threats: steps to security for your small business
Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential
More informationWeb site security issues White paper November 2009. Maintaining trust: protecting your Web site users from malware.
Web site security issues White paper November 2009 Maintaining trust: protecting your Page 2 Contents 2 Is your Web site attacking your users? 3 Familiar culprit, new MO 6 A look at how legitimate Web
More informationContents Security Centre
Contents Security Centre... 1 1. Search Engines... 2 2. Online Applications... 2 3. Virgin Money Credit Card Online Banking Security Measures... 2 3.1 Access Number, PIN and Password... 2 3.2 Keypad...
More informationMalware & Botnets. Botnets
- 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online
More informationThis session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.
The hidden risks of mobile applications This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. To learn more about TraceSecurity visit www.tracesecurity.com
More informationWhat's the difference between spyware and a virus? What is Scareware?
What's the difference between spyware and a virus? What is Scareware? Spyware and viruses are both forms of unwanted or malicious software, sometimes called "malware." You can use Microsoft Security Essentials
More informationKaspersky Security 10 for Mobile Implementation Guide
Kaspersky Security 10 for Mobile Implementation Guide APPLICATION VERSION: 10.0 MAINTENANCE RELEASE 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful
More informationPractical tips for a. Safe Christmas
Practical tips for a Safe Christmas CONTENTS 1. Online shopping 2 2. Online games 4 3. Instant messaging and mail 5 4. Practical tips for a safe digital Christmas 6 The Christmas holidays normally see
More informationEvolutionism of Intrusion Detection
Evolutionism of Intrusion Detection Jackie Lai The network technology changes with each passing day; and the attack technique of hacker also weeds through the old to bring forth the new. Worms such as
More informationSophos Mobile Control User guide for Android. Product version: 4
Sophos Mobile Control User guide for Android Product version: 4 Document date: May 2014 Contents 1 About Sophos Mobile Control...3 2 About this guide...4 3 Login to the Self Service Portal...5 4 Set up
More informationWillem Wiechers 3 rd March 2015
Willem Wiechers 3 rd March 2015 1 Why do we want Malware & Virus Protection? To make our computers save Wish to keep our data private Wish to have a safe environment to do our online banking, shopping,
More informationGlobalSign Malware Monitoring
GLOBALSIGN WHITE PAPER GlobalSign Malware Monitoring Protecting your website from distributing hidden malware GLOBALSIGN WHITE PAPER www.globalsign.com CONTENTS Introduction... 2 Malware Monitoring...
More informationSecurity Best Practices for Mobile Devices
Security Best Practices for Mobile Devices Background & Introduction The following document is intended to assist your business in taking the necessary steps needed to utilize the best security practices
More informationFive Trends to Track in E-Commerce Fraud
Five Trends to Track in E-Commerce Fraud Fraud is nothing new if you re in the e-commerce business you probably have a baseline level of fraud losses due to stolen credit cards, return fraud and other
More information1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.
Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone who can potentially harm your good name and financial well-being. Identity theft
More informationAVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out
More informationComputer Security Maintenance Information and Self-Check Activities
Computer Security Maintenance Information and Self-Check Activities Overview Unlike what many people think, computers are not designed to be maintenance free. Just like cars they need routine maintenance.
More informationDesktop and Laptop Security Policy
Desktop and Laptop Security Policy Appendix A Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious
More informationWHY SHOULDN T YOU UPLOAD COPYRIGHTED MEDIA? BECAUSE YOU RISK: breaking the law downloading a serious computer virus sharing your personal data, which
WHY SHOULDN T YOU UPLOAD COPYRIGHTED MEDIA? BECAUSE YOU RISK: breaking the law downloading a serious computer virus sharing your personal data, which can lead to identity theft getting exposed to pornographic
More informationKaspersky Security for Mobile
Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months
More informationKaspersky Small Office Security User Guide
Kaspersky Small Office Security User Guide APPLICATION VERSION: 4.0 Dear User, Thank you for choosing our product. We hope that this document will help you in your work and will provide answers regarding
More informationGeneral Security Best Practices
General Security Best Practices 1. One of the strongest physical security measures for a computer or server is a locked door. 2. Whenever you step away from your workstation, get into the habit of locking
More informationESET SMART SECURITY 9
ESET SMART SECURITY 9 Microsoft Windows 10 / 8.1 / 8 / 7 / Vista / XP Quick Start Guide Click here to download the most recent version of this document ESET Smart Security is all-in-one Internet security
More informationCookies and Your Privacy
White Paper - October 2009 Cookies and Your Privacy Anyone who uses computers today should be concerned about privacy and security. Any time your computer connects to the outside world, you run the risk
More informationSecure Your Mobile Workplace
Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in
More informationGuideline on Safe BYOD Management
CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version
More informationAlmost 400 million people 1 fall victim to cybercrime every year.
400,000000 Almost 400 million people 1 fall victim to cybercrime every year. A common way for criminals to attack people is via websites, unfortunately this includes legitimate sites that have been hacked
More informationZNetLive Malware Monitoring
Introduction The criminal ways of distributing malware or malicious software online have gone through a change in past years. In place of using USB drives, attachments or disks to distribute viruses, hackers
More informationFeature List for Kaspersky Password Manager
Feature List for Kaspersky Password Manager Overview... Features by Platform...3 Feature Descriptions...4 Glossary...7 PAGE Feature List for Kaspersky Password Manager Overview Kaspersky Password Manager
More informationKASPERSKY SMALL OFFICE SECURITY (Version 3) Features List
KASPERSKY SMALL OFFICE SECURITY (Version 3) Features List Contents Overview... 3 Features list for Personal Computer and File Server... 3 Computer Security... 3 Internet Security... 4 Backup & Restore...
More informationCyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014
Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014 Lisa D. Traina, CPA, CITP, CGMA Lisa Traina utilizes her 30+ years of experience as a CPA, CITP and CGMA
More informationEmail Security Guide
Email Security Guide Introduction No organization can afford to operate without an email security strategy. The risk landscape is constantly changing with new threats surfacing every day. This white paper
More informationDon t Fall Victim to Cybercrime:
Don t Fall Victim to Cybercrime: Best Practices to Safeguard Your Business Agenda Cybercrime Overview Corporate Account Takeover Computer Hacking, Phishing, Malware Breach Statistics Internet Security
More informationCOB 302 Management Information System (Lesson 8)
COB 302 Management Information System (Lesson 8) Dr. Stanley Wong Macau University of Science and Technology Chapter 13 Security and Ethical Challenges 安 全 與 倫 理 挑 戰 Remarks: Some of the contents in this
More informationKaspersky Internet Security
Kaspersky Internet Security User Guide APPLICATION VERSION: 16.0 Dear User, Thank you for choosing our product. We hope that this document will help you in your work and will provide answers regarding
More informationE-BUSINESS THREATS AND SOLUTIONS
E-BUSINESS THREATS AND SOLUTIONS E-BUSINESS THREATS AND SOLUTIONS E-business has forever revolutionized the way business is done. Retail has now a long way from the days of physical transactions that were
More informationConducting an Email Phishing Campaign
Conducting an Email Phishing Campaign WMISACA/Lansing IIA Joint Seminar May 26, 2016 William J. Papanikolas, CISA, CFSA Sparrow Health System Estimated cost of cybercrime to the world economy in 2015 was
More informationE Commerce and Internet Security
E Commerce and Internet Security Zachary Rosen, CFE, CIA President, ACFE Czech Republic Chapter Introduction The Internet has become a global phenomenon reshaping the way we communicate and conduct business.
