Network Security Best Practices

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Data Security: Steps to Improved Information Security September 22, 2015 Presented by: Alex Henderson General Counsel and Chief Administrative Officer.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
Computer Security By Duncan Hall.
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
BizSmart Lunch & Learn Webinar Information Security and Protecting your business With the increased risk of some sort of cyber- attack over the past few.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Important Information Provided by Information Technology Center
Presented by: SBS CyberSecurity © SBS CyberSecurity, LLC
Payment Card Industry (PCI) Rules and Standards
Chapter 40 Internet Security.
CYBERSECURITY SOLUTIONS
Managing Compliance for All Departments
Edexcel GCSE Cyber security threats Computer Science 1CP1
PCI-DSS Security Awareness
PHISHING Hi, The comms team asked if I could refresh everyone about Phishing after a fairly successful phishing circulated last week that led to.
Data Minimization Framework
CYBERSECURITY By Salomon Frangieh CISBC.
Protecting What’s Yours: Your Identity
Information Security.
Ways to protect yourself against hackers
Lesson 3 Safe Computing.
Contact Norton Support Canada for Firewall Issues.
Introduction to the Federal Defense Acquisition Regulation
Home Computer Security
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
Phishing is a form of social engineering that attempts to steal sensitive information.
Staying Austin College
Forensics Week 11.
Presented by: Brendan Walsh Manager, Security and Access Management
Teaching Computing to GCSE
Chapter 3: IRS and FTC Data Security Rules
Cybersecurity Awareness
Unfortunately, any small business could face the risk of a data breach or cyber attack. Regardless of how big or small your business is, if your data,
Robert Leonard Information Security Manager Hamilton
Mary Kummer Jim McNall PRIMA Spring Training 2018
4 ways to stay safe online 1. Avoid viruses and phishing scams
Risk of the Internet At Home
Cyber Security Why You Should Care.
Social Engineering No class today! Dr. X.
Red Flags Rule An Introduction County College of Morris
National Cyber Security
Lesson 2: Epic Security Considerations
12 STEPS TO A GDPR AWARE NETWORK
Epic Introduction Basics
HOW DO I KEEP MY COMPUTER SAFE?
Keeping your data, money & reputation safe
Lesson 2: Epic Security Considerations
Steppa Cyber Security Training Tips Your Business Was Seeking For With Cyber Security Training!
Chapter 7 – and 8 pp 155 – 202 of Web security by Lincoln D. Stein
Qiyu chen, Xiaomin Dong, Chenhui Lai, Xinteng Chen, Vittorio DiPentino
Lesson 2: Epic Security Considerations
Premier Employee Program Version 4.0
Technology Convergence
What is Phishing? Pronounced “Fishing”
Dark Web Domain Status Report
Protect data in core business applications
Why Cyber Security is important to SME? Useful Tips on how you protect and secure your business. By Ronald Soh from Win-Pro Consultancy Pte Ltd
Information Security in Your Office
Presentation transcript:

Network Security Best Practices PROSECUTORbyKarpel Thursday, November 29, 2018 Network Security Best Practices 2017 Users Group Meeting April 13, 2017 Confidential information

Monitor Applications with Access to Data PROSECUTORbyKarpel Thursday, November 29, 2018 Monitor Applications with Access to Data Applications are great. They give your business the tools it needs to function and be productive. But they also put your sensitive data at risk. When IT security attempts to protect critical information, it usually involves putting up firewalls and building your infrastructure around the data you want to protect. Then you give applications access to this data. When hackers look to steal your data, they won’t try to hammer their way through your firewall, they’ll look for the least secure system with access to the data they need. Confidential information

Create Specific Access Controls PROSECUTORbyKarpel Thursday, November 29, 2018 Create Specific Access Controls Once your IT network is secure, you need to be very careful about who you decide to give the keys to the kingdom. Ideally, it shouldn’t be anyone. By creating specific access controls for all of your users you can limit their access to only the systems they need for their tasks and limit your sensitive data’s exposure. Confidential information

