Presented as a TED talk style 5 things in 5 minutes. The purpose was to give the audience of Directors and Officers of small and medium size businesses some understanding of the challenges and practical advice.
Cybersecurity Five Facts in Five Minutes - IOD - London - 20161129
1. Five Things in Five Minutes from Fifth Step
Darren Wray - 29th November 2016
How to Improve Your Cybersecurity
2. 22
1. Don’t Under Estimate the Hackers
Hackers are Intelligent, Motivated and
Determined:
72% of attacks are financially
motivated
14% of attacks are by hacktivists
14% of attacks are committed by
cyber-spies or nation states
Statistics from Hackmageddon – August 2016
3. 33
2. Know What You Need to Protect
You and Your Company’s Digital Assets Vary:
Intellectual
Property
Personal Data Commercial
Information
• Your secret
sauce recipe
• Your
approaches
and
methodologies
• Your plans and
designs
• Your and your
staff’s
personal
information
• Your clients
personal
information
• Your client list
• Your business
expansion
plans
• Your target
clients
• Client
commercials
Data may be stored on your hardware or in the cloud
4. 44
3. What are You Protecting Against?
Hacking
Breaking into your computer system by exploiting a
security flaw or by breaking or guessing a password
to gain otherwise unauthorised access.
Phishing
Pronounced fishing. Involves convincing someone to
provide information (user Id and password for
example) to a website that isn’t what is pretends to
be.
5. 55
3. What are You Protecting Against?
Ransomware
Virus-like software that encrypts your files and data
and holds you to ransom. If payment is not made
with a time limit the ransom expires and the files
remain encrypted
6. 66
4. Practice Basic Protection
Awareness
Raise the awareness of your staff so that they can
spot and report unusual activity
Passwords
Passwords should be strong (mixture of upper case,
lower case, letters and symbols. They should change
regularly. Where possible enable multi-factor
authentication
7. 77
4. Practice Basic Protection
Use Protection
Install anti-virus software, and ensure your
computer’s firewall is enabled as a minimum
Vendors
Ensure that your vendors are cyber-resilient and are
not a weak link in your security
Assessment
Perform a cyber assessment to identify strengths and
weaknesses to help you improve
8. 88
5. Have a Response Plan
“There are only two types of company, those who
have been hacked and those that will be. Even that is
merging into one category, those that have been
hacked, and will be again.”
Robert Mueller
(former) Director of the FBI 2013
Hackers spend over 250 days in their target’s
computers before being discovered
9. London HQ
Birchin Court
20 Birchin Lane
London
EC3V 9DU,
+44 (0)20 71931966
enquires@fifthstep.com
Bermuda Office
The Rosebank Building
12 Bermudiana Road
Hamilton HM 11
+1 (441) 295 3806 x206
enquires@fifthstep.com
US Office
1745 Broadway
New York
NY 10019
+1 (646) 580-3991
enquires@fifthstep.com
www.fifthstep.com