Computer Security for Businesses

Slides:



Advertisements
Similar presentations
Copyright 2006 Mid-City Offices Systems. Busy people… How would your business be affected, if you suddenly lost all of your computer data? Rush through.
Advertisements

INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Windows XP Tutorial Securing Windows. Introduction This presentation will guide you through basic security principles for Windows XP.
TAX-AIDE Computer Security Chris Hughes Chairman NTC 1 NLT Meeting Aug 2014.
TAX-AIDE Computer Security Chris Hughes (HMR mod) Chairman NTC 1 NLT Meeting Aug 2014.
Is There a Security Problem in Computing? Network Security / G. Steffen1.
Mr C Johnston ICT Teacher
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Lecture 2 Page 1 CS 236, Spring 2008 Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
Lecture 11 Reliability and Security in IT infrastructure.
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
Threats to I.T Internet security By Cameron Mundy.
E safety. Ads It’s always best to not click on ads when you see them, and it’s always a good idea to ignore them, but if there are too many you can always.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
IT Security for Users By Matthew Moody.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Securing Your Home Computer Securing Your Home Computer Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
In the old days... You Your computer. Then came... The Network.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Chapter X When can I consider my personal data secure?
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Preventing Common Causes of loss. Common Causes of Loss of Data Accidental Erasure – close a file and don’t save it, – write over the original file when.
Session 7 LBSC 690 Information Technology Security.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
By Demi Gardiner 8P Who’s been on your computer??
Emily Ansell 8K viruseshackingbackups next. Viruses A virus is harmful software that can be passed to different computers. A virus can delete and damage.
Computer Security! Emma Campbell, 8K VirusesHackingBackups.
Lecture 19 Page 1 CS 236 Online 16. Account Monitoring and Control Why it’s important: –Inactive accounts are often attacker’s path into your system –Nobody’s.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
For brownies this PowerPoint will help you understand computer viruses and help stop them!!!!
Viruses For… What is a virus? A virus, affects your computer and damages its software. It can affect your computer, and some viruses can damage your.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Small Business Security Keith Slagle April 24, 2007.
Computer security By Isabelle Cooper.
Firewall firewalls Is a program on your computer to protect your computer from all types of threats and if you have a server and you wasn’t to protect.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 11 Network Security.
ARE YOU A CYBER SECURITY RISK?. Pass the Hat Al QaedaFARCHezbollahIRAHAMAS.
10 things you can do today to reduce your security risk.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Cyber security. Malicious Code Social Engineering Detect and prevent.
3-5 Lesson c: secret agent savings The big savings mistakes
Social Engineering Dr. X.
Security Awareness: Asking the Right Questions to Protect Information
What they are and how to protect against them
Common Methods Used to Commit Computer Crimes
Password Management Limit login attempts Encrypt your passwords
Homeland Security: Computer Protection
Recommending a Security Strategy
How to build a good reputation online
Outline Introduction Characteristics of intrusion detection systems
Business Risks of Insecure Networks
Unit 4 IT Security.
AVG Antivirus Tech Support Number
Social Engineering No class today! Dr. X.
Top Ten Cyber Security Hygiene Tips
When can I consider my personal data secure?
16. Account Monitoring and Control
Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
6. Application Software Security
Cybercrime By: Kimberly Foreiter
Identity Theft Samuel H. Slater.
COSC-100 (Elements of Computer Science) Prof. Juola
Computer System Security
Presentation transcript:

Computer Security for Businesses Richard Ford, Ph.D., Florida Tech

Computer Security… Not just for Rocket Scientists! Not really even just for Computer Scientists… In fact, securing your electronic infrastructure is very simple Smart “risk management” technique… like insurance And like insurance, doesn’t require you to be an actuary

Why me? Why not? Research is computer security at Florida Tech Well-published 10 years of industry experience (IBM, Verio, Hiway Technologies…)

What if… All the electronic data in your business disappeared tomorrow? Okay, apart from getting the day off… Computers are a critical part of your business Accounts payable Customer contacts Work product

So… Computer Security is just like any other business risk: you have to manage it That means looking at it from a Risk Management perspective Balance the Cost of Prevention with the likely loss from the event E.g. Spending $100 on antivirus software to stop a possible loss of $10,000 which is quite likely is a Good Deal™ but spending $10,000 dollars on a penetration test to stop an unlikely event is not.

Dr. Ford’s 10 Rules for Security These rules are tailored for small businesses But, from personal experience, I can tell you they work if you’re a Fortune 50 too!

Rule 0: Backup A backup is cheap and easy to do Can use tapes, a server solution or even burn DVDs Don’t overwrite your backups! Keep your backups offsite Don’t *lose* your backups, it’s probably $$ in the bank to someone else Test your backups

Rule 1: Patch your machines Even my mother does this (honest!) In Windows XP, can be done automatically Increases reliability and security Consider TCO and upgrade cost Prevents an attacker taking control via lots of different vectors

Rule 2: Use Antivirus Software Viruses and Trojans and Worms (oh my!) Very common problem in business Can reduce a network to a bunch of colored wires in seconds Must must must keep antivirus software up to date Make sure your vendor deals with Spyware too!

Rule 3: Use a Firewall Not using a firewall is the electronic equivalent of leaving the door unlocked Anyone can attack your machines My machine gets attacked every hour not every day! Not necessarily expensive Most businesses don’t need to let much in

Rule 4: Be wary of Wireless Wireless “leaks” from your building Hackers “wardrive” looking for open networks to “play with” Make sure you set it up right if you’re going to use it Check periodically to make sure you don’t have a wireless network you didn’t know about!

Rule 5: Watch your trash! Ah, the things we throw away Sometimes, it’s the equivalent of throwing our keys in the trash and assuming nobody is going to look for them Dumpster diving is very common… and shredders are really cheap

Rule 6: Use but don’t share… Passwords When you “let an employee go” you want to make sure their access is gone Bad idea to share administrative passwords with everyone

Rule 7: Understand your risk Don’t be paranoid, but don’t be careless either Know what the real threats are and engage employees to help you Remember, you are managing risk not removing it (or ignoring it…)

Rule 8: Know what you don’t know Sometimes you will have security needs which go beyond your expertise Know when that happens, and get help Don’t do silly things like open up your firewall because “Ned from Accounting needs to RPC in to his machine”

Rule 9: Don’t make the medicine worse than the disease Recognize that accidents happen, and people aren’t perfect Don’t make it like a prison!

Rule 10: Use least privilege Basically, most of your users don’t need complete control of their machines… so don’t give it to them Protects you from “whoops” moments

In Summary You CANNOT afford to ignore computer security But addressing it DOESN’T HAVE TO BE HARD Simple precautions work well When it gets difficult, call for help!

Questions?