SlideShare a Scribd company logo
1 of 12
‘‘How Secure Are Your ITHow Secure Are Your IT
Systems’Systems’
““What are the real threats and how to manage them”What are the real threats and how to manage them”
Darrell BurkeyDarrell BurkeyUnix Systems Administrator - GIAC Security Essentials CertificationUnix Systems Administrator - GIAC Security Essentials Certification
president@case.org.aupresident@case.org.au
Computing
ssistance
upport&
ducation
A
S
E
incorporated
CASE Inc 2
““IT Resources for theIT Resources for the
CommunityCommunity
by the Community”by the Community”
CASE was formed to assist individuals andCASE was formed to assist individuals and
community organisations in making bettercommunity organisations in making better
use of information technology to accomplishuse of information technology to accomplish
their goals.their goals.
Today’s discussions will be specific toToday’s discussions will be specific to
experiences from the community sector andexperiences from the community sector and
relate to systems and configurations mostrelate to systems and configurations most
commonly used by small to medium non-commonly used by small to medium non-
profit organisations.profit organisations.
CASE Inc 3
Limited resourcesLimited resources
Staff issuesStaff issues
Unpatched softwareUnpatched software
Outdated equipmentOutdated equipment
Viruses and malwareViruses and malware
False authorityFalse authority
CASE Inc 4
Define Your RiskDefine Your Risk
Risk = Threat x VulnerabilityRisk = Threat x Vulnerability
Defense in DepthDefense in Depth
No one solution will be effectiveNo one solution will be effective
What they wantWhat they want
Anything from random vandalism toAnything from random vandalism to
obtaining resources and informationobtaining resources and information
for use in organised crimefor use in organised crime
CASE Inc 5
Basic TheoryBasic Theory
The CASE Acid TestThe CASE Acid Test
Can you put an axe through it and continue to work withoutCan you put an axe through it and continue to work without
loss of data or productivity?loss of data or productivity?
How To Pass The TestHow To Pass The Test
Establish a robust, fault tolerant server-to-peer networkEstablish a robust, fault tolerant server-to-peer network
based on ‘best practice’ solutions maintained by qualifiedbased on ‘best practice’ solutions maintained by qualified
technical staff working to your specific needs and goals.technical staff working to your specific needs and goals.
Isolate WorkstationsIsolate Workstations
Proper network design will isolate your workstations fromProper network design will isolate your workstations from
connecting directly to external networksconnecting directly to external networks
CASE Inc 6
Basic TheoryBasic Theory
© Medical Networking Solutions LLC
CASE Inc 7
Social EngineeringSocial Engineering
A Typical Scam EmailA Typical Scam Email Intercepted by Server
Warning: This message has had one or more attachments removedWarning: This message has had one or more attachments removed
Warning: (3YMH6JJY.exe, 3YMH6JJY.zip).Warning: (3YMH6JJY.exe, 3YMH6JJY.zip).
Warning: Please read the "tucan_net-Attachment-Warning.txt" attachment(s) forWarning: Please read the "tucan_net-Attachment-Warning.txt" attachment(s) for
more information.more information.
Dear Microsoft Customer,Dear Microsoft Customer,
Starting 12/11/2009 the ‘Conficker’ worm began infecting Microsoft customersStarting 12/11/2009 the ‘Conficker’ worm began infecting Microsoft customers
unusually rapidly. Microsoft has been advised by your Internet provider that yourunusually rapidly. Microsoft has been advised by your Internet provider that your
network is infected.network is infected.
To counteract further spread we advise removing the infection using anTo counteract further spread we advise removing the infection using an
antispyware program. We are supplying all effected Windows Users with a freeantispyware program. We are supplying all effected Windows Users with a free
system scan in order to clean any files infected by the virus.system scan in order to clean any files infected by the virus.
Please install attached file to start the scan. The process takes under a minute andPlease install attached file to start the scan. The process takes under a minute and
will prevent your files from being compromised. We appreciate your promptwill prevent your files from being compromised. We appreciate your prompt
cooperation.cooperation.
Regards,Regards,
Microsoft Windows Agent #2 (Hollis)Microsoft Windows Agent #2 (Hollis)
Microsoft Windows Computer Safety DivisionMicrosoft Windows Computer Safety Division
CASE Inc 8
What Works for UsWhat Works for Us
Servers based on open source softwareServers based on open source software
maintained by qualified staff have the potentialmaintained by qualified staff have the potential
to address the most critical of issues:to address the most critical of issues:
 ReliabilityReliability
 Security - firewall, monitoring, reportingSecurity - firewall, monitoring, reporting
 Timely technical supportTimely technical support
 Low initial costsLow initial costs
 Low ongoing costsLow ongoing costs
 Services to meet a variety of needsServices to meet a variety of needs
CASE Inc 9
False AuthorityFalse Authority
““I swear this is true. It happened to myI swear this is true. It happened to my
brother. He opened the email and not onlybrother. He opened the email and not only
did it erase his hard drive but all his housedid it erase his hard drive but all his house
plants died and the food in his refrigeratorplants died and the food in his refrigerator
went off! Make sure you send this messagewent off! Make sure you send this message
to everyone in your address book to warn allto everyone in your address book to warn all
your friends so it doesn’t happen to them.”your friends so it doesn’t happen to them.”
““I don’t know anything about IT but here’sI don’t know anything about IT but here’s
what we are going to do because...”what we are going to do because...”
CASE Inc 10
Improved DecisionsImproved Decisions
 Ask for qualificationsAsk for qualifications
 Ask for examples of workAsk for examples of work
 Ask about membership to professionalAsk about membership to professional
bodies such as the ACS and SAGEbodies such as the ACS and SAGE
 Be aware of possible biasBe aware of possible bias
 Consider an IT auditConsider an IT audit
CASE Inc 11
Support Your StaffSupport Your Staff
 Do you have an Acceptable Use Policy?Do you have an Acceptable Use Policy?
 What training do you provide?What training do you provide?
 How well is your IT documented?How well is your IT documented?
 Do you have a password policy?Do you have a password policy?
 Knowledge empowers!Knowledge empowers!
 Ensure you have appropriate supportEnsure you have appropriate support
CASE Inc 12
Questions?
Questions?

More Related Content

What's hot

Lessons Learned: Protecting Critical Infrastructure from Cyber Attacks
Lessons Learned: Protecting Critical Infrastructure from Cyber AttacksLessons Learned: Protecting Critical Infrastructure from Cyber Attacks
Lessons Learned: Protecting Critical Infrastructure from Cyber AttacksMighty Guides, Inc.
 
AllTheTalks Security Chaos Engineering
AllTheTalks Security Chaos Engineering AllTheTalks Security Chaos Engineering
AllTheTalks Security Chaos Engineering Aaron Rinehart
 
RSAC 365 2021 Virtual Summit Spotlite Presentation on Security Chaos Engineering
RSAC 365 2021 Virtual Summit Spotlite Presentation on Security Chaos EngineeringRSAC 365 2021 Virtual Summit Spotlite Presentation on Security Chaos Engineering
RSAC 365 2021 Virtual Summit Spotlite Presentation on Security Chaos EngineeringAaron Rinehart
 
Future-proofing Supply Chain against emerging Cyber-physical Threats
Future-proofing Supply Chain against emerging Cyber-physical ThreatsFuture-proofing Supply Chain against emerging Cyber-physical Threats
Future-proofing Supply Chain against emerging Cyber-physical ThreatsSteven SIM Kok Leong
 
ITE v5.0 - Chapter 2
ITE v5.0 - Chapter 2ITE v5.0 - Chapter 2
ITE v5.0 - Chapter 2Irsandi Hasan
 
Agile Scrum Foundation - Exin
Agile Scrum Foundation - ExinAgile Scrum Foundation - Exin
Agile Scrum Foundation - ExinAlessandro Grillo
 
Worldwide Who's Who Press release from LinkedIn
Worldwide Who's Who Press release from LinkedInWorldwide Who's Who Press release from LinkedIn
Worldwide Who's Who Press release from LinkedInRobert Edwards
 
451 AppSense Webinar - Why blame the user?
451 AppSense Webinar - Why blame the user?451 AppSense Webinar - Why blame the user?
451 AppSense Webinar - Why blame the user?Adrian Sanabria
 
Jack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, AnecdotallyJack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, AnecdotallyEnergySec
 
NewOps Days 2019: The New Ways of Chaos, Security, and DevOps
NewOps Days 2019: The New Ways of Chaos, Security, and DevOpsNewOps Days 2019: The New Ways of Chaos, Security, and DevOps
NewOps Days 2019: The New Ways of Chaos, Security, and DevOpsJames Wickett
 
Future-proofing maritime ports against emerging cyber-physical threats
Future-proofing maritime ports against emerging cyber-physical threatsFuture-proofing maritime ports against emerging cyber-physical threats
Future-proofing maritime ports against emerging cyber-physical threatsSteven SIM Kok Leong
 
Enterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security SurveyEnterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security SurveyCisco Security
 
The Avoidable Risks of Remote Working
The Avoidable Risks of Remote WorkingThe Avoidable Risks of Remote Working
The Avoidable Risks of Remote WorkingRichard Kennedy
 
Dl Cowan Resume July 2012
Dl Cowan Resume July 2012Dl Cowan Resume July 2012
Dl Cowan Resume July 2012WillowWind
 
Secrets of SolarWinds SAM
Secrets of SolarWinds SAMSecrets of SolarWinds SAM
Secrets of SolarWinds SAMSolarWinds
 
A Tale of Woe, Chaos, and Business
A Tale of Woe, Chaos, and BusinessA Tale of Woe, Chaos, and Business
A Tale of Woe, Chaos, and BusinessJames Wickett
 

What's hot (18)

Lessons Learned: Protecting Critical Infrastructure from Cyber Attacks
Lessons Learned: Protecting Critical Infrastructure from Cyber AttacksLessons Learned: Protecting Critical Infrastructure from Cyber Attacks
Lessons Learned: Protecting Critical Infrastructure from Cyber Attacks
 
AllTheTalks Security Chaos Engineering
AllTheTalks Security Chaos Engineering AllTheTalks Security Chaos Engineering
AllTheTalks Security Chaos Engineering
 
RSAC 365 2021 Virtual Summit Spotlite Presentation on Security Chaos Engineering
RSAC 365 2021 Virtual Summit Spotlite Presentation on Security Chaos EngineeringRSAC 365 2021 Virtual Summit Spotlite Presentation on Security Chaos Engineering
RSAC 365 2021 Virtual Summit Spotlite Presentation on Security Chaos Engineering
 
DNA Cloud Backup
DNA Cloud BackupDNA Cloud Backup
DNA Cloud Backup
 
Future-proofing Supply Chain against emerging Cyber-physical Threats
Future-proofing Supply Chain against emerging Cyber-physical ThreatsFuture-proofing Supply Chain against emerging Cyber-physical Threats
Future-proofing Supply Chain against emerging Cyber-physical Threats
 
ITE v5.0 - Chapter 2
ITE v5.0 - Chapter 2ITE v5.0 - Chapter 2
ITE v5.0 - Chapter 2
 
Agile Scrum Foundation - Exin
Agile Scrum Foundation - ExinAgile Scrum Foundation - Exin
Agile Scrum Foundation - Exin
 
Worldwide Who's Who Press release from LinkedIn
Worldwide Who's Who Press release from LinkedInWorldwide Who's Who Press release from LinkedIn
Worldwide Who's Who Press release from LinkedIn
 
451 AppSense Webinar - Why blame the user?
451 AppSense Webinar - Why blame the user?451 AppSense Webinar - Why blame the user?
451 AppSense Webinar - Why blame the user?
 
Jack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, AnecdotallyJack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, Anecdotally
 
NewOps Days 2019: The New Ways of Chaos, Security, and DevOps
NewOps Days 2019: The New Ways of Chaos, Security, and DevOpsNewOps Days 2019: The New Ways of Chaos, Security, and DevOps
NewOps Days 2019: The New Ways of Chaos, Security, and DevOps
 
Future-proofing maritime ports against emerging cyber-physical threats
Future-proofing maritime ports against emerging cyber-physical threatsFuture-proofing maritime ports against emerging cyber-physical threats
Future-proofing maritime ports against emerging cyber-physical threats
 
Enterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security SurveyEnterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security Survey
 
AgileScrum
AgileScrumAgileScrum
AgileScrum
 
The Avoidable Risks of Remote Working
The Avoidable Risks of Remote WorkingThe Avoidable Risks of Remote Working
The Avoidable Risks of Remote Working
 
Dl Cowan Resume July 2012
Dl Cowan Resume July 2012Dl Cowan Resume July 2012
Dl Cowan Resume July 2012
 
Secrets of SolarWinds SAM
Secrets of SolarWinds SAMSecrets of SolarWinds SAM
Secrets of SolarWinds SAM
 
A Tale of Woe, Chaos, and Business
A Tale of Woe, Chaos, and BusinessA Tale of Woe, Chaos, and Business
A Tale of Woe, Chaos, and Business
 

Viewers also liked

Psicopanoramas
PsicopanoramasPsicopanoramas
PsicopanoramasPepe Rojo
 
5 Cara mengatasi jerawat secara alami
5 Cara mengatasi jerawat secara alami5 Cara mengatasi jerawat secara alami
5 Cara mengatasi jerawat secara alamisegar bugar
 
Ayotzinapa: Piece for facebook (nation)
Ayotzinapa: Piece for facebook (nation)Ayotzinapa: Piece for facebook (nation)
Ayotzinapa: Piece for facebook (nation)Pepe Rojo
 
Finance for non finance course outline (32 Hours/ 4 day)
Finance for non finance course outline (32 Hours/ 4 day)Finance for non finance course outline (32 Hours/ 4 day)
Finance for non finance course outline (32 Hours/ 4 day)Amit Gupta
 
Email marketing (Kiel Van Daal + Paul Armstrong, Sitback Solutions)
Email marketing (Kiel Van Daal + Paul Armstrong, Sitback Solutions)Email marketing (Kiel Van Daal + Paul Armstrong, Sitback Solutions)
Email marketing (Kiel Van Daal + Paul Armstrong, Sitback Solutions)makinglinks
 
C:\Documents And Settings\Icm01\Desktop\Reading Habit Of Undergraduates In Sr...
C:\Documents And Settings\Icm01\Desktop\Reading Habit Of Undergraduates In Sr...C:\Documents And Settings\Icm01\Desktop\Reading Habit Of Undergraduates In Sr...
C:\Documents And Settings\Icm01\Desktop\Reading Habit Of Undergraduates In Sr...I.M.Nawarathne
 
Chocolate Residue To Hydrogen Fuel Presentation
Chocolate Residue To Hydrogen Fuel PresentationChocolate Residue To Hydrogen Fuel Presentation
Chocolate Residue To Hydrogen Fuel Presentationhebowden
 
