Protecting Your Business

26
1 PROTECTING YOUR BUSINESS All Covered Seminar

Transcript of Protecting Your Business

Page 1: Protecting Your Business

1

PROTECTING YOUR BUSINESS

All Covered Seminar

Page 2: Protecting Your Business

2

Today’s Presenter:

ABOUT ALL COVERED

Tim Coker, GCFE, CHP, CSCS Information Security Practice Manager

Over twenty years of experience in network and systems administration, engineering, security, digital

forensics, technical consulting, and design & management. Currently directing all security program

management, compliance, and security services for clients and internally for All Covered.

• All Covered – IT services from Konica Minolta

• Established in 1997

• Headquartered in Foster City, California

• Offices in over 25 cities in the United States

• Over 800 employees with approximately 600 engineers with industry certifications

Page 3: Protecting Your Business

3

IT Security Challenges:

PROTECTING YOUR BUSINESS

Not Having a Plan

Malware / Spyware

Data Loss / Disasters

Page 4: Protecting Your Business

4

IS YOUR BUSINESS AT RISK?

Without internal security and data recovery precautions, businesses

put revenue, reputation, compliance and innovation at huge risk…

Revenue

Reputation

Compliance

Innovation

Page 5: Protecting Your Business

5

DON’T BE A TARGET!

The Target data breach affected 40 million debit and credit cards

and 70 million customer records.

The Target breach incident went

unnoticed for almost a month!

Page 6: Protecting Your Business

6

SECURITY & YOUR BUSINESS

You don’t need to be a company the size of Target to be impacted

by a security breach…

“In 2014, 40% of small and mid-size

businesses that manage their own

security will have their network

accessed by a hacker, and more

than 50% won’t even know they

were attacked.”

Page 7: Protecting Your Business

7

COMMON SECURITY CHALLENGES

Going it alone can be very demanding…

IT RESPONSIBILITIES:

• End User Support

• Messaging Protection

• Website Security

• Web Content Filtering

• Virus Definitions

• Patching

• Backup and Recovery

• Mobile Devices and BYOD

• Compliance Management

Page 8: Protecting Your Business

8

WHY BUSINESSES MIGHT NEED ASSISTANCE

• Installing firewalls and antivirus on your PCs is

not enough…cyber attacks can still get through

and go unnoticed.

• Security responsibilities often fall to

IT generalists who are also tasked with

managing servers and other applications.

• Many organizations lack the SKILLS, TIME,

RESOURCES and EXPERTISE to properly

deploy and maintain the technological side

of IT security.

Page 9: Protecting Your Business

9

TYPES OF SECURITY THREATS

Criminals use a number of tactics to gain access to your

data. Among the most common tactics are:

• Malware

• Spyware

• Adware

• Phishing

• Data Theft

• Ransomware

• Viruses

• Password Hacking

• Vulnerability Scanners

• Packet Sniffers

And don’t forget about

Insider Activity

Page 10: Protecting Your Business

10

ALL COVERED SECURITY SERVICES

All Covered will secure client environments using the following

‘All Covered Care’ services:

MESSAGING PROTECTION

• Email Antivirus

• Spam Filtering

• Email Continuity

• Email Encryption

• Phishing Protection

ENDPOINT PROTECTION

• Managing Antivirus

• Managed Malware Protection

• DNS Filtering

• Web Content Filtering

PATCHING

• Managed Microsoft Patching

VULNERABILITY MANAGEMENT

• Managed Vulnerability Scan Service

Page 11: Protecting Your Business

11

SUCCESS STORIES – SECURITY Recurring Virus and Malware Infections

Location: Atlanta

Established: 1998

Description: Over 150

employees and 4 offices in the

Atlanta area

ACCOUNTING FIRM

PROBLEM:

• Multiple virus and malware infections introduced via phishing emails and malicious links

• Various servers and workstations infected and re-infected over several months

• Several hours to resolve each time

• Email, file storage, business applications where impacted over the various infections

SOLUTION:

• Deployed Email Spam Filtering and Antivirus

• Deployed Malware prevention

• Deployed DNS filtering

BENEFITS:

• Reduced the reoccurrence of virus and

malware infections

• Improved employee confidence in IT systems

• Improved employee productivity

Page 12: Protecting Your Business

12

SUCCESS STORIES – SECURITY Vulnerability Scanning

Healthcare Provider

PROBLEM:

• Required to have periodic vulnerability scans to

meet HIPAA compliance

• Client was looking for a managed solution as they

did not have internal expertise to deploy and

manage an on-premise solution

• Out of compliance without this solution

SOLUTION:

• Deployed Managed Vulnerability Scan Service

BENEFITS:

• Provides automated monthly vulnerability scans

and reports

• Continues to help client discover and remediate new

vulnerabilities in the environment

• Helps client meet compliance requirements

Location: San Jose, CA

Established: 1989

Description: Small

provider with 2 offices

and 20 employees

Page 13: Protecting Your Business

13

ADDITIONAL THREATS TO CONSIDER

Unfortunately, threats to your business are not only security

breaches and cyber attacks; your business can also fall victim

to…DATA LOSS.

?

Page 14: Protecting Your Business

14

WHAT IF YOU LOST YOUR DATA?

Do you have a data backup system in place?

If your entire building burned down or all of your servers

crashed, would your business be able to recover?

Page 15: Protecting Your Business

15

TYPES OF DATA LOSS THREATS

• Fires

• Floods

• Earthquakes

• Hurricanes

• Tornadoes

• Data Corruption

• Hardware / System Malfunction

• Software Corruption

• Human Error

• Brownouts

• Theft

Page 16: Protecting Your Business

16

DATA LOSS STATISTICS

Every week, 140,000 hard drives crash in the United States and

31% of PC users have lost all of their files due to events beyond

their control.

