Post on 30-Dec-2015
Protecting Your Business Against the Unthinkable
SBA Houston, August 2, 2006
Mark Piening
Sr. Director Worldwide SMB Marketing
2 – 2005 Symantec Corporation. All rights reserved.Protecting your business
Small Businesses Are Interacting In New Ways
3 – 2005 Symantec Corporation. All rights reserved.Protecting your business
Your Business Is Changing
► Technology surrounds our work and private lives
► The Internet has redefined business dynamics
► Email anytime, anywhere
► Instant messages at a blink of an eye
► Wireless everything – mobile phones, wireless networks
► Access to work from home, hotel, airport
► Huge amounts of data stored on computers and servers
4 – 2005 Symantec Corporation. All rights reserved.Protecting your business
IM threats grew by 1,693% in 2005
With Opportunities Come Risks
35% of Small Businesses UseInstant Messaging (IM)
In 2005, US consumers lodged more than 196,503 internet related fraud
complaints with the FTC
57% of SMBs with websites generate significant revenue
online
One in five organizations said they have sustained financial losses due to attack on mobile data platforms
Usage of converged mobile devices grew 50% worldwide
Usage of converged mobile devices grew 50% worldwide
Sources: IMlogic Threat Center report, Jan 2006; Interland Small and Medium-sized Business Barometer, September 2005; Federal trade commission, 2006; IDC, 2005; PC World, April 2006;
5 – 2005 Symantec Corporation. All rights reserved.Protecting your business
The Problem…
Environmental Environmental ImpactsImpacts Power OutagesPower Outages FloodsFloods Tornadoes Tornadoes Etc.Etc.
User MishapsUser Mishaps End User ErrorEnd User Error TheftTheft Fat FingerFat Finger
Malicious AttacksMalicious Attacks VirusesViruses WormsWorms Trojan HorsesTrojan Horses PhishingPhishing SpyWareSpyWare
Hardware/SoftwareHardware/Software Hard DriveHard Drive Motherboard/PowerMotherboard/Power System CorruptionSystem Corruption Failed Patch or UpdateFailed Patch or Update
Common Denominator:
Loss of System and/or Important Information
6 – 2005 Symantec Corporation. All rights reserved.Protecting your business
months
days
hrs
mins
secs
ProgramViruses Macro
Viruses E-mailWorms Network
Worms
FlashWorms
Co
nta
gio
n P
eri
od
Evolution of Virus/Worm Threats
► The latest threats now spread orders of magnitude faster than years ago, from months to nearly seconds
1990 Time 2006
Contagion Period
7 – 2005 Symantec Corporation. All rights reserved.Protecting your business
Today’s Attacks Are Motivated By Financial Gain
With the growth in phishing and other financial motivated attacks, Small Businesses are at risk
Source: Symantec Internet Security Threat Report Volume IXPublished:March 2006
Top Targeted Industries
Small Business is often a target because they do not always have adequate protection
8 – 2005 Symantec Corporation. All rights reserved.Protecting your business
Threat Impact On Small Businesses
Direct Losses
• Theft, Money, Digital Assets
• Computer Resources
• Trade Secrets
• Consumer Information
Indirect Losses
• Loss of Potential Sales
• Negative Brand Impact
• Loss of Competitive Advantage
• Loss of Goodwill
Productivity Losses
• Diversion of Funds
• Continuity Expenses
• Corruption of Data
• Recovery Expenses
• Failure to Meet Contracts
• Failure to Meet Privacy Regulations
• Illegal User Activity
• Director Liability
Legal Exposure
9 – 2005 Symantec Corporation. All rights reserved.Protecting your business
But Symantec Can Help…..
Security
Data Center Management Services
Data ProtectionFor all network tiers: the gateway, the server,
the desktop, including PCs, laptops, handhelds Backup and recovery of data and systems
Simplifies administration of heterogeneous environments and provides continuous availability
of mission critical data and applications
Full range of services to assist our customers manage and mitigate IT risk
Plan Design Build Manage
10 – 2005 Symantec Corporation. All rights reserved.Protecting your business
A Simple Blueprint For Windows Security And Availability
Policy
► Proactive alerts
► Endpoint compliance
► Email discovery/compliance
Application
► Mail security
► Exchange archiving
System
► Server management & recovery
► Desktop management & recovery
Data
► Data backup and recovery
► Client and server security
11 – 2005 Symantec Corporation. All rights reserved.Protecting your business
Symantec’s Resources For Small Business
http://www.symantec.com/small_business/
12 – 2005 Symantec Corporation. All rights reserved.Protecting your business
Recommended Practices
1. Prevent infection with antivirus and antispyware software Install antivirus on all desktops, laptops, and servers Check for virus definitions daily or set for automatic updates
2. Stop intruders with a firewall Use a firewall on all desktops, laptops, and servers
3. Stay on top of security updates Deploy security patches and fixes as soon as they are available Use the latest operating system versions
4. Create strong passwords and change them frequently Don’t allow Web browsers to remember passwords/private data
5. Open email responsibly Scrutinize attachments before opening them; avoid ones with unusual
extensions Don’t open or reply to unsolicited mail
13 – 2005 Symantec Corporation. All rights reserved.Protecting your business
Recommended Practices, cont.
6. Browse the Web with caution Don’t ever give personal information to a Web site unless you see a small
padlock or key icon in the browser’s toolbar Don’t type confidential information in Instant Messaging/Chat programs
7. Back up your desktops and servers regularly Back up vital data daily and store critical backups offsite
8. Make remote connections secure Require remote users to use antivirus and firewall software Use a Virtual Private Network (VPN)
9. Lock down wireless networks Install a firewall at the wireless access point
10. Ensure the physical security of your equipment Never leave wireless devices unattended Use the screen locking feature when you leave your computer