3 Do you monitor for unauthorized intrusion activity?

Slides:



Advertisements
Similar presentations
Innovating Since 1998 Direct EDJE, we make A World of Difference Direct Response Order Management Software A Proven Solution Since.
Advertisements

UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
September 20, 2016 How to Defend Your Organization from a Cyber Breach LTC Tim Bloechl (U.S. Army, Ret.) Director, Cyber Security Business.
Technology and Business Continuity
Microsoft Azure Virtual Machines
The time to address enterprise mobility is now
Deployment Planning Services
Grow Your Business with the Security Leader
Security As a Service Value Proposition
Deployment Planning Services
Enterprise Mobility Suite Technical and Business Briefing
Grow Your Business with the Security Leader
Proactive Attack Prevention and Detection
Enterprise-level Identity Protection
Deployment Planning Services
Hybrid Management and Security
SaaS Application Deep Dive
6/25/ :13 PM BRK1076 Make Windows devices more secure by taking them out of your existing infrastructure Chris Rhodes & Andrew Bettany MCTs & MVPs.
Security managed from the cloud.
Migrate SharePoint to the cloud the Microsoft IT way
Threat Management Gateway
Built on the Powerful Microsoft Azure Platform, Lievestro Delivers Care Information, Capacity Management Solutions to Hospitals, Medical Field MICROSOFT.
Cloud Testing Shilpi Chugh.
Unfortunately, any small business could face the risk of a data breach or cyber attack. Regardless of how big or small your business is, if your data,
Call AVG Antivirus Support | Fix Your PC
I have many checklists: how do I get started with cyber security?
SAM GDPR Assessment <Insert partner logo here>
11/15/2018 3:42 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Healthcare Cloud Security Stack for Microsoft Azure
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Partner Logo Reblaze Utilizes Microsoft Azure Cloud Technology to Provide Web Assets with a Comprehensive, Robust, Protective Shield Against Internet Threats.
Get Enterprise-Grade Call Handling and Control for Microsoft Office 365 and Skype for Business with the Bridge Boss-Admin Executive Console OFFICE 365.
Partner Logo Azure Provides a Secure, Scalable Platform for ScheduleMe, an App That Enables Easy Meeting Scheduling with People Outside of Your Company.
Navigating Security Seas in a Small Ship with a Limited Crew
Microsoft Virtual Academy
12 STEPS TO A GDPR AWARE NETWORK
Healthcare Cloud Security Stack for Microsoft Azure
Healthcare Cloud Security Stack for Microsoft Azure
Healthcare Cloud Security Stack for Microsoft Azure
Windows 10 Enterprise E3 for Small and Medium Business
Windows 10 Enterprise subscriptions in CSP – Messaging Summary
Nero Blanco Service Offering – Disaster Recovery as a Service
Protecting your data with Azure AD
4/9/2019 5:05 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS.
Risk Mitigation & Incident Response Week 12
Guidance: This sales script is designed to be used. after
Move your data to the cloud with Azure and {Partner Company Name}
Technology Convergence
Technology Solutions Cybersecurity Report to the KCTCS Board of Regents March 14, 2019.
Information Protection
3 Do you monitor for unauthorized intrusion activity?
Security Assessments Offered
Microsoft Virtual Academy
Microsoft Virtual Academy
Securely run and grow your business
Microsoft Data Insights Summit
Healthcare Cloud Security Stack for Microsoft Azure
Healthcare Cloud Security Stack for Microsoft Azure
<offer name> with Microsoft 365 Business Secure Deployment
Plan and design the solution
Information Protection
3 Do you monitor for unauthorized intrusion activity?
Goddard Chamber September 12th, 2019 Hosts: John Ash & Jon Grover
Cloud Computing for Wireless Networks
Presentation transcript:

