2. Data Breaches EVERYWHERE!
It seems like everyone is being hacked!
What is going on?
What do these data breaches mean to me?
3. Cost Effects of Data Breaches
Your Business Your Customers
Loss of
Loss of Privacy
Trade Secrets
Public Trust Declines ID Theft
Regulatory Price of Goods
Investigations Increases
Risk of Malware @ home
Lawsuits
Increases
Money allocated for business growth is instead spent cleaning
up the mess!
4. What is REALLY Going On?
Before we get THERE,
let’s look at technology today….
5. MOST Companies Data Security:
Simplified
Examples:
Internet Law Firms
Accounting Firms
Call Centers
Manufacturers
ISP Modem Financial Advisors
Dentist Offices
Company Firewall Retail Stores
ETC.
Company Router
Who is watching
YOUR data?
Get Company
Antivirus
ROAR
NOTE: Most companies are set up like this, including YOURS… IF you’re lucky!
6. MOST Companies Data Security:
Explained
The previous slide is the typical layout of most businesses today.
Most companies:
Know to use Antivirus software.
Know to have a firewall.
Could spend money on IT security more
efficiently
Don’t know how to properly protect Intellectual
Property
Underestimate their exposure to risk
7. Technically “Savvy” Companies Data Security:
Simplified
Examples:
Apple
Microsoft
Internet Google
eBay
CitiGroup
NY Times
ISP Modem Amazon
Company Firewall
Company IDS/IPS
Company Router
Who is watching
YOUR data?
Get
Company
ROAR Antivirus
8. Technically “Savvy” Companies Data Security:
Explained
The previous slide is the layout of technically “savvy” businesses today.
Technically “Savvy” companies:
Attempt to protect their ideas and work product
Attempt to to control their data
Aggressively use technology to protect their
business
Use IDS/IPS to stop data from leaving
IDS – Intrusion Detection System
IPS – Intrusion Prevention System
9. So, what is REALLY Going on?
Hackers are taking advantage of weakness
in computer systems and networks
11. How do Hackers Attack You?
They would check for a firewall.
Do you even have a firewall?
What’s its status?
Which firewall ports are open?
They would email your employees.
Can they email your employee a dangerous link?
Can they email your employees a virus?
They would email your vendors.
What risks do your vendors pose to your network?
What if none of these attempts worked?
12. More Ways to Steal Your Data…
The first set of tricks almost ALWAYS work.
1. They start to work from the INSIDE out.
2. They get to know an employee.
It’s IMPORTANT to remember:
1. Employees have access to your data too
2. 15% of employees steal*
3. Effects of Employee Theft = 7% Revenues**
* Statistic Brain (www.statisticbrain.com) – Employee Theft Statistics
** Statistic Brain (www.statisticbrain.com) – Employee Theft Statistics
13. How do we KNOW where
Data Security Is Going…
…Because the OLD way isn’t working
Customer Lawsuits
Digital Forensics
eDiscovery
Evidence Hosting & Storage
Regulatory Investigations
Regulatory Fines
Loss of Productivity
Loss of Competitiveness
It is TOO expensive
to continue allowing data breaches to occur.
14. Where Data Security Is GOING:
Security Simplified
Analytics Examples:
& KaiserPermanente
Intelligence Fidelity
Internet
LockheedMartin
AssuraMed
ISP Modem
Company Firewall Lorenzi ROAR
Company IDS/IPS
ROAR Company Router
monitors data
patterns 24x7
providing constant
feedback & insight Company
Antivirus
NOTE: Examples may not be Lorenzi clients but utilize technology similar to ROAR
15. Where Data Security Is GOING:
Explained
The previous slide is the layout of where companies need to go.
Companies will:
Use existing technology to protect data
Take Additional Protections Including:
Utilize Continuous Monitoring
Utilize Security Analytics
Reduce Bottom-line Expenses
16. Lorenzi ROAR Provides:
Continuous Monitoring of data activity
Think: DVR’ing how data moves on your network
Example: You can replay questionable activities
Security Analytics
Think: Alerting you when data does something it
hasn’t done before
Examples: Forwarding an email to a private address,
FTP’ing a design, printing out financials
User Access logging for Compliance
Performance Metrics for Bottom-line
management & cost savings
17. So, what does this mean to me?
As a Businesses Executive:
Hackers are coming
You won’t know where they are coming
from
Protect your data (it’s easy)
As a Consumer:
Hackers are watching you
You NEED to encourage businesses to
protect your data
Don’t click on random web-links
18. Wrap Up
Hackers can beat “Set it & Forget it” Technology
Companies MUST watch data movement at the
DEVICE level to determine risks
Attacks are more FREQUENT from Outside In, but
more SUCCESSFUL from Inside Out.
Lorenzi ROAR provides the TOOLS & INSIGHT
companies NEED to protect their data.
19. Are YOU
Ready for a FREE Trial of ROAR?
The Lorenzi Group
866-632-9880 x123
www.thelorenzigroup.com
info@thelorenzigroup.com