Customer connect program ver 3
Customer connect program ver 3Customer connect program ver 3
Customer connect program ver 3Mitul Das
 
Cloud computing and managed services (Sumit Dutta, CSSWA)
Cloud computing and managed services (Sumit Dutta, CSSWA)Cloud computing and managed services (Sumit Dutta, CSSWA)
Cloud computing and managed services (Sumit Dutta, CSSWA)makinglinks
 
Security supervisor ppt
Security supervisor pptSecurity supervisor ppt
Security supervisor pptAccord Group
 
Ubuntu in the office (Gregory Storer, Family Life)
Ubuntu in the office (Gregory Storer, Family Life)Ubuntu in the office (Gregory Storer, Family Life)
Ubuntu in the office (Gregory Storer, Family Life)makinglinks
 
Marina Chos Tae Kwon Do Easter 2011 Group Photo and Raffle Prizes
Marina Chos Tae Kwon Do Easter 2011 Group Photo and Raffle PrizesMarina Chos Tae Kwon Do Easter 2011 Group Photo and Raffle Prizes
Marina Chos Tae Kwon Do Easter 2011 Group Photo and Raffle Prizesmjslee77
 

Viewers also liked (20)

подорож по математичному океані
подорож по математичному океаніподорож по математичному океані
подорож по математичному океані
 
Psicopanoramas
PsicopanoramasPsicopanoramas
Psicopanoramas
 
Company Analysis
Company AnalysisCompany Analysis
Company Analysis
 
5 Cara mengatasi jerawat secara alami
5 Cara mengatasi jerawat secara alami5 Cara mengatasi jerawat secara alami
5 Cara mengatasi jerawat secara alami
 
La confessione
La confessioneLa confessione
La confessione
 
Ayotzinapa: Piece for facebook (nation)
Ayotzinapa: Piece for facebook (nation)Ayotzinapa: Piece for facebook (nation)
Ayotzinapa: Piece for facebook (nation)
 
Finance for non finance course outline (32 Hours/ 4 day)
Finance for non finance course outline (32 Hours/ 4 day)Finance for non finance course outline (32 Hours/ 4 day)
Finance for non finance course outline (32 Hours/ 4 day)
 
Email marketing (Kiel Van Daal + Paul Armstrong, Sitback Solutions)
Email marketing (Kiel Van Daal + Paul Armstrong, Sitback Solutions)Email marketing (Kiel Van Daal + Paul Armstrong, Sitback Solutions)
Email marketing (Kiel Van Daal + Paul Armstrong, Sitback Solutions)
 
Partes de la oración nivel i
Partes de la oración nivel iPartes de la oración nivel i
Partes de la oración nivel i
 
C:\Documents And Settings\Icm01\Desktop\Reading Habit Of Undergraduates In Sr...
C:\Documents And Settings\Icm01\Desktop\Reading Habit Of Undergraduates In Sr...C:\Documents And Settings\Icm01\Desktop\Reading Habit Of Undergraduates In Sr...
C:\Documents And Settings\Icm01\Desktop\Reading Habit Of Undergraduates In Sr...
 
Planificación
PlanificaciónPlanificación
Planificación
 
Chocolate Residue To Hydrogen Fuel Presentation
Chocolate Residue To Hydrogen Fuel PresentationChocolate Residue To Hydrogen Fuel Presentation
Chocolate Residue To Hydrogen Fuel Presentation
 
додавання суми до числа
додавання суми до числадодавання суми до числа
додавання суми до числа
 
MelWelchNOV16
MelWelchNOV16MelWelchNOV16
MelWelchNOV16
 
-водойми--україни
-водойми--україни-водойми--україни
-водойми--україни
 
Customer connect program ver 3
Customer connect program ver 3Customer connect program ver 3
Customer connect program ver 3
 
Cloud computing and managed services (Sumit Dutta, CSSWA)
Cloud computing and managed services (Sumit Dutta, CSSWA)Cloud computing and managed services (Sumit Dutta, CSSWA)
Cloud computing and managed services (Sumit Dutta, CSSWA)
 
Security supervisor ppt
Security supervisor pptSecurity supervisor ppt
Security supervisor ppt
 
Ubuntu in the office (Gregory Storer, Family Life)
Ubuntu in the office (Gregory Storer, Family Life)Ubuntu in the office (Gregory Storer, Family Life)
Ubuntu in the office (Gregory Storer, Family Life)
 
Marina Chos Tae Kwon Do Easter 2011 Group Photo and Raffle Prizes
Marina Chos Tae Kwon Do Easter 2011 Group Photo and Raffle PrizesMarina Chos Tae Kwon Do Easter 2011 Group Photo and Raffle Prizes
Marina Chos Tae Kwon Do Easter 2011 Group Photo and Raffle Prizes
 

Similar to How to Manage Real IT Security Threats

Cyb 610 Your world/newtonhelp.com
Cyb 610 Your world/newtonhelp.comCyb 610 Your world/newtonhelp.com
Cyb 610 Your world/newtonhelp.comamaranthbeg95
 
