6 critical it security protections
play

6 Critical IT Security Protections EVERY Medical Practice Must Have - PowerPoint PPT Presentation

6 Critical IT Security Protections EVERY Medical Practice Must Have In Place NOW To Avoid Cyber-Attacks, Data Breach Lawsuits, Bank Fraud and Compliance Penalties Carl Utz Director of Sales & Client Experience Andromeda Technology


  1. 6 Critical IT Security Protections EVERY Medical Practice Must Have In Place NOW To Avoid Cyber-Attacks, Data Breach Lawsuits, Bank Fraud and Compliance Penalties Carl Utz Director of Sales & Client Experience Andromeda Technology Solutions www.WeNetwork.com

  2. Today We’re Going To Cover • The great cyber crime myth – “cybercrime isn’t a threat to my business, these criminals only go after the big companies like Home Depot, Equifax, Target, LinkedIn etc. • The Top 7 Threats to your businesses network and cyber- security. • The network security approach that will save your practice from the financial, reputational, and emotional damages associated with a data incident or cyber security attack.

  3. Ultimately We’re Going To Cover… How To Avoid Being A Sitting Duck To Cybercriminals And Protect Everything You’ve Worked So Hard To Achieve

  4. Who The Heck Is Carl Utz?

  5. Q & A

  6. Let’s Get This Out Of The Way

  7. Show of Hands

  8. The Good News Is . . .

  9. What Is An Attack??

  10. Why Should We Care?

  11. Brand Damage – Loss of Trust

  12. Financial Losses

  13. Not To Mention Lost Time & Stress

  14. Why You?

  15. Anyone Know What This Is?

  16. Not Some Kid In His Mom’s Basement

  17. Cyber Crime Revolution

  18. 20% Of This Room Will Be Breached This Year

  19. The Cost Of Cybercrime Is No Joke • The cost of cybercrime each minute globally: $1,138,888 • The number of cybercrime victims each minute globally: 1,861 • Number of records leaked globally each minute (from publicly disclosed incidents): 5,518 • The number of new phishing domains each minute: 21 • The United States has the most cybercrime globally with 23% of the total

  20. Let’s Dive In

  21. #1 - Passwords

  22. #1 - Passwords

  23. #1 - Passwords 1. Delete stored browser passwords when you get home/to the office 2. Never, ever use this function again

  24. #1 - Passwords Password Strength Keeps Criminals At Bay • 8 Characters or More • Mixture of Upper and Lowercase • Make Use of Special Characters ($@#!%&) • Use At Least 1 Number • Change Every 90 Days (make this company policy)

  25. #1 - Passwords

  26. #1 - Passwords

  27. #1 - Passwords

  28. #1 - Passwords

  29. #2 - Email

  30. #2 - Email

  31. #2 - Email

  32. #2 - Email

  33. #2 - Email

  34. Some Phishing Examples

  35. Some Phishing Examples

  36. Some Phishing Examples

  37. Some Phishing Examples

  38. Some Phishing Examples

  39. Some Phishing Examples

  40. If You Do Click A Bad Link What Happens?

  41. Cloud Security & Your Email

  42. The Shared Responsibility Model Microsoft/G-Suite provides for the security of the cloud, and the tenant (partner) provides the security in their cloud.

  43. Microsoft Office 365 D A T A R E T E N T I O N A N D D E L E T I O N M I C R O S O F T W I L L R E T A I N C U S T O M E R D A T A T H A T R E M A I N S S T O R E D I N O N L I N E S E R V I C E S I N A L I M I T E D F U N C T I O N A C C O U N T F O R 9 0 D A Y S A F T E R E X P I R A T I O N O R T E R M I N A T I O N O F C U S T O M E R ’ S S U B S C R I P T I O N S O T H A T C U S T O M E R M A Y E X T R A C T T H E D A T A . A F T E R T H E 9 0 - D A Y R E T E N T I O N P E R I O D E N D S , M I C R O S O F T W I L L D I S A B L E C U S T O M E R ’ S A C C O U N T A N D D E L E T E T H E C U S T O M E R D A T A A N D P E R S O N A L D A T A W I T H I N A N A D D I T I O N A L 9 0 D A Y S , U N L E S S M I C R O S O F T I S P E R M I T T E D O R R E Q U I R E D B Y A P P L I C A B L E L A W T O R E T A I N S U C H D A T A O R A U T H O R I Z E D I N T H I S A G R E E M E N T . M I C R O S O F T H AS N O L I AB I L I T Y F O R T H E D E L E T I O N O F C U S T O M E R D AT A O R P E R S O N AL D AT A AS D E S C R I B E D I N T H I S S E C T I O N .

  44. G-Suite LIMITATION OF LIABILITY YOU EXPRESSLY UNDERSTAND AND AGREE THAT GOOGLE AND PARTNERS SHALL NOT BE LIABLE TO YOU FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, CONSEQUENTIAL OR EXEMPLARY DAMAGES, INCLUDING BUT NOT LIMITED TO, DAMAGES FOR LOSS OF PROFITS, GOODWILL, USE, DATA OR OTHER INTANGIBLE LOSSES (EVEN IF GOOGLE OR PARTNERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES) RESULTING FROM: (i) THE USE OR THE INABILITY TO USE GOOGLE SERVICES; (ii) THE COST OF PROCUREMENT OF SUBSTITUTE GOODS AND SERVICES RESULTING FROM ANY GOODS, DATA, INFORMATION OR SERVICES PURCHASED OR OBTAINED OR MESSAGES RECEIVED OR TRANSACTIONS ENTERED INTO THROUGH OR FROM GOOGLE SERVICES; (iii) UNAUTHORISED ACCESS TO OR ALTERATION OF YOUR TRANSMISSIONS OR DATA; (iv) STATEMENTS OR CONDUCT OF ANY THIRD PARTY ON GOOGLE SERVICES; OR (v) ANY OTHER MATTER RELATING TO GOOGLE SERVICES. GOOGLE SHALL NOT BE LIABLE TO YOU FOR … DATA OR OTHER INTANGIBLE LOSSES

  45. #3 – Websites 1. Legitimate websites that have been hacked and infected 2. Fake websites or copycat sites built by criminals to trick you and steal your info

  46. #3 - Websites

  47. #4 – Public PCs

  48. Light At The End

  49. #5 – Public Wifi

  50. #6 – USB Thumb Drives

  51. What’s The Common Factor Here?

  52. #7 Your Staff

  53. #7 Your Staff

  54. #7 Your Staff

  55. #7 Your Staff

  56. #7 Your Staff

  57. Now What?

  58. Layered Security Strategy

  59. Layered Network Security!

  60. Up First – Your Practice

  61. Layer #1 - Response

  62. Layer #2 - Data

  63. Layer #3 – Application

  64. Layer #4 – Platform

  65. Layer #5 – Network

  66. Layer #6 – Physical Security

  67. This Is Too Much – Where Do I Start?

  68. I’m Here To Help

  69. Thank You!

  70. Questions?

  71. Carl Utz – Director of Sales & Client Experience Email – CarlU@WeNetwork.com Phone – (815) 836 – 0030 Website – www.WeNetwork.com FREE Report & Weekly Cyber Security Tech Tip Emails www.WeNetwork.com/ILMGMA

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend