Download presentation
Presentation is loading. Please wait.
1
Your security risk is higher than ever.
$19.95/mo. 40% buys hackers easy-to-use “as-a-service” options for attacks. ZDNet of spam contains ransomware. IBM Your security risk is higher than ever.
2
16% over 2015. 2016 ransomware attacks were up Verizon 2016 DBIR
3
of recipients open phishing messages.
30% of recipients open phishing messages. click on attachments. 12% Verizon 2016 DBIR
4
You can’t afford to be wrong on this one.
1 in 2 70% $1B USD executives experience a ransomware attack of businesses hit pay the ransom in ransom paid in 2016 IBM IBM FBI estimate
5
“IT wants things to work smoothly, while security wants security.
Feedback from a survey of 100 CIO/CSOs “IT wants things to work smoothly, while security wants security. At the endpoint, they have to work together to maintain both.”
7
Install top rated antivirus software
10 Security tips Install top rated antivirus software
8
Best as of May 2017
9
Restrict administrator rights
10
Install and update a firewall
11
Implement patches and software on popular software
12
Enforce strict password policies
13
Top 25 most common passwords
123456 qwerty 111111 password 123123 qwertyuiop mynoob 123321 666666 18atcskd2w 1q2w3e4r 654321 555555 3rjs1la7qe google 1q2w3e4r5t 123qwe zxcvbnm 1q2w3e
14
Lock those screens
15
Secure wi-fi routers
17
Secure your browsers
18
Use encryption
19
Train and recruit users.
20
Our defense-in-depth solutions
Patch & Vulnerability Management Application Control & Privilege Management Endpoint Security Secure Program Management Patch and secure the OSes and 3rd-party apps that you can. Prevent all other apps from running while practicing the principles of least privilege. Add advanced anti-malware and AV capabilities, device control, and global policy for all devices. Marry security capabilities with workflows and asset management processes to complete a secure lifecycle. Patch management Vulnerability management Application control Privilege management Device control Anti-malware Threat alerting Asset management Service management Secure configuration management
21
The first 5 controls Inventory of authorized and unauthorized devices
CIS, US-CERT, ASD, and other authorities prioritize these five elements of cyber hygiene to significantly reduce security threats. Inventory of authorized and unauthorized devices Inventory of authorized and unauthorized software Secure configuration Controlled use of administration privileges Continuous vulnerability assessment and remediation
22
Department of Homeland Security/FBI Cybersecurity Briefing December 30, 2016
Although in the context of nation-state cyber hacking, in this nationwide public (no clearance required) call, the following techniques were recommended to improve cybersecurity prophylaxis Data Backups Risk Analysis and remediation Staff Training Vulnerability Scanning & Patching Application Whitelisting Incident Response Business Continuity Planning Penetration Testing
24
Physical security
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.