SlideShare a Scribd company logo
1 of 17
We’ll be providing an overview of potential threats
to your business (Internal & External), how you can
protect your business from these threats and also
touch on General Data Protection Regulation
(GDPR) that is to be introduced next year.
There is a link at the end of this deck to the associated blog and
webinar recording.
I.T Support Consultancy
Who am I?
Matthew Parsons – Director – Surf Tech IT
Working in IT Services for 16 Years
Cyber Security| Kind of threats?
• Phishing
• Malware
• Denial Of Service
• Man In the Middle
• Credentials Reuse
• Insider Attack
Cyber Security| Phishing
• Attack via email by which the attacker
pretends to be a valid provider of a service
• Objective
to gain credentials, or other personal data
Cloud Security | Malware
• Refers to various dorm of harmful software,
such as viruses and ransomware
• Objective
to cause disruption, obtain data, collect
money
Cyber Security | Denial of Service
• Attempt to disrupt a service by simply
flooding it with data
• Objective
to stop a service (i.e website)
Cyber Security | Man in the middle
• To intercept your network/internet traffic
by pretending to be a valid service provider
• Objective
to obtain credentials/payment details
Cyber Security | Credential Reuse
• After a breach an attacker will try that
password on multiple site knowing that
most users reuse their password
• Objective
to gain additional access to other services
Cyber Security | Insider Threat
• The attack on your business from an internal
sources (employee).
• Objective
disrupt business, obtain data
Protecting your business?
• Forms of protection;
• Antivirus
• Additional Endpoint Protection
• Antispam
• Archive all email
• Unified Threat Management (UTM)
• SonicWall
• Backups
• Offsite & Tested
Monitoring and Recording
• Most data breaches are detected after the event.
• It’s important that the security events are recorded to
provide an audit trail pre/post data breach.
• Data to held for a number of years.
GDPR? General Data Protection Regulation (May 2018)
• The protection of personal data; Essentially anything that
could be used to identify an individual
• Who’s it apply to?
• Every one, big or small
• Penalty
• If caught you could face a fine up to 20m Euros or
4% of annual turnover
Conclusion
• Security is important to all businesses
• You’re not only protecting your interests, you’re
protecting your customers interests as well
• Not just one type of protection is enough, we would
highly recommend that you take all areas into
consideration
• Email Protection
• Gateway Protection (UTM)
• Endpoint Protection (AV)
• Disaster Recovery Plan
• Basic Good IT (Windows Updates etc.)
BizSmart aims to help business owners of small and medium
sized businesses to create value and scale their businesses
through sound practical business support by providing insight,
Clarity combined with a real determination to help you succeed.
You can access webinars and presentations like this and more
besides through our SmartRoom service here
You can read the associated blog and listen to a live recording of
this presentation by clicking here
You can read Matthew’s profile here
•Need a sounding board for your ideas?
•Need to know what to prioritise?
•Want someone to challenge your assumptions?
BizSmart –
Where Smart people go to surround themselves with other Smart people, to gain
business success.

More Related Content

What's hot

The difference between Cybersecurity and Information Security
The difference between Cybersecurity and Information SecurityThe difference between Cybersecurity and Information Security
The difference between Cybersecurity and Information SecurityPECB
 
Thinking like a criminal – Cybersecurity 101
Thinking like a criminal – Cybersecurity 101Thinking like a criminal – Cybersecurity 101
Thinking like a criminal – Cybersecurity 101PECB
 
Cybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive MeasuresCybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive MeasuresAditya Ratnaparkhi
 
Cybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To KnowCybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To KnowShantam Goel
 
Using international standards to improve EU cyber security
Using international standards to improve EU cyber securityUsing international standards to improve EU cyber security
Using international standards to improve EU cyber securityIT Governance Ltd
 
Prevent million dollar fines - preparing for the EU General Data Regulation
Prevent million dollar fines - preparing for the EU General Data RegulationPrevent million dollar fines - preparing for the EU General Data Regulation
Prevent million dollar fines - preparing for the EU General Data RegulationSophos Benelux
 
Information Security Lesson 1 - Eric Vanderburg
Information Security Lesson 1 - Eric VanderburgInformation Security Lesson 1 - Eric Vanderburg
Information Security Lesson 1 - Eric VanderburgEric Vanderburg
 
The Benefits of Security From a Managed Services Provider
The Benefits of Security From a Managed Services ProviderThe Benefits of Security From a Managed Services Provider
The Benefits of Security From a Managed Services ProviderCSI Solutions
 
