Presentation is loading. Please wait.

Presentation is loading. Please wait.

Your security risk is higher than ever.

Similar presentations


Presentation on theme: "Your security risk is higher than ever."— Presentation transcript:

1 Your security risk is higher than ever.
$19.95/mo. 40% buys hackers easy-to-use “as-a-service” options for attacks. ZDNet of spam contains ransomware. IBM Your security risk is higher than ever.

2 16% over 2015. 2016 ransomware attacks were up Verizon 2016 DBIR

3 of recipients open phishing messages.
30% of recipients open phishing messages. click on attachments. 12% Verizon 2016 DBIR

4 You can’t afford to be wrong on this one.
1 in 2 70% $1B USD executives experience a ransomware attack of businesses hit pay the ransom in ransom paid in 2016 IBM IBM FBI estimate

5 “IT wants things to work smoothly, while security wants security.
Feedback from a survey of 100 CIO/CSOs “IT wants things to work smoothly, while security wants security. At the endpoint, they have to work together to maintain both.”

6

7 Install top rated antivirus software
10 Security tips Install top rated antivirus software

8 Best as of May 2017

9 Restrict administrator rights

10 Install and update a firewall

11 Implement patches and software on popular software

12 Enforce strict password policies

13 Top 25 most common passwords
123456 qwerty 111111 password 123123 qwertyuiop mynoob 123321 666666 18atcskd2w 1q2w3e4r 654321 555555 3rjs1la7qe google 1q2w3e4r5t 123qwe zxcvbnm 1q2w3e

14 Lock those screens

15 Secure wi-fi routers

16

17 Secure your browsers

18 Use encryption

19 Train and recruit users.

20 Our defense-in-depth solutions
Patch & Vulnerability Management Application Control & Privilege Management Endpoint Security Secure Program Management Patch and secure the OSes and 3rd-party apps that you can. Prevent all other apps from running while practicing the principles of least privilege. Add advanced anti-malware and AV capabilities, device control, and global policy for all devices. Marry security capabilities with workflows and asset management processes to complete a secure lifecycle. Patch management Vulnerability management Application control Privilege management Device control Anti-malware Threat alerting Asset management Service management Secure configuration management

21 The first 5 controls Inventory of authorized and unauthorized devices
CIS, US-CERT, ASD, and other authorities prioritize these five elements of cyber hygiene to significantly reduce security threats. Inventory of authorized and unauthorized devices Inventory of authorized and unauthorized software Secure configuration Controlled use of administration privileges Continuous vulnerability assessment and remediation

22 Department of Homeland Security/FBI Cybersecurity Briefing December 30, 2016
Although in the context of nation-state cyber hacking, in this nationwide public (no clearance required) call, the following techniques were recommended to improve cybersecurity prophylaxis Data Backups Risk Analysis and remediation Staff Training Vulnerability Scanning & Patching Application Whitelisting Incident Response Business Continuity Planning Penetration Testing

23

24 Physical security


Download ppt "Your security risk is higher than ever."

Similar presentations


Ads by Google