Top Banner
Cyber Security Best Practices
24

Cyber Security Best Practices

Apr 16, 2017

Download

Technology

EvolveIP
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cyber Security Best Practices

Cyber Security Best Practices

Page 2: Cyber Security Best Practices

YOU HAVE MORE TO SECURE THAN EVER BEFORE

NetworkMobile DevicesEmail systemsSoftware programsBusiness applicationsBusiness documentsHR docs / employee info

And more

Page 3: Cyber Security Best Practices

SECURITY THREATS

User Error

Theft Phishing Scams

Malware

Legacy Systems

Page 4: Cyber Security Best Practices

30% of phishing emails are opened, and 12% of

targets click on the link or attachment

SMBs are the primary targets for

ransomware, but only 34% test backups

regularly

Anne Campbell
What's the source for the 34% stat?
Page 5: Cyber Security Best Practices

$$

$SMBs lose

$7K -

$74K for each hour of downtime.

44% of small businesses report being the victim of

a cyber-attack.

Ransomware victims paid

$24M to regain access to their data in 2015 alone.

THE COST OF RANSOMWARE

Page 6: Cyber Security Best Practices

1. Common cybersecurity mistakes to avoid

2. Things you need to know about ransomware

3. Creating a security policy

WHAT WILL YOU DO TO REDUCE YOUR

VULNERABILITY?

Page 7: Cyber Security Best Practices

COMMON CYBERSECURITY MISTAKES

Page 8: Cyber Security Best Practices

POST-IT FULL OF PASSWORDS 1.

The Fix: Explain to your

employees why

this is a bad idea,

and give them

some ideas on

how to manage

passwords safely.

Page 9: Cyber Security Best Practices

OUTDATED OPERATING SYSTEMS2.

The Fix:

If you’re running outdated operating systems, it’s time to transition to something more secure.

Page 10: Cyber Security Best Practices

SECURITY SOFTWARE THAT NEVER GETS UPDATED3.

The Fix:

Check for updates• Firewall• Anti-virus• Etc..

Replace old outdated security

equipment

Page 11: Cyber Security Best Practices

OLD EMPLOYEES STILL HAVE ACCESS

The Fix: Set up a solid password policy and have passwords expire every 90 days.

4.

Page 12: Cyber Security Best Practices

THINGS YOU NEED TO KNOW ABOUT RANSOMWARE

Page 13: Cyber Security Best Practices

WHAT IS MALWARE?

MalwareMeans ‘malicious software’

Malware can enter a system through downloads, email attachments, advertisements, or any type of hole in the security of the system.

Page 14: Cyber Security Best Practices

THE THREAT OF RANSOMWARE CONTINUES TO GROW

U.S. government estimates there are now 4,000 ransomware attacks being launched per day.

https://www.justice.gov

This is a 300% increase over the attacks seen per day in 2015.

Page 15: Cyber Security Best Practices

PUT TECHNICAL SAFEGUARDS IN PLACE As a best practice, have an intrusion-prevention system and security software running on your computers.

Antivirus software

Firewalls

Spam filters

Page 16: Cyber Security Best Practices

TRAIN EMPLOYEES

As a best practice, you should require all new employees to complete cybersecurity training, and then offer it on an ongoing basis to avoid information being missed.

Page 17: Cyber Security Best Practices

PROVIDE EXAMPLES

Ransomware examples show employees what a

threat looks like so they’ll know the warning signs and be able to identify a suspicious message or attachment before they

click on anything.

Page 18: Cyber Security Best Practices

CREATING A SECURITY POLICY

Page 19: Cyber Security Best Practices

Limit PermissionsIf employees don’t need access

to sensitive information and assets to complete their job,

limit their permissions.

IDENTIFY ROLES AND RESPONSIBILITIES

Page 20: Cyber Security Best Practices

DEFINE DATA RETENTION PARAMETERS

Perform a disaster drill

How long do you need

your data?

What regulations do you need to have in

place?

Do you have to be

compliant with any

regulations?

?

Page 21: Cyber Security Best Practices

Military-

grade

256AES

MAKE SURE ENCRYPTION AND COMPLIANCE NEEDS ARE MET

Page 22: Cyber Security Best Practices

10

10

10

10

01

10

01

10

01

10

01

01

01

01

01

00

11

00

11

00

11

00

10

11

0

BACK IT UP

• Choose the right technology partners

KEY TAKEAWAYS

Take precautions to safe-guard your data

• Applications and software up to date• Firewall, anti-virus, email security

Page 23: Cyber Security Best Practices

Cybercriminals are taking advantage of new attack vectors – mobile devices, web-enabled and mobile applications and web browsers – to accomplish their mission.

Click here to learn how to quickly deploy web security as a cloud service to protect against increasingly sophisticated attackers.