6 Critical IT Security Protections EVERY Medical Practice Must Have - - PowerPoint PPT Presentation

6 critical it security protections
SMART_READER_LITE
LIVE PREVIEW

6 Critical IT Security Protections EVERY Medical Practice Must Have - - PowerPoint PPT Presentation

6 Critical IT Security Protections EVERY Medical Practice Must Have In Place NOW To Avoid Cyber-Attacks, Data Breach Lawsuits, Bank Fraud and Compliance Penalties Carl Utz Director of Sales & Client Experience Andromeda Technology


slide-1
SLIDE 1

Carl Utz Director of Sales & Client Experience Andromeda Technology Solutions

www.WeNetwork.com

6 Critical IT Security Protections

EVERY Medical Practice Must Have In Place NOW

To Avoid Cyber-Attacks, Data Breach Lawsuits, Bank Fraud and Compliance Penalties

slide-2
SLIDE 2

Today We’re Going To Cover

  • The great cyber crime myth – “cybercrime isn’t a threat to

my business, these criminals only go after the big companies like Home Depot, Equifax, Target, LinkedIn etc.

  • The Top 7 Threats to your businesses network and cyber-

security.

  • The network security approach that will save your practice

from the financial, reputational, and emotional damages associated with a data incident or cyber security attack.

slide-3
SLIDE 3

Ultimately We’re Going To Cover…

How To Avoid Being A Sitting Duck To Cybercriminals And Protect Everything You’ve Worked So Hard To Achieve

slide-4
SLIDE 4

Who The Heck Is Carl Utz?

slide-5
SLIDE 5

Q & A

slide-6
SLIDE 6

Let’s Get This Out Of The Way

slide-7
SLIDE 7

Show of Hands

slide-8
SLIDE 8
slide-9
SLIDE 9

The Good News Is . . .

slide-10
SLIDE 10

What Is An Attack??

slide-11
SLIDE 11

Why Should We Care?

slide-12
SLIDE 12

Brand Damage – Loss of Trust

slide-13
SLIDE 13

Financial Losses

slide-14
SLIDE 14

Not To Mention Lost Time & Stress

slide-15
SLIDE 15

Why You?

slide-16
SLIDE 16

Anyone Know What This Is?

slide-17
SLIDE 17

Not Some Kid In His Mom’s Basement

slide-18
SLIDE 18

Cyber Crime Revolution

slide-19
SLIDE 19

20% Of This Room Will Be Breached This Year

slide-20
SLIDE 20

The Cost Of Cybercrime Is No Joke

  • The cost of cybercrime each minute globally: $1,138,888
  • The number of cybercrime victims each minute

globally: 1,861

  • Number of records leaked globally each minute (from

publicly disclosed incidents): 5,518

  • The number of new phishing domains each minute: 21
  • The United States has the most cybercrime globally with

23% of the total

slide-21
SLIDE 21

Let’s Dive In

slide-22
SLIDE 22

#1 - Passwords

slide-23
SLIDE 23

#1 - Passwords

slide-24
SLIDE 24

#1 - Passwords

  • 1. Delete stored browser

passwords when you get home/to the office

  • 2. Never, ever use this function

again

slide-25
SLIDE 25

#1 - Passwords

Password Strength Keeps Criminals At Bay

  • 8 Characters or More
  • Mixture of Upper and Lowercase
  • Make Use of Special Characters

($@#!%&)

  • Use At Least 1 Number
  • Change Every 90 Days

(make this company policy)

slide-26
SLIDE 26

#1 - Passwords

slide-27
SLIDE 27

#1 - Passwords

slide-28
SLIDE 28

#1 - Passwords

slide-29
SLIDE 29

#1 - Passwords

slide-30
SLIDE 30

#2 - Email

slide-31
SLIDE 31

#2 - Email

slide-32
SLIDE 32

#2 - Email

slide-33
SLIDE 33

#2 - Email

slide-34
SLIDE 34

#2 - Email

slide-35
SLIDE 35

Some Phishing Examples

slide-36
SLIDE 36

Some Phishing Examples

slide-37
SLIDE 37

Some Phishing Examples

slide-38
SLIDE 38

Some Phishing Examples

slide-39
SLIDE 39

Some Phishing Examples

slide-40
SLIDE 40

Some Phishing Examples

slide-41
SLIDE 41

If You Do Click A Bad Link What Happens?

slide-42
SLIDE 42

Cloud Security & Your Email

slide-43
SLIDE 43

The Shared Responsibility Model

Microsoft/G-Suite provides for the security of the cloud, and the tenant (partner) provides the security in their cloud.

