Community IT Innovators - IT Security Best Practices

41
IT Security Best Practices July 25, 2013 Community IT Innovators Webinar Series Presenters: Steve Longenecker Mark Kraemer

description

Nonprofits often struggle with how to secure their network and IT resources. During this webinar, Steve Longenecker, Project Manager, and Mark Kraemer, Network Administrator, shared IT security best practices, both from a strategic, planning perspective and also in terms of dealing with day-to-day IT issues. Some of the questions addressed during the webinar include: 1. What kind of policies does your organization need in terms of IT security? 2. What are the risks? What threats should you be most concerned about? 3. What type of training does your staff need? 4. What are some best practices in terms of upgrading hardware and updating software? 5. What are some ways to prevent virus and malware attacks?

Transcript of Community IT Innovators - IT Security Best Practices

Page 1: Community IT Innovators - IT Security Best Practices

IT Security Best Practices

July 25, 2013

Community IT Innovators Webinar Series

Presenters:

Steve Longenecker

Mark Kraemer

Page 2: Community IT Innovators - IT Security Best Practices

Webinar Tips

• Ask questions

Post questions via chat

• Interact

Respond to polls during webinar

• Focus

Avoid multitasking. You may just miss the best part of the

presentation

• Webinar PowerPoint & Recording

PowerPoint and recording links will be shared after the webinar

Page 3: Community IT Innovators - IT Security Best Practices

About Community IT

Community IT Innovators partners with nonprofits to help them solve their

strategic & day-to-day IT challenges.

Strategic

Proactive approach so you can make IT decisions that support your

mission and grow with you

Collaborative

Team of over 40 staff who empower you to make informed IT choices

Invested

We are committed to supporting your mission, and take care of your IT

network as if it were our own

Nonprofit focus

Worked with over 900 nonprofits since 1993

Page 4: Community IT Innovators - IT Security Best Practices

Presenters

Steve Longenecker, Project Manager

[email protected]

Mark Kraemer, Network Administrator

[email protected]

Page 5: Community IT Innovators - IT Security Best Practices

Agenda

• The Big Picture

• Organizational Philosophy/Attitude

• Organizational Structures

• Security Technology

• End User Responsibility

• IT Security Stories

• Questions

Page 6: Community IT Innovators - IT Security Best Practices

The Big Picture

Page 7: Community IT Innovators - IT Security Best Practices

What are we hoping for when we say

we want our network to be secure?

• No interruptions to operations?

• No data loss?

• No inappropriate use of IT resources?

Page 8: Community IT Innovators - IT Security Best Practices

We are focused on the traditional view in

this webinar. For our purposes today:

IT Security means preventing unauthorized

access, misuse, modification or denial of IT

resources.(credit to Wikipedia)

Page 9: Community IT Innovators - IT Security Best Practices

What are your organization’s biggest IT

security challenges?

Poll question

Page 10: Community IT Innovators - IT Security Best Practices

Denial of Service attack prevents access to our

organization’s website for six hours.

Malware causes half my desktops to participate in a

“bot army.”

Interns are reading the personnel files of veteran staff

members.

The office manager is using your organization’s fantastic

Internet connection to download copyrighted movies

so he can burn them to DVD and watch them at home.

Examples

Page 11: Community IT Innovators - IT Security Best Practices

Organizational

Philosophy/Attitude

Page 12: Community IT Innovators - IT Security Best Practices

What is your organizational

balance between security,

accessibility and cost?

Page 13: Community IT Innovators - IT Security Best Practices

• What is your mission?

• Who do you serve?

• What types of data do you have?

• How many users?

• What does your existing security infrastructure look like?

Assessing your organization’s risk

Page 14: Community IT Innovators - IT Security Best Practices

• Where do your users do most of their work?

• Do they use their own devices?

• Do they need remote access to your systems?

What are your accessibility

requirements?

Page 15: Community IT Innovators - IT Security Best Practices

• What is required by law or credentialing

organizations?

• What is the state of your current network?

• What is your IT budget?

What is the cost of security?

Page 16: Community IT Innovators - IT Security Best Practices

Organizational Structures

Page 17: Community IT Innovators - IT Security Best Practices

• Does your organization think about security?

• Are user accountable for their actions?

• Do stakeholders understand what security breaches can mean for the mission?

Security Culture

Page 18: Community IT Innovators - IT Security Best Practices

• Office Manager?

• HR person?

• CFO?

Someone needs to “own” security

Page 19: Community IT Innovators - IT Security Best Practices

Who is responsible for IT Security in your

organization?

Poll question

Page 20: Community IT Innovators - IT Security Best Practices

• Appropriate Use Policy.

• Password Policy.

• BYOD and BYOA Policies.

You Need Policies for End Users

Page 21: Community IT Innovators - IT Security Best Practices

• Patching Policy.

• Data Retention Policies

• Identity and Access management.

You Need Policies for the IT Dept

Page 22: Community IT Innovators - IT Security Best Practices

Confidentiality

CIA

Integrity Availability

Page 23: Community IT Innovators - IT Security Best Practices

Security Technology

Page 24: Community IT Innovators - IT Security Best Practices

• Patch Tuesday.

• Third Party Patching.

• How to patch? Day or Night? Force

Reboots?

• Alerts/Triggers on Monitors.

Centralized Patching/Monitoring

Page 25: Community IT Innovators - IT Security Best Practices

• NTFS Permissions.

• UAC.

• Event logs.

• Host Level Firewalls.

• Password Enforcement Group Policy.

• Screen Saver Lock Group Policy.

Windows Security Tools

Page 26: Community IT Innovators - IT Security Best Practices

• Community IT recommends Fortigates.

• Limit Outgoing Traffic.

• Limit Incoming Traffic’s Source Address when Appropriate.

• Can provide VPN remote access.

• Replace every 5 years.

• Size appropriately.

• Maintain your firewall (update firmware, backup, maintain support contract, remove policies when no longer in use).

Firewalls

Page 27: Community IT Innovators - IT Security Best Practices

• Hosted is preferred.

• Mail Continuity service can be included.

• Postini was great.

• Community IT offers McAfee SaaS Email

Protection and Continuity to its clients.

Email Filters

Page 28: Community IT Innovators - IT Security Best Practices

• You must have it. You must maintain it.

• An enterprise solution is needed (includes centralized management).

• Cloud-based is preferred so that traveling laptops have access to updated definitions whenever they are online.

• No solution is immune to the zero-day threat.

• Community IT offers Vipre Antivirus to its clients.

• AV software is no substitute for careful end user behavior

Desktop/Server Antivirus Software

Page 29: Community IT Innovators - IT Security Best Practices

• Popular in school and lab scenarios.

• Doesn’t have to restrict access to content

areas.

• No substitute for good end user habits.

Internet Content Filtering

Page 30: Community IT Innovators - IT Security Best Practices

• Not something our clients are doing at

the enterprise level.

• Overhead – password/recovery system

needed.

• Can be circumvented.

File/Disk Encryption

Page 31: Community IT Innovators - IT Security Best Practices

• Hosted services are coming online, very

much a work in progress.

• Allows focus on maintaining a single

complex frequently changed password.

• Builds corporate ownership of distributed

hosted services.

Single Sign-On

Page 32: Community IT Innovators - IT Security Best Practices

• Two separate authentication systems

must be navigated to gain access –

famous example is the ATM machine.

• Google offers 2-factor authentication to

Gmail (and other Google apps).

• Key fobs replaced by “soft tokens” on

mobile phones.

Two Factor Authentication

Page 33: Community IT Innovators - IT Security Best Practices

• Mobile devices have become a

significant data leakage/loss

opportunity.

• Can conflict with BYOD expectations.

• On Community IT’s service offering road

map.

Mobile Device Management

Page 34: Community IT Innovators - IT Security Best Practices

End User Responsibility

Page 35: Community IT Innovators - IT Security Best Practices

• Safe email habits

• Safe password habits

• Safe browsing habits

• Safe social media habits

• Healthy skepticism of potential social engineering attacks

Page 36: Community IT Innovators - IT Security Best Practices

Which of these practices does your staff

need to improve on the most?

Poll question

Page 37: Community IT Innovators - IT Security Best Practices

IT Security Stories

Page 38: Community IT Innovators - IT Security Best Practices

• Simple passwords.

• Domain Admin privileges.

• Virus Impacts

• Sharing of copyrighted material.

Page 39: Community IT Innovators - IT Security Best Practices

Questions?

Page 40: Community IT Innovators - IT Security Best Practices

Upcoming Webinar

August 29

Office 365 for Nonprofits

Presenter

Johanny Torrico

Page 41: Community IT Innovators - IT Security Best Practices

Next Steps

Connect with us

Provide feedback Short survey after you exit the webinar. Be sure to include any

questions that were not answered.

Missed anything? Link to slides & recording will be emailed to you.