SlideShare a Scribd company logo
1 of 16
- No matter how small or
large your company is, it is
important that you have a
plan to secure your
information assets.
WHAT IS INFORMATION SECURITY
- Information security, also referred
to as InfoSec for short, is the
practice of protecting information
from unauthorized access. This
also includes, preventing the
unauthorized disclosure, use,
modification, disruption, recording,
and inspection of information.
DON’T WAIT… SECURE NOW
- Data held on computer systems
are usually critical to the operations
and overall business of an
organization. However, it is
common for some businesses to
neglect security until their data
assets become threatened or
otherwise stolen.
IMPORTANCE OF INFOSEC
- In business, it is not uncommon
for organizations to collect
customer data. Sensitive company
data or information assets are also
stored internally. This is largely why
it is important that organizations
pay attention to information
security.
- The purpose of information
security is to preserve
confidentiality, integrity, and
availability. Let’s take a look
at them quickly.
CONFIDENTIALITY
- This ensures that only those
with the right to view your
information have access to
them. This will help protect
your company from internal and
external threats.
INTEGRITY
- This ensures that your data is
reliable, accurate, and
processed correctly. Accurate
and reliable data will help your
employees meet and/or exceed
company expectations.
AVAILABILITY
- This ensures that data can
be accessed whenever it is
needed or when it is
requested. Thus, improving
overall efficiency.
TYPES OF INFORMATION
SECURITY THREATS
- There are several information
security threats and as IT
systems become more
advanced, it is crucial that we
can clearly identify these
threats so that we may stay
safe.
In a 2013 TEDx presentation,
Anish Bhimani, Managing
Director and Chief Information
Risk Officer of JP Morgan
Chase, grouped potential
security threats into two
categories. These were
disruption and fraud.
DISRUPTION
– This group consists of
“hacktivists” and people who may
hate big businesses or individual
companies. These people can cost
an organization a lot of dollars.
Some examples are service attacks,
website defacements, email hacking
and other disruptions.
FRAUD
- This group of people are more
focused on stealing money and
intellectual property. This
includes identity theft, banking
information theft, and other
information that may lead to
cash.
One recent event in regards to
information theft is the email
hacking of Colin Powell, former top
diplomat to USA’s former president
George W. Bush. According to the
NY Times, Colin’s email was
breached and leaked online. You
may be able to imagine the potential
damages that have occurred.
OWNING A CULTURE OF SECURITY
AWARENESS
- Information security has to be part of
the day to day thinking of your
employees. It has to be thought of and
seen as an important aspect of your
organization’s success. Although, IT
generally handles the technical aspects
of security, your employees should also
be made aware of the many risks that are
out there.
To address potential information
security risks within your organization,
reach out to us at:
Penney Computer Consulting
info@penneycomputer.com
http://www.penneycomputer.com
Thank you for your time.

More Related Content

What's hot

Top Cyber Security Concerns for Small Businesses
Top Cyber Security Concerns for Small BusinessesTop Cyber Security Concerns for Small Businesses
Top Cyber Security Concerns for Small BusinessesJairo Batista, MBA
 
Social Engineering the CEO
Social Engineering the CEOSocial Engineering the CEO
Social Engineering the CEOKevin Duffey
 
August 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber AttackerAugust 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber Attackerseadeloitte
 
Are you at risk on the World Wide Web?
Are you at risk on the World Wide Web? Are you at risk on the World Wide Web?
Are you at risk on the World Wide Web? TechGenie
 
Positive and Negative impact of IT oN Business
Positive and Negative impact of IT oN BusinessPositive and Negative impact of IT oN Business
Positive and Negative impact of IT oN BusinessDinesh Laviskar
 
CEOs leading Recovery from Cyber Attack
CEOs leading Recovery from Cyber AttackCEOs leading Recovery from Cyber Attack
CEOs leading Recovery from Cyber AttackKevin Duffey
 
September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9seadeloitte
 
Cyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access managementCyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access managementseadeloitte
 
Cyber Recovery - Legal Toolkit
Cyber Recovery - Legal ToolkitCyber Recovery - Legal Toolkit
Cyber Recovery - Legal ToolkitKevin Duffey
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForcePatrick Bouillaud
 
Cyberlaw - Defining and Categorizing Chaos
Cyberlaw - Defining and Categorizing ChaosCyberlaw - Defining and Categorizing Chaos
Cyberlaw - Defining and Categorizing ChaosDavid Myers
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.Chinatu Uzuegbu
 
Practical approach to combating cyber crimes
Practical approach to combating cyber crimesPractical approach to combating cyber crimes
Practical approach to combating cyber crimesChinatu Uzuegbu
 
Cybersecurity pres 05-19-final
Cybersecurity pres 05-19-finalCybersecurity pres 05-19-final
Cybersecurity pres 05-19-finalVivek Ahuja
 
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...jsnyder40
 
June 2017 - Your Biggest Risk Could Be You
June 2017 - Your Biggest Risk Could Be YouJune 2017 - Your Biggest Risk Could Be You
June 2017 - Your Biggest Risk Could Be Youseadeloitte
 
2017 in Review: Infosec Pros Look Back on the Year
2017 in Review: Infosec Pros Look Back on the Year2017 in Review: Infosec Pros Look Back on the Year
2017 in Review: Infosec Pros Look Back on the YearTripwire
 

What's hot (20)

Top Cyber Security Concerns for Small Businesses
Top Cyber Security Concerns for Small BusinessesTop Cyber Security Concerns for Small Businesses
Top Cyber Security Concerns for Small Businesses
 
Social Engineering the CEO
Social Engineering the CEOSocial Engineering the CEO
Social Engineering the CEO
 
August 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber AttackerAugust 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber Attacker
 
Are you at risk on the World Wide Web?
Are you at risk on the World Wide Web? Are you at risk on the World Wide Web?
Are you at risk on the World Wide Web?
 
Positive and Negative impact of IT oN Business
Positive and Negative impact of IT oN BusinessPositive and Negative impact of IT oN Business
Positive and Negative impact of IT oN Business
 
CEOs leading Recovery from Cyber Attack
CEOs leading Recovery from Cyber AttackCEOs leading Recovery from Cyber Attack
CEOs leading Recovery from Cyber Attack
 
September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9
 
Cyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access managementCyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access management
 
Cyber Recovery - Legal Toolkit
Cyber Recovery - Legal ToolkitCyber Recovery - Legal Toolkit
Cyber Recovery - Legal Toolkit
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-Force
 
Cyberlaw - Defining and Categorizing Chaos
Cyberlaw - Defining and Categorizing ChaosCyberlaw - Defining and Categorizing Chaos
Cyberlaw - Defining and Categorizing Chaos
 
CRI-Exec-Cyber-Briefings (1)
CRI-Exec-Cyber-Briefings (1)CRI-Exec-Cyber-Briefings (1)
CRI-Exec-Cyber-Briefings (1)
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.
 
Practical approach to combating cyber crimes
Practical approach to combating cyber crimesPractical approach to combating cyber crimes
Practical approach to combating cyber crimes
 
Cybersecurity pres 05-19-final
Cybersecurity pres 05-19-finalCybersecurity pres 05-19-final
Cybersecurity pres 05-19-final
 
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
 
Cyber Risks
Cyber RisksCyber Risks
Cyber Risks
 
June 2017 - Your Biggest Risk Could Be You
June 2017 - Your Biggest Risk Could Be YouJune 2017 - Your Biggest Risk Could Be You
June 2017 - Your Biggest Risk Could Be You
 
223 - Computer ethics
223 - Computer ethics223 - Computer ethics
223 - Computer ethics
 
2017 in Review: Infosec Pros Look Back on the Year
2017 in Review: Infosec Pros Look Back on the Year2017 in Review: Infosec Pros Look Back on the Year
2017 in Review: Infosec Pros Look Back on the Year
 

Viewers also liked

12 Amazing Productivity Apps for Busy Executives
12 Amazing Productivity Apps for Busy Executives12 Amazing Productivity Apps for Busy Executives
12 Amazing Productivity Apps for Busy ExecutivesBert Penney
 
Sintesis informativa 29 de marzo 2017
Sintesis informativa 29 de marzo 2017Sintesis informativa 29 de marzo 2017
Sintesis informativa 29 de marzo 2017megaradioexpress
 
Getting It Right: “Bad Paper” Legislation That Works
Getting It Right: “Bad Paper” Legislation That WorksGetting It Right: “Bad Paper” Legislation That Works
Getting It Right: “Bad Paper” Legislation That WorksSwords to Plowshares
 
Estrés. Cómo se produce un ataque de estrés y estrategias para manejarlo.
Estrés. Cómo se produce un ataque de estrés y estrategias para manejarlo.Estrés. Cómo se produce un ataque de estrés y estrategias para manejarlo.
Estrés. Cómo se produce un ataque de estrés y estrategias para manejarlo.Nayma Consultores
 
Applied And Persuasive Applications For Museums
Applied And Persuasive Applications For MuseumsApplied And Persuasive Applications For Museums
Applied And Persuasive Applications For MuseumsPietro Polsinelli
 
Tues. March 7th Pine River Announcements
Tues. March 7th Pine River Announcements  Tues. March 7th Pine River Announcements
Tues. March 7th Pine River Announcements Pine River
 
Bloco Esquerda
Bloco EsquerdaBloco Esquerda
Bloco Esquerdaamattos76
 
Social Research on Violence
Social Research on ViolenceSocial Research on Violence
Social Research on ViolenceMd.Ashfak sayed
 
Federalists vs. Republicans
Federalists vs. RepublicansFederalists vs. Republicans
Federalists vs. Republicansmwhittakerms
 
Fläckvis lappning och vägreglernas förbud mot split friction, granlund wsp
Fläckvis lappning och vägreglernas förbud mot split friction, granlund wspFläckvis lappning och vägreglernas förbud mot split friction, granlund wsp
Fläckvis lappning och vägreglernas förbud mot split friction, granlund wspJohan Granlund
 
Delivering Competitive Edge
Delivering Competitive EdgeDelivering Competitive Edge
Delivering Competitive EdgeHolonomics
 
UNFEA : point sur le marché de l'étiquette adhésive en France
UNFEA : point sur le marché de l'étiquette adhésive en FranceUNFEA : point sur le marché de l'étiquette adhésive en France
UNFEA : point sur le marché de l'étiquette adhésive en FranceChristophe Perrot
 

Viewers also liked (15)

12 Amazing Productivity Apps for Busy Executives
12 Amazing Productivity Apps for Busy Executives12 Amazing Productivity Apps for Busy Executives
12 Amazing Productivity Apps for Busy Executives
 
Sintesis informativa 29 de marzo 2017
Sintesis informativa 29 de marzo 2017Sintesis informativa 29 de marzo 2017
Sintesis informativa 29 de marzo 2017
 
Getting It Right: “Bad Paper” Legislation That Works
Getting It Right: “Bad Paper” Legislation That WorksGetting It Right: “Bad Paper” Legislation That Works
Getting It Right: “Bad Paper” Legislation That Works
 
Speed costs
Speed costsSpeed costs
Speed costs
 
Bn1029 demo sap sd
Bn1029 demo  sap sdBn1029 demo  sap sd
Bn1029 demo sap sd
 
Estrés. Cómo se produce un ataque de estrés y estrategias para manejarlo.
Estrés. Cómo se produce un ataque de estrés y estrategias para manejarlo.Estrés. Cómo se produce un ataque de estrés y estrategias para manejarlo.
Estrés. Cómo se produce un ataque de estrés y estrategias para manejarlo.
 
Applied And Persuasive Applications For Museums
Applied And Persuasive Applications For MuseumsApplied And Persuasive Applications For Museums
Applied And Persuasive Applications For Museums
 
Tues. March 7th Pine River Announcements
Tues. March 7th Pine River Announcements  Tues. March 7th Pine River Announcements
Tues. March 7th Pine River Announcements
 
Bloco Esquerda
Bloco EsquerdaBloco Esquerda
Bloco Esquerda
 
The Impact of Volatility on Wealth
The Impact of Volatility on WealthThe Impact of Volatility on Wealth
The Impact of Volatility on Wealth
 
Social Research on Violence
Social Research on ViolenceSocial Research on Violence
Social Research on Violence
 
Federalists vs. Republicans
Federalists vs. RepublicansFederalists vs. Republicans
Federalists vs. Republicans
 
Fläckvis lappning och vägreglernas förbud mot split friction, granlund wsp
Fläckvis lappning och vägreglernas förbud mot split friction, granlund wspFläckvis lappning och vägreglernas förbud mot split friction, granlund wsp
Fläckvis lappning och vägreglernas förbud mot split friction, granlund wsp
 
Delivering Competitive Edge
Delivering Competitive EdgeDelivering Competitive Edge
Delivering Competitive Edge
 
UNFEA : point sur le marché de l'étiquette adhésive en France
UNFEA : point sur le marché de l'étiquette adhésive en FranceUNFEA : point sur le marché de l'étiquette adhésive en France
UNFEA : point sur le marché de l'étiquette adhésive en France
 

Similar to Information Security: Protecting Your Assets

Whitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-badWhitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-badbanerjeea
 
You Are the Target
You Are the TargetYou Are the Target
You Are the TargetEMC
 
How to secure information systemsSolutionAnswerInformation.pdf
How to secure information systemsSolutionAnswerInformation.pdfHow to secure information systemsSolutionAnswerInformation.pdf
How to secure information systemsSolutionAnswerInformation.pdfrohit219406
 
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdf
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdfInsider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdf
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdfEnterprise Insider
 
The significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information SecurityThe significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information Securitylearntransformation0
 
Understanding Website Data Security And Its Importance.pdf
Understanding Website Data Security And Its Importance.pdfUnderstanding Website Data Security And Its Importance.pdf
Understanding Website Data Security And Its Importance.pdfEracom Technologies
 
DataGravity Security Pop Quiz
DataGravity Security Pop QuizDataGravity Security Pop Quiz
DataGravity Security Pop QuizDataGravity
 
Mark Lanterman - The Risk Report October 2015
Mark Lanterman - The Risk Report October 2015Mark Lanterman - The Risk Report October 2015
Mark Lanterman - The Risk Report October 2015Mark Lanterman
 
How to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdfHow to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdfV2Infotech1
 
How to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptxHow to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptxV2Infotech1
 
An insight into information security.pdf
An insight into information security.pdfAn insight into information security.pdf
An insight into information security.pdfSecurityium
 
What Small Business Can Do To Protect Themselves Now in Cybersecurity
What Small Business Can Do To Protect Themselves Now in CybersecurityWhat Small Business Can Do To Protect Themselves Now in Cybersecurity
What Small Business Can Do To Protect Themselves Now in CybersecurityReading Works Detroit
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber securityAnimesh Roy
 
Cybersecurity: How Safe Is Your Organization?
Cybersecurity: How Safe Is Your Organization?Cybersecurity: How Safe Is Your Organization?
Cybersecurity: How Safe Is Your Organization?CBIZ, Inc.
 
Security Scare - Cybersecurity & What to Do About It!
Security Scare - Cybersecurity & What to Do About It!Security Scare - Cybersecurity & What to Do About It!
Security Scare - Cybersecurity & What to Do About It!Craig Rispin
 
Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015Lawley Insurance
 
Cyber Threat Landscape- Security Posture - ver 1.0
Cyber Threat Landscape- Security Posture - ver 1.0Cyber Threat Landscape- Security Posture - ver 1.0
Cyber Threat Landscape- Security Posture - ver 1.0Satyanandan Atyam
 
Hiring Guide to the Information Security Profession
Hiring Guide to the Information Security ProfessionHiring Guide to the Information Security Profession
Hiring Guide to the Information Security Professionamiable_indian
 

Similar to Information Security: Protecting Your Assets (20)

Whitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-badWhitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-bad
 
You Are the Target
You Are the TargetYou Are the Target
You Are the Target
 
How to secure information systemsSolutionAnswerInformation.pdf
How to secure information systemsSolutionAnswerInformation.pdfHow to secure information systemsSolutionAnswerInformation.pdf
How to secure information systemsSolutionAnswerInformation.pdf
 
Information security
Information securityInformation security
Information security
 
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdf
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdfInsider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdf
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdf
 
The significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information SecurityThe significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information Security
 
Understanding Website Data Security And Its Importance.pdf
Understanding Website Data Security And Its Importance.pdfUnderstanding Website Data Security And Its Importance.pdf
Understanding Website Data Security And Its Importance.pdf
 
DataGravity Security Pop Quiz
DataGravity Security Pop QuizDataGravity Security Pop Quiz
DataGravity Security Pop Quiz
 
Mark Lanterman - The Risk Report October 2015
Mark Lanterman - The Risk Report October 2015Mark Lanterman - The Risk Report October 2015
Mark Lanterman - The Risk Report October 2015
 
