cyber security best practices

24
Cyber Security Best Practices

Upload: evolveip

Post on 16-Apr-2017

583 views

Category:

Technology


2 download

TRANSCRIPT

Page 1: Cyber Security Best Practices

Cyber Security Best Practices

Page 2: Cyber Security Best Practices

YOU HAVE MORE TO SECURE THAN EVER BEFORE

NetworkMobile DevicesEmail systemsSoftware programsBusiness applicationsBusiness documentsHR docs / employee info

And more

Page 3: Cyber Security Best Practices

SECURITY THREATS

User Error

Theft Phishing Scams

Malware

Legacy Systems

Page 4: Cyber Security Best Practices

30% of phishing emails are opened, and 12% of

targets click on the link or attachment

SMBs are the primary targets for

ransomware, but only 34% test backups

regularly

Anne Campbell
What's the source for the 34% stat?
Page 5: Cyber Security Best Practices

$$

$SMBs lose

$7K -

$74K for each hour of downtime.

44% of small businesses report being the victim of

a cyber-attack.

Ransomware victims paid

$24M to regain access to their data in 2015 alone.

THE COST OF RANSOMWARE

Page 6: Cyber Security Best Practices

1. Common cybersecurity mistakes to avoid

2. Things you need to know about ransomware

3. Creating a security policy

WHAT WILL YOU DO TO REDUCE YOUR

VULNERABILITY?

Page 7: Cyber Security Best Practices

COMMON CYBERSECURITY MISTAKES

Page 8: Cyber Security Best Practices

POST-IT FULL OF PASSWORDS 1.

The Fix: Explain to your

employees why

this is a bad idea,

and give them

some ideas on

how to manage

passwords safely.

Page 9: Cyber Security Best Practices

OUTDATED OPERATING SYSTEMS2.

The Fix:

If you’re running outdated operating systems, it’s time to transition to something more secure.

Page 10: Cyber Security Best Practices

SECURITY SOFTWARE THAT NEVER GETS UPDATED3.

The Fix:

Check for updates• Firewall• Anti-virus• Etc..

Replace old outdated security

equipment

Page 11: Cyber Security Best Practices

OLD EMPLOYEES STILL HAVE ACCESS

The Fix: Set up a solid password policy and have passwords expire every 90 days.

4.

Page 12: Cyber Security Best Practices

THINGS YOU NEED TO KNOW ABOUT RANSOMWARE

Page 13: Cyber Security Best Practices

WHAT IS MALWARE?

MalwareMeans ‘malicious software’

Malware can enter a system through downloads, email attachments, advertisements, or any type of hole in the security of the system.

Page 14: Cyber Security Best Practices

THE THREAT OF RANSOMWARE CONTINUES TO GROW

U.S. government estimates there are now 4,000 ransomware attacks being launched per day.

https://www.justice.gov

This is a 300% increase over the attacks seen per day in 2015.

Page 15: Cyber Security Best Practices

PUT TECHNICAL SAFEGUARDS IN PLACE As a best practice, have an intrusion-prevention system and security software running on your computers.

Antivirus software

Firewalls

Spam filters

Page 16: Cyber Security Best Practices

TRAIN EMPLOYEES

As a best practice, you should require all new employees to complete cybersecurity training, and then offer it on an ongoing basis to avoid information being missed.

Page 17: Cyber Security Best Practices

PROVIDE EXAMPLES

Ransomware examples show employees what a

threat looks like so they’ll know the warning signs and be able to identify a suspicious message or attachment before they

click on anything.

Page 18: Cyber Security Best Practices

CREATING A SECURITY POLICY

Page 19: Cyber Security Best Practices

Limit PermissionsIf employees don’t need access

to sensitive information and assets to complete their job,

limit their permissions.

IDENTIFY ROLES AND RESPONSIBILITIES

Page 20: Cyber Security Best Practices

DEFINE DATA RETENTION PARAMETERS

Perform a disaster drill

How long do you need

your data?

What regulations do you need to have in

place?

Do you have to be

compliant with any

regulations?

?

Page 21: Cyber Security Best Practices

Military-

grade

256AES

MAKE SURE ENCRYPTION AND COMPLIANCE NEEDS ARE MET

Page 22: Cyber Security Best Practices

10

10

10

10

01

10

01

10

01

10

01

01

01

01

01

00

11

00

11

00

11

00

10

11

0

BACK IT UP

• Choose the right technology partners

KEY TAKEAWAYS

Take precautions to safe-guard your data

• Applications and software up to date• Firewall, anti-virus, email security

Page 23: Cyber Security Best Practices

Cybercriminals are taking advantage of new attack vectors – mobile devices, web-enabled and mobile applications and web browsers – to accomplish their mission.

Click here to learn how to quickly deploy web security as a cloud service to protect against increasingly sophisticated attackers.