Top Banner
Assessing Your Security September 2016
66

Assessing Your security

Jan 19, 2017

Download

Technology

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Assessing Your security

Assessing Your Security

September 2016

Page 2: Assessing Your security

Introductions

Joshua PeskayIdealware Expert TrainerVice President, RoundTable Technology

Page 3: Assessing Your security

Introductions

Peter CampbellChief Information Officer, Legal Services Corporation

Page 4: Assessing Your security

Introductions

www.idealware.org

Page 5: Assessing Your security

What We’ll Cover Today• Imperfect Security• Assessing Your Risk• Common Risky Practices• What Do You Do if You

Experience a Data Breach?• Establishing Policies for Your

Organization

Page 6: Assessing Your security

Poll Question

On a scale of 1-5, how concerned are you with your data security?

Page 7: Assessing Your security

A False Sense of Security

Page 8: Assessing Your security

Why Is Everyone Talking About Security?In the digital age, data risk is the new normal.

Page 9: Assessing Your security

A False Sense of SecuritySome are overwhelmed. Others are just gambling that their number won’t come up.

Survey link:

Page 10: Assessing Your security

Avoiding Security Won’t Protect You

Page 11: Assessing Your security

Neither Will Your Nonprofit Status

Survey link:

Data thieves are usually pros—they don’t care who their target is. If they can steal valuable information, they will.

Page 12: Assessing Your security

Small Nonprofits Are Attractive Targets

• Fewer resources

• Limited IT security

• Not likely to notice an attack until much later

Page 13: Assessing Your security

What Are Your Risks?

And what should you do about them?

Photo Credit: Women of Color in Tech Chat

Page 14: Assessing Your security

Assessing Your Risk

Page 15: Assessing Your security

It’s a Process

To understand the risks and your comfort with them, you need to carry out a thorough assessment of your data.

Page 16: Assessing Your security

Inventory Your Data

Make a list on sticky notes and group them by where the data is stored (e.g., case management system).

Page 17: Assessing Your security

Classify Your Information

• Confidentiality: Data that can’t be exposed.

• Integrity: Data you can’t lose.

• Availability: Data you can’t lose access to for any period of time.

If you have data that’s not very high in any of these categories, then it’s likely not essential to your organization.

Page 18: Assessing Your security

Consider the Risks

Think through:

• What could happen to your data?

• How likely is it to happen?• How bad would it be if

something happened?

Photo Credit: Women of Color in Tech Chat

Page 19: Assessing Your security

Into the Chat: What Risks Worry You?Are there specific risks that keep you up at night?

Page 20: Assessing Your security

8 Common Risky Practices

Page 21: Assessing Your security

1. Unmanaged Personal DevicesDo staffers use their personal devices for work?

Page 22: Assessing Your security

You Can’t Control Access

• A personal device may have additional users.

• Terminated employees are likely to still have organizational information after leaving.

Page 23: Assessing Your security

Virus/Malware Risk

How do you know personal computers and devices have basic protections?

Page 24: Assessing Your security

Software Ownership

Your nonprofit might purchase the software, but not control the license.

Page 25: Assessing Your security

What Can You Do?

• Provide virus and malware software.

• Establish software licensing policies.

• Provide devices for work, if possible.

• Mobile Device Management exists, but is expensive.

Page 26: Assessing Your security

2. Lack of Password ManagementAre a lot of people using weak passwords?

Page 27: Assessing Your security

Bad Habits

• Sharing passwords. • Reusing Passwords

• Not changing default passwords.• Writing passwords on post-it notes.

• Trying to keep it too simple.

Page 28: Assessing Your security

Multi-Factor Authentication

Something You Know

Something You Have

Something You Are

Page 29: Assessing Your security

Password Managers

Page 30: Assessing Your security

What Can You Do?

• Implement password management software such as OneLogin.

• Dual-factor authentication.

• Establish password creation policies.

• Provide training.

Page 31: Assessing Your security

3. Consumer-Grade Cloud StorageIs there a difference between Dropbox and Dropbox for business?

Page 32: Assessing Your security

Hard to Control Access to Data

• Convenience• Cost Savings• Staff preference

Page 33: Assessing Your security

Less Security

You often get what you pay for with free Cloud storage.

Page 34: Assessing Your security

What Can You Do?

• Use business-grade Cloud storage and set controls that limit access to your data.

