Post on 01-Nov-2014
description
Technology Threats to Your Business
and What to Do About Them
Technology Threats to Your Business and
What to Do About Them
Collect – Protect – Restore
Mike Garland – DataPreserve
Did You Know?
7 out of 10 small companies risk losing their business because they are not equipped or prepared for security threats from viruses, fraud, and system failure. National Computing Centre
Surveys Show SMBs Lack Minimal Security
Less than 25% of businesses are fully protected against security vulnerabilities and intrusions.
Quocirca, a UK-based research company
Less than 20% of Small and Medium Sized Businesses back up PC’s at least once a day.
Sources: Startups.co.uk, eWeek.com
This Drive Holds Your Company’s Future
Hard-drive failure rates found to be higher that those cited by the commonly used vendor ratings.
Carnegie Mellon University 2007
What Is On Your Hard Drive?
Email Financial data Customer records Intellectual property Proprietary software (unique to your business) Employee records, etc.
How Would Your Business Change If-
You lost your passwords? You lost internet access? You lost customers records - You lost intellectual property You lost proprietary software (unique to
Realtors) ? You lost data required for compliance with
ARS statutes? Employee records, etc.
External Threats
1. Physical Theft2. Cyber Theft3. Natural and non-natural
threats
Internal Threats
4. Security5. Hardware6. Viruses7. Software8. IT Support9. File Structure
The Biggest Internal Threat
10.End User/Staff Opening files/e-mails from unknown sources Sharing Passwords Not allowing updates to run Not encrypting passwords; using
simple/generic pw Not removing access after someone leaves Kicking server/removing data after/before
leaving company Clicking on “whatever”, modifying settings,
etc….
10 Tips to Protect Your DataE-Mail Don’t talk to strangers
Password Alpha/Numeric & Change Often, Control and Document Access
Operating System Updates Run weekly
Program Updates Run as soon as updates are made available from the application vendor.
Firewall Hardware or software
Spy ware Invest in removal programs
Anti-Virus Software Run weekly
Web Browser/ Internet Update Monthly
Miscellaneous Scheduled maintenance check. Hire a professional IT company
Remote Backup Keep a copy off-site - far from your computer
Components of Backup
1. Security including encryption2. On site vs off-site 3. Automation/Accessibility4. Revision/Retention
Resources
For copies of these slideswww.DataPreserve.com/SEVRAR
Mike Garlandmgarland@DataPreserve.com