Download presentation
Presentation is loading. Please wait.
Published byBarrie Wilson Modified over 9 years ago
1
trinsoft.com Top 10 Security Checklist John C. Stucky TrinSoft, LLC
2
trinsoft.com Agenda Introductions Context & Background Top 10 Suggested Steps Questions
3
trinsoft.com Context & Background What does security mean to you? Why does it matter? How deep do you want to go? Doesn’t this only impact “the IT guy”?
4
trinsoft.com Top 10 In honor of David Letterman – 22 years on the air – Over 4,000 episodes – Was a weatherman prior to hosting – And, his most famous segment by far was his nightly Top 10…
5
trinsoft.com Top 10 #10 – Keep patches current Patches are used to keep software and applications current A lot of the patches relate to security fixes Some are released often, some rare Backup and Test prior to installing
6
trinsoft.com Top 10 #9 – Don’t advertise your target Be smart about what you show/advertise Keep screens blocked/turned away Hide on-line access points Hide SSIDs for wireless access Imagine someone is reading every eMail
7
trinsoft.com Top 10 #8 – Stay alert and informed Keep updated regarding current threats – Cryptolocker – Hot/Current threats Let your team know Keep your filters, firewalls, blockers, etc. current Suspicious activity
8
trinsoft.com Top 10 #7 – Privacy is good practice Do not give out information you don’t have to Know who you are giving it to Have policies on private information and information exchange Take pictures of your vendor visitors
9
trinsoft.com Top 10 #6 – Practice safe passwords Require password changes regularly Teach your team about password algorithms – ~helloXXXXX23! – ~helloSummer23! – ~helloWinter23! – ~helloHappy23! Enforce password difficulty rules Do not write the full passwords down Use a password database (Keepass)
10
trinsoft.com Top 10 #5 – Watch the outside vendors closely Verify who they are Check their credentials Take their picture and check ID when they come Watch how they communicate with you (i.e. do they send passwords in eMail?) Don’t give them more than they need
11
trinsoft.com Top 10 #4 – Monitor and record everything Service are available for – Web browsing – Email – All connectivity Video & Audio Mobile It is a deterrent – not big brother
12
trinsoft.com Top 10 #3 – Manage your biggest threats Browsing Email Passwords Physical
13
trinsoft.com Top 10 #2 – Everyone is 100% responsible Teach your staff Keep them updated regularly Make security ‘best practices’ a part of every day language Give them a safe environment to come to you with a mistake Have a plan for when a breach occurs
14
trinsoft.com Top 10 #1 – Practice your RECOVERY strategy We do not call them backups – we call them recoveries If you have not practiced a restore, you may not have a backup Monitor the plan/process
15
trinsoft.com Suggested Steps 1.Change your passwords – but be sure you have confidence in IT/Backups beforehand 2.Conduct an internal training session on password, eMail and Browsing safety 3.Be sure you have the following in place and up- to-date: 1.eMail filtering 2.Anti-Virus and Anti-Malware 4.Do an internal “self audit” of your organization’s security based on this list
16
trinsoft.com Questions? Thank you! John Stucky jstucky@trinsoft.com
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.