th the weakest st link in cy cyber er secu security ty
play

TH THE WEAKEST ST LINK IN CY CYBER ER SECU SECURITY TY 1 - PDF document

11/4/19 TH THE WEAKEST ST LINK IN CY CYBER ER SECU SECURITY TY 1 Introduction In Ren Sloos - MCT, MCSE, CNE, CSSA Technical Account Manager at Bulletproof IT Managed Service Provider for ~70 organizations Municipalities


  1. 11/4/19 TH THE WEAKEST ST LINK IN CY CYBER ER SECU SECURITY TY 1 Introduction In • René Sloos - MCT, MCSE, CNE, CSSA • Technical Account Manager at Bulletproof IT • Managed Service Provider for ~70 organizations • Municipalities • Oil & Gas • Medical • Accounting • Construction 2 Source: SonicWall 2019 Cyber-Threat-Report mid-year update 3 1

  2. 11/4/19 Ge Georgia hit by Cyber Attack A huge cyber-attack has knocked out more than 2,000 websites, as well as the national TV station - in the country of Georgia. Source: bbc.com October 28, 2019 4 Ot Other examples • Crypto virus wipes server and USB Backup • Email Hijack • Clients vendor sent a bill • Clients CFO sent malicious payment instructions 5 Ha Hacked public sites 2018 -2019 2019 Source: Wikipedia – List of Data Breaches 6 2

  3. 11/4/19 Wh What’s the process? • Public sites get hacked • Account information is collected and sold on the Dark Web • Accounts are researched • Company sites • Social Media • Information is used to hack accounts using similar passwords 7 Ho How to avoid it? • Better password hygiene • Use a multi-level protection strategy • Have a multi-level backup strategy • Train your users 8 Be Better er Pas assword d Hygi giene ene • Use unique passwords for every account • Use a password manager (i.e. Lastpass) • Implement 2-Factor authentication • Do not write down passwords on stickies 9 3

  4. 11/4/19 Mu Multi Level Protection Strategy • Implement Firewalls with Active Security subscriptions • Implement a Cloud Security Solution • Implement centralized End-Point AV Solution • Monitor the network for signs of encryption 10 Multi Level Backup Strategy Mu • Implement Volume Shadow Copies on Windows Servers • Create a local backup to a NAS (not USB connected) • Cloud backup 11 Tr Train your users • Train the “Human Firewall” • Monitor training completion • Measure progress by testing your users 12 4

  5. 11/4/19 Tr Train your users • Do your users know the difference? • Phising • Smishing • Vishing • Implement external message warning 13 Security Sec y Tips • Improve the strength of your password • Use passphrases • Never use personal or obvious information in your password • Never use the same password for multiple accounts • Use a password manager (i.e. Lastpass) • Check if your account has been compromised 14 htt https://haveibeenpwned.com/ 15 5

  6. 11/4/19 Pr Products we use to keep our cl clients protect cted 16 Wh What is the weakest st link in Cyber Cy ber Sec ecur urity? Systems Process Users 17 Qu Questions? SAVING TIME. SAVING MONEY. SAVING YOU. 18 6

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend