[Internal Use] for Check Point employees​

Slides:



Advertisements
Similar presentations
Layered Security Solutions - Simplified © 2008 Monte Robertson - CEO Layered Security Solutions – Simplified!
Advertisements

©2014 Bit9. All Rights Reserved Building a Continuous Response Architecture.
Security Issues and Challenges in Cloud Computing
Norman SecureSurf Protect your users when surfing the Internet.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Data Center Firewall. 2 Common IT Security Challenges Does my network security protect my IT environment and sensitive data and meet the regulatory compliances?
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
Security and Assurance in IT organization Name: Mai Hoang Nguyen Class: INFO 609 Professor: T. Rohm.
©2015 HEAT Software. All rights reserved. Proprietary & Confidential. Ransomware: How to Avoid Extortion Matthew Walker – VP Northern Europe.
Cyber Security in the Mobile Era KEEPING ENTERPRISE DATA SAFE IN THE BYOD ERA.
1 #UPAugusta Today’s Topics What are Deadly IT Sins? Know them. Fear them. Fix them. #UPAugusta201 6.
©2016 Check Point Software Technologies Ltd. 1 Latest threats…. Rolando Panez | Security Engineer RANSOMWARE.
©2015 Check Point Software Technologies Ltd. 1 Website Watering Holes Endpoints are at risk in numerous ways, especially when social engineering is applied.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
©2014 Check Point Software Technologies Ltd Security Report “Critical Security Trends and What You Need to Know Today” Nick Hampson Security Engineering.
OFFICE 365 APP BUILDER PROFILE: Druva
November 14, 2016 bit.ly/nercomp_defendingyourdata16
Protect your Digital Enterprise
KasPer Pro HRMS with Self Service Brings a Fully Featured Human Resources Management Solution to the Office 365/SharePoint Online Environment OFFICE 365.
Intercept X Early Access Program Sophos Tester
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Karsten Chearis Sales Engineer.
Your Office 365 Journey Prepare, Migrate, and Operate with Barracuda
Leverage the Cloud to Minimize the Impact of Ransomware
There Will be Attacks – Improve Your Defenses
Comprehensive Security and Compliance at an Affordable Price.
Cloud Firewall.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Michael Burke.
Data Center Firewall.
Real-time protection for web sites and web apps against ATTACKS
Ransomware & Security for Virtualization
Hot Topics:Mobility in the Cloud
Active Cyber Security, OnDemand
Lesson Objectives Aims You should be able to:
Data Compromises: A Tax Practitioners “Nightmare”
Trends in Ransomware Distribution
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them David Hood Director of Technology Marketing.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Michael Bird Team Lead, Account Executive.
How to prepare for the End of License of Windows Server 2012/R2
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Michael Vanderhoff.
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Matthew Gardiner Product Marketing.
Cybersecurity Awareness
Myths About Web Application Security That You Need To Ignore.
4 ways to stay safe online 1. Avoid viruses and phishing scams
Intercept X for Server Early Access Program Sophos Tester
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
MetaShare, Powered by Azure, Gives SharePoint a User-Friendly, Intuitive User Interface and Added App Features with No Added Administrative Tasks OFFICE.
Cyber Security Why You Should Care.
It’s About Time – ScheduleMe Outlook Add-In for Office 365 Enables Users to Schedule Meetings Easily with People Outside of Your Organization Partner Logo.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Andrew Cotton.
Strong Security for Your Weak Link:
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Matthew Gardiner Product Marketing.
There Will be Attacks – Improve Your Defenses
Office 365 Integration Enables WebUntis Users to Sign in Using Office 365 Account Information and to Export WebUntis Timetables Directly to Outlook OFFICE.
Built on the Powerful Microsoft Office 365 Platform, My Intranet Boosts Efficiency with Support of Daily Tasks, Internal Communications and Collaboration.
National Cyber Security
Network Security Best Practices
Secure once, run anywhere Simplify your security with Sophos
Information Security Awareness
Chris Ince ISO Lead Auditor Security Risk Management Ltd
Ransomware in Web Apps OWASP Singapore.
Windows 10 Enterprise E3 for Small and Medium Business
Anatomy of a Large Scale Attack
Strategic threat assessment
Information Protection
Information Protection
Cybersecurity Simplified: Ransomware
Defencebyte THE PERFECT SECURITY FOR YOUR COMPUTER.
Presentation transcript:

[Internal Use] for Check Point employees​ Cybercrime Security Threats Facing Your Business  [Internal Use] for Check Point employees​

SMB is an organization with 500 users or less Do not have a dedicated Security person 81% 86% SMB are organizations with 500 users or less Over 81% do not have a dedicated IT person Over 86% do not have a dedicated Security person Do not have a dedicated IT person ©2017 Check Point Software Technologies Ltd.  [Protected] Distribution or modification is subject to approval ​

83% 0.7% Attacks on SMB resulted in a confirmed breach Attacks on large enterprises resulted in a confirmed breach Attack success ratio on SMBs is 83% compared to 0.7% with large enterprises (source: DBIR 2016) Source: Verizon DBIR 2016 ©2017 Check Point Software Technologies Ltd.  [Protected] Distribution or modification is subject to approval ​

$32,000 Average hacking cost on a small business Source: http://www.nsba.biz/wp-content/uploads/2016/02/Year-End-Economic-Report-2015.pdf source: National Small Business Association, 2016 ©2017 Check Point Software Technologies Ltd.  [Protected] Distribution or modification is subject to approval ​

Understanding Why Ransomware is on the Rise It is easier for hackers to execute than other campaigns The Money Factors Less Technical Obstacles We all know that infections will happen. According to the Verizon breach investigation last year, they looked at almost 80,000 incidents, of those over 2,000 of them were confirmed to involve data breaches. What do you do to efficiently respond to these attacks? Social Engineering Exploit Kits Broad Audience without customization or localization Time to money is sooner Bitcoin reduces risk on collection, and eliminates reversals Simplified Attacks, some without Command & Control Onus is on the victim to pay, not on hacker to exfiltrate Source: Verizon: 2015 Data Breach Investigations Report  [Protected] Non-confidential content​

Best Practices for Protection Blocking / Containment are crucial Backup your data, just in case So, what can you do? First it is critical to block these attacks up front, both to prevent encryption, and to prevent spread of the malware to other systems. It is good practice to step up your backup procedures to make sure if you are attacked, you can restore without paying, but also because even if you are willing to pay it is possible the hackers may have bugs in their software and not be able to recover your files. This is not after all, commercial quality, fully-QA-ed code! And if you do see an infection, make sure you learn from that, so you can prevent more users from suffering similar consequences. In many cases the best approach is educating users on what the threats look like, and which ones may be active in your organization. Beware new variants that encrypt off-line Prevent spread to more users, or network storage Not only to avoid paying Also because they may have bugs To avoid additional or reinfections Educate users Research your incidents  [Protected] Non-confidential content​

Threats 15,000 of our SMB customers face every day Phishing most common attack vector Kelihos & Zeus Most common prevented malware YouTube Consumes x4 Bandwidth than any other app Source: Data collected from over 15,000 small business managed in Check Point Cloud SMP during December 2016 SMBs experience the same attacks as large enterprises Yet, they do not have the tools, skills or budget to address this problem Example: Target attack started with an SMB SMBs Face The Same Threats As Large Enterprises source: Check Point SMB Cloud Management, December 2016 ©2017 Check Point Software Technologies Ltd.  [Protected] Distribution or modification is subject to approval ​

2016 - PHISHING IS EVERYWHERE Over 90% APT ATTACKS INVOLVE PHISING CSO Magazine, 2016 Up to45% SUCCESS RATE OF CREDENTIAL THEFT Google hijacking study, 2014  [Restricted] for designated teams ​

[Internal Use] for Check Point employees​ Considerations & Project Goals -Generate additional revenue from tasks currently performed Pro Bono/Gratis -Create a managed service solution from existing work force -Single pane of glass management console for appliances -Pricing built to provide a hardware ROI as close as possible to 1 year -Minimal or no upfront cost to the customer -Provide continued tangible value to the customer with weekly reports  [Internal Use] for Check Point employees​

[Protected] Non-confidential content

[Protected] Non-confidential content

[Internal Use] for Check Point employees​ Conclusions: -PTCI has over 1,500 ILEC/CLEC Business Broadband Customers -Customer education is key: Lunch & Learns or Try & Buy -Remember that “Firewall Services” are covered under ERATE Category 2 -Launched June 1st. We currently have 15 Managed Firewall customers -C.Y.A = Make sure you services agreement contract is thorough -Don’t forget businesses just need simple router/wifi access -Managed Services are not limited to your customers or your serving areas  [Internal Use] for Check Point employees​