PROTECTING YOUR BUSINESS - DATA TRANSFER AND OTHER SECURITY TIPS TO KEEP YOUR BUSINESS UP AND RUNNING - Clark & Lavey

Page created by Ramon Cannon
 
CONTINUE READING
PROTECTING YOUR BUSINESS - DATA TRANSFER AND OTHER SECURITY TIPS TO KEEP YOUR BUSINESS UP AND RUNNING - Clark & Lavey
PROTECTING YOUR BUSINESS
DATA TRANSFER AND OTHER SECURITY TIPS TO KEEP YOUR BUSINESS UP AND
                           RUNNING
PROTECTING YOUR BUSINESS - DATA TRANSFER AND OTHER SECURITY TIPS TO KEEP YOUR BUSINESS UP AND RUNNING - Clark & Lavey
WHO IS TIM BURNETT?
PROTECTING YOUR BUSINESS - DATA TRANSFER AND OTHER SECURITY TIPS TO KEEP YOUR BUSINESS UP AND RUNNING - Clark & Lavey
WHO IS TIM BURNETT?

• I AM A GEEK – I HAVE BEEN PROGRAMMING FOR OVER 35 YEARS
• UNIVERSITY OF FLORIDA GRADUATE – ELECTRICAL ENGINEERING SPECIALIZING IN DIGITAL
  DESIGN. GO GATORS!!
• CONSULTANT TO THE UF FOOTBALL PROGRAM FOR OVER 30 YEARS.
• CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL (CISSP) IN 2008.
• EXPERIENCE WITH INSURANCE BROKERS, IDENTITY THEFT PROTECTION SERVICES, BANKS –
  LOCAL AND INTERNATIONAL, CREDIT UNIONS, ELECTRIC UTILITIES, AND ENERGY TRADING
  COMPANIES.
PROTECTING YOUR BUSINESS - DATA TRANSFER AND OTHER SECURITY TIPS TO KEEP YOUR BUSINESS UP AND RUNNING - Clark & Lavey
THE STATE OF CYBER SECURITY
PROTECTING YOUR BUSINESS - DATA TRANSFER AND OTHER SECURITY TIPS TO KEEP YOUR BUSINESS UP AND RUNNING - Clark & Lavey
EIGHT ALARMING CYBER SECURITY FACTS

1. THERE ARE CONTINUOUS ATTACK ATTEMPTS
2. 43 PERCENT OF CYBER ATTACKS TARGET SMALL
   BUSINESS.
PROTECTING YOUR BUSINESS - DATA TRANSFER AND OTHER SECURITY TIPS TO KEEP YOUR BUSINESS UP AND RUNNING - Clark & Lavey
EIGHT ALARMING CYBER SECURITY FACTS

3. THE AVERAGE COST OF A DATA BREACH IN
   2020 WILL EXCEED $150 MILLION
4. SINCE 2013 THERE ARE 3,809,448 RECORDS
   STOLEN FROM BREACHES EVERY DAY

5. OVER 75% OF HEALTH CARE INDUSTRY   HAS
   BEEN INFECTED
PROTECTING YOUR BUSINESS - DATA TRANSFER AND OTHER SECURITY TIPS TO KEEP YOUR BUSINESS UP AND RUNNING - Clark & Lavey
EIGHT ALARMING CYBER SECURITY FACTS

6. BY 2020 THERE WILL BE ROUGHLY 200 BILLION
   CONNECTED DEVICES.

7. ONLY 38 PERCENT OF GLOBAL ORGANIZATIONS CLAIM
   THEY ARE PREPARED.

8. TOTAL COST FOR CYBER CRIME COMMITTED   GLOBALLY
   HAS ADDED UP TO 100 BILLION DOLLARS.
PROTECTING YOUR BUSINESS - DATA TRANSFER AND OTHER SECURITY TIPS TO KEEP YOUR BUSINESS UP AND RUNNING - Clark & Lavey
THE “CIA”

• WHAT YOU NEED TO BE CONCERNED   WITH
  FALLS INTO THREE CATEGORIES:

   • CONFIDENTIALITY
   • INTEGRITY
   • AVAILABILITY
PROTECTING YOUR BUSINESS - DATA TRANSFER AND OTHER SECURITY TIPS TO KEEP YOUR BUSINESS UP AND RUNNING - Clark & Lavey
THE SEVEN MOST IMPORTANT THINGS YOU
SHOULD BE DOING

1. BACKUP YOUR DATA.
   • EQUIPMENT THEFT OR FAILURE
   • RANSOMWARE
   • ACCIDENTAL DELETION OR OVERWRITE
   • IDEALLY: THREE COPIES IN TWO LOCATIONS.
   • CIA: INTEGRITY, AVAILABILITY
PROTECTING YOUR BUSINESS - DATA TRANSFER AND OTHER SECURITY TIPS TO KEEP YOUR BUSINESS UP AND RUNNING - Clark & Lavey
THE SEVEN MOST IMPORTANT THINGS YOU
    SHOULD BE DOING

2. SOFTWARE UPDATES
   • MOST MALWARE TARGETS INSECURE SYSTEMS
   • CHECK FOR AND APPLY UPDATES.
   • REPLACE OLD SOFTWARE
       •   YOU SHOULD NOT BE RUNNING WINDOWS XP OR
           SERVER 2003
       •   SERVER 2008 IS END OF LIFE JAN 14, 2020
   • CIA: CONFIDENTIALITY, INTEGRITY, AVAILABILITY
THE SEVEN MOST IMPORTANT THINGS YOU
SHOULD BE DOING

3. RUN ANTI-VIRUS   SOFTWARE

   • IN BUSINESS NETWORKS THIS SHOULD BE
      MONITORED

   • CIA: CONFIDENTIALITY, AVAILABILITY
THE SEVEN MOST IMPORTANT THINGS YOU
    SHOULD BE DOING

4. USE A WELL-DESIGNED
   NETWORK

   • PROTECT YOUR WIFI
   • USE A GOOD FIREWALL
      THAT IS UPDATED

   • KNOW WHERE YOUR
      NETWORK CABLES RUN

   • CIA: CONFIDENTIALITY,
     INTEGRITY, AVAILABILITY
THE SEVEN MOST IMPORTANT THINGS YOU
SHOULD BE DOING

5. PROFESSIONAL MONITORING
   • ANTI-VIRUS
   • UPDATES
   • GENERAL SYSTEM HEALTH
   • CIA: CONFIDENTIALITY, INTEGRITY,
     AVAILABILITY
THE SEVEN MOST IMPORTANT THINGS YOU
   SHOULD BE DOING

6. EMPLOYEE AWARENESS TRAINING
   • HOW TO SPOT SUSPICIOUS EMAIL
   • HOW TO IDENTIFY PHISHING ATTEMPTS
   • WHAT TO DO IF THEY SUSPECT SOMETHING
   • WHAT CAN AND CANNOT BE SENT THROUGH EMAIL
   • HOW TO USE SECURE DATA TRANSFER METHODS – MORE LATER
   • CIA: CONFIDENTIALITY, AVAILABILITY
THE SEVEN MOST IMPORTANT THINGS YOU
SHOULD BE DOING

7. PASSWORDS    AND   ACCESS MANAGEMENT
   • USE MULTI-FACTOR AUTHENTICATION
   • TREAT PASSWORDS LIKE UNDERWEAR:
       •   DO NOT SHARE WITH YOUR CO-WORKERS.
       • DO NOT LEAVE THEM ON YOUR DESK.
       • CHANGE THEM OFTEN
   • CIA: CONFIDENTIALITY, INTEGRITY
SECURE DATA TRANSFER

• USE SECURE EMAIL
   • CLIENT-BASED IS NO LONGER RECOMMENDED
       •   DOES NOT COVER ALL DEVICES, SUCH AS SMARTPHONES
       •   DOES NOT PROTECT AGAINST USER FORGETTING TO HIT
           THE “ENCRYPT” BUTTON

   • USE A GATEWAY OR SERVER-BASED SOLUTIONS
       •   PROTECTS EMAIL SENT FROM ALL DEVICES
       •   CAN USE RULE-BASED ENCRYPTION FOR AUTOMATIC
           PROTECTION
SECURE DATA TRANSFER

• USE SECURE   FILE TRANSFER TOOLS SUCH AS SHARESYNC

   • OVERCOMES THE SIZE LIMITATIONS IN EMAIL (~5 TO 10 GB LIMIT IN
     MANY SYSTEMS)

   • SENDS A SECURE LINK THAT CAN BE PASSWORD PROTECTED AND
      CAN EXPIRE
Doe, John
                                                                    123-45-6789

      SECURE DATA TRANSFER

• DO NOT USE FTP (FILE TRANSFER PROTOCOL)
   • IS NOT ENCRYPTED. DATA AND PASSWORDS CAN BE EASILY EXPOSED
• USE SFTP (SECURE FILE TRANSFER PROTOCOL)
   • IS SECURE BY ITSELF, BUT SOME COMPANIES ALSO USE PGP (PRETTY
     GOOD PRIVACY) TO ENCRYPT THE FILES BEFORE SENDING AS A
      EXTRA LAYER OF SECURITY

                                                                       J9j(H*9hp9b
                                                                       [kdjiHu6ydQ
SECURE DATA TRANSFER

• DO NOT USE HTTP WEBSITES (HTTP://YOURSITE.COM)
   • IS NOT ENCRYPTED AND DATA CAN BE EASILY EXPOSED
• USE HTTPS WEBSITES (HTTPS://YOURSITE.COM)
   • SECURED BY DIGITAL CERTIFICATES
   • DO NOT USE SITES THAT HAVE A CERTIFICATE ERROR
QUESTIONS?
THANK YOU!

        CONTACT
       TIM BURNETT
     DMZ SOLUTIONS
TBURNETT@BIZNETASSURE.COM

     904-240-4924
You can also read