1 00:00:03,180 --> 00:00:10,290 Social engineering attacks, those social interactions to gain access to valuable data at the root of 2 00:00:10,290 --> 00:00:13,100 all social engineering attacks is deception. 3 00:00:13,710 --> 00:00:20,490 Cyber criminals trick and manipulate their targets into taking certain actions, such as bypassing security 4 00:00:20,490 --> 00:00:23,450 measures or disclosing certain sensitive information. 5 00:00:35,110 --> 00:00:42,190 Many retailers use third parties for services such as payment processing, as such, they often believe 6 00:00:42,190 --> 00:00:46,060 the ability for a third party breach doesn't apply to them. 7 00:00:46,420 --> 00:00:53,640 In reality, using a third party vendor doesn't absolve them of responsibility for a data breach. 8 00:01:06,960 --> 00:01:13,500 Many attacks start with outdated software, for this reason, not staying up to date with software patches 9 00:01:13,650 --> 00:01:18,210 leaves companies vulnerable to any number of information security breaches. 10 00:01:18,540 --> 00:01:24,990 As soon as attackers learn of a software vulnerability, they can exploit it to launch a cyber attack. 11 00:01:36,870 --> 00:01:41,970 The more we rely on the cloud for data storage, the higher the risk of major breach. 12 00:01:42,390 --> 00:01:46,470 Cloud services are vulnerable to a wide range of cyber attacks. 13 00:01:46,860 --> 00:01:53,700 This includes account hijacking and denial of service attacks, which prevent companies from being able 14 00:01:53,700 --> 00:01:54,600 to access their data. 15 00:02:14,660 --> 00:02:21,410 Ransomware attacks are serious cyber theft, these attacks infect your network and hold your data and 16 00:02:21,410 --> 00:02:28,400 computer systems hostage until a ransom is paid, the immediate loses from the ransom are only the tip 17 00:02:28,400 --> 00:02:29,260 of the iceberg. 18 00:02:29,600 --> 00:02:35,900 The monetary damages from lost productivity and data are often the most destructive to business. 19 00:02:36,170 --> 00:02:42,500 Attacks like this are why 60 percent of small businesses go out of business with six months of cyber 20 00:02:42,500 --> 00:02:42,890 breach. 21 00:02:59,090 --> 00:03:04,680 Simply meeting the compliance standard is not the same as continuous and robust protection. 22 00:03:05,180 --> 00:03:13,040 For example, many companies need to meet payment card industry, data security standard PCI, DSD for 23 00:03:13,040 --> 00:03:14,220 their annual audit. 24 00:03:14,480 --> 00:03:19,760 However, this is not necessarily representative of their usual standard of protection. 25 00:03:20,000 --> 00:03:27,470 According to Verizon's PCI compliance report, four out of five companies fail to maintain compliance 26 00:03:27,590 --> 00:03:29,180 at their internal assessment. 27 00:03:29,540 --> 00:03:33,590 These were the same companies that previously meet compliance standards. 28 00:03:33,920 --> 00:03:41,330 Companies that were deemed as compliant still suffered from cyber security breaches some just weeks 29 00:03:41,330 --> 00:03:42,980 after they were certified. 30 00:03:43,400 --> 00:03:50,440 As these companies have learned, meeting adequate legal standard is not a substitute for cyber protection. 31 00:04:01,350 --> 00:04:08,160 Mobile technology can be a significant assist to businesses, but it can also expose them to potential 32 00:04:08,160 --> 00:04:09,420 cyber security breaches. 33 00:04:09,840 --> 00:04:17,310 Findings from a recent mobile security report conclude that one in five organizations suffer from mobile 34 00:04:17,310 --> 00:04:18,270 security breaches. 35 00:04:18,510 --> 00:04:23,340 The majority of these attacks came from a malware and militias wi fi. 36 00:04:36,950 --> 00:04:43,400 Many companies are encouraging employees to use personal devices at work as part of their bring your 37 00:04:43,400 --> 00:04:46,530 own device or policies. 38 00:04:46,760 --> 00:04:51,460 This has several benefits, including increased flexibility and convenience. 39 00:04:52,040 --> 00:04:55,010 Some even claim it helps to increase productivity and more. 40 00:05:04,590 --> 00:05:10,510 The Internet of Things or Iot, connects devices from all over the world through the Internet. 41 00:05:10,770 --> 00:05:17,270 This allows for a network of devices that can store, send and receive data because of its convenience. 42 00:05:17,730 --> 00:05:21,880 Many individuals and businesses are taking advantage of it. 43 00:05:37,530 --> 00:05:43,710 Not all threats to cyber security come from a software, the base at which software updates are released 44 00:05:43,710 --> 00:05:46,440 can make it difficult for the hardware to keep up. 45 00:05:46,860 --> 00:05:53,640 This, in turn, create exposures that can put companies data at risk as hardware becomes obsolete. 46 00:05:53,850 --> 00:05:59,760 Many outdated devices will not allow updates with the latest patches and security measures. 47 00:06:00,180 --> 00:06:08,130 Devices that rely on all the software are more susceptible to cyber attacks, creating a major potential 48 00:06:08,130 --> 00:06:08,820 vulnerability. 49 00:06:09,150 --> 00:06:14,550 It is important to monitor this and respond quickly when devices become out of date. 50 00:06:15,030 --> 00:06:17,760 Just like you should keep your software up to date. 51 00:06:17,970 --> 00:06:19,880 You should do the same with hardware.