FIVE STEPS TO REDUCE THE RISK OF CYBERCRIME TO YOUR BUSINESS.
-
Upload
dina-watkins -
Category
Documents
-
view
215 -
download
0
Transcript of FIVE STEPS TO REDUCE THE RISK OF CYBERCRIME TO YOUR BUSINESS.
![Page 1: FIVE STEPS TO REDUCE THE RISK OF CYBERCRIME TO YOUR BUSINESS.](https://reader031.fdocuments.us/reader031/viewer/2022013004/56649e4e5503460f94b45547/html5/thumbnails/1.jpg)
FIVE STEPS TO REDUCE THE RISKOF CYBERCRIME TO YOUR BUSINESS
![Page 2: FIVE STEPS TO REDUCE THE RISK OF CYBERCRIME TO YOUR BUSINESS.](https://reader031.fdocuments.us/reader031/viewer/2022013004/56649e4e5503460f94b45547/html5/thumbnails/2.jpg)
“The world is changing, and so too is the threat landscape. SMB to Large Enterprise are being targeted in unprecedented numbers.”
Target Breach
56%
200k
5M
Increase of Attacks in 2014
Chick-fil-A Credit Cards
SECURITY AND THE COST OF INTRUSION
![Page 3: FIVE STEPS TO REDUCE THE RISK OF CYBERCRIME TO YOUR BUSINESS.](https://reader031.fdocuments.us/reader031/viewer/2022013004/56649e4e5503460f94b45547/html5/thumbnails/3.jpg)
TYPES OF CYBER ATTACKS
![Page 4: FIVE STEPS TO REDUCE THE RISK OF CYBERCRIME TO YOUR BUSINESS.](https://reader031.fdocuments.us/reader031/viewer/2022013004/56649e4e5503460f94b45547/html5/thumbnails/4.jpg)
DO BUSINESSES REALLY FAIL AFTER A CYBER ATTACK?
60% of all targeted cyber attacks were directed at
Enterprise
80% of Cyber Attacks resulted in PCI Compliance
Fines
60% of Enterprise organizations see a 40% short
term loss in revenue
![Page 5: FIVE STEPS TO REDUCE THE RISK OF CYBERCRIME TO YOUR BUSINESS.](https://reader031.fdocuments.us/reader031/viewer/2022013004/56649e4e5503460f94b45547/html5/thumbnails/5.jpg)
WHAT CAN BE DONE TO MITIGATE THE RISK OF CYBERCRIME TO MY
BUSINESS?
![Page 6: FIVE STEPS TO REDUCE THE RISK OF CYBERCRIME TO YOUR BUSINESS.](https://reader031.fdocuments.us/reader031/viewer/2022013004/56649e4e5503460f94b45547/html5/thumbnails/6.jpg)
STEPS TO HELP YOU SECURE YOUR BUSINESS
1) Firewall Theory2) Use stronger authentication 3) Diversify your network4) Compliance audit5) Educate your users
![Page 7: FIVE STEPS TO REDUCE THE RISK OF CYBERCRIME TO YOUR BUSINESS.](https://reader031.fdocuments.us/reader031/viewer/2022013004/56649e4e5503460f94b45547/html5/thumbnails/7.jpg)
TASK #1 FIREWALL THEORY !
Firewall all ingress and egress points.
Limit incoming and outgoing traffic.
Limit BYOD devices.
Take a defensive strategy.
Audit users monthly.
![Page 8: FIVE STEPS TO REDUCE THE RISK OF CYBERCRIME TO YOUR BUSINESS.](https://reader031.fdocuments.us/reader031/viewer/2022013004/56649e4e5503460f94b45547/html5/thumbnails/8.jpg)
SAMPLE FIREWALL CONFIGURATION
![Page 9: FIVE STEPS TO REDUCE THE RISK OF CYBERCRIME TO YOUR BUSINESS.](https://reader031.fdocuments.us/reader031/viewer/2022013004/56649e4e5503460f94b45547/html5/thumbnails/9.jpg)
KNOWING YOUR SYSTEMS IS CRITICAL FOR MAINTAINING A REASONABLE
DEGREE OF IT SECURITY
If you don’t have a CSO, get one and have them report to the CEO.
![Page 10: FIVE STEPS TO REDUCE THE RISK OF CYBERCRIME TO YOUR BUSINESS.](https://reader031.fdocuments.us/reader031/viewer/2022013004/56649e4e5503460f94b45547/html5/thumbnails/10.jpg)
TASK #2: USE STRONGER AUTHENTICATION
Validating identities remains the key factor in security. Single Factor vs Multi Factor.
Use random key generators.
Establish multi-factor authentication for VPN and personal devices
Change Password in 8 week intervals
![Page 11: FIVE STEPS TO REDUCE THE RISK OF CYBERCRIME TO YOUR BUSINESS.](https://reader031.fdocuments.us/reader031/viewer/2022013004/56649e4e5503460f94b45547/html5/thumbnails/11.jpg)
TASK #3: DIVERSIFY YOUR NETWORK
Making your account credentials dynamic.
Lock up your WIFI Access points.
Limit access to certain data.
Allow access to specific parts of your network.
Disable USB access and enable Cloud storage.
![Page 12: FIVE STEPS TO REDUCE THE RISK OF CYBERCRIME TO YOUR BUSINESS.](https://reader031.fdocuments.us/reader031/viewer/2022013004/56649e4e5503460f94b45547/html5/thumbnails/12.jpg)
TASK #4: COMPLIANCE AUDIT
Are you PCI Compliant and do you handle financial transaction's?
Check for how many users are on your network.Semi Annual on-site assessment and quarterly off site scans.
Check records against PCI compliance standards.
Enable stricter access protocols for access.
.
![Page 13: FIVE STEPS TO REDUCE THE RISK OF CYBERCRIME TO YOUR BUSINESS.](https://reader031.fdocuments.us/reader031/viewer/2022013004/56649e4e5503460f94b45547/html5/thumbnails/13.jpg)
TASK #5: EDUCATE YOUR USERS
Educate your employees on Cyber Crime.
Make sure your employees close the bank vault.
Don’t allow installation of programs on office computers.
Safeguards are meant to support.
![Page 14: FIVE STEPS TO REDUCE THE RISK OF CYBERCRIME TO YOUR BUSINESS.](https://reader031.fdocuments.us/reader031/viewer/2022013004/56649e4e5503460f94b45547/html5/thumbnails/14.jpg)
PCI COMPLIANCE FINES
![Page 15: FIVE STEPS TO REDUCE THE RISK OF CYBERCRIME TO YOUR BUSINESS.](https://reader031.fdocuments.us/reader031/viewer/2022013004/56649e4e5503460f94b45547/html5/thumbnails/15.jpg)
BREACH CONSEQUENCES
Cardholder Breaches can result in the following losses for a merchant.
• $50-$90 fine per cardholder data compromised
• Suspension of credit card acceptance by a merchant’s credit card account provider
• Possible civil litigation from breached customers
• Loss of customer trust which effects future sales
![Page 16: FIVE STEPS TO REDUCE THE RISK OF CYBERCRIME TO YOUR BUSINESS.](https://reader031.fdocuments.us/reader031/viewer/2022013004/56649e4e5503460f94b45547/html5/thumbnails/16.jpg)
CONTACT INFORMATION
Sherman Crancer949-680-6671