SlideShare une entreprise Scribd logo
1  sur  61
Welcome to the Q4
Kick-off Lunch & Learn
About
Today, Lenovo is a
1. US$39billion personal technology company.
2. A global Fortune 500 company.
3. Founded in China as Legend Holdings Co. in 1981
4. Changed Name to Lenovo in 1988 and acquired PC Division from IBM.
5. 54,000+ employees.
6. 60+ countries.
7. Worlds Largest PC Maker.
8. 4th Largest Smartphone Company.
9. Serving customers in more than 160 countries.
10. Headquartered in Hong Kong with largest operational centers in Beijing and
Morrisville, NC.
David Coady
Channel Account Manager
David Coady is one of Lenovo's two Channel Account Managers here in Texas. He is in his first year with
Lenovo but has been involved in technology channel sales in North Texas for the last twelve years. He is
the main point of contact for Sys Logic for all Lenovo products and is supported by product specialists. He
lives in Denton, TX, with his wife Julie and they are the parents of three boys.
Yoga Laptop
AMERICA'S BEST SELLING
CONVERTIBLE 2-IN-1 PC
 Processor - 4th Generation Intel® Core™ Processors
 Operating System - Windows 8.1 64-bit Operating System
 Display - 12.5” FHD Display Rotates 360°
 Business Power - Tackle Business Your Way with Four Usage Modes
 Ultrabook - Legendary THINK Reliability & Business Features
X1 Carbon
PROFESSIONAL REDEFINED
 Processor - 4th Generation Intel® Core™ Processors
 Operating System - Windows 8.1 64-bit Operating System
 Display - Thin & Light Carbon with Carbon Fiber Durability
 Keyboard - Adaptive Keyboard That Changes with Apps
 Battery Charge - RapidCharge Battery - 80% Charge Within an Hour
TD/RD Servers
BALANCED DESIGN
OUSTANDING EFFICIENCY
 Processor - Intel® Xeon™ E3 Series Processors
 Operating System - Windows Server 2012 R2 Platform
 Business Power - Highly-Efficient, Dense, 1U, Rack Server
 Professional - Right Blend of Performance, Memory & I/O
 Professional - Perfect for Mainstream & Virtualized Workloads
ThinkServer SA120 Direct Attached Storage
ThinkServer SA120
ThinkServer SA120 provides versatile, high density direct
attached storage that’s ideal for small businesses,
distributed enterprises or datacenters.
Tony DeGonia
Director of Marketing
Tony is the Director of Marketing for Sys Logic Technology Services. Tony has been in the IT Industry for
the last 20 years 10 of which have been in East Texas with companies he has owned and as the VP and
General Manager of a major competitor before leaving in June 2013. Tony lives in Wills Point with his
wonderful wife Cayse and their three children.
The Top 3 Things To
Do To Secure Your
Small Business
Network.
Hacker News
cy-ber-at-tack
[sahy-ber-uh-tak] - noun
an attempt to damage, disrupt, or gain unauthorized access to a
computer, computer system, or electronic communications network.
Shellshock is the latest online threat sent to
disrupt us. It's a loophole that affects a piece of
software called Bash found mainly in Linux® or
Unix® operating systems as well as the Apple®
MacOS® X. And while the Shellshock bug is more
about web servers and other Internet devices,
those can now be turned against your own,
more personal devices.
What is Shellshock?
Active Threats
Active Threats
The Heartbleed Bug is a serious vulnerability in the popular
OpenSSL cryptographic software library. The Heartbleed bug
allows anyone on the Internet to read the memory of the
systems protected by the vulnerable versions of the OpenSSL
software. This allows attackers to eavesdrop on
communications, steal data directly from the services and
users and to impersonate services and users.
Hackers Can Access Admin
Panel of Some Netgear and
Linksys Routers
Hacker Headlines
January 2014
Home Depot Confirms Hack;
Cyber Attack Could Affect
Customer Credit Cards
September 2014
Hacker Headlines
More retailers reportedly hit
by cyber attacks – Target,
Neiman Marcus
December 2013
Hacker Headlines
2014 Cyber Attacks
Cyber Attack Statistics
For law enforcement agencies, the IC3
serves as a conduit to receive Internet-
related complaints, to conduct research
related to them and to develop analytical
reports for state, local, federal, tribal or
international law enforcement and
regulatory agencies.
FBI – IC3
In 2013, the IC3 received 262,813
consumer complaints with an adjusted
dollar loss of $781,841,6111, which is a
48.8 percent increase in reported losses
since 2012 ($581,441,110).
FBI – IC3
75064
124449
207492
231493
207492 206884
275284
336655
303809
314246
289874
262813
0
50000
100000
150000
200000
250000
300000
350000
400000
2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013
Yearly Totals – Cyber Attack
Complaints
262,813
119,457
$781,841,611
Total Losses - 2013
Total Number of Complaints Filed.
Number of Complaints with a Monetary Loss.
Total Monetary Value of Complaints Filed.
Someone is Messing with Texas
1. California
2. Florida
3.Texas
4. New York
5. Pennsylvania
6. New Jersey
7. Illinois
8. Virginia
9. Ohio
10. Georgia
How Many People In This Audience
Feel They Take a Proactive Security
Approach To Their Small Business
Network Security?
Question?
Compliance
This is the scariest word in a business owners vocabulary
Compliance
3 Step Approach To Security
1.Active Security Approach
2.Active Maintenance Approach
3.Active Policy Approach
Active Security Approach
Active Security Approach
1. Firewall - Deploy Firewalls with MULTI-LAYERED PROTECTION on every external
network (internet) connection.
Web Blocker
spamBlocker
Reputation
Enabled
Defense
Packet
Filtering
Live Security
Intrusion
Prevention
Gateway
Anti-Virus
Data Loss
Prevention
APT Blocker
Application
Control
Active Security Approach
Active Security Approach
2. WiFi Security – WPA2 with AES Encryption. WEP IS DEAD.
Active Security Approach
3. Authentication – Auditable standards are met for all required compliances.
Active Security Approach
4. SSL - 256bit AES SSL Certificates MUST installed on all servers, firewalls, websites and
applications that will gather client PI (Personal Information).
Active Security Approach
5. Licensing - All software licensing MUST active and legally acquired. A large percentage of security breaches occur through
illegal or illegally licensed software. (Yes that includes Microsoft Software and Anti-Virus too).
1.888.NO.PIRACY
https://reporting.bsa.org
Rewards Paid
up to
$15,000,000
Active Security Approach
6. BC/DR – Business Continuity
and Disaster Recovery. Back It
Up So It Will Be There When
You Need It.
Active Security Approach
1. Resilience
2. Recovery
3. Contingency
Active Security Approach
Firewall - Deploy Firewalls with
MULTI-LAYERED PROTECTION on
every external network (internet)
connection.
WiFi Security - WPA with AES
Encryption. WEP IS DEAD.
Authentication – Auditable
standards are met for all required
compliances.
SSL - 256bit AES SSL Certificates
MUST installed on all servers,
firewalls, websites and applications
that will gather client PI (Personal
Information).
Licensing - All software licensing
MUST active and legally acquired.
A large percentage of security
breaches occur through illegal or
illegally licensed software. (Yes
that includes Microsoft Software
and Anti-Virus too).
BC/DR – Business Continuity and
Disaster Recovery. Back It Up So It
Will Be There When You Need It.
Active Security Approach
Active Maintenance Approach
Active Maintenance Approach
1. Updates – Every device in a SMB Network
requires updates and should be updated regularly
through a standardized update procedure that tests
the updates before deployment for both software
and firmware. NO UPDATES = BAD NEWS.
AUTOMATED UPDATES = CATASTROPHE.
Active Maintenance Approach
2. End-Points - (PCs, Servers, Tablets, Mobile
Devices) MUST have active, updated anti-virus,
anti-spyware and anti-malware software installed.
Active Maintenance Approach
3. Access and Permissions – Access and
Permissions Must be Set Per Compliance
Requirement and Reviewed Monthly to Ensure
That Only Necessary Permissions are Granted.
4. File Sharing – Open File Sharing is Out.
Securing File Sharing with Audit Trails is IN.
Think BOX, OneDrive and SharePoint.
Active Maintenance Approach
Active Maintenance Approach
5. Logging and Alerts – Every Device in the Network Creates
Logs and are Capable of Creating of Alerts about predefined
log types.
Updates – Every device in a SMB Network requires
updates and should be updated regularly through a
standardized update procedure that tests the
updates before deployment for both software and
firmware. NO UPDATES = BAD NEWS. AUTOMATED
UPDATES = CATASTROPHE.
End-Points - (PCs, Servers, Tablets, Mobile Devices)
MUST have active, updated anti-virus, anti-spyware
and anti-malware software installed.
Access and Permissions – Access and Permission
Rules Must be Reviewed Monthly to ensure past
that only necessary permissions are granted.
File Sharing – Open File Sharing is Out. Securing File
Sharing with Audit Trails is IN. Think BOX, OneDrive
and SharePoint.
Logging and Alerts – Every Device in the Network
Creates Logs and are Capable of Creating of Alerts
about predefined alert types.
Active Maintenance Approach
Active Policy Approach
Active Policy Approach
1. IT Policy is a NECESSITY.
2. Your Employees Do Not “Know
What The Right Thing Is”.
Active Policy Approach
3. Do Not Write Policy That Is
Unenforceable.
Active Policy Approach
4. Be Prepared to Enforce What
You Write.
Active Policy Approach
5. Make Sure Your Policy Covers
Your Compliance Needs.
Active Policy Approach
Active Policy Approach
IT Policy is a
NECESSITY.
Your Employees Do
Not “Know What
The Right Thing Is”.
Do Not Write Policy
That Is
Unenforceable.
Be Prepared to
Enforce What You
Write.
Make Sure Your
Policy Covers Your
Compliance Needs.
Does Your Computer
Company Make A
Difference?
We Do.
Conclusion.
www.syslogic-techsvc.com

Contenu connexe

Tendances

Best Practice For Public Sector Information Security And Compliance
Best  Practice For  Public  Sector    Information  Security And  ComplianceBest  Practice For  Public  Sector    Information  Security And  Compliance
Best Practice For Public Sector Information Security And Compliance
Oracle
 
IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019 IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019
Tonex
 
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
michaelbasoah
 
IoT, Security & the Path to a Solution
IoT, Security & the Path to a SolutionIoT, Security & the Path to a Solution
IoT, Security & the Path to a Solution
Dr Laurent Guiraud
 

Tendances (20)

DG_Corp_Brochure
DG_Corp_BrochureDG_Corp_Brochure
DG_Corp_Brochure
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective a
 
Cyber security event
Cyber security eventCyber security event
Cyber security event
 
Protecting your Organisation from the Internet of Evil Things
Protecting your Organisation from the Internet of Evil ThingsProtecting your Organisation from the Internet of Evil Things
Protecting your Organisation from the Internet of Evil Things
 
The importance of information security nowadays
The importance of information security nowadaysThe importance of information security nowadays
The importance of information security nowadays
 
Overview of Information Security & Privacy
Overview of Information Security & PrivacyOverview of Information Security & Privacy
Overview of Information Security & Privacy
 
Best Practice For Public Sector Information Security And Compliance
Best  Practice For  Public  Sector    Information  Security And  ComplianceBest  Practice For  Public  Sector    Information  Security And  Compliance
Best Practice For Public Sector Information Security And Compliance
 
IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019 IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019
 
Embracing iot in the enterprise
Embracing iot in the enterpriseEmbracing iot in the enterprise
Embracing iot in the enterprise
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot security
 
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
 
U S Embassy Event - Today’S Cyber Threats
U S  Embassy  Event - Today’S  Cyber  ThreatsU S  Embassy  Event - Today’S  Cyber  Threats
U S Embassy Event - Today’S Cyber Threats
 
IoT, Security & the Path to a Solution
IoT, Security & the Path to a SolutionIoT, Security & the Path to a Solution
IoT, Security & the Path to a Solution
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are Asking
 
Alpha & Omega's Managed Security
Alpha & Omega's Managed SecurityAlpha & Omega's Managed Security
Alpha & Omega's Managed Security
 
The Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseThe Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's Enterprise
 
Attacking the cloud with social engineering
Attacking the cloud with social engineeringAttacking the cloud with social engineering
Attacking the cloud with social engineering
 
Information & Cyber Security Risk
Information & Cyber Security RiskInformation & Cyber Security Risk
Information & Cyber Security Risk
 
Technology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityTechnology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT Security
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and Tablets
 

En vedette

Microbiology Virology book MBBS
Microbiology Virology book MBBSMicrobiology Virology book MBBS
Microbiology Virology book MBBS
Raj Twix
 
Gync additional krok 2
Gync additional krok 2Gync additional krok 2
Gync additional krok 2
Raj Twix
 
