SlideShare a Scribd company logo
1 of 8
Download to read offline
FIVE MOST FREQUENT
CYBERSECURITY OVERSIGHTS
BY SANCHEZ WILLIAMS: DIRECTOR OF IT OPERATIONS U2CLOUD
SANCHEZ WILLIAMS
• Director Of IT Operations for U2Cloud
• Over 20 years experience in IT
• Former Security Architect for one of the 5 largest banks in the US
• 15 years of Private and Public Cloud experience
BY SANCHEZ WILLIAMS: DIRECTOR OF IT OPERATIONS U2CLOUD
UNDERSTANDING CLOUD BASED ANTI-VIRUS
• Q: What AV protection is included with your Hosted
Servers/Desktops/Applications?
• A: Probably None
• (With the exception of built in AV such as Windows Defender)
• Many companies have Windows Defender disabled as part of their Group Policies due
to other AV’s run within the company
BY SANCHEZ WILLIAMS: DIRECTOR OF IT OPERATIONS U2CLOUD
UNDERSTANDING OR MANAGING THE CLOUD
BASED FIREWALL
• Many SMB’s forget their Cloud Based services have a Firewall
• Left Unconfigured
• If Configured many unnecessary ports and services are left open after testing
and development has completed
BY SANCHEZ WILLIAMS: DIRECTOR OF IT OPERATIONS U2CLOUD
UTILIZING TWO FACTOR AUTHENTICATION
• Phishing has become extremely sophisticated in 2019
• Many password compromises go unnoticed until it is to late
• Keyloggers are back in the mainstream
• Opensource and Free application EULA’s often give near unlimited access to a
mobile devices storage
BY SANCHEZ WILLIAMS: DIRECTOR OF IT OPERATIONS U2CLOUD
PROPERLY TESTING BACKUPS
• According to a recent survey of 700 IT Professionals published by Spiceworks,
about 71 percent of companies do not test their plan more than once a year
• About 70 percent of Ransomware attacks in 2018 targeted small businesses,
with an average ransom demand of $116,000, according to a recent report
from Beazley Breach Response Services
BY SANCHEZ WILLIAMS: DIRECTOR OF IT OPERATIONS U2CLOUD
EDUCATING STAFF
• Staff education is one of the most effective means of preventing a breach
• Sophisticated phishing attacks can be very hard to spot even for a trained
professional
• Brute force is rarely used in today’s age of abundant information
• Knowing who is in what position within a company is often as easy as checking LinkedIn
• This gives potential threats a plethora of information to infiltrate the company
BY SANCHEZ WILLIAMS: DIRECTOR OF IT OPERATIONS U2CLOUD
QUESTIONS
• WWW.U2CLOUD.COM
• SWILLIAMS@U2CLOUD.COM
• 904-394-3910
BY SANCHEZ WILLIAMS: DIRECTOR OF IT OPERATIONS U2CLOUD

More Related Content

What's hot

Common Security Misconception
Common Security MisconceptionCommon Security Misconception
Common Security MisconceptionMatthew Ong
 
Endpoint Security Evasion
Endpoint Security EvasionEndpoint Security Evasion
Endpoint Security EvasionInvincea, Inc.
 
Don’t Sweat the Small Stuff – Protect What Matters Most - Interop 2014
Don’t Sweat the Small Stuff – Protect What Matters Most - Interop 2014 Don’t Sweat the Small Stuff – Protect What Matters Most - Interop 2014
Don’t Sweat the Small Stuff – Protect What Matters Most - Interop 2014 Unisys Corporation
 
(2017) GDPR – What Does It Mean For The Mainframe v0.2
(2017) GDPR – What Does It Mean For The Mainframe v0.2(2017) GDPR – What Does It Mean For The Mainframe v0.2
(2017) GDPR – What Does It Mean For The Mainframe v0.2Rui Miguel Feio
 
