Protecting Your Business
-
Upload
all-covered -
Category
Business
-
view
43 -
download
1
Transcript of Protecting Your Business
1
PROTECTING YOUR BUSINESS
All Covered Seminar
2
Today’s Presenter:
ABOUT ALL COVERED
Tim Coker, GCFE, CHP, CSCS Information Security Practice Manager
Over twenty years of experience in network and systems administration, engineering, security, digital
forensics, technical consulting, and design & management. Currently directing all security program
management, compliance, and security services for clients and internally for All Covered.
• All Covered – IT services from Konica Minolta
• Established in 1997
• Headquartered in Foster City, California
• Offices in over 25 cities in the United States
• Over 800 employees with approximately 600 engineers with industry certifications
3
IT Security Challenges:
PROTECTING YOUR BUSINESS
Not Having a Plan
Malware / Spyware
Data Loss / Disasters
4
IS YOUR BUSINESS AT RISK?
Without internal security and data recovery precautions, businesses
put revenue, reputation, compliance and innovation at huge risk…
Revenue
Reputation
Compliance
Innovation
5
DON’T BE A TARGET!
The Target data breach affected 40 million debit and credit cards
and 70 million customer records.
The Target breach incident went
unnoticed for almost a month!
6
SECURITY & YOUR BUSINESS
You don’t need to be a company the size of Target to be impacted
by a security breach…
“In 2014, 40% of small and mid-size
businesses that manage their own
security will have their network
accessed by a hacker, and more
than 50% won’t even know they
were attacked.”
7
COMMON SECURITY CHALLENGES
Going it alone can be very demanding…
IT RESPONSIBILITIES:
• End User Support
• Messaging Protection
• Website Security
• Web Content Filtering
• Virus Definitions
• Patching
• Backup and Recovery
• Mobile Devices and BYOD
• Compliance Management
8
WHY BUSINESSES MIGHT NEED ASSISTANCE
• Installing firewalls and antivirus on your PCs is
not enough…cyber attacks can still get through
and go unnoticed.
• Security responsibilities often fall to
IT generalists who are also tasked with
managing servers and other applications.
• Many organizations lack the SKILLS, TIME,
RESOURCES and EXPERTISE to properly
deploy and maintain the technological side
of IT security.
9
TYPES OF SECURITY THREATS
Criminals use a number of tactics to gain access to your
data. Among the most common tactics are:
• Malware
• Spyware
• Adware
• Phishing
• Data Theft
• Ransomware
• Viruses
• Password Hacking
• Vulnerability Scanners
• Packet Sniffers
And don’t forget about
Insider Activity
10
ALL COVERED SECURITY SERVICES
All Covered will secure client environments using the following
‘All Covered Care’ services:
MESSAGING PROTECTION
• Email Antivirus
• Spam Filtering
• Email Continuity
• Email Encryption
• Phishing Protection
ENDPOINT PROTECTION
• Managing Antivirus
• Managed Malware Protection
• DNS Filtering
• Web Content Filtering
PATCHING
• Managed Microsoft Patching
VULNERABILITY MANAGEMENT
• Managed Vulnerability Scan Service
11
SUCCESS STORIES – SECURITY Recurring Virus and Malware Infections
Location: Atlanta
Established: 1998
Description: Over 150
employees and 4 offices in the
Atlanta area
ACCOUNTING FIRM
PROBLEM:
• Multiple virus and malware infections introduced via phishing emails and malicious links
• Various servers and workstations infected and re-infected over several months
• Several hours to resolve each time
• Email, file storage, business applications where impacted over the various infections
SOLUTION:
• Deployed Email Spam Filtering and Antivirus
• Deployed Malware prevention
• Deployed DNS filtering
BENEFITS:
• Reduced the reoccurrence of virus and
malware infections
• Improved employee confidence in IT systems
• Improved employee productivity
12
SUCCESS STORIES – SECURITY Vulnerability Scanning
Healthcare Provider
PROBLEM:
• Required to have periodic vulnerability scans to
meet HIPAA compliance
• Client was looking for a managed solution as they
did not have internal expertise to deploy and
manage an on-premise solution
• Out of compliance without this solution
SOLUTION:
• Deployed Managed Vulnerability Scan Service
BENEFITS:
• Provides automated monthly vulnerability scans
and reports
• Continues to help client discover and remediate new
vulnerabilities in the environment
• Helps client meet compliance requirements
Location: San Jose, CA
Established: 1989
Description: Small
provider with 2 offices
and 20 employees
13
ADDITIONAL THREATS TO CONSIDER
Unfortunately, threats to your business are not only security
breaches and cyber attacks; your business can also fall victim
to…DATA LOSS.
?
14
WHAT IF YOU LOST YOUR DATA?
Do you have a data backup system in place?
If your entire building burned down or all of your servers
crashed, would your business be able to recover?
15
TYPES OF DATA LOSS THREATS
• Fires
• Floods
• Earthquakes
• Hurricanes
• Tornadoes
• Data Corruption
• Hardware / System Malfunction
• Software Corruption
• Human Error
• Brownouts
• Theft
16
DATA LOSS STATISTICS
Every week, 140,000 hard drives crash in the United States and
31% of PC users have lost all of their files due to events beyond
their control.