More informationESET SMART SECURITY 6
ESET SMART SECURITY 6 Microsoft Windows 8 / 7 / Vista / XP / Home Server Quick Start Guide Click here to download the most recent version of this document ESET Smart Security provides state-of-the-art
More informationKeeping you and your computer safe in the digital world.
Keeping you and your computer safe in the digital world. After completing this class, you should be able to: Explain the terms security and privacy as applied to the digital world Identify digital threats
More informationwhite paper Malware Security and the Bottom Line
Malware Security Report: Protecting Your BusineSS, Customers, and the Bottom Line Contents 1 Malware is crawling onto web sites everywhere 1 What is Malware? 2 The anatomy of Malware attacks 3 The Malware
More informationITSC Training Courses Student IT Competence Programme SIIS1 Information Security
ITSC Training Courses Student IT Competence Programme SI1 2012 2013 Prof. Chan Yuen Yan, Rosanna Department of Engineering The Chinese University of Hong Kong SI1-1 Course Outline What you should know
More informationSMALL BUSINESS IT SECURITY PRACTICAL GUIDE
SMALL BUSINESS IT SECURITY PRACTICAL GUIDE How to make sure your business has comprehensive IT security protection #protectmybiz Small businesses come in all shapes and sizes. But in today s world, no
More informationNEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT
Appendix A to 11-02-P1-NJOIT NJ OFFICE OF INFORMATION TECHNOLOGY P.O. Box 212 www.nj.gov/it/ps/ 300 Riverview Plaza Trenton, NJ 08625-0212 NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT The Intent
More informationisheriff CLOUD SECURITY
isheriff CLOUD SECURITY isheriff is the industry s first cloud-based security platform: providing fully integrated endpoint, Web and email security, delivered through a single Web-based management console
More information1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.
Employee Security Awareness Survey Trenton Bond trent.bond@gmail.com Admin - Version 1.3 Security Awareness One of the most significant security risks that organizations and corporations face today is
More informationSophistication of attacks will keep improving, especially APT and zero-day exploits
FAQ Isla Q&A General What is Isla? Isla is an innovative, enterprise-class web malware isolation system that prevents all browser-borne malware from penetrating corporate networks and infecting endpoint
More informationProactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID
Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation By Marc Ostryniec, vice president, CSID The increase in volume, severity, publicity and fallout of recent data breaches
More informationOCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875
OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 Understanding Information Security Information Security Information security refers to safeguarding information from misuse and theft,
More informationSpam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning
Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning Lee Zelyck Network Administrator Regina Public Library Malware, Spyware, Trojans
More informationCHECK POINT Mobile Security Revolutionized. [Restricted] ONLY for designated groups and individuals
CHECK POINT Mobile Security Revolutionized [Restricted] ONLY for designated groups and individuals 2014 Check Point Software Technologies Ltd. 1 Rapidly Expanding Mobile Threats MOBILE THREATS are ESCALATING
More informationTrust Digital Best Practices
> ARMING IT AGAINST SMARTPHONE THREATS Trust Digital Best Practices April 2009 The information contained herein is subject to change at any time, and Trust Digital makes no warranties, either express or
More informationWelcome to Part 2 of the online course, Spyware and Adware What s in Your Computer?
Welcome to Part 2 of the online course, Spyware and Adware What s in Your Computer? 1 2 This is the second part of a two-part course on spyware and adware. In this portion of the course we will: Review
More informationUser Documentation Web Traffic Security. University of Stavanger
User Documentation Web Traffic Security University of Stavanger Table of content User Documentation... 1 Web Traffic Security... 1 University of Stavanger... 1 UiS Web Traffic Security... 3 Background...
More informationWhitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers
Whitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers By INNEFU Labs Pvt. Ltd Table of Contents 1. Overview... 3 2. Threats to
More informationESET MOBILE SECURITY FOR ANDROID
ESET MOBILE SECURITY FOR ANDROID Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security 1.1 Installation...3
More informationEmail Security. 01-15-09 Fort Mac
Email Security 01-15-09 Fort Mac Most Common Mistakes in Email Security Email Security 1. Using just one email account. 2. Holding onto spammed-out accounts too long. 3. Not closing the browser after logging
More informationCyber Security: Beginners Guide to Firewalls
Cyber Security: Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers This appendix is a supplement to the Cyber Security: Getting Started
More informationDeutsche Bank db easynet. Secure method of use of the db easynet e-banking system
Deutsche Bank Secure method of use of the e-banking system Introduction Deutsche Bank pays particular attention to your security. Therefore, the funds entrusted to us by our Customers are protected, using
More information3. Security. 3.1. Security center. Open the Settings app. Tap the Security option. Enable the option Unknown sources.
G DATA Software 1. Introduction G DATA INTERNET SECURITY FOR ANDROID offers comprehensive protection against malware, intrusive apps and phishing attacks. Locate lost devices or wipe their content remotely
More information10 Quick Tips to Mobile Security
10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security contents 03 Introduction 05 Mobile Threats and Consequences 06 Important Mobile Statistics 07 Top 10 Mobile Safety Tips 19 Resources 22
More informationMobile Devices and Malicious Code Attack Prevention
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com WHITE PAPER Malicious Code and Mobile Devices: Best Practices for Securing Mobile Environments Sponsored
More informationPrivacy Policy Version 1.0, 1 st of May 2016
Privacy Policy Version 1.0, 1 st of May 2016 THIS PRIVACY POLICY APPLIES TO PERSONAL INFORMATION COLLECTED BY GOCIETY SOLUTIONS FROM USERS OF THE GOCIETY SOLUTIONS APPLICATIONS (GoLivePhone and GoLiveAssist)
More informationSoftware. Webroot. Spy Sweeper. User Guide. for. Webroot Software, Inc. PO Box 19816 Boulder, CO 80308 www.webroot.com. Version 6.
Webroot Software User Guide for Spy Sweeper Webroot Software, Inc. PO Box 19816 Boulder, CO 80308 www.webroot.com Version 6.1 Webroot Software User Guide Version 6.1 2003 2009 Webroot Software, Inc. All
More informationQuick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0
Quick Start for Webroot Internet Security Complete, Version 7.0 This Quick Start describes how to install and begin using the Webroot Internet Security Complete 2011 software. This integrated suite delivers
More informationUsers Beware: 10 Security Tips to Share with Your Users
Users Beware: 10 Security Tips to Share with Your Users Summary ThreatTrack Security has compiled these 10 tips to help your users avoid common online threats. The following information is available to
More informationCyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799
Cyber Security An Executive Imperative for Business Owners SSE Network Services www.ssenetwork.com 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799 Pretecht SM by SSE predicts and remedies
More informationOnline Cash Manager Security Guide
Online Cash Manager Security Guide You re the One who can protect your business from the threat of a Corporate Account Takeover. 102 South Clinton Street Iowa City, IA 52240 1-800-247-4418 Version 1.0
More informationKnow the Risks. Protect Yourself. Protect Your Business.
Protect while you connect. Know the Risks. Protect Yourself. Protect Your Business. GETCYBERSAFE TIPS FOR S MALL AND MEDIUM BUSINESSES If you re like most small or medium businesses in Canada, the Internet
More informationIs your data secure?
You re not as safe as you think Think for a moment: Where do you keep information about your congregants or donors? In an Excel file on someone s desktop computer? An Access database housed on your laptop?
More informationSMALL BUSINESS IT SECURITY PRACTICAL GUIDE
SMALL BUSINESS IT SECURITY PRACTICAL GUIDE How to make sure your business has comprehensive IT security protection #protectmybiz Small businesses come in all shapes and sizes. But in today s world, no
More informationPolicy for Staff and Post 16 Student BYOD (Bring Your Own Device)
Policy for Staff and Post 16 Student BYOD (Bring Your Own Device) Date approved: 7 th May 2015 Review Schedule: Annual Reviewed: Next review: 1 Context Aims of this Policy Definitions CONTENTS 1. OVERVIEW...
