BizSmart Lunch & Learn Webinar Information Security and Protecting your business With the increased risk of some sort of cyber- attack over the past few.

Slides:



Advertisements
Similar presentations
CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
Advertisements

INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Helping our customers keep their computers safe.  Using your pet’s, business, family, friend’s names  Using number or letter sequences (0123, abcd)
Mr C Johnston ICT Teacher
© 2005, QEI Inc. all characteristics subject to change. For clarity purposes, some displays may be simulated. Any trademarks mentioned remain the exclusive.
Security Controls – What Works
Nevada Digital Summit David Podwojski Director, Public Sector Citrix Systems, Inc.
Securing Your Networks Personal Safety Rules Apply Here Too. Corporate Identity Theft SPAM.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Security Management IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
Factors to be taken into account when designing ICT Security Policies
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Joel Garmon, Director, Information Security Mike Rollins, Security Architect Jeff Teague, Security Analyst, Senior 1
PCM2U Presentation by Paul A Cook IT SERVICES. PCM2U Our History  Our team has been providing complete development and networking solutions for over.
365 IT CONSULTANCY AND PROJECTS PTY (LTD) 04 Smuts Park Corner Northey & Smuts Ave Witbank 1039 Phone: Fax:
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Enterprise Risk ManagementSeptember 2010Miami, FL © 2010 Enterprise Risk Management Information Security- Facing the Risks in Electronic Channels and Social.
SecureAware Building an Information Security Management System.
SEC835 Database and Web application security Information Security Architecture.
Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
IT Security for Users By Matthew Moody.
Managing and Securing Endpoints Bruce Hotte Chief Information Officer Jeff Swan Network Supervisor  The definition of “endpoint” used to be simple: a.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Chapter 6 of the Executive Guide manual Technology.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
ISO27001 Introduction to Information Security. Who has day-to-day responsibility? All of us! Why Information Security? Control risk, limit liability What.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Introduction to Computer Security PA Turnpike Commission.
Information Asset Classification Community of Practicerev. 10/24/2007 Information Asset Classification What it means to employees.
Small Business Security Keith Slagle April 24, 2007.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
Information Technology Acceptable Use Policy The acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree.
Module 11: Designing Security for Network Perimeters.
Network Security & Accounting
Frontline Enterprise Security
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
Enterprise Data Solutions A Better Network. A Better ROI. Martin Matthews Technical Sales Engineer.
Develop your Legal Practice using “Cloud” applications, but … Make sure your data is safe! Tuesday 17 November 2015 The Law Society, London Allan Carton,
ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 11 Network Security.
Enw / Name. Advantages and Disadvantages of this type of network Draw / insert a drawing of a RING network What type of network would you recommend a.
1 1 Advanced Cyber Security Event - Introduction 11 th May 2016 Matt Locker.
Chapter 3 “A Case Study of Effectively Implemented Information Systems Security Policy[1]” John Doran, CST554, Spring 2008.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
Computer Security Keeping you and your computer safe in the digital world.
Welcome to the ICT Department Unit 3_5 Security Policies.
What is ISO Certification? Information is a valuable asset that can make or break your business. When properly managed it allows you to operate.
Handling Personal Data & Security of Information Paula Trim, Information Officer, Children’s Strategic Services, Mon – Thurs 9:15-2:15.
The time to address enterprise mobility is now
Chapter 6: Securing the Cloud
Unit 4 IT Security.
Learn Your Information Security Management System
E-commerce companies Here the focus is on the different business models for selling online: Business-to-consumer (B2C): when a company sells to an individual;
Current ‘Hot Topics’ in Information Security Governance Auditing
Lecture 14: Business Information Systems - ICT Security
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Security Essentials for Small Businesses
Network Security Best Practices
12 STEPS TO A GDPR AWARE NETWORK
IT & Security Training Skills.
Contact Center Security Strategies
(With Hybrid Network Support)
PLANNING A SECURE BASELINE INSTALLATION
Presentation transcript:

BizSmart Lunch & Learn Webinar Information Security and Protecting your business With the increased risk of some sort of cyber- attack over the past few years, it is now more important than ever to look over your computer network and identify the risks within your organisation. In this webinar we’ll look at the basic principles to protect your data and also how you can take it one step further by assessing and minimising risk. There is a link at the end of this deck to the associated blog and webinar recording

I.T Support Consultancy

Who am I? Matthew Parsons – Director – Surf Tech IT Working in IT Services for 14 Years

Information Security | Protecting your business Identifying Risks Assessing your assets Securing your information ISO : Information Security

Identifying Risks Everything / Everyone within your business is a risk Hardware Laptops, Desktops, Phones, External Hard drive Software , Cloud Solutions i.e Office 365 Employees

Assessing your assets Risk/AssetThreatLikelihoodSeverityRating

Assessing your assets Risk/AssetThreatLikelihoodSeverityRating LaptopStolen/Lost224 Security Compromised224 EmployeesRelease of unauthorised data236 Rating = Likelihood x Severity

Assessing your assets Risk/AssetThreatLikelihoodSeverityRating LaptopStolen/Lost224 Security Compromised224 EmployeesRelease of unauthorised data236 Rating = Likelihood x Severity Rating Low1 to 4 Medium5 to 10 High11+

Control Action Risk/AssetControlLikelihoodSeverityRating Laptop Company policy not to store customer data on local drive 212 Complex passwords, change password every 90 days and enable two factor authentication 122 Employees Employment contract states the release to information classified as 'confidential' will result in disciplinary action 133 Rating = Likelihood x Severity Rating Low1 to 4 Medium5 to 10 High11+

Control Action Other Control Actions may include: Additional hardware appliances (such as Firewalls, Web Filtering) Additional software (such as Anti-Virus, AntiSpam) Computer policies (Locking down users abilities on computers, what software can be installed) Why assess these threats? If you can identify the threats to your business, access the risk it may cause and identify it as a high risk. You will be able to make changes within your business to best protect your data and customer data

ISO | Information Security ISO is a standard created by the International Organisation for Standardisation (ISO) for implementing an Information Security Management System (ISMS). ISO is not required by every industry, but if you can incorporate just a few elements of ISO in to your business it should assist in protecting your important data. We work with businesses to assess these risks for them and then advise how any potential risk can be addressed and minimized. As an IT Support and Solutions provider our customers depend on us to keep their data safe. Our clients like the reassurance knowing that our systems and processes are audited, when you partner with a company like us we have the complete control of your IT systems.

Thank you for listening! Any Questions?!?

BizSmart – Where Smart people go to surround themselves with other Smart people, to gain business success.