This deck provides an overview of potential threats to your business (Internal & External), how you can protect your business from these threats and also touch on General Data Protection Regulation (GDPR) that is to be introduced next year in the UK.
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
How to Protect your Business with Cyber Security
1. We’ll be providing an overview of potential threats
to your business (Internal & External), how you can
protect your business from these threats and also
touch on General Data Protection Regulation
(GDPR) that is to be introduced next year.
There is a link at the end of this deck to the associated blog and
webinar recording.
3. Who am I?
Matthew Parsons – Director – Surf Tech IT
Working in IT Services for 16 Years
4. Cyber Security| Kind of threats?
• Phishing
• Malware
• Denial Of Service
• Man In the Middle
• Credentials Reuse
• Insider Attack
5. Cyber Security| Phishing
• Attack via email by which the attacker
pretends to be a valid provider of a service
• Objective
to gain credentials, or other personal data
6. Cloud Security | Malware
• Refers to various dorm of harmful software,
such as viruses and ransomware
• Objective
to cause disruption, obtain data, collect
money
7. Cyber Security | Denial of Service
• Attempt to disrupt a service by simply
flooding it with data
• Objective
to stop a service (i.e website)
8. Cyber Security | Man in the middle
• To intercept your network/internet traffic
by pretending to be a valid service provider
• Objective
to obtain credentials/payment details
9. Cyber Security | Credential Reuse
• After a breach an attacker will try that
password on multiple site knowing that
most users reuse their password
• Objective
to gain additional access to other services
10. Cyber Security | Insider Threat
• The attack on your business from an internal
sources (employee).
• Objective
disrupt business, obtain data
11. Protecting your business?
• Forms of protection;
• Antivirus
• Additional Endpoint Protection
• Antispam
• Archive all email
• Unified Threat Management (UTM)
• SonicWall
• Backups
• Offsite & Tested
12. Monitoring and Recording
• Most data breaches are detected after the event.
• It’s important that the security events are recorded to
provide an audit trail pre/post data breach.
• Data to held for a number of years.
13. GDPR? General Data Protection Regulation (May 2018)
• The protection of personal data; Essentially anything that
could be used to identify an individual
• Who’s it apply to?
• Every one, big or small
• Penalty
• If caught you could face a fine up to 20m Euros or
4% of annual turnover
14. Conclusion
• Security is important to all businesses
• You’re not only protecting your interests, you’re
protecting your customers interests as well
• Not just one type of protection is enough, we would
highly recommend that you take all areas into
consideration
• Email Protection
• Gateway Protection (UTM)
• Endpoint Protection (AV)
• Disaster Recovery Plan
• Basic Good IT (Windows Updates etc.)
15. BizSmart aims to help business owners of small and medium
sized businesses to create value and scale their businesses
through sound practical business support by providing insight,
Clarity combined with a real determination to help you succeed.
You can access webinars and presentations like this and more
besides through our SmartRoom service here
You can read the associated blog and listen to a live recording of
this presentation by clicking here
You can read Matthew’s profile here
16. •Need a sounding board for your ideas?
•Need to know what to prioritise?
•Want someone to challenge your assumptions?
17. BizSmart –
Where Smart people go to surround themselves with other Smart people, to gain
business success.