More informationKaspersky Internet Security User Guide
Kaspersky Internet Security User Guide APPLICATION VERSION: 15.0 Dear User, Thank you for choosing our product. We hope that this document will help you in your work and will provide answers regarding
More informationReferences NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household
This appendix is a supplement to the Cyber Security: Getting Started Guide, a non-technical reference essential for business managers, office managers, and operations managers. This appendix is one of
More informationComputer Protection. Computer Protection. Computer Protection 5/1/2013. Classic Battle of Good vs Evil. David Watterson & Ross Cavazos
David Watterson & Ross Cavazos Chief Information Officer IT Director City of Billings Yellowstone County Local Government IT Group Vice-Chairmen Classic Battle of Good vs Evil GOOD EVIL Firewall E-Mail
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
More informationKASPERSKY FRAUD PREVENTION FOR ENDPOINTS
KASPERSKY FRAUD PREVENTION FOR ENDPOINTS www.kaspersky.com 2 Fraud Prevention for Endpoints KASPERSKY FRAUD PREVENTION 1. Ways of Attacking The prime motive behind cybercrime is making money, and today
More informationKeylogging Identity The Defense System TM. Whitepaper. Legal Club of America 7771 W. Oakland Park Blvd. #217 Sunrise, Florida 33351 www.legalclub.
Keylogging Identity The Defense System TM Whitepaper Legal Club of America 7771 W. Oakland Park Blvd. #217 Sunrise, Florida 33351 www.legalclub.com Summary Keyloggers are a serious security threat that
More informationHow To Monitor The Internet In Idaho
Idaho Technology Authority (ITA) ENTERPRISE POLICY P1000 GENERAL POLICIES Category: P1050 EMPLOYEE INTERNET USE, MONITORING AND FILTERING CONTENTS: I. Authority II. Abstract III. Definitions IV. Policy
More informationStopping zombies, botnets and other email- and web-borne threats
Stopping zombies, botnets and other email- and web-borne threats Hijacked computers, or zombies, hide inside networks where they send spam, steal company secrets, and enable other serious crimes. This
More informationPrimer TROUBLE IN YOUR INBOX 5 FACTS EVERY SMALL BUSINESS SHOULD KNOW ABOUT EMAIL-BASED THREATS
A Primer TROUBLE IN YOUR INBOX 5 FACTS EVERY SMALL BUSINESS SHOULD KNOW ABOUT EMAIL-BASED THREATS Even with today s breakthroughs in online communication, email is still one of the main ways that most
More informationContents. McAfee Internet Security 3
User Guide i Contents McAfee Internet Security 3 McAfee SecurityCenter... 5 SecurityCenter features... 6 Using SecurityCenter... 7 Fixing or ignoring protection problems... 16 Working with alerts... 21
More informationCyber Security Beginners Guide to Firewalls A Non-Technical Guide
Cyber Security Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers Multi-State Information Sharing and Analysis Center (MS-ISAC) U.S.
More informationWhen a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.
Ethical Hacking and Countermeasures Course Description: This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.
More informationTOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY
TOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY An Inside Job Cyberthreats to your business are usually blamed on outsiders nefarious programmers writing malicious code designed to pilfer your
More informationAvoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data
Avoiding Malware in Your Dental Practice 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice Like most small business owners, you must protect your dental practice s computer
More informationNetwork Security and the Small Business
Network Security and the Small Business Why network security is important for a small business Many small businesses think that they are less likely targets for security attacks as compared to large enterprises,
More informationKaspersky Total Security User Guide
Kaspersky Total Security User Guide APPLICATION VERSION: 15.0 Dear User, Thank you for choosing our product. We hope that this document will help you in your work and will provide answers regarding this
More informationWhere every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
More information