Maintain Security Patches PROSECUTORbyKarpel Thursday, November 29, 2018 Maintain Security Patches When cyber-criminals are constantly inventing new techniques and looking for new vulnerabilities, an optimized security network is only optimized for so long. When Home Depot’s POS systems were hacked last summer, they were in the process of installing a security patch that would have completely protected them. To keep your network protected, make sure your software and hardware security is up to date with any new antimalware signatures or patches. Confidential information

Outline Clear Use Policies for Employees and Vendors PROSECUTORbyKarpel Thursday, November 29, 2018 Outline Clear Use Policies for Employees and Vendors To strengthen and clarify the education you give your users, you should clearly outline the requirements and expectations your company has in regards to IT security when you first hire them. Make sure employment contracts and SLAs have sections that clearly define these security requirements. Confidential information

User Activity Monitoring PROSECUTORbyKarpel Thursday, November 29, 2018 User Activity Monitoring Trust but verify. While well trained users can be your security front line, you still need technology as your last line of defense. User Activity Monitoring allows you to monitor users to verify that their actions meet good security practices. If a malicious outsider gains access to their log-in information – or if an insider chooses to take advantage of their system access – you will be immediately notified of the suspicious activity. Confidential information

Create a Data Breach Response Plan PROSECUTORbyKarpel Thursday, November 29, 2018 Create a Data Breach Response Plan No matter how well you follow these best practices, you might get breached. In fact, nearly half of organizations suffered a security incident in the past year. If you do, having a response plan laid out ahead of time will allow you to close any vulnerabilities and limit the damage the breach can do. Confidential information

Educate and Train Your Users PROSECUTORbyKarpel Thursday, November 29, 2018 Educate and Train Your Users No matter how gifted, your users will always be your weakest link when it comes to information security. That doesn’t mean you can’t limit this risk through regularly educating your users on cyber security best practices. This training should include how to recognize a phishing email, how to create strong passwords, avoiding dangerous applications, taking information out of the company, and any other relevant user security risks. Confidential information

Beware of Social Engineering PROSECUTORbyKarpel Thursday, November 29, 2018 Beware of Social Engineering All of the technical IT security you implement can’t take the place of common sense and human error. Social engineering tactics have been used successfully for decades to gain login information and access to encrypted files. Rogers Communications recently faced a major breach when a hacker called an employee pretending to be the IT department and was able to get the employee’s log-in information. Attempts like this one may come from phone, email or other communication with your users. The best defense is to… Confidential information

Phishing PROSECUTORbyKarpel Thursday, November 29, 2018 Confidential information

Common Sense Steps Don‘t open emails you aren’t expecting to receive. PROSECUTORbyKarpel Thursday, November 29, 2018 Common Sense Steps Don‘t open emails you aren’t expecting to receive. Never click on a link that “shows” a different address when you hover over it. Be cognizant that any information you send via email can be forwarded. Confidential information

PROSECUTORbyKarpel Thursday, November 29, 2018 Confidential information

Maintain Compliance PROSECUTORbyKarpel Thursday, November 29, 2018 Hopefully these best practices are a useful guideline for keeping your business safe, but you do have another set of guidelines available to you. Regulations like CJIS, HIPAA, PCI DSS and ISO offer standards for how your business should conduct its security. More than a hassle which you need to prepare audit logs for, compliance can help guide your business. Confidential information

Questions? PROSECUTORbyKarpel Thursday, November 29, 2018 Confidential information

9717 Landmark Parkway Drive Suite 200 PROSECUTORbyKarpel Thursday, November 29, 2018 Karpel Solutions 9717 Landmark Parkway Drive Suite 200 St. Louis, MO 63127 314-892-6300 info@karpel.com Vice President Tony Morris tmorris@karpel.com Confidential information