Your security risk is higher than ever. $19.95/mo. 40% buys hackers easy-to-use “as-a-service” options for attacks. ZDNet of spam contains ransomware. IBM Your security risk is higher than ever.
16% over 2015. 2016 ransomware attacks were up Verizon 2016 DBIR
of recipients open phishing messages. 30% of recipients open phishing messages. click on attachments. 12% Verizon 2016 DBIR
You can’t afford to be wrong on this one. 1 in 2 70% $1B USD executives experience a ransomware attack of businesses hit pay the ransom in ransom paid in 2016 IBM IBM FBI estimate
“IT wants things to work smoothly, while security wants security. Feedback from a survey of 100 CIO/CSOs “IT wants things to work smoothly, while security wants security. At the endpoint, they have to work together to maintain both.”
https://www.youtube.com/watch?v=dHtIGp0DPcA&feature=youtu.be
Install top rated antivirus software 10 Security tips Install top rated antivirus software
2017 10 Best as of May 2017
Restrict administrator rights
Install and update a firewall
Implement patches and software on popular software
Enforce strict password policies
Top 25 most common passwords 123456 123456789 qwerty 12345678 111111 1234567890 1234567 password 123123 987654321 qwertyuiop mynoob 123321 666666 18atcskd2w 7777777 1q2w3e4r 654321 555555 3rjs1la7qe google 1q2w3e4r5t 123qwe zxcvbnm 1q2w3e
Lock those screens
Secure wi-fi routers
Secure your browsers
Use encryption
Train and recruit users.
Our defense-in-depth solutions Patch & Vulnerability Management Application Control & Privilege Management Endpoint Security Secure Program Management Patch and secure the OSes and 3rd-party apps that you can. Prevent all other apps from running while practicing the principles of least privilege. Add advanced anti-malware and AV capabilities, device control, and global policy for all devices. Marry security capabilities with workflows and asset management processes to complete a secure lifecycle. Patch management Vulnerability management Application control Privilege management Device control Anti-malware Threat alerting Asset management Service management Secure configuration management
The first 5 controls Inventory of authorized and unauthorized devices CIS, US-CERT, ASD, and other authorities prioritize these five elements of cyber hygiene to significantly reduce security threats. Inventory of authorized and unauthorized devices Inventory of authorized and unauthorized software Secure configuration Controlled use of administration privileges Continuous vulnerability assessment and remediation
Department of Homeland Security/FBI Cybersecurity Briefing December 30, 2016 Although in the context of nation-state cyber hacking, in this nationwide public (no clearance required) call, the following techniques were recommended to improve cybersecurity prophylaxis Data Backups Risk Analysis and remediation Staff Training Vulnerability Scanning & Patching Application Whitelisting Incident Response Business Continuity Planning Penetration Testing
Physical security