Ce diaporama a bien été signalé.
Nous utilisons votre profil LinkedIn et vos données d’activité pour vous proposer des publicités personnalisées et pertinentes. Vous pouvez changer vos préférences de publicités à tout moment.

Security Scare - Cybersecurity & What to Do About It!

19 vues

Publié le

Security Scare - Cybersecurity & What to Do About It!

Publié dans : Technologie
  • Soyez le premier à commenter

  • Soyez le premier à aimer ceci

Security Scare - Cybersecurity & What to Do About It!

  1. 1. Security Scare
  2. 2. Or…
  3. 3. How Not To Be Hacked…
  4. 4. Batten Down the Hatches!
  5. 5. Cyber Security - It’s a Crime!
  6. 6. Preparing for data breach notifications in Australia May 2016
  7. 7. What is a data breach notification? Parties that could require notification in Australia include: External • Customers • Regulators including the Office of the Australian Information Commissioner (“OAIC”) • Police Incident team leader HR Finance and CEO Information security Privacy officer Internal to an organisation Legal Communications and PR Customer support Board of directors • Insurers • Third party contractors • Government agencies • Credit card companies and financial institutions Each of these stakeholders may require different information regarding the breach. The type of information which is to be provided can be driven by the stakeholder, best practice or legal requirements. A data breach notification is a notification informing required parties that a breach has occurred. It is intended to inform them so that they can take steps to minimise harm that could arise from the breach.
  8. 8. Data security is the first step when protecting information Building the capability to proactively monitor and respond to threats User access control helps reduce both internal and external risk of unauthorised exposure of personal information Our organisation stores personal information in a customer database. Data security User access control Responding to threats Is customer information stored securely? Do we know who has access to personal information assets? Has confidential information been leaked? Our organisation has a shared drive accessible by all staff. Our organisation receives phishing emails. One of our employees mistakenly clicked a link in the email. Ready for mandatory data breach notifications and reduce the likelihood of reporting a breach
  9. 9. And Please Don’t Appear To Be ‘not secure’
  10. 10. haveibeenpwned.com bit.ly/haveibeen
  11. 11. The Top 5 Things 
 To Do From Hackers & 
 Security Researchers
  12. 12. 1. Always Keep Your Software Updated!
  13. 13. Do You Keep Your Software Updated?
  14. 14. When Did You Last Update Your Hardware Connection & Password to the Internet?
  15. 15. 2/4/5. Use Unique, Long & Strong Passwords
  16. 16. 3. Use Multi-Factor Authentication (aka 2FA)
  17. 17. Use a VPN (Virtual Private Network)
  18. 18. These are Your First Steps to Security