Pediatric additional krok 2
Pediatric additional krok 2Pediatric additional krok 2
Pediatric additional krok 2
Raj Twix
 
Flip board in education by Shaikhah Almutairi
Flip board in education by Shaikhah AlmutairiFlip board in education by Shaikhah Almutairi
Flip board in education by Shaikhah Almutairi
shaikhah1404
 
Corporate and intraprenurial culture (corporate vs intrapreneurial culture)
Corporate and intraprenurial culture (corporate vs intrapreneurial culture)Corporate and intraprenurial culture (corporate vs intrapreneurial culture)
Corporate and intraprenurial culture (corporate vs intrapreneurial culture)
Suleyman Ally
 
Therapeutic 271 krok 2
Therapeutic 271 krok 2Therapeutic 271 krok 2
Therapeutic 271 krok 2
Raj Twix
 
Therapeutic 176 additional krok 2
Therapeutic 176 additional krok 2Therapeutic 176 additional krok 2
Therapeutic 176 additional krok 2
Raj Twix
 

En vedette (20)

Wales
WalesWales
Wales
 
Why Social Media?
Why Social Media?Why Social Media?
Why Social Media?
 
ETS Services Outline
ETS Services OutlineETS Services Outline
ETS Services Outline
 
Research ethics
Research ethicsResearch ethics
Research ethics
 
Microbiology Virology book MBBS
Microbiology Virology book MBBSMicrobiology Virology book MBBS
Microbiology Virology book MBBS
 
Hematology-urgent condition book internal medicine 5th year BSMU
Hematology-urgent condition book internal medicine 5th year BSMUHematology-urgent condition book internal medicine 5th year BSMU
Hematology-urgent condition book internal medicine 5th year BSMU
 
Occupational book internal medicine 5th year BSMU
Occupational book internal medicine 5th year BSMUOccupational book internal medicine 5th year BSMU
Occupational book internal medicine 5th year BSMU
 
Book 2011 krok 2
Book 2011 krok 2Book 2011 krok 2
Book 2011 krok 2
 
Gync additional krok 2
Gync additional krok 2Gync additional krok 2
Gync additional krok 2
 
Booklet 2015 krok 2
Booklet 2015 krok 2Booklet 2015 krok 2
Booklet 2015 krok 2
 
Pediatric additional krok 2
Pediatric additional krok 2Pediatric additional krok 2
Pediatric additional krok 2
 
Flip board in education by Shaikhah Almutairi
Flip board in education by Shaikhah AlmutairiFlip board in education by Shaikhah Almutairi
Flip board in education by Shaikhah Almutairi
 
Book 2008 krok 2
Book 2008 krok 2Book 2008 krok 2
Book 2008 krok 2
 
Gynac 170mcq krok 2
Gynac 170mcq krok 2Gynac 170mcq krok 2
Gynac 170mcq krok 2
 
Book 2009 krok 2
Book 2009 krok 2Book 2009 krok 2
Book 2009 krok 2
 
Corporate and intraprenurial culture (corporate vs intrapreneurial culture)
Corporate and intraprenurial culture (corporate vs intrapreneurial culture)Corporate and intraprenurial culture (corporate vs intrapreneurial culture)
Corporate and intraprenurial culture (corporate vs intrapreneurial culture)
 
Therapeutic 271 krok 2
Therapeutic 271 krok 2Therapeutic 271 krok 2
Therapeutic 271 krok 2
 
How to influence a partner during negotiation, using SPIN principle. Negotiat...
How to influence a partner during negotiation, using SPIN principle. Negotiat...How to influence a partner during negotiation, using SPIN principle. Negotiat...
How to influence a partner during negotiation, using SPIN principle. Negotiat...
 
Book 2006 krok-2
Book 2006 krok-2Book 2006 krok-2
Book 2006 krok-2
 
Therapeutic 176 additional krok 2
Therapeutic 176 additional krok 2Therapeutic 176 additional krok 2
Therapeutic 176 additional krok 2
 

Similaire à Lenovo Presentation for Sys Logic Lunch and Learn

Resume-Khalid_Kamal-SA-2015
Resume-Khalid_Kamal-SA-2015Resume-Khalid_Kamal-SA-2015
Resume-Khalid_Kamal-SA-2015
Khalid Kamal
 

Similaire à Lenovo Presentation for Sys Logic Lunch and Learn (20)

Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
 
Brian-Vaughn
Brian-VaughnBrian-Vaughn
Brian-Vaughn
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security Seminar
 
Are you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistAre you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security Checklist
 
Are you ready for the next attack? reviewing the sp security checklist (apnic...
Are you ready for the next attack? reviewing the sp security checklist (apnic...Are you ready for the next attack? reviewing the sp security checklist (apnic...
Are you ready for the next attack? reviewing the sp security checklist (apnic...
 
