Will Your Business Get Hacked? - #HumberBizWeek: 08.06.2016 @ Smailes Goldie
-
Upload
hbp-systems-ltd -
Category
Internet
-
view
87 -
download
0
Transcript of Will Your Business Get Hacked? - #HumberBizWeek: 08.06.2016 @ Smailes Goldie
1
2
Large Companies
81%£600k - £1.5m
Small Companies
60%£65k - £115k
Large Companies
90%£1.46m - £3.14m
Small Companies
75%£75k - £311k
3
2016: The year of the bigger problems?
4
4,000 data breaches in 3 yearsComputing.co.uk
5
Over 170 law firms investigated in 1 year
Computing.co.uk
6
ALL major UK banks and lenders reported data breaches
Computing.co.uk
7
¾ of customers would reconsider using a company
Computing.co.uk
8
Who’s to blame?
9
159,959 accounts compromisedComputing.co.uk
Nearly 300,000 customers lost
10
Total cost £40- £45 million Computing.co.uk
£15 million lost in trading value
11
BT picked up 40% of unhappy customers
Computing.co.uk
12
5.5 million things connected every day
1
20
15
10
5
Billi
ons
2001 20202014
1.2B
20.8B
6.4B
2016
13
“For many years, we have used encryption to protect our customers’ personal data because we believe it’s the only way to keep their information safe.”Tim Cook, CEO of Apple
14
Up to 35% would Sell company information
Computing.co.uk
15
Passwords…
1. 1234562. password3. 123456784. qwerty5. 12345
6. 1234567897. football8. 12349. 123456710. baseball
11. welcome 12. 123456789013. abc12314. 11111115. 1qaz2wzx
16. dragon17. master18. monkey19. letmein20. login
16
“Two things are infinite: The universe and human stupidity, and I’m not so sure about the former.”
- Albert Einstein
17
Trends
Security Breaches on the rise
18
Firewall
Web
Wireless
Reducing the threat - Protect
Endpoint
Encryption
Server
MobileInsight & Analysis
Better Protection
Intelligence Sharing
18
19
IT Control
Configuration
Visibility
19
Reducing the threat - Control
20
Reducing the threat - Educate
Passphrases not passwords
Think before you click
Verify the call
21
Layered defense & automation
Analytics
Next-Gen Firewall
Wireless
Web
Disk Encryption
UTM
File Encryption
Endpoint
Next-Gen Endpoint
Mobile
Server
Cloud Intelligence
Centralized Policy Management
22
Will your business get hacked?
8 June 2016
23
rollits.com
How can you help to protect
yourself against your weakest
link?
Your Employees!
24
rollits.com
Cybercriminals use social Engineering
No longer kids in their bedroom
This is serious organised crime
25
rollits.com
26
rollits.com
Employers have a duty to train employees• Tell them○ Be vigilant, if something looks strange be cautious○ Be aware of Spoofing○ Are you expecting it?○ Would you expect more/less detail?○ Do not click the link in an unexpected email○ Browse on safer devices if possible (such as tablets)
27
rollits.com
At home …• Keep anti-virus software up to
date• Ensure your firewall is turned
on and up to date• Keep your devices operating
system and Apps/Programs up to date
• Browse using a tablet (only download apps from official app stores (Google/Apple)
• Be cautious!
28
rollits.com
Browsing at work because we keep security system up to date can be not safe. Key in web site addresses, don’t click
on links to them
29
rollits.com
Criminals gain trust of employees
Trust is power to the criminals
Everyone from receptionist to MD/Chairman is duped
30
rollits.com
What if an employee causes a security breach?What action can be taken?• Misconduct?• Incompetence?
31
rollits.com
What loss has been suffered?
Carry out a proper investigation to establish the facts.
Look at the training record.
Apply appropriate sanction following a disciplinary/ capability hearing with employee.
32
rollits.com
I Quit!!
33
rollits.com
Employee walks out of the door with your most valuable assets:Customer lists / supplier lists / pricing structure / business strategy /
trade secrets / product informationWhat can an employer do to protect itself?
34
rollits.com
Look at disciplinary rules and procedure whilst in employment
Look to the contract if an employee quitsPost-termination restrictions
Must be drafted correctly“No wider than necessary”
“Legitimate business interest to protect”
Take legal advice before drafting
35
rollits.com
No contract?
More difficult
Cannot prevent competing without express
contractual provisions
Cannot prevent solicitation
Employee is free to use employer’s information
36
rollits.com
Policies & proceduresForwarding to home email
Printing/copyingLeaving things in cars/bags/trains
Be clear that all of the above are misconduct
37
rollits.com
Be prepared and you can strengthen your weakest link!
38
rollits.com
Any Questions?