Securedtech Securing your data from Attack Confidentiality – Names, addresses and sensitive data...
-
Upload
emerald-knight -
Category
Documents
-
view
212 -
download
0
Transcript of Securedtech Securing your data from Attack Confidentiality – Names, addresses and sensitive data...
![Page 1: Securedtech Securing your data from Attack Confidentiality – Names, addresses and sensitive data Integrity - Your email Availability - Your website, computer.](https://reader036.fdocuments.in/reader036/viewer/2022083008/56649f305503460f94c4a6af/html5/thumbnails/1.jpg)
Securedtech
Securing your data from Attack
• Confidentiality – Names, addresses and sensitive data
• Integrity - Your email
• Availability - Your website, computer
![Page 2: Securedtech Securing your data from Attack Confidentiality – Names, addresses and sensitive data Integrity - Your email Availability - Your website, computer.](https://reader036.fdocuments.in/reader036/viewer/2022083008/56649f305503460f94c4a6af/html5/thumbnails/2.jpg)
How much does breach cost businesses?
• Cyber crime costs businesses across the globe an estimated £265bn a year
• Every security breach costs £65,000 business
• Recently Hayes based small accountancy firm hacked into and £50k
![Page 3: Securedtech Securing your data from Attack Confidentiality – Names, addresses and sensitive data Integrity - Your email Availability - Your website, computer.](https://reader036.fdocuments.in/reader036/viewer/2022083008/56649f305503460f94c4a6af/html5/thumbnails/3.jpg)
You cannot afford to becomplacent
IT Security
![Page 4: Securedtech Securing your data from Attack Confidentiality – Names, addresses and sensitive data Integrity - Your email Availability - Your website, computer.](https://reader036.fdocuments.in/reader036/viewer/2022083008/56649f305503460f94c4a6af/html5/thumbnails/4.jpg)
I was complacent ...... and I’ve worked in the IT Industry for 20 years.
● But I’ve had a wake up call.
![Page 5: Securedtech Securing your data from Attack Confidentiality – Names, addresses and sensitive data Integrity - Your email Availability - Your website, computer.](https://reader036.fdocuments.in/reader036/viewer/2022083008/56649f305503460f94c4a6af/html5/thumbnails/5.jpg)
The scary new reality● Cybercrime is exploding.● The use of mobile devices is rising.
● So in just a few years the number and the types of threats have grown massively.
![Page 6: Securedtech Securing your data from Attack Confidentiality – Names, addresses and sensitive data Integrity - Your email Availability - Your website, computer.](https://reader036.fdocuments.in/reader036/viewer/2022083008/56649f305503460f94c4a6af/html5/thumbnails/6.jpg)
Every business is a targetBig businesses● Evernote, Adobe, NatWest, NBC and
Barclays attacked in 2013Small businesses● 71% of data breaches occur in companies
with less than 100 employees (Source: Verizon)
![Page 7: Securedtech Securing your data from Attack Confidentiality – Names, addresses and sensitive data Integrity - Your email Availability - Your website, computer.](https://reader036.fdocuments.in/reader036/viewer/2022083008/56649f305503460f94c4a6af/html5/thumbnails/7.jpg)
Barclays Bank targeted
![Page 8: Securedtech Securing your data from Attack Confidentiality – Names, addresses and sensitive data Integrity - Your email Availability - Your website, computer.](https://reader036.fdocuments.in/reader036/viewer/2022083008/56649f305503460f94c4a6af/html5/thumbnails/8.jpg)
The Facts● Companies are attacked an average of 2
million times a week (Source: IBM)
![Page 9: Securedtech Securing your data from Attack Confidentiality – Names, addresses and sensitive data Integrity - Your email Availability - Your website, computer.](https://reader036.fdocuments.in/reader036/viewer/2022083008/56649f305503460f94c4a6af/html5/thumbnails/9.jpg)
● Many attacks result in sensitive or confidential data being viewed, stolen or used.
● Imagine if a data breach happened to you ...
The Facts
![Page 10: Securedtech Securing your data from Attack Confidentiality – Names, addresses and sensitive data Integrity - Your email Availability - Your website, computer.](https://reader036.fdocuments.in/reader036/viewer/2022083008/56649f305503460f94c4a6af/html5/thumbnails/10.jpg)
Your Security Audit● We checked 101
important IT Security issues.
● You most companies failed 21
![Page 11: Securedtech Securing your data from Attack Confidentiality – Names, addresses and sensitive data Integrity - Your email Availability - Your website, computer.](https://reader036.fdocuments.in/reader036/viewer/2022083008/56649f305503460f94c4a6af/html5/thumbnails/11.jpg)
So far you have been lucky● It only takes 1 security loophole to cause
major problems.
![Page 12: Securedtech Securing your data from Attack Confidentiality – Names, addresses and sensitive data Integrity - Your email Availability - Your website, computer.](https://reader036.fdocuments.in/reader036/viewer/2022083008/56649f305503460f94c4a6af/html5/thumbnails/12.jpg)
The cost of data breaches ● Notifying those whose data has been
breached.● Outside experts to clear up the mess -
lawyers, consultants, PR.● The total cost can run to tens of thousands
of pounds.
![Page 13: Securedtech Securing your data from Attack Confidentiality – Names, addresses and sensitive data Integrity - Your email Availability - Your website, computer.](https://reader036.fdocuments.in/reader036/viewer/2022083008/56649f305503460f94c4a6af/html5/thumbnails/13.jpg)
The IT Security Guards ● IT security is a highly
specialised task these days - general IT support is not enough.
● Securing IT systems is in our DNA.
● Our company name says it all.
![Page 14: Securedtech Securing your data from Attack Confidentiality – Names, addresses and sensitive data Integrity - Your email Availability - Your website, computer.](https://reader036.fdocuments.in/reader036/viewer/2022083008/56649f305503460f94c4a6af/html5/thumbnails/14.jpg)
What makes us different ● Our staff think of
themselves as IT Security Guards
● Our absolute focus is on security
● We speak in Plain English
● Vigilant and diligent, caring and committed staff
● Staff study for the Certified Information Systems Security Professional (CISSP) qualification
![Page 15: Securedtech Securing your data from Attack Confidentiality – Names, addresses and sensitive data Integrity - Your email Availability - Your website, computer.](https://reader036.fdocuments.in/reader036/viewer/2022083008/56649f305503460f94c4a6af/html5/thumbnails/15.jpg)
How we secure IT systems● 24/7 remote
monitoring● Partnerships with
the leading security vendors
● Our staff on call whenever needed
![Page 16: Securedtech Securing your data from Attack Confidentiality – Names, addresses and sensitive data Integrity - Your email Availability - Your website, computer.](https://reader036.fdocuments.in/reader036/viewer/2022083008/56649f305503460f94c4a6af/html5/thumbnails/16.jpg)
Your two choices right now STAY AS YOU ARE● With a partially
secured IT network● Hope you stay
lucky
SWITCH TO US● Have a fully
secured IT network● Have peace of mind
![Page 17: Securedtech Securing your data from Attack Confidentiality – Names, addresses and sensitive data Integrity - Your email Availability - Your website, computer.](https://reader036.fdocuments.in/reader036/viewer/2022083008/56649f305503460f94c4a6af/html5/thumbnails/17.jpg)
Stay safe
We enable technology-dependent businesses to avoid IT disasters