2. About
Today, Lenovo is a
1. US$39billion personal technology company.
2. A global Fortune 500 company.
3. Founded in China as Legend Holdings Co. in 1981
4. Changed Name to Lenovo in 1988 and acquired PC Division from IBM.
5. 54,000+ employees.
6. 60+ countries.
7. Worlds Largest PC Maker.
8. 4th Largest Smartphone Company.
9. Serving customers in more than 160 countries.
10. Headquartered in Hong Kong with largest operational centers in Beijing and
Morrisville, NC.
3. David Coady
Channel Account Manager
David Coady is one of Lenovo's two Channel Account Managers here in Texas. He is in his first year with
Lenovo but has been involved in technology channel sales in North Texas for the last twelve years. He is
the main point of contact for Sys Logic for all Lenovo products and is supported by product specialists. He
lives in Denton, TX, with his wife Julie and they are the parents of three boys.
4.
5. Yoga Laptop
AMERICA'S BEST SELLING
CONVERTIBLE 2-IN-1 PC
Processor - 4th Generation Intel® Core™ Processors
Operating System - Windows 8.1 64-bit Operating System
Display - 12.5” FHD Display Rotates 360°
Business Power - Tackle Business Your Way with Four Usage Modes
Ultrabook - Legendary THINK Reliability & Business Features
6.
7. X1 Carbon
PROFESSIONAL REDEFINED
Processor - 4th Generation Intel® Core™ Processors
Operating System - Windows 8.1 64-bit Operating System
Display - Thin & Light Carbon with Carbon Fiber Durability
Keyboard - Adaptive Keyboard That Changes with Apps
Battery Charge - RapidCharge Battery - 80% Charge Within an Hour
8.
9. TD/RD Servers
BALANCED DESIGN
OUSTANDING EFFICIENCY
Processor - Intel® Xeon™ E3 Series Processors
Operating System - Windows Server 2012 R2 Platform
Business Power - Highly-Efficient, Dense, 1U, Rack Server
Professional - Right Blend of Performance, Memory & I/O
Professional - Perfect for Mainstream & Virtualized Workloads
10.
11. ThinkServer SA120 Direct Attached Storage
ThinkServer SA120
ThinkServer SA120 provides versatile, high density direct
attached storage that’s ideal for small businesses,
distributed enterprises or datacenters.
12.
13. Tony DeGonia
Director of Marketing
Tony is the Director of Marketing for Sys Logic Technology Services. Tony has been in the IT Industry for
the last 20 years 10 of which have been in East Texas with companies he has owned and as the VP and
General Manager of a major competitor before leaving in June 2013. Tony lives in Wills Point with his
wonderful wife Cayse and their three children.
14. The Top 3 Things To
Do To Secure Your
Small Business
Network.
16. cy-ber-at-tack
[sahy-ber-uh-tak] - noun
an attempt to damage, disrupt, or gain unauthorized access to a
computer, computer system, or electronic communications network.
17. Shellshock is the latest online threat sent to
disrupt us. It's a loophole that affects a piece of
software called Bash found mainly in Linux® or
Unix® operating systems as well as the Apple®
MacOS® X. And while the Shellshock bug is more
about web servers and other Internet devices,
those can now be turned against your own,
more personal devices.
What is Shellshock?
Active Threats
18. Active Threats
The Heartbleed Bug is a serious vulnerability in the popular
OpenSSL cryptographic software library. The Heartbleed bug
allows anyone on the Internet to read the memory of the
systems protected by the vulnerable versions of the OpenSSL
software. This allows attackers to eavesdrop on
communications, steal data directly from the services and
users and to impersonate services and users.
19. Hackers Can Access Admin
Panel of Some Netgear and
Linksys Routers
Hacker Headlines
January 2014
20. Home Depot Confirms Hack;
Cyber Attack Could Affect
Customer Credit Cards
September 2014
Hacker Headlines
21. More retailers reportedly hit
by cyber attacks – Target,
Neiman Marcus
December 2013
Hacker Headlines
24. For law enforcement agencies, the IC3
serves as a conduit to receive Internet-
related complaints, to conduct research
related to them and to develop analytical
reports for state, local, federal, tribal or
international law enforcement and
regulatory agencies.
FBI – IC3
25. In 2013, the IC3 received 262,813
consumer complaints with an adjusted
dollar loss of $781,841,6111, which is a
48.8 percent increase in reported losses
since 2012 ($581,441,110).
