Your SlideShare is downloading. ×
0
Secure Your Business 2009
Secure Your Business 2009
Secure Your Business 2009
Secure Your Business 2009
Secure Your Business 2009
Secure Your Business 2009
Secure Your Business 2009
Secure Your Business 2009
Secure Your Business 2009
Secure Your Business 2009
Secure Your Business 2009
Secure Your Business 2009
Secure Your Business 2009
Secure Your Business 2009
Secure Your Business 2009
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Secure Your Business 2009

147

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
147
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Secure Your Business!A Blueprint for a Healthy Technology Plan
    2009
    Presented by:
    Robert CioffiDirector of Technology
    rcioffi@pro-comp.com
    Copyright © 2009, Robert Cioffi, Progressive Computing Inc.
  • 2. Installing confidencein your network
    We are Trusted Technology Advisors for small and mid-sized businesses throughout the NYC metro area.
    We design, install and maintainMicrosoft Windows based networks.
    We help customers who are…
     Overwhelmed or confused by technology problems.
     Frustrated by poor and unresponsive support.
     Feeling helpless when faced with new IT challenges.
    www.pro-comp.com
    2
  • 3. Secure Your Business: Objectives
    • Increase Awareness of Threats
    What are the potential threats to my financial transactions, intellectual property, customer database, images, etc?
    • Understand Pressures on IT
    What are the dynamic forces affecting IT?
    • Understand Protection Strategies
    How do I protect my business?
    3
    Copyright © 2009, Robert Cioffi, Progressive Computing Inc.
  • 4. Secure Your Business: IT Mgmt Mistakes
    It’s the economy, stupid!
    “Companies using their 2009 performance as a guide are more likely to see 2010 as another down year, perhaps even lower than 2008…”
    “…unlike past recessions, CIOs report that transaction and storage volumes continue to grow.  This means that enterprises have to work smarter by working in new ways than working harder by doing more with less. ”
    Source: Gartner, The context for 2010 planning will be challenging, June 22, 2009
    Pressure leads to Mistakes
    IT is a Cost Center
    Hyper focus on apps
    IT is not well understood
    If it ain’t broke, don’t fix it
    4
    Copyright © 2009, Robert Cioffi, Progressive Computing Inc.
  • 5. Secure Your Business: Traditional Threats
    Recent Focus
    }
    Most Common
    F.U.D.
    Most Dangerous
    5
    Copyright © 2009, Robert Cioffi, Progressive Computing Inc.
  • 6. Secure Your Business: Threats 2009
    Specific threats affecting business…
    Phishing
    Attacks
    Spyware
    Computer
    Abuse
    Data
    Leakage
    (Accidental)
    Data
    Loss
    (Malicious)
    Theft & Loss
    Rising Costs & Less Resources
    6
    Copyright © 2009, Robert Cioffi, Progressive Computing Inc.
  • 7. Secure Your Business: Budgets
    Data
    Protection
    Access
    Controls
    Risk Assessmentprovides clear direction onResource Expenditures
    Power
    Asset
    Protection
    Threat
    Mgmt
    Policies &
    Procedures
    7
    Copyright © 2009, Robert Cioffi, Progressive Computing Inc.
  • 8. Secure Your Business: Data Protection
    What’s the most important part of your computer system?
    The Data!
    What’s the right way to protect my data?
    Traditional
    Innovative
    HYBRID
    8
    Copyright © 2009, Robert Cioffi, Progressive Computing Inc.
  • 9. Secure Your Business: Data Protection
    Data Protection Technologies – 2009/10
    Server Virtualization
     Reduce cost.
    • Maximize resource utilization.
    • 10. Greater system availability.
    Online Backups
    • Near real-time backup.
    • 11. Versioning and quick recovery.
    • 12. Low operating costs.
    9
    Copyright © 2009, Robert Cioffi, Progressive Computing Inc.
  • 13. Secure Your Business: Power
    Rising costs of energy saps business.
    Datacenters are running out of power
    • Costs to build power plants on the rise.
    • 14. Government regulations making it harder.
    • 15. Microsoft acquires local power plant for datacenter.
    Do more with less – Virtualization?
    US power: Prone to failure & attack
    10
    Copyright © 2009, Robert Cioffi, Progressive Computing Inc.
  • 16. Secure Your Business: Threat Mgmt
    Depth in Defense
    11
    Copyright © 2009, Robert Cioffi, Progressive Computing Inc.
  • 20. Secure Your Business: Access Controls
    Who Has Access to What?
    1. Define resources, and users; what can they access?
    2. Force users to enter logon credentials to access resources.
    3. Segregate data into logical areas & assign appropriate access.
    4. Passwords should be hard to guess & changed periodically.
    5. Educate users about dangers of social engineering.
    6. Periodically check for and install software patches & updates.
    7. Bio-Scan Technology: Hand readers, Retina scanners, etc.
    Windows Group Policy is an excellent and powerful tool for implementing centralized Logical Security on your network: desktop lockdown, password policies, application options control, and more.
    12
    Copyright © 2009, Robert Cioffi, Progressive Computing Inc.
  • 21. Secure Your Business: Asset Controls
    How do I control & manage assets?
     Secure critical components behind locked doors.
    • Computer rooms should be well ventilated and properly cooled.
    • 22. Restrict access to sensitive equipment to relevant personnel.
    • 23. Computer workstations can be secured to walls or furniture.
    • 24. Laptop users should keep an “eye” on their computer at all times.
    • 25. Asset management systems help keep track of inventory.
    Technology Goes Hollywood
     Remote Device Wipe for Windows Mobile 6.x Devices
    • Windows Vista/7 Bit-Locker – Encrypt the entire drive
    • 26. “Homing Pigeon” Software for lost or stolen equipment
    13
    Copyright © 2009, Robert Cioffi, Progressive Computing Inc.
  • 27. Secure Your Business: Policies
    Corporate Policies & Procedures
    • Policies are guidelines for protecting assets.
    • 28. Should be routinely reviewed and revised.
    • 29. Good risk assessment will drive good security policies.
    • 30. Makes expectations of employee behavior & accountability clear.
    Examples
    Dangers
    • Email & Internet Usage
    • 31. Email signature disclaimers
    • 32. Don’t Ask, Don’t Tell Passwords
    • 33. Policies are platitudes rather than a decision or direction
    • 34. Too restrictive – people bypass
    14
    Copyright © 2009, Robert Cioffi, Progressive Computing Inc.
  • 35. Secure Your Business!
    Q & A
    15
    Copyright © 2009, Robert Cioffi, Progressive Computing Inc.

×