pro t ec t i ng yo ur busi ness
play

PRO T EC T I NG YO UR BUSI NESS D AT A T Y T O K EEP Y O UR B - PowerPoint PPT Presentation

PRO T EC T I NG YO UR BUSI NESS D AT A T Y T O K EEP Y O UR B USINESS U P AND RANSFER AND O T HER SEC URIT IPS T R UNNING WHO I S T I M BURNET T ? WHO I S T I M BURNET T ? I AM A G EEK I HAVE BEEN PRO G RAMMING FO R O VER


  1. PRO T EC T I NG YO UR BUSI NESS D AT A T Y T O K EEP Y O UR B USINESS U P AND RANSFER AND O T HER SEC URIT IPS T R UNNING

  2. WHO I S T I M BURNET T ?

  3. WHO I S T I M BURNET T ? I AM A G EEK – I HAVE BEEN PRO G RAMMING FO R O VER 35 YEARS • E – E LEC T • U NIVERSIT Y O F F LO RIDA G RADUAT RIC AL E NG INEERING SPEC IALIZING IN D IG IT AL D ESIG N . G O G AT O RS !! • C O NSULT HE UF F O O T BALL P RO G RAM FO R O VER 30 YEARS . ANT T O T • C ERT IFIED I IO N S YST EMS S EC URIT Y P RO FESSIO NAL (C ISSP) IN 2008. NFO RMAT IO N S ERVIC ES , B ANKS – • E XPERIENC E WIT H I NSURANC E BRO KERS , I Y T HEFT P RO T DENT IT EC T L O C AL AND I IO NAL , C REDIT U NIO NS , E LEC T RIC U T IES , AND E NERG Y T NT ERNAT ILIT RADING C O MPANIES .

  4. T HE ST AT E O F C YBER SEC URI T Y

  5. EI G HT ALARMI NG C YBER SEC URI T Y FAC T S 1. T HERE ARE C O NT INUO US AT T AC K AT T EMPT S 2. 43 PERC ENT O F C YBER AT T AC KS T ARG ET SMALL BUSINESS .

  6. EI G HT ALARMI NG C YBER SEC URI T Y FAC T S 3. T HE AVERAG E C O ST O F A DAT A BREAC H IN 2020 WILL EXC EED $150 MILLIO N 4. S INC E 2013 T HERE ARE 3,809,448 REC O RDS ST O LEN FRO M BREAC HES EVERY DAY 5. O VER 75% O F HEALT H C ARE INDUST RY HAS BEEN INFEC T ED

  7. EI G HT ALARMI NG C YBER SEC URI T Y FAC T S 6. B Y 2020 T HERE WILL BE RO UG HLY 200 BILLIO N ED DEVIC ES . C O NNEC T 7. O NL Y 38 PERC ENT O F G L O BAL O RG ANIZAT IO NS C L AIM HEY ARE PREPARED . T 8. T O T AL C O ST FO R C YBER C RIME C O MMIT T ED G LO BALLY O 100 BILLIO N DO LLARS . HAS ADDED UP T

  8. THE “CIA” • W HAT YO U NEED T O BE C O NC ERNED WIT H EG O RIES : FALLS INT O T HREE C AT • C O NFIDENT IAL IT Y • I NT EG RIT Y • A VAILABIL IT Y

  9. T HE SEVEN MO ST I MPO RT ANT T HI NG S YO U SHO ULD BE DO I NG 1. B AC KUP YO UR D AT A . • E Q UIPMENT T HEFT O R FAILURE • R ANSO MWARE • A C C IDENT AL DELET IO N O R O VERWRIT E • I DEALLY : T HREE C O PIES IN T IO NS . WO LO C AT • C IA: I Y , A VAILABIL NT EG RIT IT Y

  10. T HE SEVEN MO ST I MPO RT ANT T HI NG S YO U SHO ULD BE DO I NG 2. S O FT WARE U PDAT ES • M O ST MALWARE T ARG ET S INSEC URE SYST EMS • C HEC K FO R AND APPLY UPDAT ES . • R EPLAC E O L D SO FT WARE • Y O U SHO UL D NO T BE RUNNING W INDO WS XP O R S ERVER 2003 • S ERVER 2008 IS E ND O F L IFE J AN 14, 2020 • C IA: C O NFIDENT Y , I Y , A VAILABIL IAL IT NT EG RIT IT Y

  11. T HE SEVEN MO ST I MPO RT ANT T HI NG S YO U SHO ULD BE DO I NG 3. R UN A NT I - VIRUS SO FT WARE • I N BUSINESS NET WO RKS T HIS SHO ULD BE MO NIT O RED • C IA: C O NFIDENT Y , A VAILABIL IAL IT IT Y

