6 Critical IT Security Protections EVERY Medical Practice Must Have In Place NOW To Avoid Cyber-Attacks, Data Breach Lawsuits, Bank Fraud and Compliance Penalties Carl Utz Director of Sales & Client Experience Andromeda Technology Solutions www.WeNetwork.com
Today We’re Going To Cover • The great cyber crime myth – “cybercrime isn’t a threat to my business, these criminals only go after the big companies like Home Depot, Equifax, Target, LinkedIn etc. • The Top 7 Threats to your businesses network and cyber- security. • The network security approach that will save your practice from the financial, reputational, and emotional damages associated with a data incident or cyber security attack.
Ultimately We’re Going To Cover… How To Avoid Being A Sitting Duck To Cybercriminals And Protect Everything You’ve Worked So Hard To Achieve
Who The Heck Is Carl Utz?
Q & A
Let’s Get This Out Of The Way
Show of Hands
The Good News Is . . .
What Is An Attack??
Why Should We Care?
Brand Damage – Loss of Trust
Financial Losses
Not To Mention Lost Time & Stress
Why You?
Anyone Know What This Is?
Not Some Kid In His Mom’s Basement
Cyber Crime Revolution
20% Of This Room Will Be Breached This Year
The Cost Of Cybercrime Is No Joke • The cost of cybercrime each minute globally: $1,138,888 • The number of cybercrime victims each minute globally: 1,861 • Number of records leaked globally each minute (from publicly disclosed incidents): 5,518 • The number of new phishing domains each minute: 21 • The United States has the most cybercrime globally with 23% of the total
Let’s Dive In
#1 - Passwords
#1 - Passwords
#1 - Passwords 1. Delete stored browser passwords when you get home/to the office 2. Never, ever use this function again
#1 - Passwords Password Strength Keeps Criminals At Bay • 8 Characters or More • Mixture of Upper and Lowercase • Make Use of Special Characters ($@#!%&) • Use At Least 1 Number • Change Every 90 Days (make this company policy)
#1 - Passwords
#1 - Passwords
#1 - Passwords
#1 - Passwords
#2 - Email
#2 - Email
#2 - Email
#2 - Email
#2 - Email
Some Phishing Examples
Some Phishing Examples
Some Phishing Examples
Some Phishing Examples
Some Phishing Examples
Some Phishing Examples
If You Do Click A Bad Link What Happens?
Cloud Security & Your Email
The Shared Responsibility Model Microsoft/G-Suite provides for the security of the cloud, and the tenant (partner) provides the security in their cloud.
Microsoft Office 365 D A T A R E T E N T I O N A N D D E L E T I O N M I C R O S O F T W I L L R E T A I N C U S T O M E R D A T A T H A T R E M A I N S S T O R E D I N O N L I N E S E R V I C E S I N A L I M I T E D F U N C T I O N A C C O U N T F O R 9 0 D A Y S A F T E R E X P I R A T I O N O R T E R M I N A T I O N O F C U S T O M E R ’ S S U B S C R I P T I O N S O T H A T C U S T O M E R M A Y E X T R A C T T H E D A T A . A F T E R T H E 9 0 - D A Y R E T E N T I O N P E R I O D E N D S , M I C R O S O F T W I L L D I S A B L E C U S T O M E R ’ S A C C O U N T A N D D E L E T E T H E C U S T O M E R D A T A A N D P E R S O N A L D A T A W I T H I N A N A D D I T I O N A L 9 0 D A Y S , U N L E S S M I C R O S O F T I S P E R M I T T E D O R R E Q U I R E D B Y A P P L I C A B L E L A W T O R E T A I N S U C H D A T A O R A U T H O R I Z E D I N T H I S A G R E E M E N T . M I C R O S O F T H AS N O L I AB I L I T Y F O R T H E D E L E T I O N O F C U S T O M E R D AT A O R P E R S O N AL D AT A AS D E S C R I B E D I N T H I S S E C T I O N .
G-Suite LIMITATION OF LIABILITY YOU EXPRESSLY UNDERSTAND AND AGREE THAT GOOGLE AND PARTNERS SHALL NOT BE LIABLE TO YOU FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, CONSEQUENTIAL OR EXEMPLARY DAMAGES, INCLUDING BUT NOT LIMITED TO, DAMAGES FOR LOSS OF PROFITS, GOODWILL, USE, DATA OR OTHER INTANGIBLE LOSSES (EVEN IF GOOGLE OR PARTNERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES) RESULTING FROM: (i) THE USE OR THE INABILITY TO USE GOOGLE SERVICES; (ii) THE COST OF PROCUREMENT OF SUBSTITUTE GOODS AND SERVICES RESULTING FROM ANY GOODS, DATA, INFORMATION OR SERVICES PURCHASED OR OBTAINED OR MESSAGES RECEIVED OR TRANSACTIONS ENTERED INTO THROUGH OR FROM GOOGLE SERVICES; (iii) UNAUTHORISED ACCESS TO OR ALTERATION OF YOUR TRANSMISSIONS OR DATA; (iv) STATEMENTS OR CONDUCT OF ANY THIRD PARTY ON GOOGLE SERVICES; OR (v) ANY OTHER MATTER RELATING TO GOOGLE SERVICES. GOOGLE SHALL NOT BE LIABLE TO YOU FOR … DATA OR OTHER INTANGIBLE LOSSES
#3 – Websites 1. Legitimate websites that have been hacked and infected 2. Fake websites or copycat sites built by criminals to trick you and steal your info
#3 - Websites
#4 – Public PCs
Light At The End
#5 – Public Wifi
#6 – USB Thumb Drives
What’s The Common Factor Here?
#7 Your Staff
#7 Your Staff
#7 Your Staff
#7 Your Staff
#7 Your Staff
Now What?
Layered Security Strategy
Layered Network Security!
Up First – Your Practice
Layer #1 - Response
Layer #2 - Data
Layer #3 – Application
Layer #4 – Platform
Layer #5 – Network
Layer #6 – Physical Security
This Is Too Much – Where Do I Start?
I’m Here To Help
Thank You!
Questions?
Carl Utz – Director of Sales & Client Experience Email – CarlU@WeNetwork.com Phone – (815) 836 – 0030 Website – www.WeNetwork.com FREE Report & Weekly Cyber Security Tech Tip Emails www.WeNetwork.com/ILMGMA
Recommend
More recommend