17
DATA BACKUP AND RECOVERY SERVICES
All Covered will provide protection of client data via the following
‘All Covered Care’ services:
MANAGED BACKUP AND RECOVERY
• Physical Servers
• Virtual Servers
• Server Files
• PCs and Laptops
EMAIL PROTECTION
• Archiving
CLOUD SERVICES
• Cloud Assessments
• Cloud Hosting
18
SUCCESS STORIES – DATA BACKUP Disaster Recovery
Greater Des Moines Partnership
PROBLEM:
• Fire in an adjacent building
• Smoke and water damage to their systems
SOLUTION:
• All Covered Backup for Servers
• With Business Continuity in the Cloud
BENEFITS:
• Servers damaged by water and smoke replaced by
virtual cloud servers in under 2 hours
• Access to building was lost, but full access to systems
and data in the cloud was uncompromised
Location: Des Moines, Iowa
Established: 1888
Description:
• Community development
organization servicing
central Iowa
• 21 affiliate chambers
of commerce
• 5,000 business members
19
SUCCESS STORIES – SECURITY & DISASTER RECOVERY Email Protection and Disaster Recovery
Location: Chicago, IL
Established: 1992
Description: Over 100
employees and 3 offices in the
Chicago area
Software Company
PROBLEM:
• Ransomware introduced to IT environment via phishing email
• Accounting and Financial systems were encrypted
• Client had not confirmed backup for weeks
• Data stored on Accounting laptop was not part of backup
• Client had to pay a ransom to decrypt files
• 4 Days to resolve
• Billing, Timesheets, Payroll, Email all impacted
SOLUTION:
• Deployed All Covered Email Protection Services
• Deployed All Covered backup for servers
• Deployed All Covered backup for workstations
BENEFITS:
• Email is now protected with antispam, antivirus and phishing protection
• Automated server backups with offsite copy
• Server backups managed and monitored from the
All Covered NOC (Network Operations Center)
• Data on laptops is now backed up to the cloud
20
ADDITIONAL SECURITY MEASURES:
CLOUD SERVICES
Looking for an extra layer of security? Consider the cloud!
ALL COVERED CLOUD SERVICES INCLUDE:
• Fully managed virtual servers located in the U.S.
• Cloud backup and disaster recovery
• Cloud hosted exchange
• Cloud business continuity
BENEFITS AND FEATURES:
• 24x7 availability and reliability
• Remote access from any location
• Predictable monthly costs
• Ability to quickly scale up or down
Cloud ROI Return on Investment Curve for Cloud Solutions
21
SUCCESS STORIES – CLOUD Risk Mitigation & Regulatory Compliance
Clarkston State Bank
PROBLEM:
• Locations with aging infrastructure, intermittent
internet and unreliable power caused major outage.
All 6 branches lost access to the network and
internet for several days.
SOLUTION:
• All Covered Cloud Servers and co-location
BENEFITS:
• Eliminated need to purchase new servers for
secondary locations
• Reliable power to all centrally located servers
while removing need to purchase backup power
• Achieved compliance conditions
Location: Clarkston, Michigan
Established: 1911
Description: Community bank
with 6 branches in Oakland
County, Michigan. Dedicated to
meeting the financial needs of
local residents and businesses.
22
ALL COVERED CAN HELP
• Step 1 – Plan: Build a comprehensive
security plan that includes written policies
for BYOD, malware and virus protection,
and data security.
• Step 2 – Secure: Put the right
safeguards into action including
email protection, endpoint protection,
network monitoring, patching and
vulnerability management.
• Step 3 – Protect: Implement ongoing
managed protection of data, on PCs and
servers (both on-site and in the cloud) for
quick and reliable recovery.
22
23
STEPS YOU CAN TAKE NOW
SECURITY MANAGEMENT
• Deploy Centralized Managed Endpoint Security
• Institute automated patch management
• Create and enforce IT and Security policies across all layers
DATA ACCESS AND PROTECTION
• Understand where your data resides
• Identify data that needs to be backed up regularly
• Make sure you have copies off-site
• Secure the entire perimeter of your network
• Institute secure remote access
USERS
• Educate employees
• Communicate policies and procedures
• Consider Web Content Filtering
CONSIDER OUTSOURCING
24
NETWORK AND SECURITY ANALYSIS OFFER
STEPS FOR MOVING FORWARD
• Contact your local sales rep or call 866.446.1133
• Authorization form signed and submitted
• Analysis scan performed on your network
• Review Network Risk Report with an
All Covered Solutions Architect
NETWORK ANALYSIS RISK REPORT INCLUDES:
• List of analysis tasks performed
• Risk score from 1-100
• Issues Summary with recommended solutions
• Asset Summary
• User Summary
**Complimentary Network and Security Analysis ($1,000 Value)
Network
and
Security Analysis
View Sample Report: http://allcovered.com/security/report
25
QUESTIONS?
To speak with an All Covered
Services Consultant, call:
866-446-1133
Or visit:
http://www.allcovered.com/
26
APPENDIX
“40% of small to medium businesses who manage their own
network and use the Internet for more than e-mail will have their
network accessed by a hacker and more than 50% won’t even
know they were attacked” (Source: Gartner Group).
“Every week, 140,000 hard drives crash in the United States and
31% of PC users have lost all of their files due to events beyond
their control” (Source: Mozy Online Backup).