PROTECTING YOUR BUSINESS - DATA TRANSFER AND OTHER SECURITY TIPS TO KEEP YOUR BUSINESS UP AND RUNNING - Clark & Lavey
←
→
Page content transcription
If your browser does not render page correctly, please read the page content below
WHO IS TIM BURNETT? • I AM A GEEK – I HAVE BEEN PROGRAMMING FOR OVER 35 YEARS • UNIVERSITY OF FLORIDA GRADUATE – ELECTRICAL ENGINEERING SPECIALIZING IN DIGITAL DESIGN. GO GATORS!! • CONSULTANT TO THE UF FOOTBALL PROGRAM FOR OVER 30 YEARS. • CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL (CISSP) IN 2008. • EXPERIENCE WITH INSURANCE BROKERS, IDENTITY THEFT PROTECTION SERVICES, BANKS – LOCAL AND INTERNATIONAL, CREDIT UNIONS, ELECTRIC UTILITIES, AND ENERGY TRADING COMPANIES.
EIGHT ALARMING CYBER SECURITY FACTS 1. THERE ARE CONTINUOUS ATTACK ATTEMPTS 2. 43 PERCENT OF CYBER ATTACKS TARGET SMALL BUSINESS.
EIGHT ALARMING CYBER SECURITY FACTS 3. THE AVERAGE COST OF A DATA BREACH IN 2020 WILL EXCEED $150 MILLION 4. SINCE 2013 THERE ARE 3,809,448 RECORDS STOLEN FROM BREACHES EVERY DAY 5. OVER 75% OF HEALTH CARE INDUSTRY HAS BEEN INFECTED
EIGHT ALARMING CYBER SECURITY FACTS 6. BY 2020 THERE WILL BE ROUGHLY 200 BILLION CONNECTED DEVICES. 7. ONLY 38 PERCENT OF GLOBAL ORGANIZATIONS CLAIM THEY ARE PREPARED. 8. TOTAL COST FOR CYBER CRIME COMMITTED GLOBALLY HAS ADDED UP TO 100 BILLION DOLLARS.
THE “CIA” • WHAT YOU NEED TO BE CONCERNED WITH FALLS INTO THREE CATEGORIES: • CONFIDENTIALITY • INTEGRITY • AVAILABILITY
THE SEVEN MOST IMPORTANT THINGS YOU SHOULD BE DOING 1. BACKUP YOUR DATA. • EQUIPMENT THEFT OR FAILURE • RANSOMWARE • ACCIDENTAL DELETION OR OVERWRITE • IDEALLY: THREE COPIES IN TWO LOCATIONS. • CIA: INTEGRITY, AVAILABILITY
THE SEVEN MOST IMPORTANT THINGS YOU SHOULD BE DOING 2. SOFTWARE UPDATES • MOST MALWARE TARGETS INSECURE SYSTEMS • CHECK FOR AND APPLY UPDATES. • REPLACE OLD SOFTWARE • YOU SHOULD NOT BE RUNNING WINDOWS XP OR SERVER 2003 • SERVER 2008 IS END OF LIFE JAN 14, 2020 • CIA: CONFIDENTIALITY, INTEGRITY, AVAILABILITY
THE SEVEN MOST IMPORTANT THINGS YOU SHOULD BE DOING 3. RUN ANTI-VIRUS SOFTWARE • IN BUSINESS NETWORKS THIS SHOULD BE MONITORED • CIA: CONFIDENTIALITY, AVAILABILITY
THE SEVEN MOST IMPORTANT THINGS YOU SHOULD BE DOING 4. USE A WELL-DESIGNED NETWORK • PROTECT YOUR WIFI • USE A GOOD FIREWALL THAT IS UPDATED • KNOW WHERE YOUR NETWORK CABLES RUN • CIA: CONFIDENTIALITY, INTEGRITY, AVAILABILITY
THE SEVEN MOST IMPORTANT THINGS YOU SHOULD BE DOING 5. PROFESSIONAL MONITORING • ANTI-VIRUS • UPDATES • GENERAL SYSTEM HEALTH • CIA: CONFIDENTIALITY, INTEGRITY, AVAILABILITY
THE SEVEN MOST IMPORTANT THINGS YOU SHOULD BE DOING 6. EMPLOYEE AWARENESS TRAINING • HOW TO SPOT SUSPICIOUS EMAIL • HOW TO IDENTIFY PHISHING ATTEMPTS • WHAT TO DO IF THEY SUSPECT SOMETHING • WHAT CAN AND CANNOT BE SENT THROUGH EMAIL • HOW TO USE SECURE DATA TRANSFER METHODS – MORE LATER • CIA: CONFIDENTIALITY, AVAILABILITY
THE SEVEN MOST IMPORTANT THINGS YOU SHOULD BE DOING 7. PASSWORDS AND ACCESS MANAGEMENT • USE MULTI-FACTOR AUTHENTICATION • TREAT PASSWORDS LIKE UNDERWEAR: • DO NOT SHARE WITH YOUR CO-WORKERS. • DO NOT LEAVE THEM ON YOUR DESK. • CHANGE THEM OFTEN • CIA: CONFIDENTIALITY, INTEGRITY
SECURE DATA TRANSFER • USE SECURE EMAIL • CLIENT-BASED IS NO LONGER RECOMMENDED • DOES NOT COVER ALL DEVICES, SUCH AS SMARTPHONES • DOES NOT PROTECT AGAINST USER FORGETTING TO HIT THE “ENCRYPT” BUTTON • USE A GATEWAY OR SERVER-BASED SOLUTIONS • PROTECTS EMAIL SENT FROM ALL DEVICES • CAN USE RULE-BASED ENCRYPTION FOR AUTOMATIC PROTECTION
SECURE DATA TRANSFER • USE SECURE FILE TRANSFER TOOLS SUCH AS SHARESYNC • OVERCOMES THE SIZE LIMITATIONS IN EMAIL (~5 TO 10 GB LIMIT IN MANY SYSTEMS) • SENDS A SECURE LINK THAT CAN BE PASSWORD PROTECTED AND CAN EXPIRE
Doe, John 123-45-6789 SECURE DATA TRANSFER • DO NOT USE FTP (FILE TRANSFER PROTOCOL) • IS NOT ENCRYPTED. DATA AND PASSWORDS CAN BE EASILY EXPOSED • USE SFTP (SECURE FILE TRANSFER PROTOCOL) • IS SECURE BY ITSELF, BUT SOME COMPANIES ALSO USE PGP (PRETTY GOOD PRIVACY) TO ENCRYPT THE FILES BEFORE SENDING AS A EXTRA LAYER OF SECURITY J9j(H*9hp9b [kdjiHu6ydQ
SECURE DATA TRANSFER • DO NOT USE HTTP WEBSITES (HTTP://YOURSITE.COM) • IS NOT ENCRYPTED AND DATA CAN BE EASILY EXPOSED • USE HTTPS WEBSITES (HTTPS://YOURSITE.COM) • SECURED BY DIGITAL CERTIFICATES • DO NOT USE SITES THAT HAVE A CERTIFICATE ERROR
QUESTIONS?
THANK YOU! CONTACT TIM BURNETT DMZ SOLUTIONS TBURNETT@BIZNETASSURE.COM 904-240-4924
You can also read