SLIDE 1 Carl Utz Director of Sales & Client Experience Andromeda Technology Solutions
www.WeNetwork.com
6 Critical IT Security Protections
EVERY Medical Practice Must Have In Place NOW
To Avoid Cyber-Attacks, Data Breach Lawsuits, Bank Fraud and Compliance Penalties
SLIDE 2 Today We’re Going To Cover
- The great cyber crime myth – “cybercrime isn’t a threat to
my business, these criminals only go after the big companies like Home Depot, Equifax, Target, LinkedIn etc.
- The Top 7 Threats to your businesses network and cyber-
security.
- The network security approach that will save your practice
from the financial, reputational, and emotional damages associated with a data incident or cyber security attack.
SLIDE 3
Ultimately We’re Going To Cover…
How To Avoid Being A Sitting Duck To Cybercriminals And Protect Everything You’ve Worked So Hard To Achieve
SLIDE 4
Who The Heck Is Carl Utz?
SLIDE 5
Q & A
SLIDE 6
Let’s Get This Out Of The Way
SLIDE 7
Show of Hands
SLIDE 8
SLIDE 9
The Good News Is . . .
SLIDE 10
What Is An Attack??
SLIDE 11
Why Should We Care?
SLIDE 12
Brand Damage – Loss of Trust
SLIDE 13
Financial Losses
SLIDE 14
Not To Mention Lost Time & Stress
SLIDE 15
Why You?
SLIDE 16
Anyone Know What This Is?
SLIDE 17
Not Some Kid In His Mom’s Basement
SLIDE 18
Cyber Crime Revolution
SLIDE 19
20% Of This Room Will Be Breached This Year
SLIDE 20 The Cost Of Cybercrime Is No Joke
- The cost of cybercrime each minute globally: $1,138,888
- The number of cybercrime victims each minute
globally: 1,861
- Number of records leaked globally each minute (from
publicly disclosed incidents): 5,518
- The number of new phishing domains each minute: 21
- The United States has the most cybercrime globally with
23% of the total
SLIDE 21
Let’s Dive In
SLIDE 22
#1 - Passwords
SLIDE 23
#1 - Passwords
SLIDE 24 #1 - Passwords
passwords when you get home/to the office
- 2. Never, ever use this function
again
SLIDE 25 #1 - Passwords
Password Strength Keeps Criminals At Bay
- 8 Characters or More
- Mixture of Upper and Lowercase
- Make Use of Special Characters
($@#!%&)
- Use At Least 1 Number
- Change Every 90 Days
(make this company policy)
SLIDE 26
#1 - Passwords
SLIDE 27
#1 - Passwords
SLIDE 28
#1 - Passwords
SLIDE 29
#1 - Passwords
SLIDE 30
#2 - Email
SLIDE 31
#2 - Email
SLIDE 32
#2 - Email
SLIDE 33
#2 - Email
SLIDE 34
#2 - Email
SLIDE 35
Some Phishing Examples
SLIDE 36
Some Phishing Examples
SLIDE 37
Some Phishing Examples
SLIDE 38
Some Phishing Examples
SLIDE 39
Some Phishing Examples
SLIDE 40
Some Phishing Examples
SLIDE 41
If You Do Click A Bad Link What Happens?
SLIDE 42
Cloud Security & Your Email
SLIDE 43
The Shared Responsibility Model
Microsoft/G-Suite provides for the security of the cloud, and the tenant (partner) provides the security in their cloud.
