PRO T EC T I NG YO UR BUSI NESS D AT A T Y T O K EEP Y O UR B USINESS U P AND RANSFER AND O T HER SEC URIT IPS T R UNNING
WHO I S T I M BURNET T ?
WHO I S T I M BURNET T ? I AM A G EEK – I HAVE BEEN PRO G RAMMING FO R O VER 35 YEARS • E – E LEC T • U NIVERSIT Y O F F LO RIDA G RADUAT RIC AL E NG INEERING SPEC IALIZING IN D IG IT AL D ESIG N . G O G AT O RS !! • C O NSULT HE UF F O O T BALL P RO G RAM FO R O VER 30 YEARS . ANT T O T • C ERT IFIED I IO N S YST EMS S EC URIT Y P RO FESSIO NAL (C ISSP) IN 2008. NFO RMAT IO N S ERVIC ES , B ANKS – • E XPERIENC E WIT H I NSURANC E BRO KERS , I Y T HEFT P RO T DENT IT EC T L O C AL AND I IO NAL , C REDIT U NIO NS , E LEC T RIC U T IES , AND E NERG Y T NT ERNAT ILIT RADING C O MPANIES .
T HE ST AT E O F C YBER SEC URI T Y
EI G HT ALARMI NG C YBER SEC URI T Y FAC T S 1. T HERE ARE C O NT INUO US AT T AC K AT T EMPT S 2. 43 PERC ENT O F C YBER AT T AC KS T ARG ET SMALL BUSINESS .
EI G HT ALARMI NG C YBER SEC URI T Y FAC T S 3. T HE AVERAG E C O ST O F A DAT A BREAC H IN 2020 WILL EXC EED $150 MILLIO N 4. S INC E 2013 T HERE ARE 3,809,448 REC O RDS ST O LEN FRO M BREAC HES EVERY DAY 5. O VER 75% O F HEALT H C ARE INDUST RY HAS BEEN INFEC T ED
EI G HT ALARMI NG C YBER SEC URI T Y FAC T S 6. B Y 2020 T HERE WILL BE RO UG HLY 200 BILLIO N ED DEVIC ES . C O NNEC T 7. O NL Y 38 PERC ENT O F G L O BAL O RG ANIZAT IO NS C L AIM HEY ARE PREPARED . T 8. T O T AL C O ST FO R C YBER C RIME C O MMIT T ED G LO BALLY O 100 BILLIO N DO LLARS . HAS ADDED UP T
THE “CIA” • W HAT YO U NEED T O BE C O NC ERNED WIT H EG O RIES : FALLS INT O T HREE C AT • C O NFIDENT IAL IT Y • I NT EG RIT Y • A VAILABIL IT Y
T HE SEVEN MO ST I MPO RT ANT T HI NG S YO U SHO ULD BE DO I NG 1. B AC KUP YO UR D AT A . • E Q UIPMENT T HEFT O R FAILURE • R ANSO MWARE • A C C IDENT AL DELET IO N O R O VERWRIT E • I DEALLY : T HREE C O PIES IN T IO NS . WO LO C AT • C IA: I Y , A VAILABIL NT EG RIT IT Y
T HE SEVEN MO ST I MPO RT ANT T HI NG S YO U SHO ULD BE DO I NG 2. S O FT WARE U PDAT ES • M O ST MALWARE T ARG ET S INSEC URE SYST EMS • C HEC K FO R AND APPLY UPDAT ES . • R EPLAC E O L D SO FT WARE • Y O U SHO UL D NO T BE RUNNING W INDO WS XP O R S ERVER 2003 • S ERVER 2008 IS E ND O F L IFE J AN 14, 2020 • C IA: C O NFIDENT Y , I Y , A VAILABIL IAL IT NT EG RIT IT Y
T HE SEVEN MO ST I MPO RT ANT T HI NG S YO U SHO ULD BE DO I NG 3. R UN A NT I - VIRUS SO FT WARE • I N BUSINESS NET WO RKS T HIS SHO ULD BE MO NIT O RED • C IA: C O NFIDENT Y , A VAILABIL IAL IT IT Y