• Add-on services such as BetterCloud can also give you deeper audit and policy controls.

Page 35: Assessing Your security

4. Poor Backup InfrastructureWhat if your office experiences a disaster?

Page 36: Assessing Your security

Data Needs to Be in a Safe Place

If you have to store it physically, take your backup off site.

The Cloud is a great option for backup.

Page 37: Assessing Your security

Think Beyond Backup

It’s just one of many business continuity challenges. What will you do if the data is unavailable for a period of time or you experience a data breach?

Page 38: Assessing Your security

What Can You Do?

• Regularly schedule backups.

• Create incident response, business continuity, and disaster recovery plans—and test them!

Page 39: Assessing Your security

5. Poor Software ManagementIs the software your team is using safe?

Page 40: Assessing Your security

DIY Downloads Don’t Happen

It’s inconvenient, so people are likely to skip downloading patches and updates.

Page 41: Assessing Your security

Out of Date Software

Hackers keep up to date on security holes and are always looking for opportunities to exploit them.

Page 42: Assessing Your security

Unwanted Applications

They can affect both productivity and machine health. And some carry malware.

Page 43: Assessing Your security

What Can You Do?

• Establish patch management procedures.

• Manage software installations.

• Perform regular tune-ups.

Page 44: Assessing Your security

6. Overlooking Physical SecurityIs your office protected?

Page 45: Assessing Your security

What if Someone Walks in the Door?

Would it be easy to access or steal computers?

Page 46: Assessing Your security

What Can You Do?

• Take basic office security measures.

• Lock computers to desks.

• Institute a check out policy for shared devices and keep them locked away.

Page 47: Assessing Your security

7. Unsafe Wi-FiIs your connection secure?

Page 48: Assessing Your security

Office Wi-Fi Needs to Be Protected

You can’t just plug in a router and assume everything is fine.

Page 49: Assessing Your security

Coffee Shops Can Be Risky

Is that connection vulnerable to spying?

Page 50: Assessing Your security

What Can You Do?

• Make sure your network is protected by a firewall and a password.

• Avoid working in unsecure environments.

Page 51: Assessing Your security

8. Security TrainingYour staff members are your most important security measure.

Page 52: Assessing Your security

Awareness Can Prevent Many Incidents

People want to do the right thing, but they often don’t know what that is or why it’s important.

Page 53: Assessing Your security

What Can You Do?

• Regularly provide short training sessions.

• Incorporate security issues/discussions in existing meetings.

Page 54: Assessing Your security

Establishing Policies

Page 55: Assessing Your security

Form a Committee

A diverse committee can help you see risk from multiple angles and come up with smart ways to deal with those risks.

Page 56: Assessing Your security

Ask Tough Questions

Anything you overlook has the potential to be a hazard in the future.

Page 57: Assessing Your security

What Will Prevent a Breach?

Think of all the ways a breach might occur. Write rules that govern activities such as how to create and handle passwords or how files can be stored and shared.

Page 58: Assessing Your security

How Will You Respond if a Breach Occurs?

Map out a response plan that includes steps and roles for data recovery, business continuity, and communications.

Page 59: Assessing Your security

BYOD?

Write clear usage guidelines for things such as what security software needs to be installed and whether your organization provides IT support.

Page 60: Assessing Your security

Policy Making Is Iterative

You’ll need to review your rules and update them periodically to make sure they’re addressing your needs.

Page 61: Assessing Your security

Policy ExamplesGo to http://bit.ly/SecurityPolicyExamples to find examples and

templates that you can use as your starting point.

Page 62: Assessing Your security

Additional ResourcesIdealware and RoundTable technology have many resources that can help you better secure your technology and data.

• What Nonprofits Need to Know About Security: A Practical Guide to Managing Risk (Idealware)

• Incident Report Form (RoundTable)• Backup, Data Recovery, and Business Continuity Primer

(RoundTable)• Information Identification and Classification Template

(RoundTable)

Page 63: Assessing Your security

Perfect Security Isn’t Possible

There will always be risks out there.

Page 64: Assessing Your security

Practical Security Is Within Reach

Page 65: Assessing Your security

Into the Chat: What Resonated?What security steps will you take over the next month?

Page 66: Assessing Your security

Questions?

Ask Idealware…On Twitter: @idealwareOn Facebook:  /idealware