This presentation takes a look at issues affecting cyber-security. It also covers some of SHBO Technologies\' capabilities of supporting and protecting clients.
Security For Business: Are You And Your Customers Safe
1. Security for Business
Are You and Your Customers Safe?
Brian Woods
President
SHBO Technologies, LLC
2. Is this You?
• Use the “firewall” in the router that came
from your Internet service provider (ISP).
• Have your full birthday (month, day and year)
on your Facebook or LinkedIn profile.
• Save company or client data on your laptop
unencrypted.
• Haven’t tried to recover data from your data
backups within the last month.
3. Agenda
• Introduction to SHBO Technologies and Brian
Woods
• Why is Cyber Security Important?
• Cyber security trends
• Ways of protecting your customers’ and your
data
• Questions and Answers
4. Who is SHBO Technologies
• SHBO stands for Solutions for Home, Business
and Office.
• We help companies use technology and
information systems to support and grow their
business.
• Consult and support businesses through IT
operations and projects.
• Partners with Microsoft, Google, Dell, Fortinet
and many more to offer the best solutions to our
clients’ unique needs.
5. Who is Brian Woods
• 18+ years of experience in IT operations and
projects.
• Background in IT infrastructure.
• Has been responsible for IT in small business
through large global companies.
• Educates, consults and supports clients.
7. Cyber Security Trends
• Wireless networks • Online data backup
• Consumer grade • Mobile devices
products in business • Instant messaging
• Laws • Social media
• Encryption • Cloud computing
• Ecommerce • User education
8. Wireless Networks
• Wifi (wireless fidelity) is everywhere today.
• Open (unsecured) wireless is – OPEN.
• In many cases, you must agree to a disclaimer
from the “hotspot” provider – taking full
responsibility for anything malicious that
happens to your equipment or data.
9. Consumer Grade Products in Business
• In today’s tough economic environment, many
company’s are using consumer grade
equipment in their business.
• While the price is cheaper, the cost is greater.
• Many people work remotely from home
today. Are consumer grade products right for
your home?
10. Laws Affecting Cyber Security
• Health Insurance Portability and
Accountability Act (HIPAA)
• Gramm-Leach-Bliley Act (GLB)
• Sarbanes-Oxley Act (SOX)
• Many other laws and policies
– PCI
– European privacy
11. HIPPA
• Requires companies appoint an Information
Security Official to be in charge of all compliance
in the office.
• Must comply with all 50+ standards of managing
data for electronic health records.
• Doctors’ offices, hospitals, health insurance
companies, public health organizations,
employers, etc with medical records and health
care information that is stored or transferred in
electronic form.
12. GLB
• Specify a person or group of people to be responsible for GLB
compliance.
• Identify security risks involving customer information
• Assess existing safeguards for protecting the privacy of
customer information.
• Implement any additional safeguards that are needed.
• Monitor the effectiveness of safeguards.
• Ensure that service providers are able to meet the GLB
requirements.
• Upgrade the organization's security program as necessary due
to changing circumstances.
Source: www.windowssecurity.com
13. SOX
• Designed to enforce the accuracy of financial
statements by publicly traded companies.
• Sections 302 and 404 apply specifically to IT.
• Companies are required to establish an
infrastructure that insures data is safe from
unauthorized access or damage /data loss.
• Requires lots of documentation and process
verification.
14. Encryption
• Encryption protects data from unauthorized
access.
• Protects data communications over networks.
• Protects stored data.
• Different levels of encryption depending on
requirements.
15. Ecommerce
• Many electronic stores opening each year.
• Need to have published policies on website.
• PCI compliance is a must for credit card
processing.
• Must have SSL (Secure Socket Layer)
encryption.
16. Online Data Backup
• Online data backup is a must for businesses.
• Important to make sure the entire process is
secure (end to end).
• Should be able to backup all important data,
no matter where it is in your company.
• Good to have a local copy for quick recovery.
