Download presentation
Presentation is loading. Please wait.
Published byFelix Greene Modified over 8 years ago
1
IT SECURITY WHAT IT MEANS FOR BUSINESS TODAY KASPERSKY ENDPOINT SECURITY FOR BUSINESS - ADVANCED March 2016
2
ANTIVIRUS ON IT’S OWN IS NO LONGER ENOUGH. BUT WHAT’S NEXT? → Ransomware resistance → Business continuity → Data protection → Cost optimization → Secure mobile
3
RANSOMWARE RESISTANCE
4
NO ONE IS SAFE FROM RANSOMWARE Methodist Hospital in Henderson Kentucky Hackers locked thousands of patient’s files and deleted originals “We haven't seen crimes in such a large scale” - FBI says Another hospital in Los Angeles Hackers locked patients files and demanded ransom Hospital had choice but to pay about $17,000 to unlock them FBI also investigating the case now “Locky” Trojan infected users in 114 countries around the world in few days Most affected countries are France, Germany, India, USA and China RANSOMWARE HAS BECOME #1 PROBLEM OF IT SECURITY WORLDWIDE!
5
HOW THIS HAPPENS
6
HOW MULTILAYERED SECURITY WORKS
7
BUSINESS CONTINUITY
8
HACKERS GET ADVANCED Criminals worldwide now invest much more money and time to develop more advanced malicious code. They continuously enhance anti-debugging techniques to protect malware from being detected for much longer. Malware can have special modules to target specific systems, as happened to Russia’s EnergoBank Malware Metel had specific modules to connect to trading systems Infected machines placed orders for USD sell/buy automatically This led to currency exchange fluctuations that caused problems with the Central Bank - they refused to believe that EnrgoBank employees were not involved
9
HOW THIS HAPPENED → Duration: 14 min → Loss: $3.7 mln. → Big issue with Central Bank MALWARE Link EXPLOIT QUIK Transaq EXPLOIT Interruption of business processes can lead to issues with customers, partners or even regulators
10
SOLUTION THAT WORKS Prevention is better than cure. Advanced technologies can scan networks to identify vulnerabilities caused by unpatched applications or operating systems before automatically installing the required patches and updates AEP WEB AV MALWARE QUIK Transaq EXPLOIT →Vulnerability assessment →Patch management EXPLOIT
11
DATA PROTECTION
12
“THIS WILL NEVER HAPPEN TO US” Tax and Personal Data on thousands of students and workers at Kentucky State University and Tidewater Community College in the US were exposed via phishing requests Data affected included 2015 W-2s forms and university IDs for employees and students - including names, Social Security numbers and addresses. 1,071 people become victims of attack An attacker sent a phishing email to a staffer, impersonating the school's president Raymond Burse, requesting 2015 W-2s data for employees. The employee sent the data, unaware that the email was not from Burse.
13
WHERE THE PROBLEM IS Their own intellectual property Designs and ‘know how’ owned by business partners Confidential, personal information about employees Sensitive information about customers TODAY, BUSINESSES PROCESS AND STORE MASSIVE VOLUMES OF INFORMATION, INCLUDING : Data loss caused by theft or accidents could entail costs or legal problems for violating data protection regulations. 65% of data loss caused by human factors 32% of data loss caused by IT threats
14
SOLUTION THAT WORKS Encryption is an effective way to protect a company from the risks associated with data loss caused by malware or even device loss/theft.
15
SECURE MOBILE
16
US. In-flight (and any public) Wi-Fi insecurity: journalist's emails were hacked by fellow traveler USA Today and Washington Post newspaper columnist Steven Petrow has exposed serious flaws in aeroplane wifi On a recent flight, a fellow passenger hacked into his laptop computer and read his emails He learned of the security breach from the hacker after he used Gogo (the biggest on-board WiFi provider in the US) This problem is relevant not only for in-flight WiFi but for every public wireless network. So employee laptops have to be properly defended before leaving the company's security perimeter. PUBLIC WIFI THREATS
17
HOW THIS HAPPENS Be aware! Malicious applications that users can download Phishing links that users can open from mobile browser Device jailbreak that removes security functions Leaving device unlocked or even loss of the device Information sent over public Wi-Fi can easily be intercepted by criminals
18
SOLUTION THAT WORKS You need to know You can block the use of unsecured public wifi You can encrypt sensitive data within applications You can block an application installation to protect against malware You can remotely wipe the most sensitive data from a device Mobile device management (MDM) helps to secure mobile devices properly
19
COST OPTIMIZATION
20
ELEGANT OPTIMIZATION OF IT EXPENSES "As it turned out, crises differ. In 2008, there was a clear prospect while now there is no clear understanding of what the year 2016 will bring. Therefore, most of the players have reduced their IT budgets to a minimum, which allows them to maintain the current infrastructure. Accordingly, I would understand the IT ratio support/development in the budget of the average bank as 90% / 5% + 5% on unexpected expenses” "Some of our customers have cut their IT budgets by 20-25%, and even more. Only the expenses on providing vital functions - support of the existing IT infrastructure, information security and implementation of legislative requirements - remained inviolable" "At the moment the expenditures for IT is the biggest cost item in any bank. Therefore a clear IT strategy and the cost effectiveness evaluation system for this area is required. The objective of IT today is to enable the bank to optimize its costs and to make money. " BANKING CIOS SAYS:
21
WHERE THE PROBLEM IS Price 1Price 2Price 3 + cost of education Using multiple, different security solutions without any clear standards around the software used or any centralized automation and control tools can actually cost more to support, thanks to hidden and indirect operational expenses.
22
SOLUTION No additional trainingCentralized management and unified service Comprehensive solution at a single price A single platform for a wide range of system administration functions (Systems Management)provides a centralized approach and tool for managing different IT areas, automating routine IT tasks and transparent monitoring of IT security - without additional maintenance costs and expenses for staff training. That creates savings for the IT budget without compromising on the quality of protection. AUTOMATIC HARDWARE AND SOFTWARE INVENTORY AUTOMATED OS INSTALLATION AND REINSTALLATION REMOTE INCIDENT RESOLUTION CENTRALIZED IT SECURITY MANAGEMENT FOR ALL TYPES OF WORKSTATIONS REMOTE WORK WITH DISTRIBUTED NETWORKS
23
KASPERSKY ENDPOINT SECURITY FOR BUSINESS ADVANCED
24
Encryption Vulnerability Assessment Patch Management Systems Management Security for Mobile Mobile Device Management & Mobile Application Management Anti-Cryptor – NEW! Server Application Control – NEW!
25
THANK YOU!
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.