Supply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoTSupply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoT
 
Resume-Khalid_Kamal-SA-2015
Resume-Khalid_Kamal-SA-2015Resume-Khalid_Kamal-SA-2015
Resume-Khalid_Kamal-SA-2015
 
Network Diagram of a company ABCD Roshan basnet it 29
Network Diagram of a company ABCD Roshan basnet it 29Network Diagram of a company ABCD Roshan basnet it 29
Network Diagram of a company ABCD Roshan basnet it 29
 
Nvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - finalNvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - final
 
Behind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced ThreatsBehind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced Threats
 
21 Cybersecurity Companies You Need to Know.pptx
21 Cybersecurity Companies You Need to Know.pptx21 Cybersecurity Companies You Need to Know.pptx
21 Cybersecurity Companies You Need to Know.pptx
 
Cyb 610 Inspiring Innovation--tutorialrank.com
Cyb 610 Inspiring Innovation--tutorialrank.comCyb 610 Inspiring Innovation--tutorialrank.com
Cyb 610 Inspiring Innovation--tutorialrank.com
 
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
 Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud... Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009
 
10 Security issues facing NZ Enterprises
10 Security issues facing NZ Enterprises10 Security issues facing NZ Enterprises
10 Security issues facing NZ Enterprises
 
The top 5 basics fundamentals of network security cyberhunter solutions
The top 5 basics fundamentals of network security    cyberhunter solutionsThe top 5 basics fundamentals of network security    cyberhunter solutions
The top 5 basics fundamentals of network security cyberhunter solutions
 
VoIP Security 101 what you need to know
VoIP Security 101   what you need to knowVoIP Security 101   what you need to know
VoIP Security 101 what you need to know
 
Presentacion Palo Alto Networks
Presentacion Palo Alto NetworksPresentacion Palo Alto Networks
Presentacion Palo Alto Networks
 
Project
ProjectProject
Project
 

Plus de Tony DeGonia (LION) (8)

Jimbob's Towing and Wrecker Services Presentation
Jimbob's Towing and Wrecker Services PresentationJimbob's Towing and Wrecker Services Presentation
Jimbob's Towing and Wrecker Services Presentation
 
DNA Cloud Backup
DNA Cloud BackupDNA Cloud Backup
DNA Cloud Backup
 
DNA Cloud Office
DNA Cloud OfficeDNA Cloud Office
DNA Cloud Office
 
ETS Sales Process Training
ETS Sales Process TrainingETS Sales Process Training
ETS Sales Process Training
 
Who is ETS?
Who is ETS?Who is ETS?
Who is ETS?
 
Partner program presentation
Partner program presentationPartner program presentation
Partner program presentation
 
Chamber Technology Committee Presentation
Chamber Technology Committee PresentationChamber Technology Committee Presentation
Chamber Technology Committee Presentation
 
Tyler Technology Expo
Tyler Technology ExpoTyler Technology Expo
Tyler Technology Expo
 

Dernier

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Dernier (20)

DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 

Lenovo Presentation for Sys Logic Lunch and Learn

  • 1. Welcome to the Q4 Kick-off Lunch & Learn
  • 2. About Today, Lenovo is a 1. US$39billion personal technology company. 2. A global Fortune 500 company. 3. Founded in China as Legend Holdings Co. in 1981 4. Changed Name to Lenovo in 1988 and acquired PC Division from IBM. 5. 54,000+ employees. 6. 60+ countries. 7. Worlds Largest PC Maker. 8. 4th Largest Smartphone Company. 9. Serving customers in more than 160 countries. 10. Headquartered in Hong Kong with largest operational centers in Beijing and Morrisville, NC.
  • 3. David Coady Channel Account Manager David Coady is one of Lenovo's two Channel Account Managers here in Texas. He is in his first year with Lenovo but has been involved in technology channel sales in North Texas for the last twelve years. He is the main point of contact for Sys Logic for all Lenovo products and is supported by product specialists. He lives in Denton, TX, with his wife Julie and they are the parents of three boys.
  • 4.
  • 5. Yoga Laptop AMERICA'S BEST SELLING CONVERTIBLE 2-IN-1 PC  Processor - 4th Generation Intel® Core™ Processors  Operating System - Windows 8.1 64-bit Operating System  Display - 12.5” FHD Display Rotates 360°  Business Power - Tackle Business Your Way with Four Usage Modes  Ultrabook - Legendary THINK Reliability & Business Features
  • 6.
  • 7. X1 Carbon PROFESSIONAL REDEFINED  Processor - 4th Generation Intel® Core™ Processors  Operating System - Windows 8.1 64-bit Operating System  Display - Thin & Light Carbon with Carbon Fiber Durability  Keyboard - Adaptive Keyboard That Changes with Apps  Battery Charge - RapidCharge Battery - 80% Charge Within an Hour
  • 8.
  • 9. TD/RD Servers BALANCED DESIGN OUSTANDING EFFICIENCY  Processor - Intel® Xeon™ E3 Series Processors  Operating System - Windows Server 2012 R2 Platform  Business Power - Highly-Efficient, Dense, 1U, Rack Server  Professional - Right Blend of Performance, Memory & I/O  Professional - Perfect for Mainstream & Virtualized Workloads
  • 10.
  • 11. ThinkServer SA120 Direct Attached Storage ThinkServer SA120 ThinkServer SA120 provides versatile, high density direct attached storage that’s ideal for small businesses, distributed enterprises or datacenters.
  • 12.
  • 13. Tony DeGonia Director of Marketing Tony is the Director of Marketing for Sys Logic Technology Services. Tony has been in the IT Industry for the last 20 years 10 of which have been in East Texas with companies he has owned and as the VP and General Manager of a major competitor before leaving in June 2013. Tony lives in Wills Point with his wonderful wife Cayse and their three children.
  • 14. The Top 3 Things To Do To Secure Your Small Business Network.
  • 16. cy-ber-at-tack [sahy-ber-uh-tak] - noun an attempt to damage, disrupt, or gain unauthorized access to a computer, computer system, or electronic communications network.
  • 17. Shellshock is the latest online threat sent to disrupt us. It's a loophole that affects a piece of software called Bash found mainly in Linux® or Unix® operating systems as well as the Apple® MacOS® X. And while the Shellshock bug is more about web servers and other Internet devices, those can now be turned against your own, more personal devices. What is Shellshock? Active Threats
  • 18. Active Threats The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. The Heartbleed bug allows anyone on the Internet to read the memory of the systems protected by the vulnerable versions of the OpenSSL software. This allows attackers to eavesdrop on communications, steal data directly from the services and users and to impersonate services and users.
  • 19. Hackers Can Access Admin Panel of Some Netgear and Linksys Routers Hacker Headlines January 2014
  • 20. Home Depot Confirms Hack; Cyber Attack Could Affect Customer Credit Cards September 2014 Hacker Headlines
  • 21. More retailers reportedly hit by cyber attacks – Target, Neiman Marcus December 2013 Hacker Headlines
  • 24. For law enforcement agencies, the IC3 serves as a conduit to receive Internet- related complaints, to conduct research related to them and to develop analytical reports for state, local, federal, tribal or international law enforcement and regulatory agencies. FBI – IC3
  • 25. In 2013, the IC3 received 262,813 consumer complaints with an adjusted dollar loss of $781,841,6111, which is a 48.8 percent increase in reported losses since 2012 ($581,441,110). FBI – IC3
  • 27. 262,813 119,457 $781,841,611 Total Losses - 2013 Total Number of Complaints Filed. Number of Complaints with a Monetary Loss. Total Monetary Value of Complaints Filed.
  • 28. Someone is Messing with Texas 1. California 2. Florida 3.Texas 4. New York 5. Pennsylvania 6. New Jersey 7. Illinois 8. Virginia 9. Ohio 10. Georgia