Cyb 610 Motivated Minds/newtonhelp.com
Cyb 610 Motivated Minds/newtonhelp.comCyb 610 Motivated Minds/newtonhelp.com
Cyb 610 Motivated Minds/newtonhelp.comamaranthbeg55
 
Cyber Security and GDPR Made Easy
Cyber Security and GDPR Made EasyCyber Security and GDPR Made Easy
Cyber Security and GDPR Made EasyChristoanSmit
 
Are you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistAre you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistAPNIC
 
Are you ready for the next attack? reviewing the sp security checklist (apnic...
Are you ready for the next attack? reviewing the sp security checklist (apnic...Are you ready for the next attack? reviewing the sp security checklist (apnic...
Are you ready for the next attack? reviewing the sp security checklist (apnic...Barry Greene
 
Prevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability ScannerPrevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability ScannerGFI Software
 
Csec 610 Inspiring Innovation--tutorialrank.com
Csec 610 Inspiring Innovation--tutorialrank.comCsec 610 Inspiring Innovation--tutorialrank.com
Csec 610 Inspiring Innovation--tutorialrank.comPrescottLunt384
 
Cyber security innovation imho
Cyber security innovation imhoCyber security innovation imho
Cyber security innovation imhoW Fred Seigneur
 
The Truth About Viruses on Power Systems - Powertech
The Truth About Viruses on Power Systems - PowertechThe Truth About Viruses on Power Systems - Powertech
The Truth About Viruses on Power Systems - PowertechHelpSystems
 
Csec 610 Motivated Minds/newtonhelp.com
Csec 610 Motivated Minds/newtonhelp.comCsec 610 Motivated Minds/newtonhelp.com
Csec 610 Motivated Minds/newtonhelp.comamaranthbeg52
 
Csec 610 Education is Power/newtonhelp.com
Csec 610 Education is Power/newtonhelp.comCsec 610 Education is Power/newtonhelp.com
Csec 610 Education is Power/newtonhelp.comamaranthbeg72
 
Csec 610 Your world/newtonhelp.com
Csec 610 Your world/newtonhelp.comCsec 610 Your world/newtonhelp.com
Csec 610 Your world/newtonhelp.comamaranthbeg92
 
Csec 610 Extraordinary Success/newtonhelp.com
Csec 610 Extraordinary Success/newtonhelp.comCsec 610 Extraordinary Success/newtonhelp.com
Csec 610 Extraordinary Success/newtonhelp.comamaranthbeg112
 
Are you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistAre you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistMyNOG
 
Introduction To Pc Security Pre Test.Doc
Introduction To Pc Security Pre Test.DocIntroduction To Pc Security Pre Test.Doc
Introduction To Pc Security Pre Test.DocWalmart Super Center
 
Cyb 610 Inspiring Innovation--tutorialrank.com
Cyb 610 Inspiring Innovation--tutorialrank.comCyb 610 Inspiring Innovation--tutorialrank.com
Cyb 610 Inspiring Innovation--tutorialrank.comPrescottLunt386
 
Information security and protecting your business
Information security and protecting your businessInformation security and protecting your business
Information security and protecting your businessBizSmart Select
 
Managing Riskin InformationSystemsPowered by vLab Solu.docx
Managing Riskin InformationSystemsPowered by vLab Solu.docxManaging Riskin InformationSystemsPowered by vLab Solu.docx
Managing Riskin InformationSystemsPowered by vLab Solu.docxjessiehampson
 
What we do
What we doWhat we do
What we dobcolbeck
 

Similar to How to Manage Real IT Security Threats (20)

Cyb 610 Your world/newtonhelp.com
Cyb 610 Your world/newtonhelp.comCyb 610 Your world/newtonhelp.com
Cyb 610 Your world/newtonhelp.com
 
Cyb 610 Motivated Minds/newtonhelp.com
Cyb 610 Motivated Minds/newtonhelp.comCyb 610 Motivated Minds/newtonhelp.com
Cyb 610 Motivated Minds/newtonhelp.com
 
Cyber Security and GDPR Made Easy
Cyber Security and GDPR Made EasyCyber Security and GDPR Made Easy
Cyber Security and GDPR Made Easy
 
Are you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistAre you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security Checklist
 
Are you ready for the next attack? reviewing the sp security checklist (apnic...
Are you ready for the next attack? reviewing the sp security checklist (apnic...Are you ready for the next attack? reviewing the sp security checklist (apnic...
Are you ready for the next attack? reviewing the sp security checklist (apnic...
 
Prevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability ScannerPrevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability Scanner
 
Csec 610 Inspiring Innovation--tutorialrank.com
Csec 610 Inspiring Innovation--tutorialrank.comCsec 610 Inspiring Innovation--tutorialrank.com
Csec 610 Inspiring Innovation--tutorialrank.com
 
Cyber security innovation imho
Cyber security innovation imhoCyber security innovation imho
Cyber security innovation imho
 
The Truth About Viruses on Power Systems - Powertech
The Truth About Viruses on Power Systems - PowertechThe Truth About Viruses on Power Systems - Powertech
The Truth About Viruses on Power Systems - Powertech
 
Csec 610 Motivated Minds/newtonhelp.com
Csec 610 Motivated Minds/newtonhelp.comCsec 610 Motivated Minds/newtonhelp.com
Csec 610 Motivated Minds/newtonhelp.com
 
Csec 610 Education is Power/newtonhelp.com
Csec 610 Education is Power/newtonhelp.comCsec 610 Education is Power/newtonhelp.com
Csec 610 Education is Power/newtonhelp.com
 
Csec 610 Your world/newtonhelp.com
Csec 610 Your world/newtonhelp.comCsec 610 Your world/newtonhelp.com
Csec 610 Your world/newtonhelp.com
 
Csec 610 Extraordinary Success/newtonhelp.com
Csec 610 Extraordinary Success/newtonhelp.comCsec 610 Extraordinary Success/newtonhelp.com
Csec 610 Extraordinary Success/newtonhelp.com
 
Are you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistAre you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security Checklist
 
Broken by design (Danny Fullerton)
Broken by design (Danny Fullerton)Broken by design (Danny Fullerton)
Broken by design (Danny Fullerton)
 
Introduction To Pc Security Pre Test.Doc
Introduction To Pc Security Pre Test.DocIntroduction To Pc Security Pre Test.Doc
Introduction To Pc Security Pre Test.Doc
 
Cyb 610 Inspiring Innovation--tutorialrank.com
Cyb 610 Inspiring Innovation--tutorialrank.comCyb 610 Inspiring Innovation--tutorialrank.com
Cyb 610 Inspiring Innovation--tutorialrank.com
 
Information security and protecting your business
Information security and protecting your businessInformation security and protecting your business
Information security and protecting your business
 
Managing Riskin InformationSystemsPowered by vLab Solu.docx
Managing Riskin InformationSystemsPowered by vLab Solu.docxManaging Riskin InformationSystemsPowered by vLab Solu.docx
Managing Riskin InformationSystemsPowered by vLab Solu.docx
 
What we do
What we doWhat we do
What we do
 

More from makinglinks

Teaspoon of Concrete (Aram Hosie, Inspire Foundation)
Teaspoon of Concrete (Aram Hosie, Inspire Foundation)Teaspoon of Concrete (Aram Hosie, Inspire Foundation)
Teaspoon of Concrete (Aram Hosie, Inspire Foundation)makinglinks
 
Facebook hands on (Bianca Wirth, Wirth Consulting)
Facebook hands on (Bianca Wirth, Wirth Consulting)Facebook hands on (Bianca Wirth, Wirth Consulting)
Facebook hands on (Bianca Wirth, Wirth Consulting)makinglinks
 
Measuring social return in a HITnet community participation project (Julie Gi...
Measuring social return in a HITnet community participation project (Julie Gi...Measuring social return in a HITnet community participation project (Julie Gi...
Measuring social return in a HITnet community participation project (Julie Gi...makinglinks
 
Using film as a personal advocacy tool, an evaluation method and a social act...
Using film as a personal advocacy tool, an evaluation method and a social act...Using film as a personal advocacy tool, an evaluation method and a social act...
Using film as a personal advocacy tool, an evaluation method and a social act...makinglinks
 
Why Weight WA (Annie Gan, PHAIWA + Diabetes WA)
Why Weight WA (Annie Gan, PHAIWA + Diabetes WA)Why Weight WA (Annie Gan, PHAIWA + Diabetes WA)
Why Weight WA (Annie Gan, PHAIWA + Diabetes WA)makinglinks
 
Online technology + leading women’s health experts = innovative education aus...
Online technology + leading women’s health experts = innovative education aus...Online technology + leading women’s health experts = innovative education aus...
Online technology + leading women’s health experts = innovative education aus...makinglinks
 
Making links using an internet intervention to support breastfeeding mothers ...
Making links using an internet intervention to support breastfeeding mothers ...Making links using an internet intervention to support breastfeeding mothers ...
Making links using an internet intervention to support breastfeeding mothers ...makinglinks
 
ICT planning and choosing appropriate ICTs (Sumit Dutta - CSSWA)
ICT planning and choosing appropriate ICTs (Sumit Dutta - CSSWA)ICT planning and choosing appropriate ICTs (Sumit Dutta - CSSWA)
ICT planning and choosing appropriate ICTs (Sumit Dutta - CSSWA)makinglinks
 
HeartNET: an online community giving heart patients a voice (Lynsey Ulridge -...
HeartNET: an online community giving heart patients a voice (Lynsey Ulridge -...HeartNET: an online community giving heart patients a voice (Lynsey Ulridge -...
HeartNET: an online community giving heart patients a voice (Lynsey Ulridge -...makinglinks
 
Free and open source software (FOSS) for NGOs (Sky Croeser - Internet Studies...
Free and open source software (FOSS) for NGOs (Sky Croeser - Internet Studies...Free and open source software (FOSS) for NGOs (Sky Croeser - Internet Studies...
Free and open source software (FOSS) for NGOs (Sky Croeser - Internet Studies...makinglinks
 
Designing online forms (Jessica Kerr, Formulate)
Designing online forms (Jessica Kerr, Formulate)Designing online forms (Jessica Kerr, Formulate)
Designing online forms (Jessica Kerr, Formulate)makinglinks
 
Online Game Mechanics for Social Action (Richard Giles, CPSU/CSA)
Online Game Mechanics for Social Action (Richard Giles, CPSU/CSA) Online Game Mechanics for Social Action (Richard Giles, CPSU/CSA)
Online Game Mechanics for Social Action (Richard Giles, CPSU/CSA) makinglinks
 

More from makinglinks (12)

Teaspoon of Concrete (Aram Hosie, Inspire Foundation)
Teaspoon of Concrete (Aram Hosie, Inspire Foundation)Teaspoon of Concrete (Aram Hosie, Inspire Foundation)
Teaspoon of Concrete (Aram Hosie, Inspire Foundation)
 
Facebook hands on (Bianca Wirth, Wirth Consulting)
Facebook hands on (Bianca Wirth, Wirth Consulting)Facebook hands on (Bianca Wirth, Wirth Consulting)
Facebook hands on (Bianca Wirth, Wirth Consulting)
 
Measuring social return in a HITnet community participation project (Julie Gi...
Measuring social return in a HITnet community participation project (Julie Gi...Measuring social return in a HITnet community participation project (Julie Gi...
Measuring social return in a HITnet community participation project (Julie Gi...
 
Using film as a personal advocacy tool, an evaluation method and a social act...
Using film as a personal advocacy tool, an evaluation method and a social act...Using film as a personal advocacy tool, an evaluation method and a social act...
Using film as a personal advocacy tool, an evaluation method and a social act...
 
Why Weight WA (Annie Gan, PHAIWA + Diabetes WA)
Why Weight WA (Annie Gan, PHAIWA + Diabetes WA)Why Weight WA (Annie Gan, PHAIWA + Diabetes WA)
Why Weight WA (Annie Gan, PHAIWA + Diabetes WA)
 
Online technology + leading women’s health experts = innovative education aus...
Online technology + leading women’s health experts = innovative education aus...Online technology + leading women’s health experts = innovative education aus...
Online technology + leading women’s health experts = innovative education aus...
 
Making links using an internet intervention to support breastfeeding mothers ...
Making links using an internet intervention to support breastfeeding mothers ...Making links using an internet intervention to support breastfeeding mothers ...
Making links using an internet intervention to support breastfeeding mothers ...
 
ICT planning and choosing appropriate ICTs (Sumit Dutta - CSSWA)
ICT planning and choosing appropriate ICTs (Sumit Dutta - CSSWA)ICT planning and choosing appropriate ICTs (Sumit Dutta - CSSWA)
ICT planning and choosing appropriate ICTs (Sumit Dutta - CSSWA)
 
HeartNET: an online community giving heart patients a voice (Lynsey Ulridge -...
HeartNET: an online community giving heart patients a voice (Lynsey Ulridge -...HeartNET: an online community giving heart patients a voice (Lynsey Ulridge -...
HeartNET: an online community giving heart patients a voice (Lynsey Ulridge -...
 
Free and open source software (FOSS) for NGOs (Sky Croeser - Internet Studies...
Free and open source software (FOSS) for NGOs (Sky Croeser - Internet Studies...Free and open source software (FOSS) for NGOs (Sky Croeser - Internet Studies...
Free and open source software (FOSS) for NGOs (Sky Croeser - Internet Studies...
 
Designing online forms (Jessica Kerr, Formulate)
Designing online forms (Jessica Kerr, Formulate)Designing online forms (Jessica Kerr, Formulate)
Designing online forms (Jessica Kerr, Formulate)
 
Online Game Mechanics for Social Action (Richard Giles, CPSU/CSA)
Online Game Mechanics for Social Action (Richard Giles, CPSU/CSA) Online Game Mechanics for Social Action (Richard Giles, CPSU/CSA)
Online Game Mechanics for Social Action (Richard Giles, CPSU/CSA)
 

Recently uploaded

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 

Recently uploaded (20)

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 

How to Manage Real IT Security Threats

  • 1. ‘‘How Secure Are Your ITHow Secure Are Your IT Systems’Systems’ ““What are the real threats and how to manage them”What are the real threats and how to manage them” Darrell BurkeyDarrell BurkeyUnix Systems Administrator - GIAC Security Essentials CertificationUnix Systems Administrator - GIAC Security Essentials Certification president@case.org.aupresident@case.org.au Computing ssistance upport& ducation A S E incorporated
  • 2. CASE Inc 2 ““IT Resources for theIT Resources for the CommunityCommunity by the Community”by the Community” CASE was formed to assist individuals andCASE was formed to assist individuals and community organisations in making bettercommunity organisations in making better use of information technology to accomplishuse of information technology to accomplish their goals.their goals. Today’s discussions will be specific toToday’s discussions will be specific to experiences from the community sector andexperiences from the community sector and relate to systems and configurations mostrelate to systems and configurations most commonly used by small to medium non-commonly used by small to medium non- profit organisations.profit organisations.
  • 3. CASE Inc 3 Limited resourcesLimited resources Staff issuesStaff issues Unpatched softwareUnpatched software Outdated equipmentOutdated equipment Viruses and malwareViruses and malware False authorityFalse authority
  • 4. CASE Inc 4 Define Your RiskDefine Your Risk Risk = Threat x VulnerabilityRisk = Threat x Vulnerability Defense in DepthDefense in Depth No one solution will be effectiveNo one solution will be effective What they wantWhat they want Anything from random vandalism toAnything from random vandalism to obtaining resources and informationobtaining resources and information for use in organised crimefor use in organised crime
  • 5. CASE Inc 5 Basic TheoryBasic Theory The CASE Acid TestThe CASE Acid Test Can you put an axe through it and continue to work withoutCan you put an axe through it and continue to work without loss of data or productivity?loss of data or productivity? How To Pass The TestHow To Pass The Test Establish a robust, fault tolerant server-to-peer networkEstablish a robust, fault tolerant server-to-peer network based on ‘best practice’ solutions maintained by qualifiedbased on ‘best practice’ solutions maintained by qualified technical staff working to your specific needs and goals.technical staff working to your specific needs and goals. Isolate WorkstationsIsolate Workstations Proper network design will isolate your workstations fromProper network design will isolate your workstations from connecting directly to external networksconnecting directly to external networks
  • 6. CASE Inc 6 Basic TheoryBasic Theory © Medical Networking Solutions LLC
  • 7. CASE Inc 7 Social EngineeringSocial Engineering A Typical Scam EmailA Typical Scam Email Intercepted by Server Warning: This message has had one or more attachments removedWarning: This message has had one or more attachments removed Warning: (3YMH6JJY.exe, 3YMH6JJY.zip).Warning: (3YMH6JJY.exe, 3YMH6JJY.zip). Warning: Please read the "tucan_net-Attachment-Warning.txt" attachment(s) forWarning: Please read the "tucan_net-Attachment-Warning.txt" attachment(s) for more information.more information. Dear Microsoft Customer,Dear Microsoft Customer, Starting 12/11/2009 the ‘Conficker’ worm began infecting Microsoft customersStarting 12/11/2009 the ‘Conficker’ worm began infecting Microsoft customers unusually rapidly. Microsoft has been advised by your Internet provider that yourunusually rapidly. Microsoft has been advised by your Internet provider that your network is infected.network is infected. To counteract further spread we advise removing the infection using anTo counteract further spread we advise removing the infection using an antispyware program. We are supplying all effected Windows Users with a freeantispyware program. We are supplying all effected Windows Users with a free system scan in order to clean any files infected by the virus.system scan in order to clean any files infected by the virus. Please install attached file to start the scan. The process takes under a minute andPlease install attached file to start the scan. The process takes under a minute and will prevent your files from being compromised. We appreciate your promptwill prevent your files from being compromised. We appreciate your prompt cooperation.cooperation. Regards,Regards, Microsoft Windows Agent #2 (Hollis)Microsoft Windows Agent #2 (Hollis) Microsoft Windows Computer Safety DivisionMicrosoft Windows Computer Safety Division
  • 8. CASE Inc 8 What Works for UsWhat Works for Us Servers based on open source softwareServers based on open source software maintained by qualified staff have the potentialmaintained by qualified staff have the potential to address the most critical of issues:to address the most critical of issues:  ReliabilityReliability  Security - firewall, monitoring, reportingSecurity - firewall, monitoring, reporting  Timely technical supportTimely technical support  Low initial costsLow initial costs  Low ongoing costsLow ongoing costs  Services to meet a variety of needsServices to meet a variety of needs
  • 9. CASE Inc 9 False AuthorityFalse Authority ““I swear this is true. It happened to myI swear this is true. It happened to my brother. He opened the email and not onlybrother. He opened the email and not only did it erase his hard drive but all his housedid it erase his hard drive but all his house plants died and the food in his refrigeratorplants died and the food in his refrigerator went off! Make sure you send this messagewent off! Make sure you send this message to everyone in your address book to warn allto everyone in your address book to warn all your friends so it doesn’t happen to them.”your friends so it doesn’t happen to them.” ““I don’t know anything about IT but here’sI don’t know anything about IT but here’s what we are going to do because...”what we are going to do because...”
  • 10. CASE Inc 10 Improved DecisionsImproved Decisions  Ask for qualificationsAsk for qualifications  Ask for examples of workAsk for examples of work  Ask about membership to professionalAsk about membership to professional bodies such as the ACS and SAGEbodies such as the ACS and SAGE  Be aware of possible biasBe aware of possible bias  Consider an IT auditConsider an IT audit
  • 11. CASE Inc 11 Support Your StaffSupport Your Staff  Do you have an Acceptable Use Policy?Do you have an Acceptable Use Policy?  What training do you provide?What training do you provide?  How well is your IT documented?How well is your IT documented?  Do you have a password policy?Do you have a password policy?  Knowledge empowers!Knowledge empowers!  Ensure you have appropriate supportEnsure you have appropriate support