protecting your business against the unthinkable sba houston, august 2, 2006 mark piening sr....

14
Protecting Your Business Against the Unthinkable SBA Houston, August 2, 2006 Mark Piening Sr. Director Worldwide SMB Marketing

Upload: lorraine-sutton

Post on 30-Dec-2015

213 views

Category:

Documents


0 download

TRANSCRIPT

Protecting Your Business Against the Unthinkable

SBA Houston, August 2, 2006

Mark Piening

Sr. Director Worldwide SMB Marketing

2 – 2005 Symantec Corporation. All rights reserved.Protecting your business

Small Businesses Are Interacting In New Ways

3 – 2005 Symantec Corporation. All rights reserved.Protecting your business

Your Business Is Changing

► Technology surrounds our work and private lives

► The Internet has redefined business dynamics

► Email anytime, anywhere

► Instant messages at a blink of an eye

► Wireless everything – mobile phones, wireless networks

► Access to work from home, hotel, airport

► Huge amounts of data stored on computers and servers

4 – 2005 Symantec Corporation. All rights reserved.Protecting your business

IM threats grew by 1,693% in 2005

With Opportunities Come Risks

35% of Small Businesses UseInstant Messaging (IM)

In 2005, US consumers lodged more than 196,503 internet related fraud

complaints with the FTC

57% of SMBs with websites generate significant revenue

online

One in five organizations said they have sustained financial losses due to attack on mobile data platforms

Usage of converged mobile devices grew 50% worldwide

Usage of converged mobile devices grew 50% worldwide

Sources: IMlogic Threat Center report, Jan 2006; Interland Small and Medium-sized Business Barometer, September 2005; Federal trade commission, 2006; IDC, 2005; PC World, April 2006;

5 – 2005 Symantec Corporation. All rights reserved.Protecting your business

The Problem…

Environmental Environmental ImpactsImpacts Power OutagesPower Outages FloodsFloods Tornadoes Tornadoes Etc.Etc.

User MishapsUser Mishaps End User ErrorEnd User Error TheftTheft Fat FingerFat Finger

Malicious AttacksMalicious Attacks VirusesViruses WormsWorms Trojan HorsesTrojan Horses PhishingPhishing SpyWareSpyWare

Hardware/SoftwareHardware/Software Hard DriveHard Drive Motherboard/PowerMotherboard/Power System CorruptionSystem Corruption Failed Patch or UpdateFailed Patch or Update

Common Denominator:

Loss of System and/or Important Information

6 – 2005 Symantec Corporation. All rights reserved.Protecting your business

months

days

hrs

mins

secs

ProgramViruses Macro

Viruses E-mailWorms Network

Worms

FlashWorms

Co

nta

gio

n P

eri

od

Evolution of Virus/Worm Threats

► The latest threats now spread orders of magnitude faster than years ago, from months to nearly seconds

1990 Time 2006

Contagion Period

7 – 2005 Symantec Corporation. All rights reserved.Protecting your business

Today’s Attacks Are Motivated By Financial Gain

With the growth in phishing and other financial motivated attacks, Small Businesses are at risk

Source: Symantec Internet Security Threat Report Volume IXPublished:March 2006

Top Targeted Industries

Small Business is often a target because they do not always have adequate protection

8 – 2005 Symantec Corporation. All rights reserved.Protecting your business

Threat Impact On Small Businesses

Direct Losses

• Theft, Money, Digital Assets

• Computer Resources

• Trade Secrets

• Consumer Information

Indirect Losses

• Loss of Potential Sales

• Negative Brand Impact

• Loss of Competitive Advantage

• Loss of Goodwill

Productivity Losses

• Diversion of Funds

• Continuity Expenses

• Corruption of Data

• Recovery Expenses

• Failure to Meet Contracts

• Failure to Meet Privacy Regulations

• Illegal User Activity

• Director Liability

Legal Exposure

9 – 2005 Symantec Corporation. All rights reserved.Protecting your business

But Symantec Can Help…..

Security

Data Center Management Services

Data ProtectionFor all network tiers: the gateway, the server,

the desktop, including PCs, laptops, handhelds Backup and recovery of data and systems

Simplifies administration of heterogeneous environments and provides continuous availability

of mission critical data and applications

Full range of services to assist our customers manage and mitigate IT risk

Plan Design Build Manage

10 – 2005 Symantec Corporation. All rights reserved.Protecting your business

A Simple Blueprint For Windows Security And Availability

Policy

► Proactive alerts

► Endpoint compliance

► Email discovery/compliance

Application

► Mail security

► Exchange archiving

System

► Server management & recovery

► Desktop management & recovery

Data

► Data backup and recovery

► Client and server security

11 – 2005 Symantec Corporation. All rights reserved.Protecting your business

Symantec’s Resources For Small Business

http://www.symantec.com/small_business/

12 – 2005 Symantec Corporation. All rights reserved.Protecting your business

Recommended Practices

1. Prevent infection with antivirus and antispyware software Install antivirus on all desktops, laptops, and servers Check for virus definitions daily or set for automatic updates

2. Stop intruders with a firewall Use a firewall on all desktops, laptops, and servers

3. Stay on top of security updates Deploy security patches and fixes as soon as they are available Use the latest operating system versions

4. Create strong passwords and change them frequently Don’t allow Web browsers to remember passwords/private data

5. Open email responsibly Scrutinize attachments before opening them; avoid ones with unusual

extensions Don’t open or reply to unsolicited mail

13 – 2005 Symantec Corporation. All rights reserved.Protecting your business

Recommended Practices, cont.

6. Browse the Web with caution Don’t ever give personal information to a Web site unless you see a small

padlock or key icon in the browser’s toolbar Don’t type confidential information in Instant Messaging/Chat programs

7. Back up your desktops and servers regularly Back up vital data daily and store critical backups offsite

8. Make remote connections secure Require remote users to use antivirus and firewall software Use a Virtual Private Network (VPN)

9. Lock down wireless networks Install a firewall at the wireless access point

10. Ensure the physical security of your equipment Never leave wireless devices unattended Use the screen locking feature when you leave your computer

Thank You