Cyber security and the mainframe (v1.3)
Cyber security and the mainframe (v1.3)Cyber security and the mainframe (v1.3)
Cyber security and the mainframe (v1.3)Rui Miguel Feio
 
terry-gilsenan-pie-operating.10433
terry-gilsenan-pie-operating.10433terry-gilsenan-pie-operating.10433
terry-gilsenan-pie-operating.10433Terry Gilsenan
 
National Government Webinar: Reap the Rewards of IT Consolidation
National Government Webinar: Reap the Rewards of IT ConsolidationNational Government Webinar: Reap the Rewards of IT Consolidation
National Government Webinar: Reap the Rewards of IT ConsolidationSolarWinds
 
Simplitfy - Guarding your Data
Simplitfy - Guarding your DataSimplitfy - Guarding your Data
Simplitfy - Guarding your DataErick Solms
 
Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3)
Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3)Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3)
Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3)Rui Miguel Feio
 
Even In 2014, Attackers are on steroid on Cloud, since the IT spending on Web...
Even In 2014, Attackers are on steroid on Cloud, since the IT spending on Web...Even In 2014, Attackers are on steroid on Cloud, since the IT spending on Web...
Even In 2014, Attackers are on steroid on Cloud, since the IT spending on Web...Sreejesh Madonandy
 
How to Protect Your Mainframe from Hackers (v1.0)
How to Protect Your Mainframe from Hackers (v1.0)How to Protect Your Mainframe from Hackers (v1.0)
How to Protect Your Mainframe from Hackers (v1.0)Rui Miguel Feio
 
Protecting Your Business
Protecting Your BusinessProtecting Your Business
Protecting Your BusinessAll Covered
 
2017 - A New Look at Mainframe Hacking and Penetration Testing v2.2
2017 - A New Look at Mainframe Hacking and Penetration Testing v2.22017 - A New Look at Mainframe Hacking and Penetration Testing v2.2
2017 - A New Look at Mainframe Hacking and Penetration Testing v2.2Rui Miguel Feio
 
Your Datacenter at risk? – Patching for the Datacenter
Your Datacenter at risk? – Patching for the DatacenterYour Datacenter at risk? – Patching for the Datacenter
Your Datacenter at risk? – Patching for the DatacenterIvanti
 
Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...
Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...
Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...IBM Security
 
Uncover What's Inside the Mind of a Hacker
Uncover What's Inside the Mind of a HackerUncover What's Inside the Mind of a Hacker
Uncover What's Inside the Mind of a HackerIBM Security
 
Considerations for a secure internet of things for cities and communities
Considerations for a secure internet of things for cities and communitiesConsiderations for a secure internet of things for cities and communities
Considerations for a secure internet of things for cities and communitiesMrinal Wadhwa
 
How to secure a safe teleworking environment
How to secure a safe teleworking environment How to secure a safe teleworking environment
How to secure a safe teleworking environment LCpublicrelations
 

What's hot (20)

Common Security Misconception
Common Security MisconceptionCommon Security Misconception
Common Security Misconception
 
Endpoint Security Evasion
Endpoint Security EvasionEndpoint Security Evasion
Endpoint Security Evasion
 
Don’t Sweat the Small Stuff – Protect What Matters Most - Interop 2014
Don’t Sweat the Small Stuff – Protect What Matters Most - Interop 2014 Don’t Sweat the Small Stuff – Protect What Matters Most - Interop 2014
Don’t Sweat the Small Stuff – Protect What Matters Most - Interop 2014
 
(2017) GDPR – What Does It Mean For The Mainframe v0.2
(2017) GDPR – What Does It Mean For The Mainframe v0.2(2017) GDPR – What Does It Mean For The Mainframe v0.2
(2017) GDPR – What Does It Mean For The Mainframe v0.2
 
Cyber security and the mainframe (v1.3)
Cyber security and the mainframe (v1.3)Cyber security and the mainframe (v1.3)
Cyber security and the mainframe (v1.3)
 
terry-gilsenan-pie-operating.10433
terry-gilsenan-pie-operating.10433terry-gilsenan-pie-operating.10433
terry-gilsenan-pie-operating.10433
 
