Watch the "Cybersecurity Essentials for Educational Institutions: Focus on Backup and Recovery" webinar, where we dive into the critical aspects of securing academic environments in the digital age.
3. ● Common cyber threats in educational institutions
● Best practices for cybersecurity
● MSP360 Solutions for Education
● MSP360 Demo
● Q and A
Agenda
4. Why
Educational
Institutions?
● Soft targets
● Vast amounts of sensitive data
● Personal information of students, staff and parents
● Faculty records
● Intellectual property
● Research data
● Financial information
5. Common Cyber Threats in
Educational Institutions
● Phishing Attacks
● Ransomware
● DDoS
● Data Breaches
● Insider Threats
6. Best Practices For Cybersecurity
● Employee Training
● Regular Security Audits
● Strong Password Policies
● Network Segmentation
● Patch Management
● Secure Backups with Object Lock/Immutability
● Incident Response Plan
11. ● Use companies as departments in your
organization
● Use users for additional granularity
● Create sub-administrators with limited
privileges
● Forcibly enable 2FA
● Use the IP-allowlisting
Configure console
for the best multi tenancy
12. Maintain at least 3
copies of your data
Keep 2 copies stored
at separate locations
Store at least 1 copy at
an offsite location
Run local and cloud backups
Local backups:
- Smaller retention policy
- Faster restoration
Cloud backups:
- More restore points
- Use object lock
13. Encrypt the backups
● Always encrypt the backups
● Use different passwords for each department
● AES-256AES-128AES-64 algorithms supported
● Encryption in transit is used by default by TLSSSL
14. Backup schedule
RPO - Recovery Point Objective
Schedule should be balanced between the
number of restore points and network activity
Run the backups at least everyday
The backups will automatically restart if missed
15. Backup retention
and immutability
● Store enough backups - to ensure the virus is
not there
● Use GFS for the long term backups
● Always use immutability (Object lock)
16. Check the success and
audit setup
● Check the backup statuses every day
● Restore backups once a quarter
● Audit admin permissions once a quarter
● Check backup plan setting once a year
● Change passwords once a year
17. Secure the backup
agent
● Disable the User Interface
● Disable the ability to edit backup and restore
plans
● Do not allow data deletion from the agent
● Enable master password to access it
● Disable Pre-Post actions
18. Remote monitoring
● Know about updates pending
● Be informed about high diskCPURAM usage
● Run remote PowerShell scripts
● Get informed about new installed software
● Get reports about hardware inventory
19. Rebrand the console
● Rename the product
● Custom product is harder to find
● Make your solution more recognizable internally
20. Use Deep Instinct
● Deep Learning technology based
● Protects from zero-day attacks
● Prevents 99% known and unknown attacks
● Fastest in the market
● 0.1% false positive
23. 23
Thank you for joining
our webinar!
The Winner of the
Sonos Era 100 is…
Editor's Notes
would like to include a globe here with dots on markets we serve .
i would also like to include some of the bigger clients we work with both on the MSP side and on the Business side.
basically what im thinking is combine slides 3-6 into one slide. a lot of them have similar info on it already and we can pick and choose what we like.