XMC & VISUAL EDGE IT PRESENT You have Questions. We have Experts. They have Answers.
TODAY'S TOPICS Welcome & Panel Introduction Meet Our Experts Cyber Security & the SMB Why it is critical for SMBs to Protect themselves Cyber Security Checklist What you need to be secure Cyber Attacks How to Recognize, Prevent, Educate Communications ail, Phone, Virtual Meeting Apps
IT INFRASTRUCTURE FIREWALL ENDPOINT PROTECTION INDUSTRY REQUIREMENTS SECURITY RISK ASSESSMENTS: Overview PASSWORDS: Best Practices PHISHING RECOGNITION: What to look for EMPLOYEE TRAINING: Overview SECURE COMMUNICATIONS: Best Practices REQUEST CONSULTATION & INFORMATION
PRESIDENT NATIONAL SALES & DELIVERY VICE PRESIDENT, MANAGED IT SERVICES VISUAL EDGE IT VISUAL EDGE IT VISUAL EDGE IT DIRECTOR OF IT CHIEF TECHNOLOGY OFFICER SENIOR IT ENGINEER VET CENTRAL REGION XMC, INC. XMC, INC
RISK | IMPACT| EXAMPLES
INFRASTRUCTURE | END POINT | COMPLIANCE
ANSWER! • QUESTION • •
• • • • • •
QUESTION ANSWER! • • •
QUESTION
fi fi fi
QUESTION
• file by file • • Reinstall the Operating System Need license keys • • Reinstall each application Need license keys • Restore the files and data file by file • robably days of process & rebuild
QUESTION
• • •
Data Backup is your • • •
ANSWER! QUESTION YES! For some industries this is very important! Let's go over a few specifics: • HIPPA • FINRA • Legal • GDP Europe (General Data Protection Regulation)
EDUCATE | RECOGNIZE | PREVENT
• (includes viruses, trojans, spyware, rootkits and ransomware) • • (including DDOS) • • • •
ANSWER! QUESTION
QUESTION
• • • • •
QUESTION ANSWER! • • • •
• • • • • • •
strong passwords! • • • • •
• • • • • •
• • • • • •
BALANCING SECURITY & USE
ANSWER! QUESTION
• • • • • • •
Recommend
More recommend