National Government Webinar: Reap the Rewards of IT Consolidation
National Government Webinar: Reap the Rewards of IT ConsolidationNational Government Webinar: Reap the Rewards of IT Consolidation
National Government Webinar: Reap the Rewards of IT Consolidation
 
Simplitfy - Guarding your Data
Simplitfy - Guarding your DataSimplitfy - Guarding your Data
Simplitfy - Guarding your Data
 
Security challenges in 2017
Security challenges in 2017Security challenges in 2017
Security challenges in 2017
 
Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3)
Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3)Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3)
Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3)
 
Even In 2014, Attackers are on steroid on Cloud, since the IT spending on Web...
Even In 2014, Attackers are on steroid on Cloud, since the IT spending on Web...Even In 2014, Attackers are on steroid on Cloud, since the IT spending on Web...
Even In 2014, Attackers are on steroid on Cloud, since the IT spending on Web...
 
How to Protect Your Mainframe from Hackers (v1.0)
How to Protect Your Mainframe from Hackers (v1.0)How to Protect Your Mainframe from Hackers (v1.0)
How to Protect Your Mainframe from Hackers (v1.0)
 
Protecting Your Business
Protecting Your BusinessProtecting Your Business
Protecting Your Business
 
2017 - A New Look at Mainframe Hacking and Penetration Testing v2.2
2017 - A New Look at Mainframe Hacking and Penetration Testing v2.22017 - A New Look at Mainframe Hacking and Penetration Testing v2.2
2017 - A New Look at Mainframe Hacking and Penetration Testing v2.2
 
Your Datacenter at risk? – Patching for the Datacenter
Your Datacenter at risk? – Patching for the DatacenterYour Datacenter at risk? – Patching for the Datacenter
Your Datacenter at risk? – Patching for the Datacenter
 
Mitigating the clicker
Mitigating the clickerMitigating the clicker
Mitigating the clicker
 
Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...
Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...
Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...
 
Uncover What's Inside the Mind of a Hacker
Uncover What's Inside the Mind of a HackerUncover What's Inside the Mind of a Hacker
Uncover What's Inside the Mind of a Hacker
 
Considerations for a secure internet of things for cities and communities
Considerations for a secure internet of things for cities and communitiesConsiderations for a secure internet of things for cities and communities
Considerations for a secure internet of things for cities and communities
 
How to secure a safe teleworking environment
How to secure a safe teleworking environment How to secure a safe teleworking environment
How to secure a safe teleworking environment
 

Similar to BITZ BOOTCAMP DC: Expo Showcase - U2Cloud

Andrew Useckas Csa presentation hacking custom webapps 4 3
Andrew Useckas Csa presentation   hacking custom webapps 4 3Andrew Useckas Csa presentation   hacking custom webapps 4 3
Andrew Useckas Csa presentation hacking custom webapps 4 3Trish McGinity, CCSK
 
The cyber house of horrors - securing the expanding attack surface
The cyber house of horrors -  securing the expanding attack surfaceThe cyber house of horrors -  securing the expanding attack surface
The cyber house of horrors - securing the expanding attack surfaceJason Bloomberg
 
Breached! App Attacks, Application Protection and Incident Response
Breached! App Attacks, Application Protection and Incident ResponseBreached! App Attacks, Application Protection and Incident Response
Breached! App Attacks, Application Protection and Incident ResponseResilient Systems
 
Scalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Decisions
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Decisions
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Decisions
 
Compliance made easy. Pass your audits stress-free.
Compliance made easy. Pass your audits stress-free.Compliance made easy. Pass your audits stress-free.
Compliance made easy. Pass your audits stress-free.AlgoSec
 
NVIS-Pitch Deck version 6 - 2022 MAR.pdf
NVIS-Pitch Deck version 6 - 2022 MAR.pdfNVIS-Pitch Deck version 6 - 2022 MAR.pdf
NVIS-Pitch Deck version 6 - 2022 MAR.pdfPhilSmith165
 
Event Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control SystemsEvent Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control SystemsInfonaligy
 
Spikes Security Isla Isolation
Spikes Security Isla IsolationSpikes Security Isla Isolation
Spikes Security Isla IsolationCybryx
 
Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015Alert Logic
 
Cyber security and its controls.pptx
Cyber security and its controls.pptxCyber security and its controls.pptx
Cyber security and its controls.pptxsrikmhh
 
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDCDefending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDCCloudflare
 
Streamline and Secure Your Network and Users
Streamline and Secure Your Network and UsersStreamline and Secure Your Network and Users
Streamline and Secure Your Network and UsersFrederik Lawson
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamMohammed Adam
 
[CLASS 2014] Palestra Técnica - Alexandre Euclides
[CLASS 2014] Palestra Técnica - Alexandre Euclides[CLASS 2014] Palestra Técnica - Alexandre Euclides
[CLASS 2014] Palestra Técnica - Alexandre EuclidesTI Safe
 
Nvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - finalNvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - finalA. Phillip Smith
 

Similar to BITZ BOOTCAMP DC: Expo Showcase - U2Cloud (20)

Andrew Useckas Csa presentation hacking custom webapps 4 3
Andrew Useckas Csa presentation   hacking custom webapps 4 3Andrew Useckas Csa presentation   hacking custom webapps 4 3
Andrew Useckas Csa presentation hacking custom webapps 4 3
 
The cyber house of horrors - securing the expanding attack surface
The cyber house of horrors -  securing the expanding attack surfaceThe cyber house of horrors -  securing the expanding attack surface
The cyber house of horrors - securing the expanding attack surface
 
Application Hackers Have A Handbook. Why Shouldn't You?
Application Hackers Have A Handbook. Why Shouldn't You?Application Hackers Have A Handbook. Why Shouldn't You?
Application Hackers Have A Handbook. Why Shouldn't You?
 
Breached! App Attacks, Application Protection and Incident Response
Breached! App Attacks, Application Protection and Incident ResponseBreached! App Attacks, Application Protection and Incident Response
Breached! App Attacks, Application Protection and Incident Response
 
Scalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa Presentation
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
 
Compliance made easy. Pass your audits stress-free.
Compliance made easy. Pass your audits stress-free.Compliance made easy. Pass your audits stress-free.
Compliance made easy. Pass your audits stress-free.
 
NVIS-Pitch Deck version 6 - 2022 MAR.pdf
NVIS-Pitch Deck version 6 - 2022 MAR.pdfNVIS-Pitch Deck version 6 - 2022 MAR.pdf
NVIS-Pitch Deck version 6 - 2022 MAR.pdf
 
Sholove cyren web security presentation2
Sholove cyren web security presentation2Sholove cyren web security presentation2
Sholove cyren web security presentation2
 
Event Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control SystemsEvent Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control Systems
 
Spikes Security Isla Isolation
Spikes Security Isla IsolationSpikes Security Isla Isolation
Spikes Security Isla Isolation
 
Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015
 
Cyber security and its controls.pptx
Cyber security and its controls.pptxCyber security and its controls.pptx
Cyber security and its controls.pptx
 
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDCDefending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
 
Streamline and Secure Your Network and Users
Streamline and Secure Your Network and UsersStreamline and Secure Your Network and Users
Streamline and Secure Your Network and Users
 
Under thehood
Under thehoodUnder thehood
Under thehood
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by Adam
 
[CLASS 2014] Palestra Técnica - Alexandre Euclides
[CLASS 2014] Palestra Técnica - Alexandre Euclides[CLASS 2014] Palestra Técnica - Alexandre Euclides
[CLASS 2014] Palestra Técnica - Alexandre Euclides
 
Nvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - finalNvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - final
 

More from Localogy

Mono Solutions Webinar - The Engagement Challenge: Simple Steps for Improving...
Mono Solutions Webinar - The Engagement Challenge: Simple Steps for Improving...Mono Solutions Webinar - The Engagement Challenge: Simple Steps for Improving...
Mono Solutions Webinar - The Engagement Challenge: Simple Steps for Improving...Localogy
 