slide-44
SLIDE 44

Microsoft Office 365

D A T A R E T E N T I O N A N D D E L E T I O N M I C R O S O F T W I L L R E T A I N C U S T O M E R D A T A T H A T R E M A I N S S T O R E D I N O N L I N E S E R V I C E S I N A L I M I T E D F U N C T I O N A C C O U N T F O R 9 0 D A Y S A F T E R E X P I R A T I O N O R T E R M I N A T I O N O F C U S T O M E R ’ S S U B S C R I P T I O N S O T H A T C U S T O M E R M A Y E X T R A C T T H E D A T A . A F T E R T H E 9 0 - D A Y R E T E N T I O N P E R I O D E N D S , M I C R O S O F T W I L L D I S A B L E C U S T O M E R ’ S A C C O U N T A N D D E L E T E T H E C U S T O M E R D A T A A N D P E R S O N A L D A T A W I T H I N A N A D D I T I O N A L 9 0 D A Y S , U N L E S S M I C R O S O F T I S P E R M I T T E D O R R E Q U I R E D B Y A P P L I C A B L E L A W T O R E T A I N S U C H D A T A O R A U T H O R I Z E D I N T H I S A G R E E M E N T . M I C R O S O F T H AS N O L I AB I L I T Y F O R T H E D E L E T I O N O F C U S T O M E R D AT A O R P E R S O N AL D AT A AS D E S C R I B E D I N T H I S S E C T I O N .

slide-45
SLIDE 45

G-Suite

LIMITATION OF LIABILITY YOU EXPRESSLY UNDERSTAND AND AGREE THAT GOOGLE AND PARTNERS SHALL NOT BE LIABLE TO YOU FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, CONSEQUENTIAL OR EXEMPLARY DAMAGES, INCLUDING BUT NOT LIMITED TO, DAMAGES FOR LOSS OF PROFITS, GOODWILL, USE, DATA OR OTHER INTANGIBLE LOSSES (EVEN IF GOOGLE OR PARTNERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES) RESULTING FROM: (i) THE USE OR THE INABILITY TO USE GOOGLE SERVICES; (ii) THE COST OF PROCUREMENT OF SUBSTITUTE GOODS AND SERVICES RESULTING FROM ANY GOODS, DATA, INFORMATION OR SERVICES PURCHASED OR OBTAINED OR MESSAGES RECEIVED OR TRANSACTIONS ENTERED INTO THROUGH OR FROM GOOGLE SERVICES; (iii) UNAUTHORISED ACCESS TO OR ALTERATION OF YOUR TRANSMISSIONS OR DATA; (iv) STATEMENTS OR CONDUCT OF ANY THIRD PARTY ON GOOGLE SERVICES; OR (v) ANY OTHER MATTER RELATING TO GOOGLE SERVICES.

GOOGLE SHALL NOT BE LIABLE TO YOU FOR … DATA OR OTHER INTANGIBLE LOSSES

slide-46
SLIDE 46

#3 – Websites

  • 1. Legitimate websites that have

been hacked and infected

  • 2. Fake websites or copycat sites

built by criminals to trick you and steal your info

slide-47
SLIDE 47

#3 - Websites

slide-48
SLIDE 48

#4 – Public PCs

slide-49
SLIDE 49

Light At The End

slide-50
SLIDE 50

#5 – Public Wifi

slide-51
SLIDE 51

#6 – USB Thumb Drives

slide-52
SLIDE 52

What’s The Common Factor Here?

slide-53
SLIDE 53

#7 Your Staff

slide-54
SLIDE 54

#7 Your Staff

slide-55
SLIDE 55

#7 Your Staff

slide-56
SLIDE 56

#7 Your Staff

slide-57
SLIDE 57

#7 Your Staff

slide-58
SLIDE 58

Now What?

slide-59
SLIDE 59

Layered Security Strategy

slide-60
SLIDE 60

Layered Network Security!

slide-61
SLIDE 61

Up First – Your Practice

slide-62
SLIDE 62

Layer #1 - Response

slide-63
SLIDE 63

Layer #2 - Data

slide-64
SLIDE 64

Layer #3 – Application

slide-65
SLIDE 65

Layer #4 – Platform

slide-66
SLIDE 66

Layer #5 – Network

slide-67
SLIDE 67

Layer #6 – Physical Security

slide-68
SLIDE 68

This Is Too Much – Where Do I Start?

slide-69
SLIDE 69

I’m Here To Help

slide-70
SLIDE 70

Thank You!

slide-71
SLIDE 71

Questions?

slide-72
SLIDE 72

Carl Utz – Director of Sales & Client Experience

Email – CarlU@WeNetwork.com Phone – (815) 836 – 0030 Website – www.WeNetwork.com

FREE Report & Weekly Cyber

Security Tech Tip Emails

www.WeNetwork.com/ILMGMA