3 Do you monitor for unauthorized intrusion activity?  Quiz How secure are you? Take this 10-question quiz to find out if you are safe and secure, or if your organization is at risk to become a cyber-crime victim. 1  Pro Tip: Explore Azure Active Directory and Identity Protection to deploy centralized cloud based identity for your userbase. If possible use Multi Factor Authentication (MFA). Do you have a Single Sign-On identity framework? Yes, an Active Directory or Azure Cloud ID Yes, some other system is in place. What is SSO? No, we do not use a centralized identity system or have single-sign on deployed 2  Pro Tip: Which of the following is true about your Disaster Recovery program? A All critical systems and data are automatically backed up and are tamperproof B Our IT guy regularly conducts business continuity exercise drills C We use a cloud based recovery service like Azure Site Recovery Explore Azure cloud offerings to get your business set up with proper backup and recovery functions so you can ensure data and services are backed up and always available. 3 Do you monitor for unauthorized intrusion activity?  Pro Tip: We can help design an IDS solution and tune detection to fit your network and business needs. Yes, we do have an intrusion detection system (IDS) Yes, our IT guy monitors for cyber-attacks daily, somehow C No, we cannot monitor for such activities 4  Pro Tip: Do you have a security policy in place? Yes, we do have a comprehensive security policy endorsed by management Yes, someone wrote a policy for us to follow No, we do not have a complete security policy You need to define a security policy based on ISO 27001 to ensure compliance and alignment to best practices. We can help you write one and get compliant! 5 How do you connect your company to cloud services? We use VPN and/or SSL to securely access hybrid cloud services We connect to the cloud via the Internet?! C We do not use cloud services at this time  Pro Tip: Evaluate Azure Virtual Network and Office 365 secure portal solutions for secure connectivity to the cloud. Partner Logo Here

6 How do you monitor for data leaks?  Pro Tip: Let us help you design a comprehensive data and information protection solution. Azure and Office 365 can help provide technology for both! We do have a comprehensive data protection program in place with rule detection logic Word of mouth, someone reported it We cannot track or monitor for data leaks 7  Pro Tip: Updating systems on time and taking the practice seriously is paramount to the security of your environment. It sounds simple, but in enterprise and business environments there are a lot of factors at play that could delay even critical updates. Explore the adoption of Azure Cloud and PaaS and focus on running your applications in an always up to date environment. How long does it take to deploy critical security updates to software? It takes us 5-30 days and we strive to patch quickly We need more than 30+ days because it is a lot of work We have to patch? Don’t systems patch themselves!? 8 How do you limit access to resources?  Pro Tip: Define roles and responsibilities and look for a technology such as Azure AD, and deploy access control features to effectively manage authentication and authorization to resources. We have access control defined based on roles and responsibilities in AD groups Everyone asks everyone for access to everything We don’t have any real means to reliably restrict access to services and data beyond authentication 9  Pro Tip: Identify a vulnerability management service that has cloud and internal offerings to be deployed in your network. Consult with us to setup and tune the scanner and train your IT pro to handle vulnerability reports. It requires management commitment to remediate discovered issues. Do you perform vulnerability assessments on your environment? We have a vulnerability management program and assessment technology in place We let our IT admin run some scans at times or wait for others to expose our gaps We do not have a vulnerability scanner or process 10  Pro Tip: Are you prepared to deal with ransomware attacks and demands? We patch our systems regularly, remediate any potential risks quickly and have regular backups We have purchased enough Bitcoins to pay for ransoms, so we’re not worried if it happens We are not prepared to handle malware and ransomware attacks at this point Obtain a comprehensive solution for all systems. Patch your systems and apps regularly to ensure propagation of malware using old bugs will not go far. Be aware of zero-day potential risks by following our bug reports and awareness campaigns. Protect your organization from unnecessary security risks. Most organizations don’t take action on cybersecurity until it’s too late, but a security breach could cost millions, drive away customers, disrupt your business, and become a PR nightmare. If your answers to this simple security quiz have raised concerns about your cybersecurity, contact us to learn how Microsoft 365 can protect you against today’s evolving security threats. <<partner phone or URL>>