LOCALOGY ENGAGE 19: The Best Companies and PE Firms are Focused on Engagement...
LOCALOGY ENGAGE 19: The Best Companies and PE Firms are Focused on Engagement...LOCALOGY ENGAGE 19: The Best Companies and PE Firms are Focused on Engagement...
LOCALOGY ENGAGE 19: The Best Companies and PE Firms are Focused on Engagement...Localogy
 
LOCALOGY ENGAGE 19: Turning Customers Into Advocates
LOCALOGY ENGAGE 19: Turning Customers Into AdvocatesLOCALOGY ENGAGE 19: Turning Customers Into Advocates
LOCALOGY ENGAGE 19: Turning Customers Into AdvocatesLocalogy
 
LOCALOGY ENGAGE 19: SMBuy-in - Better Onboarding and Engagement - LegalZoom
LOCALOGY ENGAGE 19: SMBuy-in - Better Onboarding and Engagement - LegalZoomLOCALOGY ENGAGE 19: SMBuy-in - Better Onboarding and Engagement - LegalZoom
LOCALOGY ENGAGE 19: SMBuy-in - Better Onboarding and Engagement - LegalZoomLocalogy
 
LOCALOGY ENGAGE 19: SMBuy-in - Better Onboarding and Engagement - AWeber
LOCALOGY ENGAGE 19: SMBuy-in - Better Onboarding and Engagement - AWeberLOCALOGY ENGAGE 19: SMBuy-in - Better Onboarding and Engagement - AWeber
LOCALOGY ENGAGE 19: SMBuy-in - Better Onboarding and Engagement - AWeberLocalogy
 
LOCALOGY ENGAGE 19: SMBs and KPIs - Sharing Data that Drives Success
LOCALOGY ENGAGE 19: SMBs and KPIs - Sharing Data that Drives SuccessLOCALOGY ENGAGE 19: SMBs and KPIs - Sharing Data that Drives Success
LOCALOGY ENGAGE 19: SMBs and KPIs - Sharing Data that Drives SuccessLocalogy
 
LOCALOGY ENGAGE 19: Bringing Customer Feedback into Product Development
LOCALOGY ENGAGE 19: Bringing Customer Feedback into Product DevelopmentLOCALOGY ENGAGE 19: Bringing Customer Feedback into Product Development
LOCALOGY ENGAGE 19: Bringing Customer Feedback into Product DevelopmentLocalogy
 
LOCALOGY ENGAGE 19: AI’s Impact on the B2B Customer Journey
LOCALOGY ENGAGE 19: AI’s Impact on the B2B Customer JourneyLOCALOGY ENGAGE 19: AI’s Impact on the B2B Customer Journey
LOCALOGY ENGAGE 19: AI’s Impact on the B2B Customer JourneyLocalogy
 
BITZ BOOTCAMP DC: Welcome - Why Are You Here?
BITZ BOOTCAMP DC: Welcome - Why Are You Here? BITZ BOOTCAMP DC: Welcome - Why Are You Here?
BITZ BOOTCAMP DC: Welcome - Why Are You Here? Localogy
 
BITZ BOOTCAMP DC: The Modern Customer Journey - Be Found Where your Customers...
BITZ BOOTCAMP DC: The Modern Customer Journey - Be Found Where your Customers...BITZ BOOTCAMP DC: The Modern Customer Journey - Be Found Where your Customers...
BITZ BOOTCAMP DC: The Modern Customer Journey - Be Found Where your Customers...Localogy
 
BITZ BOOTCAMP DC: Smart Service - Winning the Customer Experience
BITZ BOOTCAMP DC: Smart Service - Winning the Customer ExperienceBITZ BOOTCAMP DC: Smart Service - Winning the Customer Experience
BITZ BOOTCAMP DC: Smart Service - Winning the Customer ExperienceLocalogy
 
BITZ BOOTCAMP DC: Managing Cash Flow/Profits (aka Why You Are in Business)
BITZ BOOTCAMP DC: Managing Cash Flow/Profits (aka Why You Are in Business)BITZ BOOTCAMP DC: Managing Cash Flow/Profits (aka Why You Are in Business)
BITZ BOOTCAMP DC: Managing Cash Flow/Profits (aka Why You Are in Business)Localogy
 