• Online data backup should be part of an
overall disaster recovery business plan.
17. Mobile Devices
• The new wave of technology in the business
world.
• Feeds our “always have access” mentality.
• Bring Your Own Device (BYOD)
• Requires IT departments to re-examine the
balance between usability and security.
• IT needs to embrace these business changes
because customers will use them anyway.
18. Instant Messaging
• Easy to communicate real time with associates
and strategic partners.
• Public and private messaging networks.
• Huge legal and business implications.
19. Social Media
• Legitimate business uses for social media.
• Large potential for wasting productive time.
• Opportunity for data leaks.
• Businesses have varying policies on social
media use.
20. Cloud Computing
• “Cloud” is one of the buzz words right now.
• Small businesses are able to have access to
the same resources as large businesses –
helping to level the playing field.
• Security concerns
• Local requirements in the office
21. User Education
• User education is one of the easiest ways of
helping to address cyber security.
• In recent years, user education has decreased
as companies try to cut costs.
• Internal people, not external, are the cause of
most data breaches – most companies are
unaware.
22. How SHBO Technologies Works
• Analyze current environment
– What are the current concerns?
– Where is the business headed?
– What is in place now?
– Can we improve the use of what is already in use?
• Develop plan for addressing business
challenges
• Work with management to implement the
solutions
23. Business / Technology Policies
• SHBO helps businesses define their business
polices as it relates to technology.
• Examples are:
– Acceptable Use
– Data Security Standards
– Mobile Devices and Remote Access
– Change Management
• Efficient and effective policies help immensely.
24. Firewall / Remote Access / Content
Filtering
• We provide business grade firewalls (Dell
Sonicwall and Fortinet) to stop external
threats.
• These firewalls provide secure remote access
to internal resources.
• The content is examined for viruses and
malware.
• Undesirable content is controlled.
• We proactively monitor and advise of threats.
25. Wireless Networks
• SHBO works with clients to design wireless
networks that meet their needs.
• Depending on the requirements, the wireless
could be built into a firewall device or be an
expansive segment of the network.
• Some of the partners we use are Dell
Sonicwall, Fortinet, Cisco and Meraki.
26. Network Security
• We help centralize resources and user
security, using technologies like Microsoft Active
Directory (AD).
• Using LDAP / AD security, we are able to use one
central security database in Active Directory for
most other needs (i.e. remote access, content
filtering, file and print)
• As a Microsoft Volume Licensing Specialist, we
help clients save time and money with acquiring
and implementing the correct Microsoft licensing
plan for their company.
27. Antivirus / Endpoint Protection /
Access Control
• We also provide clients with antivirus and
endpoint protection.
• Network access control allows us to identify
the computers that can get on the network.
• Vendors we use are GFI Vipre, AVG, Symantec,
HP and Cisco.
28. Online Data Backup and Disaster
Recovery
• SHBO has its own backup software called Data
Guardian.
• Data Guarding is a piece of our backup
process named Simplified Business Continuity.
• We help clients develop and overall business
continuity plan for when a disaster happens.
29. Mobile Devices
• We help clients choose the best mobile
devices for their business needs.
• SHBO supports mobile devices and their
connectivity to business applications.
• We help clients with additional ways they can
use the devices they already have to help their
business.
• The platforms we typically use are Android
and iOS.
30. Cloud Computing
• SHBO has migrated all of our environment to
the cloud.
• We offer specific applications (i.e. Office 365,
CRM, etc) and complete computing platforms
(Windows and Linux) in the cloud.
• SHBO offers cloud-base PBX phone service
through RingCentral.
31. How safe do you feel your
customers and business are
in regards to the way your
company practices cyber
security currently?
32. In Conclusion
• There are many trends happening in the
market today regarding cyber security.
• As we become more reliant on digital assets
and communication, the field of cyber security
will continue to grow in importance.
• SHBO Technologies is a local IT business
partner that can help companies protect their
clients and themselves through proven
solutions.