cybersecurity cybersecurity seminar seminar steve
play

CYBERSECURITY CYBERSECURITY SEMINAR SEMINAR STEVE RUTKOVITZ - PowerPoint PPT Presentation

PROTECTING YOU AND YOUR BUSINESS CYBERSECURITY CYBERSECURITY SEMINAR SEMINAR STEVE RUTKOVITZ STEVE RUTKOVITZ ABOUT STEVE RUTKOVITZ ABOUT STEVE RUTKOVITZ For over 20 years, Steve owned and operated a very successful MSP business. W ith a


  1. PROTECTING YOU AND YOUR BUSINESS CYBERSECURITY CYBERSECURITY SEMINAR SEMINAR

  2. STEVE RUTKOVITZ STEVE RUTKOVITZ ABOUT STEVE RUTKOVITZ ABOUT STEVE RUTKOVITZ For over 20 years, Steve owned and operated a very successful MSP business. W ith a clear understanding of the market needs, and the ability to see things that no one else can, he developed an innovative IT and business process. STEVE’S SUPERHERO POWERS: STEVE’S SUPERHERO POWERS: Security and Compliance Risk Assessments Education PRESIDENT & CEO PRESIDENT & CEO Management 2

  3. STATE OF CYBER SECURITY STATE OF CYBER SECURITY 61% 61% 76% 76% 600% 600% 50% SMBs SMBs 2018 2018 PHISHING PHISHING IOT IOT Attacks reported by Target of 61% of all 50% increase in Attacks increased 76% of businesses by 600% security breaches Cyber Attacks 3

  4. Baltimore city government computer network hit by ransomware attack MAY 7, 2019, 6:50 PM altimore city government computers were infected with ransomware Tuesday, the mayor’s office said, the second time in just over a year that hackers demanding payment disrupted the city’s technology systems. “Employees are working diligently to locate the source and extent of the infection,” said Lester Davis, a spokesman for Democratic Mayor Bernard C. “Jack” Young. Davis said critical systems, including 911 and 311, were not been affected, but that the majority of city servers were shut down. The effects ranged from a City Council committee canceling a hearing on gun violence to water customers being unable to get billing questions answered. By the afternoon, Davis said, city teams had the ransomware quarantined. But the cause and scale of the problem was not clear Tuesday evening and Davis did not know when the affected systems would be back online. Dave Fitz, a spokesman for the FBI’s Baltimore office, said agents from its cyber squad were assisting the city. 4

  5. THE PROBLEM THE PROBLEM Increased Increased Internet of Internet of Number of Number of Things Things Devices Devices Mobile and Mobile and Cloud Cloud Wearable Wearable Applications Applications Devices Devices 5

  6. Security & Compliance Security & Compliance Security Security • The state of being free from danger or threat Compliance Compliance • The act of obeying an order, rule or request 6

  7. SECURITY SECURITY • The Right Layers Of Defense • Reactive to Proactive • Awareness Training 7

  8. CYBER THREATS CYBER THREATS 1 Phishing Attacks Phishing Attacks 2 Ransomware Ransomware TOP CYBER TOP CYBER 3 Malware Malware THREATS THREATS 4 Brute Force Attacks Brute Force Attacks 5 Insider Threats Insider Threats 8

  9. • Structured Framework COMPLIANCE COMPLIANCE COMPLIANCE COMPLIANCE • Policies and Procedures • Best Practices ● Structured Framework ● Policies and Procedures ● Regulatory Controls 9

  10. ISO 27001 ISO 27001 NIST NIST HIPAA HIPAA NYDFS NYDFS COMMON COMMON COMPLIANCES COMPLIANCES SEC SEC FFIEC FFIEC & BEST & BEST PRACTICES PRACTICES PCI DSS PCI DSS FINRA FINRA CCPA CCPA EU GDPR EU GDPR 10 10

  11. SEPARATING SEPARATING PERSONAL & PERSONAL & BUSINESS BUSINESS 11 11

  12. PERSONAL SECURITY PERSONAL SECURITY 1 Email Accounts Email Accounts 2 Password Strength Password Strength ACTION ACTION 3 Password Manager Password Manager STEPS STEPS 4 Layered Approach Layered Approach 5 Phishing Phishing 12 12

  13. 5 W AYS TO AVOID A PHISHING ATTACK 1 Identify the Real Sender Identify the Real Sender 2 Check the Salutation Check the Salutation 3 Use Your Mouse Hover Use Your Mouse Hover 4 Review the Footer 5 When in doubt, delete When in doubt, delete 13 13

  14. 14 14

  15. Our Assessment Process 15 15

  16. BUSINESS SECURITY BUSINESS SECURITY 1 Risk Assessment Risk Assessment 2 Structured Framework Structured Framework 3 ACTION ACTION Policies & Procedures Policies & Procedures 4 STEPS STEPS Awareness Training Awareness Training 5 Layered Security Layered Security 16 16

  17. • Software Vulnerabilities VISIBILITY VISIBILITY • Workarounds • Risk Exposure 17 17

  18. Bank Account Bank Account 350 350 Numbers Numbers 9,936 Credit Cards Credit Cards 14,541 14,541 Social Security Social Security TOTAL Numbers Numbers PII SCAN PII SCAN LIABILITY RESULTS RESULTS $10,043,391 $10,043,391 Dates of Birth Dates of Birth 2746 ABC COMPANY 18 18 18 18

  19. IN THE EVENT IN THE EVENT IN THE EVENT OF IN THE EVENT OF OF A BREACH OF A BREACH A BREACH A BREACH 19 19

  20. ALIGNMENT ALIGNMENT TECHNOLOGY RESOURCES TECHNOLOGY RESOURCES POLICIES & PROCEDURES POLICIES & PROCEDURES AWARENESS TRAINING AWARENESS TRAINING 20 20

  21. STEPS STEPS Contact Us Contact Us Schedule a Schedule a Meeting Meeting Framework Framework Analysis Analysis Risk Risk Assessment Assessment Executive Executive Summary Summary 21 21

  22. <50 Employees <50 Employees For profit company For profit company 2019 Calendar year 2019 Calendar year MARYLAND MARYLAND TAX PROGRAM TAX PROGRAM 50% Dollar for dollar tax credit 50% Dollar for dollar tax credit 22 22

  23. WEBSITES WEBSITES Lastpass Lastpass Darkweb Darkweb Roboform.com Roboform.com 23 23

  24. 24 24

  25. Thank You Thank You for Attending! for Attending! Contact Us: Contact Us: @ info@choicecybersecurity.com info@choicecybersecurity.com choicecybersecurity.com (410) 205-4980 (410) 205 4980 10065 Red Run Blvd, Suite 120, 10065 Red Run Blvd, Suite 120, Owings Mills, MD 21117 Owings Mills, MD 21117 Securities offered through Triad Advisors, LLC., Member FINRA/SIPC. Investment advisory services offered through The Prosperity Consulting 25 25 Group, LLC. The Prosperity Consulting Group, LLC is not affiliated with Triad Advisors, LLC.

Recommend


More recommend