مشروع الامن السيبراني
مشروع الامن السيبرانيمشروع الامن السيبراني
مشروع الامن السيبرانيmeshalalmrwani
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsToño Herrera
 
Information Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesInformation Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesKroll
 
2017 - Data Privacy and GDPR (v1.1)
2017 - Data Privacy and GDPR (v1.1)2017 - Data Privacy and GDPR (v1.1)
2017 - Data Privacy and GDPR (v1.1)Rui Miguel Feio
 
Magix Value Proposition Ar
Magix Value Proposition ArMagix Value Proposition Ar
Magix Value Proposition Aralanrehbock
 
Online security (Daniel Beazer)
Online security (Daniel Beazer)Online security (Daniel Beazer)
Online security (Daniel Beazer)Screen Pages
 
Information Security Lesson 11 - Policies & Procedures - Eric Vanderburg
Information Security Lesson 11 - Policies & Procedures - Eric VanderburgInformation Security Lesson 11 - Policies & Procedures - Eric Vanderburg
Information Security Lesson 11 - Policies & Procedures - Eric VanderburgEric Vanderburg
 
Trust It Mini Public
Trust It Mini PublicTrust It Mini Public
Trust It Mini PublicTrust_IT
 
Information security
Information security Information security
Information security AishaIshaq4
 

What's hot (20)

The difference between Cybersecurity and Information Security
The difference between Cybersecurity and Information SecurityThe difference between Cybersecurity and Information Security
The difference between Cybersecurity and Information Security
 
Thinking like a criminal – Cybersecurity 101
Thinking like a criminal – Cybersecurity 101Thinking like a criminal – Cybersecurity 101
Thinking like a criminal – Cybersecurity 101
 
Simple Safe Steps to Cyber Security
Simple Safe Steps to Cyber SecuritySimple Safe Steps to Cyber Security
Simple Safe Steps to Cyber Security
 
Cybersecurity services
Cybersecurity servicesCybersecurity services
Cybersecurity services
 
Cybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive MeasuresCybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive Measures
 
Cybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To KnowCybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To Know
 
Using international standards to improve EU cyber security
Using international standards to improve EU cyber securityUsing international standards to improve EU cyber security
Using international standards to improve EU cyber security
 
Prevent million dollar fines - preparing for the EU General Data Regulation
Prevent million dollar fines - preparing for the EU General Data RegulationPrevent million dollar fines - preparing for the EU General Data Regulation
Prevent million dollar fines - preparing for the EU General Data Regulation
 
Information Security Lesson 1 - Eric Vanderburg
Information Security Lesson 1 - Eric VanderburgInformation Security Lesson 1 - Eric Vanderburg
Information Security Lesson 1 - Eric Vanderburg
 
The Benefits of Security From a Managed Services Provider
The Benefits of Security From a Managed Services ProviderThe Benefits of Security From a Managed Services Provider
The Benefits of Security From a Managed Services Provider
 
مشروع الامن السيبراني
مشروع الامن السيبرانيمشروع الامن السيبراني
مشروع الامن السيبراني
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity Fundamentals
 
Information Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesInformation Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & Responsibilities
 
2017 - Data Privacy and GDPR (v1.1)
2017 - Data Privacy and GDPR (v1.1)2017 - Data Privacy and GDPR (v1.1)
2017 - Data Privacy and GDPR (v1.1)
 
Magix Value Proposition Ar
Magix Value Proposition ArMagix Value Proposition Ar
Magix Value Proposition Ar
 
Online security (Daniel Beazer)
Online security (Daniel Beazer)Online security (Daniel Beazer)
Online security (Daniel Beazer)
 
IT security
IT securityIT security
IT security
 
Information Security Lesson 11 - Policies & Procedures - Eric Vanderburg
Information Security Lesson 11 - Policies & Procedures - Eric VanderburgInformation Security Lesson 11 - Policies & Procedures - Eric Vanderburg
Information Security Lesson 11 - Policies & Procedures - Eric Vanderburg
 
Trust It Mini Public
Trust It Mini PublicTrust It Mini Public
Trust It Mini Public
 
Information security
Information security Information security
Information security
 

Similar to How to Protect your Business with Cyber Security

Cyber security guide
Cyber security guideCyber security guide
Cyber security guideMark Bennett
 
Cloud data security and GDPR compliance
Cloud data security and GDPR complianceCloud data security and GDPR compliance
Cloud data security and GDPR complianceSalim Benadel
 
Netwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldNetwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldnetwealthInvest
 
