Entrepreneur's Evolve From Their Experience: Fail Fast, Fail Cheap. Push Boundaries!
RISKS & THREATS
Ø Protecting Against Malicious Code – a description of viruses, worms, and Trojan horses and tips for protecting your business from these types of malicious code.
Ø Handling Destructive Malware – an overview of the threat of destructive malware, potential distribution vectors, and tips for protecting your business.
Ø Understanding Hidden Threats: Rootkits and Botnets – an overview of rootkits and botnets and tips for protecting your business.
Ø Recognizing Fake Antiviruses – description of the fake antivirus threat and tips for avoiding and recovering from fake antivirus software.
Ø Understanding Hidden Threats: Corrupted Software Files – an overview of how malicious files can impact your electronic devices and tips for protecting your business.
Ø Ransomware – an overview of ransomware and tips to protect your business.
Ø Recognizing and Avoiding Spyware – an overview of spyware, why malicious spyware could be damaging to your business, how to detect spyware, and tips for protecting your business.
Ø Understanding Denial-of-Service Attacks – description of the threat of denial-of-service attacks and tips for protecting your business.
Ø Phishing – an overview of phishing and tips for protecting your business from phishing attacks.
Ø Business Email Imposters – tips for protecting your business against business email scams.
Ø Securing Network Infrastructure Devices – description of threats to network infrastructure devices and tips for protecting those devices.
Ø Website Security – overview of threats from website attacks and tips on how to protect your business.
Ø Securing Wireless Networks – summary of risks to your wireless network and how to protect against those risks.
Ø Defending Cell Phones and PDAs Against Attack – risks to cell phones and personal data assistants and tips to protect them.