BITZ BOOTCAMP DC: Expo Showcase - Freshlime
BITZ BOOTCAMP DC: Expo Showcase - FreshlimeBITZ BOOTCAMP DC: Expo Showcase - Freshlime
BITZ BOOTCAMP DC: Expo Showcase - FreshlimeLocalogy
 
BITZ BOOTCAMP DC: CRM and Customer Insights
BITZ BOOTCAMP DC: CRM and Customer InsightsBITZ BOOTCAMP DC: CRM and Customer Insights
BITZ BOOTCAMP DC: CRM and Customer InsightsLocalogy
 
LSA19: The Location Factor — How Multi-Location Brands Win in Social
LSA19: The Location Factor — How Multi-Location Brands Win in SocialLSA19: The Location Factor — How Multi-Location Brands Win in Social
LSA19: The Location Factor — How Multi-Location Brands Win in SocialLocalogy
 
LSA19: Amazon — Shifting Purchase Behaviors and the Advertising Mix
LSA19: Amazon — Shifting Purchase Behaviors and the Advertising MixLSA19: Amazon — Shifting Purchase Behaviors and the Advertising Mix
LSA19: Amazon — Shifting Purchase Behaviors and the Advertising MixLocalogy
 
LSA19: Creating a Purpose Driven Culture
LSA19: Creating a Purpose Driven CultureLSA19: Creating a Purpose Driven Culture
LSA19: Creating a Purpose Driven CultureLocalogy
 
LSA19: The Science Behind Increasing Customer Retention
LSA19: The Science Behind Increasing Customer RetentionLSA19: The Science Behind Increasing Customer Retention
LSA19: The Science Behind Increasing Customer RetentionLocalogy
 
LSA19: The Role of Organic Content in the Consumer Buying Journey
LSA19: The Role of Organic Content in the Consumer Buying JourneyLSA19: The Role of Organic Content in the Consumer Buying Journey
LSA19: The Role of Organic Content in the Consumer Buying JourneyLocalogy
 
LSA19: Secrets of Marketing to Millennial Business Owners & Decision Makers
LSA19: Secrets of Marketing to Millennial Business Owners & Decision MakersLSA19: Secrets of Marketing to Millennial Business Owners & Decision Makers
LSA19: Secrets of Marketing to Millennial Business Owners & Decision MakersLocalogy
 

More from Localogy (20)

Mono Solutions Webinar - The Engagement Challenge: Simple Steps for Improving...
Mono Solutions Webinar - The Engagement Challenge: Simple Steps for Improving...Mono Solutions Webinar - The Engagement Challenge: Simple Steps for Improving...
Mono Solutions Webinar - The Engagement Challenge: Simple Steps for Improving...
 
LOCALOGY ENGAGE 19: The Best Companies and PE Firms are Focused on Engagement...
LOCALOGY ENGAGE 19: The Best Companies and PE Firms are Focused on Engagement...LOCALOGY ENGAGE 19: The Best Companies and PE Firms are Focused on Engagement...
LOCALOGY ENGAGE 19: The Best Companies and PE Firms are Focused on Engagement...
 
LOCALOGY ENGAGE 19: Turning Customers Into Advocates
LOCALOGY ENGAGE 19: Turning Customers Into AdvocatesLOCALOGY ENGAGE 19: Turning Customers Into Advocates
LOCALOGY ENGAGE 19: Turning Customers Into Advocates
 
LOCALOGY ENGAGE 19: SMBuy-in - Better Onboarding and Engagement - LegalZoom
LOCALOGY ENGAGE 19: SMBuy-in - Better Onboarding and Engagement - LegalZoomLOCALOGY ENGAGE 19: SMBuy-in - Better Onboarding and Engagement - LegalZoom
LOCALOGY ENGAGE 19: SMBuy-in - Better Onboarding and Engagement - LegalZoom
 
LOCALOGY ENGAGE 19: SMBuy-in - Better Onboarding and Engagement - AWeber
LOCALOGY ENGAGE 19: SMBuy-in - Better Onboarding and Engagement - AWeberLOCALOGY ENGAGE 19: SMBuy-in - Better Onboarding and Engagement - AWeber
LOCALOGY ENGAGE 19: SMBuy-in - Better Onboarding and Engagement - AWeber
 
LOCALOGY ENGAGE 19: SMBs and KPIs - Sharing Data that Drives Success
LOCALOGY ENGAGE 19: SMBs and KPIs - Sharing Data that Drives SuccessLOCALOGY ENGAGE 19: SMBs and KPIs - Sharing Data that Drives Success
LOCALOGY ENGAGE 19: SMBs and KPIs - Sharing Data that Drives Success
 
LOCALOGY ENGAGE 19: Bringing Customer Feedback into Product Development
LOCALOGY ENGAGE 19: Bringing Customer Feedback into Product DevelopmentLOCALOGY ENGAGE 19: Bringing Customer Feedback into Product Development
LOCALOGY ENGAGE 19: Bringing Customer Feedback into Product Development
 
LOCALOGY ENGAGE 19: AI’s Impact on the B2B Customer Journey
LOCALOGY ENGAGE 19: AI’s Impact on the B2B Customer JourneyLOCALOGY ENGAGE 19: AI’s Impact on the B2B Customer Journey
LOCALOGY ENGAGE 19: AI’s Impact on the B2B Customer Journey
 
BITZ BOOTCAMP DC: Welcome - Why Are You Here?
BITZ BOOTCAMP DC: Welcome - Why Are You Here? BITZ BOOTCAMP DC: Welcome - Why Are You Here?
BITZ BOOTCAMP DC: Welcome - Why Are You Here?
 
BITZ BOOTCAMP DC: The Modern Customer Journey - Be Found Where your Customers...
BITZ BOOTCAMP DC: The Modern Customer Journey - Be Found Where your Customers...BITZ BOOTCAMP DC: The Modern Customer Journey - Be Found Where your Customers...
BITZ BOOTCAMP DC: The Modern Customer Journey - Be Found Where your Customers...
 
BITZ BOOTCAMP DC: Smart Service - Winning the Customer Experience
BITZ BOOTCAMP DC: Smart Service - Winning the Customer ExperienceBITZ BOOTCAMP DC: Smart Service - Winning the Customer Experience
BITZ BOOTCAMP DC: Smart Service - Winning the Customer Experience
 
BITZ BOOTCAMP DC: Managing Cash Flow/Profits (aka Why You Are in Business)
BITZ BOOTCAMP DC: Managing Cash Flow/Profits (aka Why You Are in Business)BITZ BOOTCAMP DC: Managing Cash Flow/Profits (aka Why You Are in Business)
BITZ BOOTCAMP DC: Managing Cash Flow/Profits (aka Why You Are in Business)
 
BITZ BOOTCAMP DC: Expo Showcase - Freshlime
BITZ BOOTCAMP DC: Expo Showcase - FreshlimeBITZ BOOTCAMP DC: Expo Showcase - Freshlime
BITZ BOOTCAMP DC: Expo Showcase - Freshlime
 
BITZ BOOTCAMP DC: CRM and Customer Insights
BITZ BOOTCAMP DC: CRM and Customer InsightsBITZ BOOTCAMP DC: CRM and Customer Insights
BITZ BOOTCAMP DC: CRM and Customer Insights
 
LSA19: The Location Factor — How Multi-Location Brands Win in Social
LSA19: The Location Factor — How Multi-Location Brands Win in SocialLSA19: The Location Factor — How Multi-Location Brands Win in Social
LSA19: The Location Factor — How Multi-Location Brands Win in Social
 
LSA19: Amazon — Shifting Purchase Behaviors and the Advertising Mix
LSA19: Amazon — Shifting Purchase Behaviors and the Advertising MixLSA19: Amazon — Shifting Purchase Behaviors and the Advertising Mix
LSA19: Amazon — Shifting Purchase Behaviors and the Advertising Mix
 
LSA19: Creating a Purpose Driven Culture
LSA19: Creating a Purpose Driven CultureLSA19: Creating a Purpose Driven Culture
LSA19: Creating a Purpose Driven Culture
 
LSA19: The Science Behind Increasing Customer Retention
LSA19: The Science Behind Increasing Customer RetentionLSA19: The Science Behind Increasing Customer Retention
LSA19: The Science Behind Increasing Customer Retention
 
LSA19: The Role of Organic Content in the Consumer Buying Journey
LSA19: The Role of Organic Content in the Consumer Buying JourneyLSA19: The Role of Organic Content in the Consumer Buying Journey
LSA19: The Role of Organic Content in the Consumer Buying Journey
 
LSA19: Secrets of Marketing to Millennial Business Owners & Decision Makers
LSA19: Secrets of Marketing to Millennial Business Owners & Decision MakersLSA19: Secrets of Marketing to Millennial Business Owners & Decision Makers
LSA19: Secrets of Marketing to Millennial Business Owners & Decision Makers
 

Recently uploaded

Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 

Recently uploaded (20)

Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 

BITZ BOOTCAMP DC: Expo Showcase - U2Cloud

  • 1. FIVE MOST FREQUENT CYBERSECURITY OVERSIGHTS BY SANCHEZ WILLIAMS: DIRECTOR OF IT OPERATIONS U2CLOUD
  • 2. SANCHEZ WILLIAMS • Director Of IT Operations for U2Cloud • Over 20 years experience in IT • Former Security Architect for one of the 5 largest banks in the US • 15 years of Private and Public Cloud experience BY SANCHEZ WILLIAMS: DIRECTOR OF IT OPERATIONS U2CLOUD
  • 3. UNDERSTANDING CLOUD BASED ANTI-VIRUS • Q: What AV protection is included with your Hosted Servers/Desktops/Applications? • A: Probably None • (With the exception of built in AV such as Windows Defender) • Many companies have Windows Defender disabled as part of their Group Policies due to other AV’s run within the company BY SANCHEZ WILLIAMS: DIRECTOR OF IT OPERATIONS U2CLOUD
  • 4. UNDERSTANDING OR MANAGING THE CLOUD BASED FIREWALL • Many SMB’s forget their Cloud Based services have a Firewall • Left Unconfigured • If Configured many unnecessary ports and services are left open after testing and development has completed BY SANCHEZ WILLIAMS: DIRECTOR OF IT OPERATIONS U2CLOUD
  • 5. UTILIZING TWO FACTOR AUTHENTICATION • Phishing has become extremely sophisticated in 2019 • Many password compromises go unnoticed until it is to late • Keyloggers are back in the mainstream • Opensource and Free application EULA’s often give near unlimited access to a mobile devices storage BY SANCHEZ WILLIAMS: DIRECTOR OF IT OPERATIONS U2CLOUD
  • 6. PROPERLY TESTING BACKUPS • According to a recent survey of 700 IT Professionals published by Spiceworks, about 71 percent of companies do not test their plan more than once a year • About 70 percent of Ransomware attacks in 2018 targeted small businesses, with an average ransom demand of $116,000, according to a recent report from Beazley Breach Response Services BY SANCHEZ WILLIAMS: DIRECTOR OF IT OPERATIONS U2CLOUD
  • 7. EDUCATING STAFF • Staff education is one of the most effective means of preventing a breach • Sophisticated phishing attacks can be very hard to spot even for a trained professional • Brute force is rarely used in today’s age of abundant information • Knowing who is in what position within a company is often as easy as checking LinkedIn • This gives potential threats a plethora of information to infiltrate the company BY SANCHEZ WILLIAMS: DIRECTOR OF IT OPERATIONS U2CLOUD
  • 8. QUESTIONS • WWW.U2CLOUD.COM • SWILLIAMS@U2CLOUD.COM • 904-394-3910 BY SANCHEZ WILLIAMS: DIRECTOR OF IT OPERATIONS U2CLOUD