T HE SEVEN MO ST I MPO RT ANT T HI NG S YO U SHO ULD BE DO I NG 4. U SE A WEL L - DESIG NED NET WO RK • P RO T EC T YO UR W I F I • U SE A G O O D FIREWALL T HAT IS UPDAT ED • K NO W WHERE YO UR NET WO RK C ABLES RUN • C IA: C O NFIDENT Y , IAL IT I Y , A VAILABIL NT EG RIT IT Y
T HE SEVEN MO ST I MPO RT ANT T HI NG S YO U SHO ULD BE DO I NG 5. P RO FESSIO NAL M O NIT O RING • A NT I - VIRUS • U PDAT ES • G ENERAL SYST EM HEALT H • C IA: C O NFIDENT Y , I Y , IAL IT NT EG RIT A VAILABIL IT Y
T HE SEVEN MO ST I MPO RT ANT T HI NG S YO U SHO ULD BE DO I NG 6. E MPLO YEE AWARENESS T RAINING • H O W T O SPO T SUSPIC IO US EMAIL • H O W T O IDENT IFY PHISHING AT T EMPT S • W HAT T O DO IF T HEY SUSPEC T SO MET HING • W HAT C AN AND C ANNO T BE SENT T HRO UG H EMAIL HO DS – M O RE LAT • H O W T O USE SEC URE DAT A T RANSFER MET ER • C IA: C O NFIDENT Y , A VAILABIL IAL IT IT Y
T HE SEVEN MO ST I MPO RT ANT T HI NG S YO U SHO ULD BE DO I NG 7. P ASSWO RDS AND A C C ESS M ANAG EMENT • U SE M ULT I - FAC T O R A UT HENT IC AT IO N • T REAT PASSWO RDS LIKE UNDERWEAR : • H YO UR C O - WO RKERS . D O NO T SHARE WIT • D O NO T LEAVE T HEM O N YO UR DESK . • C HANG E T HEM O FT EN • C IA: C O NFIDENT Y , I IAL IT NT EG RIT Y
SEC URE DAT A T RANSFER • U SE S EC URE EMAIL • C LIENT - BASED IS NO LO NG ER REC O MMENDED • D O ES NO T C O VER ALL DEVIC ES , SUC H AS SMART PHO NES • D O ES NO T PRO T EC T AG AINST USER FO RG ET T ING T O HIT HE “E NC RYPT ” BUT T T O N • U SE A G AT EWAY O R S ERVER -B ASED SO LUT IO NS • P RO T EC T S EMAIL SENT FRO M ALL DEVIC ES • C AN USE RULE - BASED ENC RYPT IO N FO R AUT O MAT IC PRO T EC T IO N
SEC URE DAT A T RANSFER • U SE SEC URE FILE T O O LS SUC H AS S HARE S YNC RANSFER T • O VERC O MES T IO NS IN EMAIL (~5 T O 10 G B LIMIT IN HE SIZE LIMIT AT EMS ) MANY SYST • S ENDS A SEC URE LINK T HAT C AN BE PASSWO RD PRO T EC T ED AND C AN EXPIRE
Doe, John 123-45-6789 SEC URE DAT A T RANSFER • DO NO T USE FT P (F ILE T RANSFER P RO T O C O L ) • I ED . D AT S NO T ENC RYPT A AND PASSWO RDS C AN BE EASILY EXPO SED • P (S EC URE F I LE T RANSFER P RO T O C O L ) USE SFT • I SELF , BUT SO ME C O MPANIES ALSO USE PG P (P RET S SEC URE BY IT T Y G O O D P RIVAC Y ) T O ENC RYPT T HE FILES BEFO RE SENDING AS A EXT RA LAYER O F SEC URIT Y J9j(H*9hp9b [kdjiHu6ydQ
SEC URE DAT A T RANSFER • DO NO T USE HT T P WEBSIT ES ( HT P :/ / YO URSIT E . C O M ) T • I S NO T ENC RYPT ED AND DAT A C AN BE EASILY EXPO SED • USE HT T PS WEBSIT ES ( HT P S:/ / YO URSIT E . C O M ) T • S EC URED BY D IG IT AL C ERT IFIC AT ES • D O NO T USE SIT ES T HAT HAVE A C ERT IFIC AT E ERRO R
Q UEST I O NS?
T HANK YO U! C O NT AC T T IM B URNET T DMZ S O LUT IO NS T @ BIZNET ASSURE . C O M T BURNET 904-240-4924
Recommend
More recommend