protect yourself while conducting business virtually in
play

Protect Yourself While Conducting Business Virtually In The Time Of - PowerPoint PPT Presentation

Protect Yourself While Conducting Business Virtually In The Time Of COVID-19 What you can do to protect your business and experience uninterrupted productivity during a new work-from-home reality . Agenda da Who is vulnerable Whats


  1. Protect Yourself While Conducting Business Virtually In The Time Of COVID-19 What you can do to protect your business and experience uninterrupted productivity during a new work-from-home reality .

  2. Agenda da • Who is vulnerable • What’s changed since the pandemic • Everyday habits to minimize risk • What you should do if you’re working from home • What to do if you think you’ve been hacked • Additional Resources • Q&A

  3. Who is vulnerabl ble • SMBs are prime targets of cyber breaches: • Verizon 2019 DBIR

  4. What’s changed s since t the pandemic Mobile Workforce: Exploiting the Coronavirus:

  5. Everyday habits ts to minimize r risk: • If you see something, say something • Password protection • MFA – Multi-Factor Authentication on every login

  6. Everyday habits ts to minimize r risk: • Don’t be “Click-happy” (email & while browsing)

  7. Everyday habits ts to minimize r risk: • Backup • Backup • Backup • Backup • Backup • Backup

  8. What t you ou s shou ould ld d do i o if you ou’re w wor orking f from h home • Don’t use public Wi-Fi; secure your own • Install OS and Software Updates • Windows: Start > “update” > Check for Updates • MacOS: Apple > About this Mac > Software Updates • Office: File > Account > Update Options > Update Now • Install Anti-Malware Updates • Uninstall unnecessary software • Secure other devices

  9. What t you ou s shou ould ld d do i o if you ou’re w wor orking f from h home • If your company or IT provider mandates using a VPN – Use it • Verify disconnect procedures • Review data and privacy concerns, i.e. HIPPA, PCI • Create and use a work profile if you share your computer • Lock your computer • Cntl-Alt-Del > Enter

  10. What t you ou s shou ould ld d do i o if you ou’re w wor orking f from h home • Track and maintain borrowed equipment • Use a surge protector and, if possible, a backup battery

  11. What t to do i if you think you’ve been hacked • Disconnect affected systems from local network • GET HELP • Disconnect entire network and Internet access • Protect your backup • Change passwords • Document • Contact authorities if theft involved

  12. Additi tional R Resources • Nist.gov/cyberframework.com • Check bitsight.com • haveibeenpwned.com • Check your Office 365 Secure Score • Get cyber security training for your company • https://www.webroot.com/us/en/business/security-awareness

  13. Q&A Q&A Keenan Klos CEO/Owner Klos Consulting, Inc. kklos@klosconsulting.com 954-934-0909

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend