SlideShare une entreprise Scribd logo
1  sur  34
Security for Business
       Are You and Your Customers Safe?


Brian Woods
President
SHBO Technologies, LLC
Is this You?
• Use the “firewall” in the router that came
  from your Internet service provider (ISP).
• Have your full birthday (month, day and year)
  on your Facebook or LinkedIn profile.
• Save company or client data on your laptop
  unencrypted.
• Haven’t tried to recover data from your data
  backups within the last month.
Agenda
• Introduction to SHBO Technologies and Brian
  Woods
• Why is Cyber Security Important?
• Cyber security trends
• Ways of protecting your customers’ and your
  data
• Questions and Answers
Who is SHBO Technologies
• SHBO stands for Solutions for Home, Business
  and Office.
• We help companies use technology and
  information systems to support and grow their
  business.
• Consult and support businesses through IT
  operations and projects.
• Partners with Microsoft, Google, Dell, Fortinet
  and many more to offer the best solutions to our
  clients’ unique needs.
Who is Brian Woods


• 18+ years of experience in IT operations and
  projects.
• Background in IT infrastructure.
• Has been responsible for IT in small business
  through large global companies.
• Educates, consults and supports clients.
Why is Cyber Security Important?
Cyber Security Trends
• Wireless networks      •   Online data backup
• Consumer grade         •   Mobile devices
  products in business   •   Instant messaging
• Laws                   •   Social media
• Encryption             •   Cloud computing
• Ecommerce              •   User education
Wireless Networks
• Wifi (wireless fidelity) is everywhere today.
• Open (unsecured) wireless is – OPEN.
• In many cases, you must agree to a disclaimer
  from the “hotspot” provider – taking full
  responsibility for anything malicious that
  happens to your equipment or data.
Consumer Grade Products in Business
• In today’s tough economic environment, many
  company’s are using consumer grade
  equipment in their business.
• While the price is cheaper, the cost is greater.
• Many people work remotely from home
  today. Are consumer grade products right for
  your home?
Laws Affecting Cyber Security
• Health Insurance Portability and
  Accountability Act (HIPAA)
• Gramm-Leach-Bliley Act (GLB)
• Sarbanes-Oxley Act (SOX)
• Many other laws and policies
  – PCI
  – European privacy
HIPPA
• Requires companies appoint an Information
  Security Official to be in charge of all compliance
  in the office.
• Must comply with all 50+ standards of managing
  data for electronic health records.
• Doctors’ offices, hospitals, health insurance
  companies, public health organizations,
  employers, etc with medical records and health
  care information that is stored or transferred in
  electronic form.
GLB
• Specify a person or group of people to be responsible for GLB
  compliance.
• Identify security risks involving customer information
• Assess existing safeguards for protecting the privacy of
  customer information.
• Implement any additional safeguards that are needed.
• Monitor the effectiveness of safeguards.
• Ensure that service providers are able to meet the GLB
  requirements.
• Upgrade the organization's security program as necessary due
  to changing circumstances.
Source: www.windowssecurity.com
SOX
• Designed to enforce the accuracy of financial
  statements by publicly traded companies.
• Sections 302 and 404 apply specifically to IT.
• Companies are required to establish an
  infrastructure that insures data is safe from
  unauthorized access or damage /data loss.
• Requires lots of documentation and process
  verification.
Encryption
• Encryption protects data from unauthorized
  access.
• Protects data communications over networks.
• Protects stored data.
• Different levels of encryption depending on
  requirements.
Ecommerce
• Many electronic stores opening each year.
• Need to have published policies on website.
• PCI compliance is a must for credit card
  processing.
• Must have SSL (Secure Socket Layer)
  encryption.
Online Data Backup
• Online data backup is a must for businesses.
• Important to make sure the entire process is
  secure (end to end).
• Should be able to backup all important data,
  no matter where it is in your company.
• Good to have a local copy for quick recovery.
• Online data backup should be part of an
  overall disaster recovery business plan.
Mobile Devices
• The new wave of technology in the business
  world.
• Feeds our “always have access” mentality.
• Bring Your Own Device (BYOD)
• Requires IT departments to re-examine the
  balance between usability and security.
• IT needs to embrace these business changes
  because customers will use them anyway.
Instant Messaging
• Easy to communicate real time with associates
  and strategic partners.
• Public and private messaging networks.
• Huge legal and business implications.
Social Media
•   Legitimate business uses for social media.
•   Large potential for wasting productive time.
•   Opportunity for data leaks.
•   Businesses have varying policies on social
    media use.
Cloud Computing
• “Cloud” is one of the buzz words right now.
• Small businesses are able to have access to
  the same resources as large businesses –
  helping to level the playing field.
• Security concerns
• Local requirements in the office
User Education
• User education is one of the easiest ways of
  helping to address cyber security.
• In recent years, user education has decreased
  as companies try to cut costs.
• Internal people, not external, are the cause of
  most data breaches – most companies are
  unaware.
How SHBO Technologies Works
• Analyze current environment
  – What are the current concerns?
  – Where is the business headed?
  – What is in place now?
  – Can we improve the use of what is already in use?
• Develop plan for addressing business
  challenges
• Work with management to implement the
  solutions
Business / Technology Policies
• SHBO helps businesses define their business
  polices as it relates to technology.
• Examples are:
  – Acceptable Use
  – Data Security Standards
  – Mobile Devices and Remote Access
  – Change Management
• Efficient and effective policies help immensely.
Firewall / Remote Access / Content
                Filtering
• We provide business grade firewalls (Dell
  Sonicwall and Fortinet) to stop external
  threats.
• These firewalls provide secure remote access
  to internal resources.
• The content is examined for viruses and
  malware.
• Undesirable content is controlled.
• We proactively monitor and advise of threats.
Wireless Networks
• SHBO works with clients to design wireless
  networks that meet their needs.
• Depending on the requirements, the wireless
  could be built into a firewall device or be an
  expansive segment of the network.
• Some of the partners we use are Dell
  Sonicwall, Fortinet, Cisco and Meraki.
Network Security
• We help centralize resources and user
  security, using technologies like Microsoft Active
  Directory (AD).
• Using LDAP / AD security, we are able to use one
  central security database in Active Directory for
  most other needs (i.e. remote access, content
  filtering, file and print)
• As a Microsoft Volume Licensing Specialist, we
  help clients save time and money with acquiring
  and implementing the correct Microsoft licensing
  plan for their company.
Antivirus / Endpoint Protection /
            Access Control
• We also provide clients with antivirus and
  endpoint protection.
• Network access control allows us to identify
  the computers that can get on the network.
• Vendors we use are GFI Vipre, AVG, Symantec,
  HP and Cisco.
Online Data Backup and Disaster
              Recovery
• SHBO has its own backup software called Data
  Guardian.
• Data Guarding is a piece of our backup
  process named Simplified Business Continuity.
• We help clients develop and overall business
  continuity plan for when a disaster happens.
Mobile Devices
• We help clients choose the best mobile
  devices for their business needs.
• SHBO supports mobile devices and their
  connectivity to business applications.
• We help clients with additional ways they can
  use the devices they already have to help their
  business.
• The platforms we typically use are Android
  and iOS.
Cloud Computing
• SHBO has migrated all of our environment to
  the cloud.
• We offer specific applications (i.e. Office 365,
  CRM, etc) and complete computing platforms
  (Windows and Linux) in the cloud.
• SHBO offers cloud-base PBX phone service
  through RingCentral.
How safe do you feel your
customers and business are
in regards to the way your
company practices cyber
security currently?
In Conclusion
• There are many trends happening in the
  market today regarding cyber security.
• As we become more reliant on digital assets
  and communication, the field of cyber security
  will continue to grow in importance.
• SHBO Technologies is a local IT business
  partner that can help companies protect their
  clients and themselves through proven
  solutions.
Thank You
Brian Woods
President

SHBO Technologies, LLC
Royal Palm Beach, FL

561-283-0825
bwoods@shbo-tech.com

Contenu connexe

Tendances

The Changing Role of IT Staff
The Changing Role of IT StaffThe Changing Role of IT Staff
The Changing Role of IT StaffBVU
 
The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management Kaseya
 
Keep Up with the Demands of IT Security on a Nonprofit Budget
Keep Up with the Demands of IT Security on a Nonprofit BudgetKeep Up with the Demands of IT Security on a Nonprofit Budget
Keep Up with the Demands of IT Security on a Nonprofit BudgetBVU
 
Preparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility StrategyPreparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility StrategyLogicalis Australia
 
Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
 Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf... Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...Information Security Awareness Group
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesHarsh Kishore Mishra
 
How to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationHow to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationTroy C. Fulton
 
BYOD: D for Device or D for Disaster?
BYOD: D for Device or D for Disaster?BYOD: D for Device or D for Disaster?
BYOD: D for Device or D for Disaster?Marketing Team
 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentationJMS Secure Data
 
Classification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtectionClassification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtectionGianmarco Ferri
 
7.5 steps to overlaying byod & iot
7.5 steps to overlaying byod & iot7.5 steps to overlaying byod & iot
7.5 steps to overlaying byod & iotCaston Thomas
 
Mobile Security in 2013
Mobile Security in 2013 Mobile Security in 2013
Mobile Security in 2013 Troy C. Fulton
 
gkknwqeq3232,sqSecurity essentials domain 3
gkknwqeq3232,sqSecurity essentials   domain 3gkknwqeq3232,sqSecurity essentials   domain 3
gkknwqeq3232,sqSecurity essentials domain 3Anne Starr
 

Tendances (20)

The Changing Role of IT Staff
The Changing Role of IT StaffThe Changing Role of IT Staff
The Changing Role of IT Staff
 
The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management
 
Keep Up with the Demands of IT Security on a Nonprofit Budget
Keep Up with the Demands of IT Security on a Nonprofit BudgetKeep Up with the Demands of IT Security on a Nonprofit Budget
Keep Up with the Demands of IT Security on a Nonprofit Budget
 
BYOD
BYODBYOD
BYOD
 
Bring your own device
Bring your own deviceBring your own device
Bring your own device
 
Preparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility StrategyPreparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility Strategy
 
Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
 Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf... Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security Issues
 
How to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationHow to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry Migration
 
BYOD: D for Device or D for Disaster?
BYOD: D for Device or D for Disaster?BYOD: D for Device or D for Disaster?
BYOD: D for Device or D for Disaster?
 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentation
 
Classification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtectionClassification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtection
 
BREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAPBREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAP
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
Mobile Security
Mobile Security Mobile Security
Mobile Security
 
7.5 steps to overlaying byod & iot
7.5 steps to overlaying byod & iot7.5 steps to overlaying byod & iot
7.5 steps to overlaying byod & iot
 
Mobile Security in 2013
Mobile Security in 2013 Mobile Security in 2013
Mobile Security in 2013
 
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
 
gkknwqeq3232,sqSecurity essentials domain 3
gkknwqeq3232,sqSecurity essentials   domain 3gkknwqeq3232,sqSecurity essentials   domain 3
gkknwqeq3232,sqSecurity essentials domain 3
 
Wipo smes ge_08_topic07
Wipo smes ge_08_topic07Wipo smes ge_08_topic07
Wipo smes ge_08_topic07
 

En vedette

DSS @RIGA COMM2013 - The Value of an IT Security for Business People
DSS @RIGA COMM2013 - The Value of an IT Security for Business PeopleDSS @RIGA COMM2013 - The Value of an IT Security for Business People
DSS @RIGA COMM2013 - The Value of an IT Security for Business PeopleAndris Soroka
 
Cyber Security for Business Traveller
Cyber Security for Business TravellerCyber Security for Business Traveller
Cyber Security for Business TravellerRajneesh G
 
Network Security - What Every Business Needs to Know
Network Security - What Every Business Needs to KnowNetwork Security - What Every Business Needs to Know
Network Security - What Every Business Needs to Knowmapletronics
 
The Business of Security: The Nitty Gritty of Running a Multi-Million Dollar ...
The Business of Security: The Nitty Gritty of Running a Multi-Million Dollar ...The Business of Security: The Nitty Gritty of Running a Multi-Million Dollar ...
The Business of Security: The Nitty Gritty of Running a Multi-Million Dollar ...Sucuri
 
Information Security Business Middle East 2011
Information Security Business   Middle East 2011Information Security Business   Middle East 2011
Information Security Business Middle East 2011Arjun V
 
Security First: What it is and What it Means for Your Business
Security First: What it is and What it Means for Your BusinessSecurity First: What it is and What it Means for Your Business
Security First: What it is and What it Means for Your BusinessGeorgian
 
IT Security for your Business
IT Security for your BusinessIT Security for your Business
IT Security for your BusinessNeil Kemp
 
Lessons Learned from the NIST CSF
Lessons Learned from the NIST CSFLessons Learned from the NIST CSF
Lessons Learned from the NIST CSFDigital Bond
 
ISO 22301 Business Continuity Management
ISO 22301 Business Continuity ManagementISO 22301 Business Continuity Management
ISO 22301 Business Continuity ManagementRamiro Cid
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewTandhy Simanjuntak
 
Security Management Practices
Security Management PracticesSecurity Management Practices
Security Management Practicesamiable_indian
 

En vedette (12)

DSS @RIGA COMM2013 - The Value of an IT Security for Business People
DSS @RIGA COMM2013 - The Value of an IT Security for Business PeopleDSS @RIGA COMM2013 - The Value of an IT Security for Business People
DSS @RIGA COMM2013 - The Value of an IT Security for Business People
 
Information Security and your Business
Information Security and your BusinessInformation Security and your Business
Information Security and your Business
 
Cyber Security for Business Traveller
Cyber Security for Business TravellerCyber Security for Business Traveller
Cyber Security for Business Traveller
 
Network Security - What Every Business Needs to Know
Network Security - What Every Business Needs to KnowNetwork Security - What Every Business Needs to Know
Network Security - What Every Business Needs to Know
 
The Business of Security: The Nitty Gritty of Running a Multi-Million Dollar ...
The Business of Security: The Nitty Gritty of Running a Multi-Million Dollar ...The Business of Security: The Nitty Gritty of Running a Multi-Million Dollar ...
The Business of Security: The Nitty Gritty of Running a Multi-Million Dollar ...
 
Information Security Business Middle East 2011
Information Security Business   Middle East 2011Information Security Business   Middle East 2011
Information Security Business Middle East 2011
 
Security First: What it is and What it Means for Your Business
Security First: What it is and What it Means for Your BusinessSecurity First: What it is and What it Means for Your Business
Security First: What it is and What it Means for Your Business
 
IT Security for your Business
IT Security for your BusinessIT Security for your Business
IT Security for your Business
 
Lessons Learned from the NIST CSF
Lessons Learned from the NIST CSFLessons Learned from the NIST CSF
Lessons Learned from the NIST CSF
 
ISO 22301 Business Continuity Management
ISO 22301 Business Continuity ManagementISO 22301 Business Continuity Management
ISO 22301 Business Continuity Management
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
 
Security Management Practices
Security Management PracticesSecurity Management Practices
Security Management Practices
 

Similaire à Security For Business: Are You And Your Customers Safe

Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSonny Hashmi
 
3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputation3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputationNikec Solutions
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestJay McLaughlin
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Mark Williams
 
The 5 ws of Cyber Security
The 5 ws of Cyber SecurityThe 5 ws of Cyber Security
The 5 ws of Cyber SecurityMisha Hanin
 
Cybersecurity
Cybersecurity Cybersecurity
Cybersecurity nado-web
 
dataProtection_p3.ppt
dataProtection_p3.pptdataProtection_p3.ppt
dataProtection_p3.pptssusera76ea9
 
20 6-2013 - breinwave - nationale voorraaddag - de impact van cloud in de sup...
20 6-2013 - breinwave - nationale voorraaddag - de impact van cloud in de sup...20 6-2013 - breinwave - nationale voorraaddag - de impact van cloud in de sup...
20 6-2013 - breinwave - nationale voorraaddag - de impact van cloud in de sup...Peter de Haas
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourleyGovCloud Network
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesChris Pepin
 
Sleeping well with cloud services
Sleeping well with cloud servicesSleeping well with cloud services
Sleeping well with cloud servicesComarch_Services
 
Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2Brad Deflin
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4Valencell, Inc.
 
Modiant World - Top IT Outsourcing Company in Dubai
Modiant World - Top IT Outsourcing Company in DubaiModiant World - Top IT Outsourcing Company in Dubai
Modiant World - Top IT Outsourcing Company in DubaiModiant world
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSPreetiDevidas
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythSecurity Innovation
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudCompTIA UK
 

Similaire à Security For Business: Are You And Your Customers Safe (20)

Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEs
 
3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputation3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputation
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?
 