FBI – IC3
28. Someone is Messing with Texas
1. California
2. Florida
3.Texas
4. New York
5. Pennsylvania
6. New Jersey
7. Illinois
8. Virginia
9. Ohio
10. Georgia
29. How Many People In This Audience
Feel They Take a Proactive Security
Approach To Their Small Business
Network Security?
Question?
34. Active Security Approach
1. Firewall - Deploy Firewalls with MULTI-LAYERED PROTECTION on every external
network (internet) connection.
Web Blocker
spamBlocker
Reputation
Enabled
Defense
Packet
Filtering
Live Security
Intrusion
Prevention
Gateway
Anti-Virus
Data Loss
Prevention
APT Blocker
Application
Control
38. Active Security Approach
4. SSL - 256bit AES SSL Certificates MUST installed on all servers, firewalls, websites and
applications that will gather client PI (Personal Information).
39. Active Security Approach
5. Licensing - All software licensing MUST active and legally acquired. A large percentage of security breaches occur through
illegal or illegally licensed software. (Yes that includes Microsoft Software and Anti-Virus too).
1.888.NO.PIRACY
https://reporting.bsa.org
Rewards Paid
up to
$15,000,000
40. Active Security Approach
6. BC/DR – Business Continuity
and Disaster Recovery. Back It
Up So It Will Be There When
You Need It.
42. Active Security Approach
Firewall - Deploy Firewalls with
MULTI-LAYERED PROTECTION on
every external network (internet)
connection.
WiFi Security - WPA with AES
Encryption. WEP IS DEAD.
Authentication – Auditable
standards are met for all required
compliances.
SSL - 256bit AES SSL Certificates
MUST installed on all servers,
firewalls, websites and applications
that will gather client PI (Personal
Information).
Licensing - All software licensing
MUST active and legally acquired.
A large percentage of security
breaches occur through illegal or
illegally licensed software. (Yes
that includes Microsoft Software
and Anti-Virus too).
BC/DR – Business Continuity and
Disaster Recovery. Back It Up So It
Will Be There When You Need It.
45. Active Maintenance Approach
1. Updates – Every device in a SMB Network
requires updates and should be updated regularly
through a standardized update procedure that tests
the updates before deployment for both software
and firmware. NO UPDATES = BAD NEWS.
AUTOMATED UPDATES = CATASTROPHE.
46. Active Maintenance Approach
2. End-Points - (PCs, Servers, Tablets, Mobile
Devices) MUST have active, updated anti-virus,
anti-spyware and anti-malware software installed.
47. Active Maintenance Approach
3. Access and Permissions – Access and
Permissions Must be Set Per Compliance
Requirement and Reviewed Monthly to Ensure
That Only Necessary Permissions are Granted.
48. 4. File Sharing – Open File Sharing is Out.
Securing File Sharing with Audit Trails is IN.
Think BOX, OneDrive and SharePoint.
Active Maintenance Approach
49. Active Maintenance Approach
5. Logging and Alerts – Every Device in the Network Creates
Logs and are Capable of Creating of Alerts about predefined
log types.
50.
51. Updates – Every device in a SMB Network requires
updates and should be updated regularly through a
standardized update procedure that tests the
updates before deployment for both software and
firmware. NO UPDATES = BAD NEWS. AUTOMATED
UPDATES = CATASTROPHE.
End-Points - (PCs, Servers, Tablets, Mobile Devices)
MUST have active, updated anti-virus, anti-spyware
and anti-malware software installed.
Access and Permissions – Access and Permission
Rules Must be Reviewed Monthly to ensure past
that only necessary permissions are granted.
File Sharing – Open File Sharing is Out. Securing File
Sharing with Audit Trails is IN. Think BOX, OneDrive
and SharePoint.
Logging and Alerts – Every Device in the Network
Creates Logs and are Capable of Creating of Alerts
about predefined alert types.
Active Maintenance Approach
54. 2. Your Employees Do Not “Know
What The Right Thing Is”.
Active Policy Approach
55. 3. Do Not Write Policy That Is
Unenforceable.
Active Policy Approach
56. 4. Be Prepared to Enforce What
You Write.
Active Policy Approach
57. 5. Make Sure Your Policy Covers
Your Compliance Needs.
Active Policy Approach
58. Active Policy Approach
IT Policy is a
NECESSITY.
Your Employees Do
Not “Know What
The Right Thing Is”.
Do Not Write Policy
That Is
Unenforceable.
Be Prepared to
Enforce What You
Write.
Make Sure Your
Policy Covers Your
Compliance Needs.