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptxPradeeshSAI
 
Importance of Cyber Security for Company.pdf
Importance of Cyber Security for Company.pdfImportance of Cyber Security for Company.pdf
Importance of Cyber Security for Company.pdforage technologies
 
Information and Cyber Warfare
Information and Cyber WarfareInformation and Cyber Warfare
Information and Cyber WarfareSwapnil Jagtap
 
Cyber Security Services for Business.pdf
Cyber Security Services for Business.pdfCyber Security Services for Business.pdf
Cyber Security Services for Business.pdfVograce
 
How to Protect Your Business from Cyberattacks.pptx
How to Protect Your Business from Cyberattacks.pptxHow to Protect Your Business from Cyberattacks.pptx
How to Protect Your Business from Cyberattacks.pptxRohit kumar
 
Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015sarah kabirat
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSPreetiDevidas
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptxAkshayKhade21
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyMark Albala
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessJoel Cardella
 
Cysecc.pptx
Cysecc.pptxCysecc.pptx
Cysecc.pptxjondon17
 
How to Start a Cyber Security Business.pdf
How to Start a Cyber Security Business.pdfHow to Start a Cyber Security Business.pdf
How to Start a Cyber Security Business.pdfMr. Business Magazine
 
Baretzky & Associates Presentation.
Baretzky & Associates Presentation.Baretzky & Associates Presentation.
Baretzky & Associates Presentation.Ricardo Bn. Baretzky
 

Similar to How to Protect your Business with Cyber Security (20)

Cyber - it's all now a matter of time!
Cyber - it's all now a matter of time!Cyber - it's all now a matter of time!
Cyber - it's all now a matter of time!
 
Cyber security guide
Cyber security guideCyber security guide
Cyber security guide
 
Cloud data security and GDPR compliance
Cloud data security and GDPR complianceCloud data security and GDPR compliance
Cloud data security and GDPR compliance
 
Netwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldNetwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital world
 
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
 
Importance of Cyber Security for Company.pdf
Importance of Cyber Security for Company.pdfImportance of Cyber Security for Company.pdf
Importance of Cyber Security for Company.pdf
 
Information and Cyber Warfare
Information and Cyber WarfareInformation and Cyber Warfare
Information and Cyber Warfare
 
nerfslides.pptx
nerfslides.pptxnerfslides.pptx
nerfslides.pptx
 
IT & Network Security Awareness
IT & Network Security AwarenessIT & Network Security Awareness
IT & Network Security Awareness
 
Cyber Security Services for Business.pdf
Cyber Security Services for Business.pdfCyber Security Services for Business.pdf
Cyber Security Services for Business.pdf
 
How to Protect Your Business from Cyberattacks.pptx
How to Protect Your Business from Cyberattacks.pptxHow to Protect Your Business from Cyberattacks.pptx
How to Protect Your Business from Cyberattacks.pptx
 
Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing business
 
Cysecc.pptx
Cysecc.pptxCysecc.pptx
Cysecc.pptx
 
How to Start a Cyber Security Business.pdf
How to Start a Cyber Security Business.pdfHow to Start a Cyber Security Business.pdf
How to Start a Cyber Security Business.pdf
 
Baretzky & Associates Presentation.
Baretzky & Associates Presentation.Baretzky & Associates Presentation.
Baretzky & Associates Presentation.
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 

More from BizSmart Select

How to Develop Your Marketing Cookbook
How to Develop Your Marketing CookbookHow to Develop Your Marketing Cookbook
How to Develop Your Marketing CookbookBizSmart Select
 
Top 10 ways to Overcome Procrastination
Top 10 ways to Overcome ProcrastinationTop 10 ways to Overcome Procrastination
Top 10 ways to Overcome ProcrastinationBizSmart Select
 
Tax Tips for Business Owners
Tax Tips for Business OwnersTax Tips for Business Owners
Tax Tips for Business OwnersBizSmart Select
 
How to Use Engagement Marketing
How to Use Engagement MarketingHow to Use Engagement Marketing
How to Use Engagement MarketingBizSmart Select
 
How to Improve Efficiency in Your Business/ Improving Your Business Processes
How to Improve Efficiency in Your Business/ Improving Your Business ProcessesHow to Improve Efficiency in Your Business/ Improving Your Business Processes
How to Improve Efficiency in Your Business/ Improving Your Business ProcessesBizSmart Select
 
Tax Efficient Planning for Business Owners
Tax Efficient Planning for Business OwnersTax Efficient Planning for Business Owners
Tax Efficient Planning for Business OwnersBizSmart Select
 