Page 17: Protecting Your Business

17

DATA BACKUP AND RECOVERY SERVICES

All Covered will provide protection of client data via the following

‘All Covered Care’ services:

MANAGED BACKUP AND RECOVERY

• Physical Servers

• Virtual Servers

• Server Files

• PCs and Laptops

EMAIL PROTECTION

• Archiving

CLOUD SERVICES

• Cloud Assessments

• Cloud Hosting

Page 18: Protecting Your Business

18

SUCCESS STORIES – DATA BACKUP Disaster Recovery

Greater Des Moines Partnership

PROBLEM:

• Fire in an adjacent building

• Smoke and water damage to their systems

SOLUTION:

• All Covered Backup for Servers

• With Business Continuity in the Cloud

BENEFITS:

• Servers damaged by water and smoke replaced by

virtual cloud servers in under 2 hours

• Access to building was lost, but full access to systems

and data in the cloud was uncompromised

Location: Des Moines, Iowa

Established: 1888

Description:

• Community development

organization servicing

central Iowa

• 21 affiliate chambers

of commerce

• 5,000 business members

Page 19: Protecting Your Business

19

SUCCESS STORIES – SECURITY & DISASTER RECOVERY Email Protection and Disaster Recovery

Location: Chicago, IL

Established: 1992

Description: Over 100

employees and 3 offices in the

Chicago area

Software Company

PROBLEM:

• Ransomware introduced to IT environment via phishing email

• Accounting and Financial systems were encrypted

• Client had not confirmed backup for weeks

• Data stored on Accounting laptop was not part of backup

• Client had to pay a ransom to decrypt files

• 4 Days to resolve

• Billing, Timesheets, Payroll, Email all impacted

SOLUTION:

• Deployed All Covered Email Protection Services

• Deployed All Covered backup for servers

• Deployed All Covered backup for workstations

BENEFITS:

• Email is now protected with antispam, antivirus and phishing protection

• Automated server backups with offsite copy

• Server backups managed and monitored from the

All Covered NOC (Network Operations Center)

• Data on laptops is now backed up to the cloud

Page 20: Protecting Your Business

20

ADDITIONAL SECURITY MEASURES:

CLOUD SERVICES

Looking for an extra layer of security? Consider the cloud!

ALL COVERED CLOUD SERVICES INCLUDE:

• Fully managed virtual servers located in the U.S.

• Cloud backup and disaster recovery

• Cloud hosted exchange

• Cloud business continuity

BENEFITS AND FEATURES:

• 24x7 availability and reliability

• Remote access from any location

• Predictable monthly costs

• Ability to quickly scale up or down

Cloud ROI Return on Investment Curve for Cloud Solutions

Page 21: Protecting Your Business

21

SUCCESS STORIES – CLOUD Risk Mitigation & Regulatory Compliance

Clarkston State Bank

PROBLEM:

• Locations with aging infrastructure, intermittent

internet and unreliable power caused major outage.

All 6 branches lost access to the network and

internet for several days.

SOLUTION:

• All Covered Cloud Servers and co-location

BENEFITS:

• Eliminated need to purchase new servers for

secondary locations

• Reliable power to all centrally located servers

while removing need to purchase backup power

• Achieved compliance conditions

Location: Clarkston, Michigan

Established: 1911

Description: Community bank

with 6 branches in Oakland

County, Michigan. Dedicated to

meeting the financial needs of

local residents and businesses.

Page 22: Protecting Your Business

22

ALL COVERED CAN HELP

• Step 1 – Plan: Build a comprehensive

security plan that includes written policies

for BYOD, malware and virus protection,

and data security.

• Step 2 – Secure: Put the right

safeguards into action including

email protection, endpoint protection,

network monitoring, patching and

vulnerability management.

• Step 3 – Protect: Implement ongoing

managed protection of data, on PCs and

servers (both on-site and in the cloud) for

quick and reliable recovery.

22

Page 23: Protecting Your Business

23

STEPS YOU CAN TAKE NOW

SECURITY MANAGEMENT

• Deploy Centralized Managed Endpoint Security

• Institute automated patch management

• Create and enforce IT and Security policies across all layers

DATA ACCESS AND PROTECTION

• Understand where your data resides

• Identify data that needs to be backed up regularly

• Make sure you have copies off-site

• Secure the entire perimeter of your network

• Institute secure remote access

USERS

• Educate employees

• Communicate policies and procedures

• Consider Web Content Filtering

CONSIDER OUTSOURCING

Page 24: Protecting Your Business

24

NETWORK AND SECURITY ANALYSIS OFFER

STEPS FOR MOVING FORWARD

• Contact your local sales rep or call 866.446.1133

• Authorization form signed and submitted

• Analysis scan performed on your network

• Review Network Risk Report with an

All Covered Solutions Architect

NETWORK ANALYSIS RISK REPORT INCLUDES:

• List of analysis tasks performed

• Risk score from 1-100

• Issues Summary with recommended solutions

• Asset Summary

• User Summary

**Complimentary Network and Security Analysis ($1,000 Value)

Network

and

Security Analysis

View Sample Report: http://allcovered.com/security/report

Page 25: Protecting Your Business

25

QUESTIONS?

To speak with an All Covered

Services Consultant, call:

866-446-1133

Or visit:

http://www.allcovered.com/

Page 26: Protecting Your Business

26

APPENDIX

“40% of small to medium businesses who manage their own

network and use the Internet for more than e-mail will have their

network accessed by a hacker and more than 50% won’t even

know they were attacked” (Source: Gartner Group).

“Every week, 140,000 hard drives crash in the United States and

31% of PC users have lost all of their files due to events beyond

their control” (Source: Mozy Online Backup).