Cyber Security Why You Should Care.

Slides:



Advertisements
Similar presentations
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Advertisements

Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Lecture 11 Reliability and Security in IT infrastructure.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Threats to I.T Internet security By Cameron Mundy.
Data Security GCSE ICT.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Topic 5: Basic Security.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Computer Security By Duncan Hall.
Role Of Network IDS in Network Perimeter Defense.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 11 Network Security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Computer Security Sample security policy Dr Alexei Vernitski.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Protection of Data 31 Protection of Data 31. Protection of Data 31 Having looked at threats, we’ll now look at ways to protect data: Physical Barriers.
Ransomware BISD Technology Department. Ransomware Ransomware is a type of malicious software (malware) that infects a computer and/or mobile device and.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
UNIT V Security Management of Information Technology.
Security on the Internet Norman White ©2001. Security What is it? Confidentiality – Can my information be stolen? Integrity – Can it be changed? Availability.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Technical Implementation: Security Risks
Securing Information Systems
Chapter 40 Internet Security.
Network security Vlasov Illia
Securing Information Systems
Information Technology Acceptable Use An Overview
IT Best Practices Fred Limmer, IT Practice Manager.
What they are and how to protect against them
Seminar On Ethical Hacking Submitted To: Submitted By:
3 Do you monitor for unauthorized intrusion activity?
Cybersecurity - What’s Next? June 2017
Critical Security Controls
Common Methods Used to Commit Computer Crimes
3.6 Fundamentals of cyber security
Unit 4 IT Security.
Instructor Materials Chapter 7 Network Security
Secure Software Confidentiality Integrity Data Security Authentication
Lesson Objectives Aims You should be able to:
Business Risks of Insecure Networks
Answer the questions to reveal the blocks and guess the picture.
Firewalls.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Securing Information Systems
Teaching Computing to GCSE
Cybersecurity Awareness
Call AVG Antivirus Support | Fix Your PC
Risk of the Internet At Home
Malware, Phishing and Network Policies
Information Security Session October 24, 2005
Network Security Best Practices
Contact Center Security Strategies
Chapter 4: Protecting the Organization
Faculty of Science IT Department By Raz Dara MA.
– Communication Technology in a Changing World
Computer Security By: Muhammed Anwar.
G061 - Network Security.
6. Application Software Security
Internet Safety and You
Cybersecurity Simplified: Ransomware
Presentation transcript:

Cyber Security Why You Should Care

What Is Cyber Security? Cyber Security is the technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access.

Why is Cyber Security important to my business? This year 40% of small to medium size businesses who manage their own networks will have their data accessed by a hacker. 50% of these will not even know they were attacked (Source: Gartner Group) 20% of small businesses will be hacked within one year (Source: National Cyber Security Alliance) You can be held liable for your clients data A data breach can be devastating to your business The result of a cyber attack on your business could cost you thousands…or even your business. (60 percent of small companies go out of business within six months of a cyber attack.) Your data is the only thing that your insurance CANNOT replace 71% of all data breaches are waged against companies with less than 100 employees (www.inc.com). The average cost to recover from these attacks was $7500 - $36,000. Depending on your industry and your client base you may be required by law to be compliant (PCI, SOX, HIPAA, etc…) It is best practice to be take the same measures to protect your data – Even if you are not required to by law. You are still responsible for your clients data.

Why ME? I’m not Target or Home Depot! In almost all cases Cyber Attacks are not targeting your business. Cyber Attacks are a crime of opportunity. Hackers have software that automatically tests random websites and networks for vulnerabilities while logging the results so that the hacker can attempt to break in later. In most cases they are not even aware of who they are attacking until they have gained access to your your data. There is a 100% chance that 1 out of 10 users will click a malicious link sent via email infecting your network with a virus.