How to Find Your Hedgehog!
How to Find Your Hedgehog!How to Find Your Hedgehog!
How to Find Your Hedgehog!BizSmart Select
 
What is the Enterprise Finance Loan Guarantee Scheme?
What is the Enterprise Finance Loan Guarantee Scheme?What is the Enterprise Finance Loan Guarantee Scheme?
What is the Enterprise Finance Loan Guarantee Scheme?BizSmart Select
 
How to be More productive, in 10 steps!
How to be More productive, in 10 steps!How to be More productive, in 10 steps!
How to be More productive, in 10 steps!BizSmart Select
 
What's your Why? Your Core Purpose?
What's your Why? Your Core Purpose?What's your Why? Your Core Purpose?
What's your Why? Your Core Purpose?BizSmart Select
 
Continuous improvement for Small Businesses
Continuous improvement for Small BusinessesContinuous improvement for Small Businesses
Continuous improvement for Small BusinessesBizSmart Select
 
Stressing about GDPR? Key Facts
Stressing about GDPR? Key FactsStressing about GDPR? Key Facts
Stressing about GDPR? Key FactsBizSmart Select
 
How to Join the Dots between Sales and Marketing
How to Join the Dots between Sales and MarketingHow to Join the Dots between Sales and Marketing
How to Join the Dots between Sales and MarketingBizSmart Select
 
How to measure the success of my social media
How to measure the success of my social mediaHow to measure the success of my social media
How to measure the success of my social mediaBizSmart Select
 
Tax Efficient Investment Planning for (UK) Business Owners
Tax Efficient Investment Planning for (UK) Business OwnersTax Efficient Investment Planning for (UK) Business Owners
Tax Efficient Investment Planning for (UK) Business OwnersBizSmart Select
 
How to use Emotional Marketing
How to use Emotional MarketingHow to use Emotional Marketing
How to use Emotional MarketingBizSmart Select
 
How to ensure your Virtual Assistant delivers Tangible support
How to ensure your Virtual Assistant delivers Tangible supportHow to ensure your Virtual Assistant delivers Tangible support
How to ensure your Virtual Assistant delivers Tangible supportBizSmart Select
 
How to Review Employee Performance
How to Review Employee PerformanceHow to Review Employee Performance
How to Review Employee PerformanceBizSmart Select
 

More from BizSmart Select (20)

How to Develop Your Marketing Cookbook
How to Develop Your Marketing CookbookHow to Develop Your Marketing Cookbook
How to Develop Your Marketing Cookbook
 
Top 10 ways to Overcome Procrastination
Top 10 ways to Overcome ProcrastinationTop 10 ways to Overcome Procrastination
Top 10 ways to Overcome Procrastination
 
Tax Tips for Business Owners
Tax Tips for Business OwnersTax Tips for Business Owners
Tax Tips for Business Owners
 
How to Use Engagement Marketing
How to Use Engagement MarketingHow to Use Engagement Marketing
How to Use Engagement Marketing
 
How to Improve Efficiency in Your Business/ Improving Your Business Processes
How to Improve Efficiency in Your Business/ Improving Your Business ProcessesHow to Improve Efficiency in Your Business/ Improving Your Business Processes
How to Improve Efficiency in Your Business/ Improving Your Business Processes
 
Tax Efficient Planning for Business Owners
Tax Efficient Planning for Business OwnersTax Efficient Planning for Business Owners
Tax Efficient Planning for Business Owners
 
How to Find Your Hedgehog!
How to Find Your Hedgehog!How to Find Your Hedgehog!
How to Find Your Hedgehog!
 
What is the Enterprise Finance Loan Guarantee Scheme?
What is the Enterprise Finance Loan Guarantee Scheme?What is the Enterprise Finance Loan Guarantee Scheme?
What is the Enterprise Finance Loan Guarantee Scheme?
 
How to be More productive, in 10 steps!
How to be More productive, in 10 steps!How to be More productive, in 10 steps!
How to be More productive, in 10 steps!
 
What's at your Core?
What's at your Core?What's at your Core?
What's at your Core?
 
What's your Why? Your Core Purpose?
What's your Why? Your Core Purpose?What's your Why? Your Core Purpose?
What's your Why? Your Core Purpose?
 
