Technology Audit Brandon Hall.

Slides:



Advertisements
Similar presentations
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Advertisements

Security Management IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
Microsoft Baseline Security Analyzer INLS 187 Security Software Presentation by Hinár György Polczer
Bullet-Proofing Your Wireless Router By Steve Janss.
Windows Anti-virus and Security WNUG Meeting
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Troubleshooting Your Network Networking for Home and Small Businesses.
ACME ACME Solutions Inc. You Focus on Your Business & We Focus on Your IT.
NovaTech You Focus on Your Business & We Focus on Your IT Managed Services.
CIS 460 – Network Design Seminar Network Security Scanner Tool GFI LANguard.
{ Active Directory Security Why bother?.   Law #1: Nobody believes anything bad can happen to them, until it does   Law #2: Security only works if.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
1/28/2010 Network Plus Unit 4 WAP Configuration WAP Configuration In this section we will discuss basic Wireless Access configuration using a Linksys.
1Federal Network Systems, LLC CIS Network Security Instructor Professor Mort Anvair Notice: Use and Disclosure of Data. Limited Data Rights. This proposal.
XP Practical PC, 3e Chapter 7 1 Connecting to the Internet.
Telnet allows you to log in remotely to other computers connected to the Internet (but only computers that are set up to be logged in to). Once logged.
Retina Network Security Scanner
KTAC Security Task Force Superintendents Update April 23, 2015.
Critical Security Controls & Effective Cyber Defense Hasain “The Wolf”
Personal System Administration CS5493. SA SA is a Systems Administrator The SA is responsible for maintaining the overall wellbeing of a computing system.
GFI LANguard Matt Norris Dave Hone Chris Gould. GFI LANguard: Description Through the performances of the three (3) cornerstones of vulnerability management:
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Dial For Netgear Router Support and Help Phone Number.
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. CLOUD.
 Remote monitoring and management (RMM), also known as network management or remote service software, is a built on application to help managed IT service.
Version of the document: 1.01 Software Version CBox: v3.7.1 Hardware Version CBox: C5 Remote Access Configuration Client Language: English.
WHAT’S A WIRELESS AP? AND WHY DO I NEED ONE? Network Components & How They Work.
SECURE LAB: CREATING A CISCO 3550 VLSM NETWORK
Defining your requirements for a successful security (and compliance
Getting Connected to NGS while on the Road…
Lecture 6: Cloud Computing
Patch Management Module 13.
Chapter 7. Identifying Assets and Activities to Be Protected
Securing Network Servers
BIGPOND TECHNICAL SUPPORT BIGPOND . BIGPOND CONNECT’S YOU TO THE WORLD.
Managing Windows Devices
Technology Solutions For Business
LINKSYS ROUTER SUPPORT
Before the talk… Zix Mail is the approved encrypted platform, we will have training on this soon. Citrix Sharefile has been approved for use for.
Set up your own Cloud The search for a secure and acceptable means of gaining access to your files stored at the office from a remote location.
Crystal Lake Public Library Gadget Group Training August 2016
Wireless Network Security
How to build a good reputation online
IBM Software Group | Tivoli Brand Software
HOW TO SOLVE HBO GO STREAMING ISSUES ON TIVO? For More Details visit our website
MCSA VCE
Network Management Checking Performance + Traffic & Configuration
IT Roles and Responsibilities
POGO CUSTOMER SERVICE Fix Pogo Sign In & No Internet Connection Issues Best Pogo Customer Service Number.
Deriving more value from your Windows investment
How to use mrtg to monitor traffic on your wireless and wired network
Socket Programming in Java
Connecting to the Internet
Introduction to Computers
The “Internet”.
REACH AT Apple Support Team : Fix Mac Error Code Give a Ring on.
LINKSYS SUPPORT NUMBER. Linksys Support Number for upgrading firewall, Installation and Repair and Connecting Device and Fix Error Messages by Linksys.
Call AVG Antivirus Support | Fix Your PC
Norton customer support Number
Chapter 7 Connecting to the Internet
Information Security Session October 24, 2005
Getting Connected to NGS while on the Road…
Automating Security Operations using Phantom
How to Fix Brother Printer Offline Status with Free Brother Printer Support? VISIT WEBSITE.
CLOUD COMPUTING.
Discovering Technology
How to install HP printer using IP address? How to install HP printer using IP address? Call
In the attack index…what number is your Company?
How to install and manage exchange server 2010 OP Saklani.
Presentation transcript:

Technology Audit Brandon Hall

Agenda We will talk about why we are doing tech audits We will discuss what a tech audit is, what to expect, and what the process looks like We will discuss what the deliverables are after a tech audit has been completed And we will discuss follow-up steps on action items

What you should gain You will know why we are doing tech audits You will understand what a tech audit is, how it is done, and what to expect when we do one You will know what we expect once a tech audit is completed and you have your deliverables in hand

Why do we audit? You all should be reviewing your office cyber security, because FINRA and the SEC are talking heavily about cyber There are fundamental pieces of knowledge that all of you need to have to be safe and identify anomalies Your data is valuable and your clients are our clients, and it is up to all of us to keep their data safe We chose to offer this as a free included service instead of making you do your own audits and provide documentation from a third party auditing company that you would pay for

Technology Audit – what to expect We will expect you to know: What is on your network What security software you have and is it up to date Who is your internet service provider How to get us remote access and/or install and run a piece of software for the actual audit

Technology Audit – overview You will be asked a series of questions We will run an auditing program that tells us if your software is outdated, if there are patches missing, and the general wellbeing of the machine We will review your network configuration We will review your hardware on the network and their patch levels

So? What do you actually do? We run a program called Belarc Advisor One of us gets on your machines and looks over settings, software, network neighbors, IP addresses, etc. We ask questions about what certain things are that are plugged into your network

Tech Audit – Repercussions We will tell you what the status is of your systems We will tell you the status of your network We will provide an inventory of discovered devices We will provide a list of software installed on your devices We will provide a breakdown of what we think should be fixed

So? What do you actually do? (cont.) We will remotely connect to each machine and run the software if we need to, and do an overall assessment of the health of the systems We will provide a breakdown of all the devices on your network and how they are connected in a diagram and a summary of each machine, along with an assessment report and any recommendations

So? What do you actually do? (cont.) We will determine what things are on your network We will account for all IP addresses used and listed We will discover your ISP and modem brand We will discover your current external facing IP address We may do port scanning or a full network scan

So? What do you actually do? (cont.) We will answer any questions you may have as we are doing the audit with regard to security or anything else tech We can then schedule a time to go over the results and talk about any tech that may increase your efficiency, help make you more mobile, keep you safer, etc.

Best practices for your network Segment wireless and wired networks. If you must let others on your wireless that you also have machines used for work, establish a guest network and give the password out for that, not your company wireless network. Understand when you have a wireless anything, that device will have the potential for flawed firmware and will need updated. Set passwords on your devices and don’t write them down on a paper under your keyboard or tape them to the device.

Questions?

Belarc Deep Dive