The 5 ws of Cyber Security
The 5 ws of Cyber SecurityThe 5 ws of Cyber Security
The 5 ws of Cyber Security
 
Cybersecurity
Cybersecurity Cybersecurity
Cybersecurity
 
NG-Brochure
NG-BrochureNG-Brochure
NG-Brochure
 
dataProtection_p3.ppt
dataProtection_p3.pptdataProtection_p3.ppt
dataProtection_p3.ppt
 
Outside the Office: Mobile Security
Outside the Office: Mobile SecurityOutside the Office: Mobile Security
Outside the Office: Mobile Security
 
Byod final (2)
Byod   final (2)Byod   final (2)
Byod final (2)
 
20 6-2013 - breinwave - nationale voorraaddag - de impact van cloud in de sup...
20 6-2013 - breinwave - nationale voorraaddag - de impact van cloud in de sup...20 6-2013 - breinwave - nationale voorraaddag - de impact van cloud in de sup...
20 6-2013 - breinwave - nationale voorraaddag - de impact van cloud in de sup...
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
Sleeping well with cloud services
Sleeping well with cloud servicesSleeping well with cloud services
Sleeping well with cloud services
 
Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4
 
Modiant World - Top IT Outsourcing Company in Dubai
Modiant World - Top IT Outsourcing Company in DubaiModiant World - Top IT Outsourcing Company in Dubai
Modiant World - Top IT Outsourcing Company in Dubai
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" Myth
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the Cloud
 

