Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
SITSecure Audits
1.
2. SIT Secure now brings you
Super Security Audits
The master key to all your security problems
(Known or Unknown)
3. Super Security Audits deliver …
Benchmarks for your IT:
Strategy Compliance
Budgets
Team
Management Planning
4. What is the threat to your IT Security?
• Rapidly Changing Technologies
• Smart phones becoming smarter
• Complex connectivity poorly understood
• Data leakage avenues exploding
constantly
• Highly sophisticated “hacking tools”
readily available
5. A Super Security Audit will:
• Benchmark all your business
processes
• Align the IT with your business goals
• Prevent human error
• Maintain “security state” amidst
unplanned growth
• Keep your organization super secure
‘continually’
6. Threat originates with:
Increasing:
Availability of Info. exposure
Customer Access vulnerable systems
Processes security challenged IT
teams
Turnover in IT Ill-configured systems
teams going unchecked
7. How wide is the effect of the threat?
Attacks - International
• May 2011, IBM managed Health Net reports a security breach
(third largest) that compromised the personal information of
more than 2.7 million users. (The Business Journal)
• June 2012: Six million passwords are stolen in a hack of the
professional networking site linkedin.com.
• June 2011, a cyber-attack that compromises the personal
information of 1.3 million subscribers of Sega's online gaming
network forces the Japanese video-game maker to shut down
the service. (technewsworld)
• March 2012: Chinese hackers gain „full access' to the NASA‟s lab
that commands 23 spacecraft including missions to Jupiter, Mars,
and Saturn.
8. How wide is the effect of the threat?
Attacks - India
• 10 June 2012: „Anonymous‟ attacks and brings down the
website run by CERT-India, the country's premier agency
dealing with cyber security contingencies.
• 13 February 2012: The Microsoft India Store is hacked and
usernames and passwords leaked. The usernames and
passwords are kept in plain text.
• 7 June 2012: „Anonymous‟ brings down the website of MTNL
in a DDoS attack.
• 27 May 2012: Protesting hackers target social sites on the
Reliance Communication platform.
9. How is your IT Security to be approached?
• Recognize, that IT is the backbone of your organization.
• Recognize that it is costing you dearly to be unsecured.
• Recognize that being unsecure means loss of money, time,
reputation, man hours.
• Recognize that being secure means being swift, efficient, on-
time, every time.
• Recognize that all your vendors, partners, and security
analysts, do not qualify to advise you about the state of
security of your company, as a whole.
10. Super Security Audits at a glance
S A
e u
S c d
u u i
p r t
e i o
Your
r t r
Company
y
11. Why is IT Security a real challenge?
IT Security is a real challenge because of:
• Increasing sophistication in attacks
• Policies not being followed
• Increasingly complex security solutions
• No system being 100% secure
• Every system being a target
12. Super Security Audits will …
Free up scarce resources of your company
Successfully defend your IT Infrastructure
Bring you substantial cash savings
13. Find out how:
Schedule a free security evaluation of
your information assets, contact:
Ramesh Iyer
302 Triumph Industrial Estate,
Near Oberoi Mall, Goregaon East
Mumbai - 400 063
+91 98211 40447
ramesh@sitsecure.com
14. Find out how:
Schedule a free security evaluation of
your information assets, contact:
Ramesh Iyer
302 Triumph Industrial Estate,
Near Oberoi Mall, Goregaon East
Mumbai - 400 063
+91 98211 40447
ramesh@aristoslabs.com