kentucky nonprofits covid 19 sector resources
play

Kentucky Nonprofits & COVID-19 Sector Resources Cybersecurity - PowerPoint PPT Presentation

Kentucky Nonprofits & COVID-19 Sector Resources Cybersecurity in a Pandemic for Small Businesses All participants have been automatically muted. During todays conversation, if you would like to submit a question, please use the


  1. Kentucky Nonprofits & COVID-19 – Sector Resources Cybersecurity in a Pandemic for Small Businesses All participants have been automatically muted. During today’s conversation, if you would like to submit a question, please use the “CHAT” feature located at the bottom of your Zoom screen. You can also find COVID-19 resources on www.kynonprofits.org We will begin the program shortly.

  2. Cybersecurity in a Pandemic Jason D. Miller Director, Business & Technology Consulting

  3. Agenda 1. Small business cybersecurity pre-pandemic 2. Rush to work from home 3. Cybersecurity during a pandemic 4. Online meeting tools discussion 5. Cybersecurity post-pandemic

  4. Small Business Cybersecurity Pre-Pandemic

  5. Industry reports

  6. Small Business Prime Targets 2019 DBIR

  7. What tactics are utilized? 2019 DBIR

  8. Top hacking actions? 2019 DBIR

  9. What are other commonalities? 2019 DBIR

  10. Small Business with Cyberattacks

  11. Why aren’t small businesses better at cybersecurity?

  12. Cost of a breach and business disruption?

  13. The Rush to Work From Home March 2020

  14. What did we see happen in a matter of days? Remote Access? Who?  Open up remote desktop  Untrained users services  Employees out of their  More VPN users comfort zone  Third-party tools (free?) Devices? Communication?  Grab any spare laptop  Free video conferencing  Employee's home  Personal email computers  Personal file shares

  15. Concerns created by the rush Remote Access? Who? What new vulnerabilities did Are your users really you just open up for cyber prepared? Users are our criminals to access your number one vulnerability is network? cybersecurity. Devices? Communication? How many vulnerable and Where is your sensitive unpatched devices are information going? processing your critical data?

  16. Cybersecurity During the Pandemic

  17. Do it NOW Remote access Make sure NO open RDP, Secure all remote - MFA Get devices updated Swap out all old devices with patched and secure Secure password policies Review and implement secure password policies External vulnerability scan Have a professional do a quick external scan

  18. Online Meeting Tools

  19. Popular tools and recent news Best Practices  Use unique meeting ID’s for each meeting  Require a password or ping to gain access to meetings  Privately share meeting invitations. Cisco Webex Resources → Zoom Resources →  Consider requiring users to enable the “Lobby” or “Waiting room” functionality and affirming entry into a meeting.  If your users are using client-applications versus the web interface, be sure the client applications are updated frequently to gain any security patches and enhancements that are released.

  20. Cybersecurity Post-Pandemic

  21. Key cybersecurity considerations Do you have the Have you had a Would you know Does your right protection third-party Cyber if your systems organization tools ? assessment conduct regular have been conducted? user awareness compromised? Do you have training? Recently? monitoring tools ?

  22. Information Security Program PEOPLE TECHNOLOGY PROCESSES

  23. People User Awareness It is critical to train and equip our users on the frontlines. 2019 DBIR

  24. Processes & Controls Risk Assessment Monitoring & Response  Not just a technology  Tools to monitor and provide exercise early detection  Must be continual  Incident Response plans Information Security Business Continuity Program Policies and Procedures  Documentation & planning   User education  Strong and reliable backups  Technology  Roadmap for improvement

  25. Assessment: Dean Dorton Cybersecurity Scorecard

  26. Security Lifecycles Small Business Model Large to Medium Model

  27. Technology MFA Next-Gen Advanced Advanced Anti-virus Web Filter Email Multi-factor Protection Authentication

  28. Other considerations Office 365 Passwords Have someone evaluate your  Deploy a password filter Office 365 security and  Require strong passwords controls  Minimum length 12  Age: 180 days Remote Workforce Backups  Should all users have a  Multiple layers laptop?  Air gap  Virtual Desktop Solutions  Test regularly Cloud Solutions 

  29. The one thing… MFA Multi-factor Authentication

  30. Resources deandorton.com /insights deandorton.com /remote-work deandorton.com /cybersecurity

  31. What questions do you have? Use the Chat box now

  32. Thank you Jason D. Miller Director, Business & Technology Consulting jmiller@ddaftech.com 859.425.7626

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend