Are Your IT Systems Secure
From Cyber Criminals, Viruses,
Worms and EMPLOYEES?
Security Essentials
• Current Operating System – Windows 7 or Above
• OS and Third Party Patches
• Firewall With Update Services
• Client Level Antivirus
• Spam Filter
• Secure Wireless
• Password Policy
On Saturday, Nov. 30, the hackers had set their traps
Six months earlier the company began installing a $1.6
million malware detection tool made by the computer
security firm FireEye (FEYE), whose customers also
include the CIA and the Pentagon.
FireEye spotted them.
Bangalore got an alert and
flagged the security team in
Minneapolis. And then …
Nothing happened.
For some reason, Minneapolis
didn’t react to the sirens.
Current Threats
Spearphishing
95% of all attacks on the
enterprise network are the
result of successful
spearphishing
-Allen Paller
Director of Research,
SANS Institute
Current Threats
Phishing
Nearly 1 in 5 users will
click on a link within a
phishing email
Verizon Data Breach
Investigation Report, 2014 https://phishingquiz.mcafee.com/
88% of HR and
Finance clicked on at
least one phishing
email
Current Threats
Social Engineering
Current Threats
“Nearly one in five people who found a random
USB stick in a public setting proceeded to use
the drive in ways that posed cybersecurity risks
to their personal devices and information and
potentially, that of their employer, a recent
experiment conducted on behalf of CompTIA,
the IT industry association, revealed.”
http://www.securitymagazine.com/articles/86728-study-highlights-poor-security-habits
Current Threats
• Viruses
• Malware
• Worms
• Trojans
• Ransomware
Best Practices
• Security Review
• Update Software including OS, AV..etc.
• Policy Review
• Current Generation Firewall
• Backup Backup Backup
• Security Breach Mitigation Plan
NO ONE IS DISCOUNTING PREVENTION. BUT
BUILDING CYBER RESILIENCY STARTS WITH
THE PREMISE THAT ATTACKERS WILL GET IN,
THAT SMART ORGANIZATIONS OPERATE
UNDER AN “ASSUMPTION OF COMPROMISE,”
AND THAT THEY PLAN THEIR RESPONSE AND
REMEDIATION CAPABILITIES ACCORDINGLY
VICTOR LIMONGELLI IS PRESIDENT AND CEO OF GUIDANCE SOFTWARE, INC. HE IS A FREQUENT
SPEAKER AT SECURITY AND LEGAL EVENTS.
Security Inside Network
• Training
• Security Review
• ISFW
• Training Again
Loren Vonlintel Lvonlintel@nex-tech.com 785-621-7006

Are Your IT Systems Secure?

  • 1.
    Are Your ITSystems Secure From Cyber Criminals, Viruses, Worms and EMPLOYEES?
  • 2.
    Security Essentials • CurrentOperating System – Windows 7 or Above • OS and Third Party Patches • Firewall With Update Services • Client Level Antivirus • Spam Filter • Secure Wireless • Password Policy
  • 3.
    On Saturday, Nov.30, the hackers had set their traps
  • 4.
    Six months earlierthe company began installing a $1.6 million malware detection tool made by the computer security firm FireEye (FEYE), whose customers also include the CIA and the Pentagon.
  • 5.
    FireEye spotted them. Bangaloregot an alert and flagged the security team in Minneapolis. And then … Nothing happened. For some reason, Minneapolis didn’t react to the sirens.
  • 6.
    Current Threats Spearphishing 95% ofall attacks on the enterprise network are the result of successful spearphishing -Allen Paller Director of Research, SANS Institute
  • 7.
    Current Threats Phishing Nearly 1in 5 users will click on a link within a phishing email Verizon Data Breach Investigation Report, 2014 https://phishingquiz.mcafee.com/ 88% of HR and Finance clicked on at least one phishing email
  • 8.
  • 9.
    Current Threats “Nearly onein five people who found a random USB stick in a public setting proceeded to use the drive in ways that posed cybersecurity risks to their personal devices and information and potentially, that of their employer, a recent experiment conducted on behalf of CompTIA, the IT industry association, revealed.” http://www.securitymagazine.com/articles/86728-study-highlights-poor-security-habits
  • 10.
    Current Threats • Viruses •Malware • Worms • Trojans • Ransomware
  • 11.
    Best Practices • SecurityReview • Update Software including OS, AV..etc. • Policy Review • Current Generation Firewall • Backup Backup Backup • Security Breach Mitigation Plan
  • 12.
    NO ONE ISDISCOUNTING PREVENTION. BUT BUILDING CYBER RESILIENCY STARTS WITH THE PREMISE THAT ATTACKERS WILL GET IN, THAT SMART ORGANIZATIONS OPERATE UNDER AN “ASSUMPTION OF COMPROMISE,” AND THAT THEY PLAN THEIR RESPONSE AND REMEDIATION CAPABILITIES ACCORDINGLY VICTOR LIMONGELLI IS PRESIDENT AND CEO OF GUIDANCE SOFTWARE, INC. HE IS A FREQUENT SPEAKER AT SECURITY AND LEGAL EVENTS.
  • 13.
    Security Inside Network •Training • Security Review • ISFW • Training Again
  • 14.