  12. T HE SEVEN MO ST I MPO RT ANT T HI NG S YO U SHO ULD BE DO I NG 4. U SE A WEL L - DESIG NED NET WO RK • P RO T EC T YO UR W I F I • U SE A G O O D FIREWALL T HAT IS UPDAT ED • K NO W WHERE YO UR NET WO RK C ABLES RUN • C IA: C O NFIDENT Y , IAL IT I Y , A VAILABIL NT EG RIT IT Y

  13. T HE SEVEN MO ST I MPO RT ANT T HI NG S YO U SHO ULD BE DO I NG 5. P RO FESSIO NAL M O NIT O RING • A NT I - VIRUS • U PDAT ES • G ENERAL SYST EM HEALT H • C IA: C O NFIDENT Y , I Y , IAL IT NT EG RIT A VAILABIL IT Y

  14. T HE SEVEN MO ST I MPO RT ANT T HI NG S YO U SHO ULD BE DO I NG 6. E MPLO YEE AWARENESS T RAINING • H O W T O SPO T SUSPIC IO US EMAIL • H O W T O IDENT IFY PHISHING AT T EMPT S • W HAT T O DO IF T HEY SUSPEC T SO MET HING • W HAT C AN AND C ANNO T BE SENT T HRO UG H EMAIL HO DS – M O RE LAT • H O W T O USE SEC URE DAT A T RANSFER MET ER • C IA: C O NFIDENT Y , A VAILABIL IAL IT IT Y

  15. T HE SEVEN MO ST I MPO RT ANT T HI NG S YO U SHO ULD BE DO I NG 7. P ASSWO RDS AND A C C ESS M ANAG EMENT • U SE M ULT I - FAC T O R A UT HENT IC AT IO N • T REAT PASSWO RDS LIKE UNDERWEAR : • H YO UR C O - WO RKERS . D O NO T SHARE WIT • D O NO T LEAVE T HEM O N YO UR DESK . • C HANG E T HEM O FT EN • C IA: C O NFIDENT Y , I IAL IT NT EG RIT Y

  16. SEC URE DAT A T RANSFER • U SE S EC URE EMAIL • C LIENT - BASED IS NO LO NG ER REC O MMENDED • D O ES NO T C O VER ALL DEVIC ES , SUC H AS SMART PHO NES • D O ES NO T PRO T EC T AG AINST USER FO RG ET T ING T O HIT HE “E NC RYPT ” BUT T T O N • U SE A G AT EWAY O R S ERVER -B ASED SO LUT IO NS • P RO T EC T S EMAIL SENT FRO M ALL DEVIC ES • C AN USE RULE - BASED ENC RYPT IO N FO R AUT O MAT IC PRO T EC T IO N

  17. SEC URE DAT A T RANSFER • U SE SEC URE FILE T O O LS SUC H AS S HARE S YNC RANSFER T • O VERC O MES T IO NS IN EMAIL (~5 T O 10 G B LIMIT IN HE SIZE LIMIT AT EMS ) MANY SYST • S ENDS A SEC URE LINK T HAT C AN BE PASSWO RD PRO T EC T ED AND C AN EXPIRE

  18. Doe, John 123-45-6789 SEC URE DAT A T RANSFER • DO NO T USE FT P (F ILE T RANSFER P RO T O C O L ) • I ED . D AT S NO T ENC RYPT A AND PASSWO RDS C AN BE EASILY EXPO SED • P (S EC URE F I LE T RANSFER P RO T O C O L ) USE SFT • I SELF , BUT SO ME C O MPANIES ALSO USE PG P (P RET S SEC URE BY IT T Y G O O D P RIVAC Y ) T O ENC RYPT T HE FILES BEFO RE SENDING AS A EXT RA LAYER O F SEC URIT Y J9j(H*9hp9b [kdjiHu6ydQ

  19. SEC URE DAT A T RANSFER • DO NO T USE HT T P WEBSIT ES ( HT P :/ / YO URSIT E . C O M ) T • I S NO T ENC RYPT ED AND DAT A C AN BE EASILY EXPO SED • USE HT T PS WEBSIT ES ( HT P S:/ / YO URSIT E . C O M ) T • S EC URED BY D IG IT AL C ERT IFIC AT ES • D O NO T USE SIT ES T HAT HAVE A C ERT IFIC AT E ERRO R

  20. Q UEST I O NS?

  21. T HANK YO U! C O NT AC T T IM B URNET T DMZ S O LUT IO NS T @ BIZNET ASSURE . C O M T BURNET 904-240-4924

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend