Top Banner
Are Your IT Systems Secure From Cyber Criminals, Viruses, Worms and EMPLOYEES?
14

Are Your IT Systems Secure?

Jan 21, 2018

Download

Technology

Nex-Tech
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Are Your IT Systems Secure?

Are Your IT Systems Secure From Cyber Criminals, Viruses, Worms and EMPLOYEES?

Page 2: Are Your IT Systems Secure?

Security Essentials

• Current Operating System – Windows 7 or Above

• OS and Third Party Patches

• Firewall With Update Services

• Client Level Antivirus

• Spam Filter

• Secure Wireless

• Password Policy

Page 3: Are Your IT Systems Secure?

On Saturday, Nov. 30, the hackers had set their traps

Page 4: Are Your IT Systems Secure?

Six months earlier the company began installing a $1.6 million malware detection tool made by the computer

security firm FireEye (FEYE), whose customers also include the CIA and the Pentagon.

Page 5: Are Your IT Systems Secure?

FireEye spotted them. Bangalore got an alert and flagged the security team in Minneapolis. And then …

Nothing happened.For some reason, Minneapolis didn’t react to the sirens.

Page 6: Are Your IT Systems Secure?

Current Threats

Spearphishing95% of all attacks on the

enterprise network are the result of successful

spearphishing

-Allen PallerDirector of Research,

SANS Institute

Page 7: Are Your IT Systems Secure?

Current Threats

PhishingNearly 1 in 5 users will click on a link within a

phishing email

Verizon Data Breach Investigation Report, 2014 https://phishingquiz.mcafee.com/

88% of HR and Finance clicked on at least one phishing

email

Page 8: Are Your IT Systems Secure?

Current Threats

Social Engineering

Page 9: Are Your IT Systems Secure?

Current Threats

“Nearly one in five people who found a random USB stick in a public setting proceeded to use

the drive in ways that posed cybersecurity risks to their personal devices and information and

potentially, that of their employer, a recent experiment conducted on behalf of CompTIA,

the IT industry association, revealed.”

http://www.securitymagazine.com/articles/86728-study-highlights-poor-security-habits

Page 10: Are Your IT Systems Secure?

Current Threats

• Viruses

• Malware

• Worms

• Trojans

• Ransomware

Page 11: Are Your IT Systems Secure?

Best Practices

• Security Review

• Update Software including OS, AV..etc.

• Policy Review

• Current Generation Firewall

• Backup Backup Backup

• Security Breach Mitigation Plan

Page 12: Are Your IT Systems Secure?

NO ONE IS DISCOUNTING PREVENTION. BUT

BUILDING CYBER RESILIENCY STARTS WITH

THE PREMISE THAT ATTACKERS WILL GET IN,

THAT SMART ORGANIZATIONS OPERATE

UNDER AN “ASSUMPTION OF COMPROMISE,”

AND THAT THEY PLAN THEIR RESPONSE AND

REMEDIATION CAPABILITIES ACCORDINGLYVICTOR LIMONGELLI IS PRESIDENT AND CEO OF GUIDANCE SOFTWARE, INC. HE IS A FREQUENT

SPEAKER AT SECURITY AND LEGAL EVENTS.

Page 13: Are Your IT Systems Secure?

Security Inside Network

• Training

• Security Review

• ISFW

• Training Again

Page 14: Are Your IT Systems Secure?

Loren Vonlintel [email protected] 785-621-7006