Today’s Risk. Today’s Solutions. Cyber security and

Slides:



Advertisements
Similar presentations
!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
Advertisements

1 MIS 2000 Class 22 System Security Update: Winter 2015.
STOP.THINK.CONNECT™ NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION.
Network Security aka CyberSecurity Monitor and manage security risks at the network level for the entire Johns Hopkins Network.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
By Ashlee Parton, Kimmy McCoy, & Labdhi Shah
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
BUSINESS PLUG-IN B6 Information Security.
N ETWORK S ECURITY Presented by: Brent Vignola. M ATERIAL OVERVIEW … Basic security components that exist in all networks Authentication Firewall Intrusion.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Global Information Security Issues According to the E&Y Global Survey, Managers Say the Right Thing… –90% of 1400 companies surveyed in 66 countries say.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Threats to I.T Internet security By Cameron Mundy.
© Affiliated Computer Services, Inc. (ACS) 2010 ACS Encryption.
Security. If I get 7.5% interest on $5,349.44, how much do I get in a month? (.075/12) = * 5, = $ What happens to the.004? =
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
FIVE STEPS TO REDUCE THE RISK OF CYBERCRIME TO YOUR BUSINESS.
Information Security. What is Information Security? A. The quality of being secure B. To protect the confidentiality, integrity, and availability of information.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Chapter 6 of the Executive Guide manual Technology.
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
Computer Security By Duncan Hall.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
MIS323 – Business Telecommunications Chapter 10 Security.
Security risks in a network. Remote access  When you connect a computer to a network it is visible to all other computers on the network. When you connect.
Presented by: SBS CyberSecurity © SBS CyberSecurity, LLC
Securing Information Systems
Securing Information Systems
BUSINESS DRIVEN TECHNOLOGY
Cyber Security Zafar Sadik
Cybersecurity - What’s Next? June 2017
Common Methods Used to Commit Computer Crimes
Compliance with hardening standards
Cyber Security & IT: What’s Next?
Cyber Crime & What It Means For Your Business
F5 PRO ASSETS We’ve created these Pro Assets to help you communicate to your team the importance of app security and performance. Feel free to remove.
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
Joe, Larry, Josh, Susan, Mary, & Ken
Dissecting the Cyber Security Threat Landscape
Securing Information Systems
Forensics Week 11.
Security in Networking
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Cybersecurity Awareness
Call AVG Antivirus Support | Fix Your PC
Unit 1.6 Systems security Lesson 3
4 ways to stay safe online 1. Avoid viruses and phishing scams
Risk of the Internet At Home
Information Security CIS 9002 Kannan Mohan Department of CIS
Security Essentials for Small Businesses
Philip Nichilo Vincent Carestia
How to Mitigate the Consequences What are the Countermeasures?
Faculty of Science IT Department By Raz Dara MA.
Anatomy of a Large Scale Attack
Computer Security By: Muhammed Anwar.
Unit 1.6 Systems security Lesson 1
Microsoft Üzleti Megoldások Konferencia 2005
Identity Theft Samuel H. Slater.
Cybersecurity Simplified: Ransomware
Cloud Computing for Wireless Networks
Presentation transcript:

Cyber security and email Today’s Risk. Today’s Solutions. Cyber security and email Presented by Gerald Montella, President & CEO Trustifi Corporation

Contents of Presentation Introduction to Cyber Security Issues Background Information of Cyber Crimes Preventative Measures Market Opportunities for Remediation Contents of Presentation 2

A Brief History of Cyber Security Issues The First Computer Worm — Late 1980s - Early 1990s Succeeded in shutting down the Internet The First Viruses — 1990s Caused global email failure Credit Cards Under Attack — Late 2000s Cyber attacks become more targeted with the first serial data breach of credit card numbers. The Threat Tsunami — Modern Day Cyber breaches are now board-level issues. Data breaches cost an average $6.53 million per incident. http://www-03.ibm.com/security/data-breach/ http://www.infosecurity-magazine.com/opinions/the-history-of-cybersecurity/

3 No Plug-Ins or Downloads required Authentication & Verification Tamper-Proof PDF Option 3

Data Breaches — By the Numbers Since 2005 889,508,931 records have been compromised as the result of data breaches. www.privacyrights.org

The number of email accounts worldwide is expected to increase by 6% — from over 3.9 billion in 2013 to over 4.9 billion by the end of 2017. The go-to form of communication in the business world is email. Business email is expected to grow at an average annual growth rate of about 5% — from over 929 million e-mailboxes in 2013 to over 1.1 billion by the end of 2017. The majority of business email accounts are currently deployed on-premises. In 2013, the majority of email traffic came from business email, which accounted for over 100 billion emails sent and received per day. This trend is expected to continue and will account for over 132 billion emails sent and received per day by the end of 2017. Consumer email accounts currently account for the vast majority — approximately 76% — of worldwide email accounts. The market share is expected to steadily increase as more people come online and email continues to be a key component of the online experience.

The Radicati Group, Inc.

The Radicati Group, Inc.

Email is often the entry point for all manner of malware attacks. There are at least three hops every email goes through on its way to a recipient. Each of these points may or may not be encrypted. Unencrypted email and its attachment pose a threat to your data security and privacy, and are vulnerable to attack from hackers and other cyber threats. When an email attachment is encrypted it’s often done with subpar techniques like using a locked spreadsheet with a simple password (e.g. abc123) that is easily penetrable.

What Can We Do About Cyberthreats? Preventative Measures Start with security Factor it into the decision making in every department of your business – personnel, sales, accounting, information technology, etc Control access to data sensibly Put controls in place to make sure employees have access only on a “need to know” basis. For your network, consider steps such as separate user accounts to limit access to the places where personal data is stored or to control who can use particular databases. Require secure passwords & authentication If you have personal information stored on your network, strong authentication – including sensible password “hygiene” – can help ensure that only authorized individuals can access the data. Segment your network & monitor who’s trying to get in and out When designing your network, consider using tools like firewalls to segment your network, thereby limiting access between computers on your network and between your computers and the internet. Another useful safeguard: intrusion detection and prevention tools to monitor your network for malicious activity. https://www.ftc.gov/tips-advice/business-center/guidance/start-security-guide-business#segment

Market Opportunities for Remediation Invest in network security. Send secure emails to authenticated recipients. Train your employees to prevent social engineering. Secure the devices used by your company.

Know who’s looking at your email and what they’re doing with it.

Questions

Thank You!