Common Types of Attacks Intrusion Attempts – A hacker tries to penetrate your network using various methods. Successful attempts are usually the result of a known vulnerability that could have been prevented by simply updating your software. RansomWare – An infection that is typically spread through infected emails or websites disguised as legitimate. These infections encrypt or lock your data requiring that you pay a ransom to regain access. These infections typically infect a users workstation and then spread to shared network resources such as your server. Denial of Service Attack – An attack that sends useless traffic to a specified network overloading the networks capacity which in turn brings the network to a halt. Virus – An infection that can have varying payloads ranging from nothing more than a nuisance to deleting or damaging data. Malware – Malicious software that may have been installed under false circumstances. Malware can be a nuisance, damage or delete data or collect data and provide it to a third party all while creating a major performance deficit on your machine. Man In The Middle Attack - A hacker intercepts data between two users and manipulates the data. The users are not aware. This is commonly used to intercept communications including payment information allowing the intruder to change account numbers or routing numbers sending the payment to an alternate location.

Important Facts In the early days of Cyber Attacks a good solid antivirus program was all you needed. In todays environment, a multi-tiered approach to Cyber Security is required. No one solution is sufficient. Not all security products are created equal. Patching your software and operating system is critical. Employing a true enterprise firewall is critical in the protection of your data. Encryption is no longer optional. In fact – some organizations are required by law to use encryption. An enterprise spam filter is a must in preventing viruses and other malicious data into your network. Backup is a non negotiable necessity! Antivirus still plays an important role in protecting your data. Web content filtering can help protect your network while also increasing the efficiency of your users.

The 8 Must Haves Of Security Antivirus Firewall Patching Web Filtering Encryption Enterprise Email Filtering BACKUP Real Time Monitoring

Antivirus Antivirus is very much required although it is now considered the last line of defense. Antivirus needs to be monitored and updated regularly to remain effectiveness. Scheduled scans as well as real time scans can help catch a threat before it becomes active. Remember – All security products are not created equally. This includes antivirus products. Enterprise monitored antivirus products can cost as little as $24/year.

Firewall Firewalls prevent exposure to attacks. Firewalls play an important role in security by monitoring incoming and outgoing traffic for your network. Firewalls inspect this traffic identifying potential viruses and malicious attacks and take action automatically. Firewalls need to be monitored and maintained ensuring they are up to date and have detailed rulesets defined for maximum security. Small routers such as Linksys, Netgear and D-Link are not sufficient firewalls and have no intrusion prevention system or virus scanning capabilities. These devices should never be used to protect your business. New generation firewalls in most cases include web content filtering allowing you to restrict access to website categories or specific websites greatly improving network security and employee efficiency. These devices are very economical. It is best practice to have your firewall monitored as well as regular reporting to alert you of anomalies.

Actual Data From Firewall Report

Patching Even if your systems are working fine – You must patch! By not patching you are leaving the door open for malicious software or exploits to take advantage of newly found flaws in your software or operating system. On average more than 20 new vulnerabilities are identified each day. It is estimated that more than 80% of all pc’s are missing critical patches or updates. Patching should be done routinely. Patching should be monitored and confirmed.

Web Content Filtering Web content filtering prevents exposure to malicious software and websites. Content filtering prevents access to potentially dangerous websites. By creating filtering policies you are able to gain control of your network allowing increased security and efficiency. Reporting allows you visibility into your security. You are able to use the report data to improve policies and employee efficiency.

Encryption Encryption is a method of protecting data using a series of keys to code and decode the information. Encrypted data is completely protected…well almost.. even it is stolen. 256-bit AES encryption would take a hacker a lifetime to crack using the brute force method. Even the hacker’s grandchildren wouldn’t live long enough to decode the data. Email encryption allows you to transmit data securely. (Man in the middle attack). Who is looking at your email when in transit? Ensure compliance - All compliances require data to be encrypted.

Enterprise Spam Protection

Backup Your backup should require no human interaction. Your backup should be monitored and tested weekly! Over 50% of companies managing their own networks. is the MOST important part of your security plan. 93% of companies who lost access to their data for more than 10 days files for bankruptcy within one year. 50% filed immediately. 31% of companies who lost their data completely went out of business within 1 year. Backup is your last resort. Your data cannot be replaced. 77% of users who backup their own data had backup failures when tested. 100% of all hard drives crash! You must have a sound disaster recovery plan.

Things You Can Do Immediately Use strong and secure passwords Purchase Cyber Insurance (Do everything in your power so that you never have to use it!) Have your network security tested Budget for IT! Your data and network infrastructure is critical to your business. Consult with an expert to determine where your weaknesses are.