Security For Business: Are You And Your Customers Safe

  • 1. Security for Business Are You and Your Customers Safe? Brian Woods President SHBO Technologies, LLC
  • 2. Is this You? • Use the “firewall” in the router that came from your Internet service provider (ISP). • Have your full birthday (month, day and year) on your Facebook or LinkedIn profile. • Save company or client data on your laptop unencrypted. • Haven’t tried to recover data from your data backups within the last month.
  • 3. Agenda • Introduction to SHBO Technologies and Brian Woods • Why is Cyber Security Important? • Cyber security trends • Ways of protecting your customers’ and your data • Questions and Answers
  • 4. Who is SHBO Technologies • SHBO stands for Solutions for Home, Business and Office. • We help companies use technology and information systems to support and grow their business. • Consult and support businesses through IT operations and projects. • Partners with Microsoft, Google, Dell, Fortinet and many more to offer the best solutions to our clients’ unique needs.
  • 5. Who is Brian Woods • 18+ years of experience in IT operations and projects. • Background in IT infrastructure. • Has been responsible for IT in small business through large global companies. • Educates, consults and supports clients.
  • 6. Why is Cyber Security Important?
  • 7. Cyber Security Trends • Wireless networks • Online data backup • Consumer grade • Mobile devices products in business • Instant messaging • Laws • Social media • Encryption • Cloud computing • Ecommerce • User education
  • 8. Wireless Networks • Wifi (wireless fidelity) is everywhere today. • Open (unsecured) wireless is – OPEN. • In many cases, you must agree to a disclaimer from the “hotspot” provider – taking full responsibility for anything malicious that happens to your equipment or data.
  • 9. Consumer Grade Products in Business • In today’s tough economic environment, many company’s are using consumer grade equipment in their business. • While the price is cheaper, the cost is greater. • Many people work remotely from home today. Are consumer grade products right for your home?
  • 10. Laws Affecting Cyber Security • Health Insurance Portability and Accountability Act (HIPAA) • Gramm-Leach-Bliley Act (GLB) • Sarbanes-Oxley Act (SOX) • Many other laws and policies – PCI – European privacy
  • 11. HIPPA • Requires companies appoint an Information Security Official to be in charge of all compliance in the office. • Must comply with all 50+ standards of managing data for electronic health records. • Doctors’ offices, hospitals, health insurance companies, public health organizations, employers, etc with medical records and health care information that is stored or transferred in electronic form.
  • 12. GLB • Specify a person or group of people to be responsible for GLB compliance. • Identify security risks involving customer information • Assess existing safeguards for protecting the privacy of customer information. • Implement any additional safeguards that are needed. • Monitor the effectiveness of safeguards. • Ensure that service providers are able to meet the GLB requirements. • Upgrade the organization's security program as necessary due to changing circumstances. Source: www.windowssecurity.com
  • 13. SOX • Designed to enforce the accuracy of financial statements by publicly traded companies. • Sections 302 and 404 apply specifically to IT. • Companies are required to establish an infrastructure that insures data is safe from unauthorized access or damage /data loss. • Requires lots of documentation and process verification.
  • 14. Encryption • Encryption protects data from unauthorized access. • Protects data communications over networks. • Protects stored data. • Different levels of encryption depending on requirements.
  • 15. Ecommerce • Many electronic stores opening each year. • Need to have published policies on website. • PCI compliance is a must for credit card processing. • Must have SSL (Secure Socket Layer) encryption.
  • 16. Online Data Backup • Online data backup is a must for businesses. • Important to make sure the entire process is secure (end to end). • Should be able to backup all important data, no matter where it is in your company. • Good to have a local copy for quick recovery. • Online data backup should be part of an overall disaster recovery business plan.
  • 17. Mobile Devices • The new wave of technology in the business world. • Feeds our “always have access” mentality. • Bring Your Own Device (BYOD) • Requires IT departments to re-examine the balance between usability and security. • IT needs to embrace these business changes because customers will use them anyway.
  • 18. Instant Messaging • Easy to communicate real time with associates and strategic partners. • Public and private messaging networks. • Huge legal and business implications.
  • 19. Social Media • Legitimate business uses for social media. • Large potential for wasting productive time. • Opportunity for data leaks. • Businesses have varying policies on social media use.
  • 20. Cloud Computing • “Cloud” is one of the buzz words right now. • Small businesses are able to have access to the same resources as large businesses – helping to level the playing field. • Security concerns • Local requirements in the office
  • 21. User Education • User education is one of the easiest ways of helping to address cyber security. • In recent years, user education has decreased as companies try to cut costs. • Internal people, not external, are the cause of most data breaches – most companies are unaware.
  • 22. How SHBO Technologies Works • Analyze current environment – What are the current concerns? – Where is the business headed? – What is in place now? – Can we improve the use of what is already in use? • Develop plan for addressing business challenges • Work with management to implement the solutions
  • 23. Business / Technology Policies • SHBO helps businesses define their business polices as it relates to technology. • Examples are: – Acceptable Use – Data Security Standards – Mobile Devices and Remote Access – Change Management • Efficient and effective policies help immensely.
  • 24. Firewall / Remote Access / Content Filtering • We provide business grade firewalls (Dell Sonicwall and Fortinet) to stop external threats. • These firewalls provide secure remote access to internal resources. • The content is examined for viruses and malware. • Undesirable content is controlled. • We proactively monitor and advise of threats.
  • 25. Wireless Networks • SHBO works with clients to design wireless networks that meet their needs. • Depending on the requirements, the wireless could be built into a firewall device or be an expansive segment of the network. • Some of the partners we use are Dell Sonicwall, Fortinet, Cisco and Meraki.
  • 26. Network Security • We help centralize resources and user security, using technologies like Microsoft Active Directory (AD). • Using LDAP / AD security, we are able to use one central security database in Active Directory for most other needs (i.e. remote access, content filtering, file and print) • As a Microsoft Volume Licensing Specialist, we help clients save time and money with acquiring and implementing the correct Microsoft licensing plan for their company.
  • 27. Antivirus / Endpoint Protection / Access Control • We also provide clients with antivirus and endpoint protection. • Network access control allows us to identify the computers that can get on the network. • Vendors we use are GFI Vipre, AVG, Symantec, HP and Cisco.
  • 28. Online Data Backup and Disaster Recovery • SHBO has its own backup software called Data Guardian. • Data Guarding is a piece of our backup process named Simplified Business Continuity. • We help clients develop and overall business continuity plan for when a disaster happens.
  • 29. Mobile Devices • We help clients choose the best mobile devices for their business needs. • SHBO supports mobile devices and their connectivity to business applications. • We help clients with additional ways they can use the devices they already have to help their business. • The platforms we typically use are Android and iOS.
  • 30. Cloud Computing • SHBO has migrated all of our environment to the cloud. • We offer specific applications (i.e. Office 365, CRM, etc) and complete computing platforms (Windows and Linux) in the cloud. • SHBO offers cloud-base PBX phone service through RingCentral.
  • 31. How safe do you feel your customers and business are in regards to the way your company practices cyber security currently?
  • 32. In Conclusion • There are many trends happening in the market today regarding cyber security. • As we become more reliant on digital assets and communication, the field of cyber security will continue to grow in importance. • SHBO Technologies is a local IT business partner that can help companies protect their clients and themselves through proven solutions.
  • 33.
  • 34. Thank You Brian Woods President SHBO Technologies, LLC Royal Palm Beach, FL 561-283-0825 bwoods@shbo-tech.com