SLIDE 44 Microsoft Office 365
D A T A R E T E N T I O N A N D D E L E T I O N M I C R O S O F T W I L L R E T A I N C U S T O M E R D A T A T H A T R E M A I N S S T O R E D I N O N L I N E S E R V I C E S I N A L I M I T E D F U N C T I O N A C C O U N T F O R 9 0 D A Y S A F T E R E X P I R A T I O N O R T E R M I N A T I O N O F C U S T O M E R ’ S S U B S C R I P T I O N S O T H A T C U S T O M E R M A Y E X T R A C T T H E D A T A . A F T E R T H E 9 0 - D A Y R E T E N T I O N P E R I O D E N D S , M I C R O S O F T W I L L D I S A B L E C U S T O M E R ’ S A C C O U N T A N D D E L E T E T H E C U S T O M E R D A T A A N D P E R S O N A L D A T A W I T H I N A N A D D I T I O N A L 9 0 D A Y S , U N L E S S M I C R O S O F T I S P E R M I T T E D O R R E Q U I R E D B Y A P P L I C A B L E L A W T O R E T A I N S U C H D A T A O R A U T H O R I Z E D I N T H I S A G R E E M E N T . M I C R O S O F T H AS N O L I AB I L I T Y F O R T H E D E L E T I O N O F C U S T O M E R D AT A O R P E R S O N AL D AT A AS D E S C R I B E D I N T H I S S E C T I O N .
SLIDE 45 G-Suite
LIMITATION OF LIABILITY YOU EXPRESSLY UNDERSTAND AND AGREE THAT GOOGLE AND PARTNERS SHALL NOT BE LIABLE TO YOU FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, CONSEQUENTIAL OR EXEMPLARY DAMAGES, INCLUDING BUT NOT LIMITED TO, DAMAGES FOR LOSS OF PROFITS, GOODWILL, USE, DATA OR OTHER INTANGIBLE LOSSES (EVEN IF GOOGLE OR PARTNERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES) RESULTING FROM: (i) THE USE OR THE INABILITY TO USE GOOGLE SERVICES; (ii) THE COST OF PROCUREMENT OF SUBSTITUTE GOODS AND SERVICES RESULTING FROM ANY GOODS, DATA, INFORMATION OR SERVICES PURCHASED OR OBTAINED OR MESSAGES RECEIVED OR TRANSACTIONS ENTERED INTO THROUGH OR FROM GOOGLE SERVICES; (iii) UNAUTHORISED ACCESS TO OR ALTERATION OF YOUR TRANSMISSIONS OR DATA; (iv) STATEMENTS OR CONDUCT OF ANY THIRD PARTY ON GOOGLE SERVICES; OR (v) ANY OTHER MATTER RELATING TO GOOGLE SERVICES.
GOOGLE SHALL NOT BE LIABLE TO YOU FOR … DATA OR OTHER INTANGIBLE LOSSES
SLIDE 46 #3 – Websites
- 1. Legitimate websites that have
been hacked and infected
- 2. Fake websites or copycat sites
built by criminals to trick you and steal your info
SLIDE 47
#3 - Websites
SLIDE 48
#4 – Public PCs
SLIDE 49
Light At The End
SLIDE 50
#5 – Public Wifi
SLIDE 51
#6 – USB Thumb Drives
SLIDE 52
What’s The Common Factor Here?
SLIDE 53
#7 Your Staff
SLIDE 54
#7 Your Staff
SLIDE 55
#7 Your Staff
SLIDE 56
#7 Your Staff
SLIDE 57
#7 Your Staff
SLIDE 58
Now What?
SLIDE 59
Layered Security Strategy
SLIDE 60
Layered Network Security!
SLIDE 61
Up First – Your Practice
SLIDE 62
Layer #1 - Response
SLIDE 63
Layer #2 - Data
SLIDE 64
Layer #3 – Application
SLIDE 65
Layer #4 – Platform
SLIDE 66
Layer #5 – Network
SLIDE 67
Layer #6 – Physical Security
SLIDE 68
This Is Too Much – Where Do I Start?
SLIDE 69
I’m Here To Help
SLIDE 70
Thank You!
SLIDE 71
Questions?
SLIDE 72
Carl Utz – Director of Sales & Client Experience
Email – CarlU@WeNetwork.com Phone – (815) 836 – 0030 Website – www.WeNetwork.com
FREE Report & Weekly Cyber
Security Tech Tip Emails
www.WeNetwork.com/ILMGMA