7 Small Business Security Tips

1,076 views
975 views

Published on

Computer security tips for small business - presented by Joseph Manna from Infusionsoft.

http://www.infusionsoft.com

Published in: Self Improvement
0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
1,076
On SlideShare
0
From Embeds
0
Number of Embeds
43
Actions
Shares
0
Downloads
0
Comments
0
Likes
2
Embeds 0
No embeds

No notes for slide
  • Remove trailing parenthetical on email marketing 1.0
  • 7 Small Business Security Tips

    1. 1. 7 Small Business Security Tips<br />Joseph Manna (@joemanna)www.infusionsoft.com<br />
    2. 2. InfusionCon 2011<br />March 21-24, 2011 | Special room rates<br />Amazing content, Infusionsoft Tips, Fantastic Networking<br />FREE to attend | http://infusioncon.com/<br />
    3. 3. Agenda <br /><ul><li>Why Security Matters
    4. 4. How You’re a Part of the Problem & Solution
    5. 5. Real-world Security Vulnerabilities
    6. 6. 7 Practical Small Biz Security Tips
    7. 7. Q&A</li></li></ul><li>Why Security Matters<br />Privacy Spam Scams Reputation Performance Fraud Theft Trust Confidentiality Compliance Safety<br />
    8. 8. You: Problem & Solution<br />
    9. 9. Real-world Security Vulnerabilities<br />Technical<br /><ul><li>Website, Apps, Server
    10. 10. Malware-infected system
    11. 11. Sniffers & Insecure Data Protocols
    12. 12. Email Attachments
    13. 13. Password Insecurity
    14. 14. Rogue network devices
    15. 15. Smartphones*
    16. 16. Social Graph & Data Release</li></ul>Printed Documents<br /><ul><li>Passwords
    17. 17. Billing/Invoices
    18. 18. Key Personnel</li></ul>Social Engineering<br /><ul><li>Phone
    19. 19. Email
    20. 20. In-person</li></li></ul><li>You don’t need to jail yourself from convenience.<br />But you must be aware of its impact.<br />Customers expect you to think and act securely. <br />
    21. 21. 7 Small Business Security Tips<br />
    22. 22. Use Complex Passwords<br /><ul><li>Greater than 8 characters
    23. 23. Changed frequently
    24. 24. Unrelated to you, activities or interests.
    25. 25. Same password not used on multiple sites
    26. 26. Generate a secure password: http://bit.ly/strongpassword</li></li></ul><li>Use Updated AV Protection<br /><ul><li>Modern anti-virus scanners protect against multiple threats
    27. 27. Only run one AV scanner at a time
    28. 28. Recommended:
    29. 29. AVG, TrendMicro, MS Security Essentials, AVIRA</li></li></ul><li>Secure Your DNS Server<br /><ul><li>DNS resolves domain names to their IP
    30. 30. DNS compromises can result in unknown data theft
    31. 31. OpenDNS offers stats and malware detection
    32. 32. Can aid in filtering unwanted content in your network</li></li></ul><li>Lock Your Devices<br /><ul><li>Smartphones give access to TONS of data
    33. 33. Passcodes and remote access can aid in loss/theft
    34. 34. Set a unique, random passcode and change regularly
    35. 35. Lock your computer when you step away
    36. 36. Require a password on startup</li></li></ul><li>Destroy Sensitive Documents<br /><ul><li>Shred documents securely with any sensitive information
    37. 37. Do not keep written password lying around
    38. 38. Do not save credit card numbers in unencrypted files
    39. 39. Consider using cloud-based data storage & backup</li></li></ul><li>Update Your Web Browser<br /><ul><li>Old/Outdated Web Browsers pose major security risks
    40. 40. Update any plugins that you have in them
    41. 41. Consider keeping multiple browsers on your system
    42. 42. Firefox, Chromeand Opera
    43. 43. Update Adobe Flash regularly</li></li></ul><li>Secure Your Social Networks<br /><ul><li>Leverage Privacy options to remove potentially-risky data
    44. 44. Date of Birth, Hometown, Pet Names, Favorite Color, etc.
    45. 45. Use secure passwords and change regularly
    46. 46. Associate with a monitored email account
    47. 47. Be vigilant against scams from ‘innocent’ links</li></li></ul><li>Never forget…<br />Security is not about making life harder;<br />It’s about limiting the scope and impact fromrisks.<br />Alwaysthink about how an attackerwillget in, whatthey have access to and how youcanrecoverfromit. <br />
    48. 48. Q&A<br /><ul><li>Post questions to the Questions module
    49. 49. Will answer as much as I can
    50. 50. More questions?
    51. 51. Head to our Facebook Page and post themwww.facebook.com/Infusionsoft</li>

    ×