How to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdfHow to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdf
 
How to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptxHow to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptx
 
An insight into information security.pdf
An insight into information security.pdfAn insight into information security.pdf
An insight into information security.pdf
 
Security Feature Cover Story
Security Feature Cover StorySecurity Feature Cover Story
Security Feature Cover Story
 
What Small Business Can Do To Protect Themselves Now in Cybersecurity
What Small Business Can Do To Protect Themselves Now in CybersecurityWhat Small Business Can Do To Protect Themselves Now in Cybersecurity
What Small Business Can Do To Protect Themselves Now in Cybersecurity
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Cybersecurity: How Safe Is Your Organization?
Cybersecurity: How Safe Is Your Organization?Cybersecurity: How Safe Is Your Organization?
Cybersecurity: How Safe Is Your Organization?
 
Security Scare - Cybersecurity & What to Do About It!
Security Scare - Cybersecurity & What to Do About It!Security Scare - Cybersecurity & What to Do About It!
Security Scare - Cybersecurity & What to Do About It!
 
Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015
 
Cyber Threat Landscape- Security Posture - ver 1.0
Cyber Threat Landscape- Security Posture - ver 1.0Cyber Threat Landscape- Security Posture - ver 1.0
Cyber Threat Landscape- Security Posture - ver 1.0
 
Hiring Guide to the Information Security Profession
Hiring Guide to the Information Security ProfessionHiring Guide to the Information Security Profession
Hiring Guide to the Information Security Profession
 

Recently uploaded

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

Information Security: Protecting Your Assets

  • 1.
  • 2. - No matter how small or large your company is, it is important that you have a plan to secure your information assets.
  • 3. WHAT IS INFORMATION SECURITY - Information security, also referred to as InfoSec for short, is the practice of protecting information from unauthorized access. This also includes, preventing the unauthorized disclosure, use, modification, disruption, recording, and inspection of information.
  • 4. DON’T WAIT… SECURE NOW - Data held on computer systems are usually critical to the operations and overall business of an organization. However, it is common for some businesses to neglect security until their data assets become threatened or otherwise stolen.
  • 5. IMPORTANCE OF INFOSEC - In business, it is not uncommon for organizations to collect customer data. Sensitive company data or information assets are also stored internally. This is largely why it is important that organizations pay attention to information security.
  • 6. - The purpose of information security is to preserve confidentiality, integrity, and availability. Let’s take a look at them quickly.
  • 7. CONFIDENTIALITY - This ensures that only those with the right to view your information have access to them. This will help protect your company from internal and external threats.
  • 8. INTEGRITY - This ensures that your data is reliable, accurate, and processed correctly. Accurate and reliable data will help your employees meet and/or exceed company expectations.
  • 9. AVAILABILITY - This ensures that data can be accessed whenever it is needed or when it is requested. Thus, improving overall efficiency.
  • 10. TYPES OF INFORMATION SECURITY THREATS - There are several information security threats and as IT systems become more advanced, it is crucial that we can clearly identify these threats so that we may stay safe.
  • 11. In a 2013 TEDx presentation, Anish Bhimani, Managing Director and Chief Information Risk Officer of JP Morgan Chase, grouped potential security threats into two categories. These were disruption and fraud.
  • 12. DISRUPTION – This group consists of “hacktivists” and people who may hate big businesses or individual companies. These people can cost an organization a lot of dollars. Some examples are service attacks, website defacements, email hacking and other disruptions.
  • 13. FRAUD - This group of people are more focused on stealing money and intellectual property. This includes identity theft, banking information theft, and other information that may lead to cash.
  • 14. One recent event in regards to information theft is the email hacking of Colin Powell, former top diplomat to USA’s former president George W. Bush. According to the NY Times, Colin’s email was breached and leaked online. You may be able to imagine the potential damages that have occurred.
  • 15. OWNING A CULTURE OF SECURITY AWARENESS - Information security has to be part of the day to day thinking of your employees. It has to be thought of and seen as an important aspect of your organization’s success. Although, IT generally handles the technical aspects of security, your employees should also be made aware of the many risks that are out there.
  • 16. To address potential information security risks within your organization, reach out to us at: Penney Computer Consulting info@penneycomputer.com http://www.penneycomputer.com Thank you for your time.