  • 29. How Many People In This Audience Feel They Take a Proactive Security Approach To Their Small Business Network Security? Question?
  • 30. Compliance This is the scariest word in a business owners vocabulary
  • 32. 3 Step Approach To Security 1.Active Security Approach 2.Active Maintenance Approach 3.Active Policy Approach
  • 34. Active Security Approach 1. Firewall - Deploy Firewalls with MULTI-LAYERED PROTECTION on every external network (internet) connection. Web Blocker spamBlocker Reputation Enabled Defense Packet Filtering Live Security Intrusion Prevention Gateway Anti-Virus Data Loss Prevention APT Blocker Application Control
  • 36. Active Security Approach 2. WiFi Security – WPA2 with AES Encryption. WEP IS DEAD.
  • 37. Active Security Approach 3. Authentication – Auditable standards are met for all required compliances.
  • 38. Active Security Approach 4. SSL - 256bit AES SSL Certificates MUST installed on all servers, firewalls, websites and applications that will gather client PI (Personal Information).
  • 39. Active Security Approach 5. Licensing - All software licensing MUST active and legally acquired. A large percentage of security breaches occur through illegal or illegally licensed software. (Yes that includes Microsoft Software and Anti-Virus too). 1.888.NO.PIRACY https://reporting.bsa.org Rewards Paid up to $15,000,000
  • 40. Active Security Approach 6. BC/DR – Business Continuity and Disaster Recovery. Back It Up So It Will Be There When You Need It.
  • 41. Active Security Approach 1. Resilience 2. Recovery 3. Contingency
  • 42. Active Security Approach Firewall - Deploy Firewalls with MULTI-LAYERED PROTECTION on every external network (internet) connection. WiFi Security - WPA with AES Encryption. WEP IS DEAD. Authentication – Auditable standards are met for all required compliances. SSL - 256bit AES SSL Certificates MUST installed on all servers, firewalls, websites and applications that will gather client PI (Personal Information). Licensing - All software licensing MUST active and legally acquired. A large percentage of security breaches occur through illegal or illegally licensed software. (Yes that includes Microsoft Software and Anti-Virus too). BC/DR – Business Continuity and Disaster Recovery. Back It Up So It Will Be There When You Need It.
  • 45. Active Maintenance Approach 1. Updates – Every device in a SMB Network requires updates and should be updated regularly through a standardized update procedure that tests the updates before deployment for both software and firmware. NO UPDATES = BAD NEWS. AUTOMATED UPDATES = CATASTROPHE.
  • 46. Active Maintenance Approach 2. End-Points - (PCs, Servers, Tablets, Mobile Devices) MUST have active, updated anti-virus, anti-spyware and anti-malware software installed.
  • 47. Active Maintenance Approach 3. Access and Permissions – Access and Permissions Must be Set Per Compliance Requirement and Reviewed Monthly to Ensure That Only Necessary Permissions are Granted.
  • 48. 4. File Sharing – Open File Sharing is Out. Securing File Sharing with Audit Trails is IN. Think BOX, OneDrive and SharePoint. Active Maintenance Approach
  • 49. Active Maintenance Approach 5. Logging and Alerts – Every Device in the Network Creates Logs and are Capable of Creating of Alerts about predefined log types.
  • 50.
  • 51. Updates – Every device in a SMB Network requires updates and should be updated regularly through a standardized update procedure that tests the updates before deployment for both software and firmware. NO UPDATES = BAD NEWS. AUTOMATED UPDATES = CATASTROPHE. End-Points - (PCs, Servers, Tablets, Mobile Devices) MUST have active, updated anti-virus, anti-spyware and anti-malware software installed. Access and Permissions – Access and Permission Rules Must be Reviewed Monthly to ensure past that only necessary permissions are granted. File Sharing – Open File Sharing is Out. Securing File Sharing with Audit Trails is IN. Think BOX, OneDrive and SharePoint. Logging and Alerts – Every Device in the Network Creates Logs and are Capable of Creating of Alerts about predefined alert types. Active Maintenance Approach
  • 53. Active Policy Approach 1. IT Policy is a NECESSITY.
  • 54. 2. Your Employees Do Not “Know What The Right Thing Is”. Active Policy Approach
  • 55. 3. Do Not Write Policy That Is Unenforceable. Active Policy Approach
  • 56. 4. Be Prepared to Enforce What You Write. Active Policy Approach
  • 57. 5. Make Sure Your Policy Covers Your Compliance Needs. Active Policy Approach
  • 58. Active Policy Approach IT Policy is a NECESSITY. Your Employees Do Not “Know What The Right Thing Is”. Do Not Write Policy That Is Unenforceable. Be Prepared to Enforce What You Write. Make Sure Your Policy Covers Your Compliance Needs.
  • 59. Does Your Computer Company Make A Difference? We Do.
  • 60.