Continuous improvement for Small Businesses
Continuous improvement for Small BusinessesContinuous improvement for Small Businesses
Continuous improvement for Small Businesses
 
Stressing about GDPR? Key Facts
Stressing about GDPR? Key FactsStressing about GDPR? Key Facts
Stressing about GDPR? Key Facts
 
How to Join the Dots between Sales and Marketing
How to Join the Dots between Sales and MarketingHow to Join the Dots between Sales and Marketing
How to Join the Dots between Sales and Marketing
 
How to measure the success of my social media
How to measure the success of my social mediaHow to measure the success of my social media
How to measure the success of my social media
 
Tax Efficient Investment Planning for (UK) Business Owners
Tax Efficient Investment Planning for (UK) Business OwnersTax Efficient Investment Planning for (UK) Business Owners
Tax Efficient Investment Planning for (UK) Business Owners
 
How to use Emotional Marketing
How to use Emotional MarketingHow to use Emotional Marketing
How to use Emotional Marketing
 
How to ensure your Virtual Assistant delivers Tangible support
How to ensure your Virtual Assistant delivers Tangible supportHow to ensure your Virtual Assistant delivers Tangible support
How to ensure your Virtual Assistant delivers Tangible support
 
How to Review Employee Performance
How to Review Employee PerformanceHow to Review Employee Performance
How to Review Employee Performance
 
Discover Your X Factor
Discover Your X FactorDiscover Your X Factor
Discover Your X Factor
 

Recently uploaded

Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
Islamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in IslamabadIslamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in IslamabadAyesha Khan
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...lizamodels9
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Serviceankitnayak356677
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
Marketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet CreationsMarketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet Creationsnakalysalcedo61
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailAriel592675
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessSeta Wicaksana
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Timedelhimodelshub1
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 

Recently uploaded (20)

Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
Islamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in IslamabadIslamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in Islamabad
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
Marketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet CreationsMarketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet Creations
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detail
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Time
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 

How to Protect your Business with Cyber Security

  • 1. We’ll be providing an overview of potential threats to your business (Internal & External), how you can protect your business from these threats and also touch on General Data Protection Regulation (GDPR) that is to be introduced next year. There is a link at the end of this deck to the associated blog and webinar recording.
  • 3. Who am I? Matthew Parsons – Director – Surf Tech IT Working in IT Services for 16 Years
  • 4. Cyber Security| Kind of threats? • Phishing • Malware • Denial Of Service • Man In the Middle • Credentials Reuse • Insider Attack
  • 5. Cyber Security| Phishing • Attack via email by which the attacker pretends to be a valid provider of a service • Objective to gain credentials, or other personal data
  • 6. Cloud Security | Malware • Refers to various dorm of harmful software, such as viruses and ransomware • Objective to cause disruption, obtain data, collect money
  • 7. Cyber Security | Denial of Service • Attempt to disrupt a service by simply flooding it with data • Objective to stop a service (i.e website)
  • 8. Cyber Security | Man in the middle • To intercept your network/internet traffic by pretending to be a valid service provider • Objective to obtain credentials/payment details
  • 9. Cyber Security | Credential Reuse • After a breach an attacker will try that password on multiple site knowing that most users reuse their password • Objective to gain additional access to other services
  • 10. Cyber Security | Insider Threat • The attack on your business from an internal sources (employee). • Objective disrupt business, obtain data
  • 11. Protecting your business? • Forms of protection; • Antivirus • Additional Endpoint Protection • Antispam • Archive all email • Unified Threat Management (UTM) • SonicWall • Backups • Offsite & Tested
  • 12. Monitoring and Recording • Most data breaches are detected after the event. • It’s important that the security events are recorded to provide an audit trail pre/post data breach. • Data to held for a number of years.
  • 13. GDPR? General Data Protection Regulation (May 2018) • The protection of personal data; Essentially anything that could be used to identify an individual • Who’s it apply to? • Every one, big or small • Penalty • If caught you could face a fine up to 20m Euros or 4% of annual turnover
  • 14. Conclusion • Security is important to all businesses • You’re not only protecting your interests, you’re protecting your customers interests as well • Not just one type of protection is enough, we would highly recommend that you take all areas into consideration • Email Protection • Gateway Protection (UTM) • Endpoint Protection (AV) • Disaster Recovery Plan • Basic Good IT (Windows Updates etc.)
  • 15. BizSmart aims to help business owners of small and medium sized businesses to create value and scale their businesses through sound practical business support by providing insight, Clarity combined with a real determination to help you succeed. You can access webinars and presentations like this and more besides through our SmartRoom service here You can read the associated blog and listen to a live recording of this presentation by clicking here You can read Matthew’s profile here
  • 16. •Need a sounding board for your ideas? •Need to know what to prioritise? •Want someone to challenge your assumptions?
  • 17. BizSmart – Where Smart people go to surround themselves with other Smart people, to gain business success.